Çözüldü MEMORY_MANAGEMENT mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

vtnzng

Kilopat
Katılım
26 Ağustos 2018
Mesajlar
85
Yer
/dev/sda1/home
Daha fazla  
Cinsiyet
Erkek
Merhaba, sorunsuz çalışan sistemim son zamanlarda art arda çok seri şekilde mavi ekran hatası verip duruyor. Başlarda IRQL_NOT_LESS_OR_EQUAL hatası verirken sonradan hep MEMORY_MANAGEMENT hatası vermeye başladı. Ve işin tuhaf tarafı bu sabah 6 kere mavi ekran verdi ve bilgisayar Boot ediyor şifremi giriyorum anında mavi ekran verip duruyordu. Ama ondan sonra hiç mavi ekran vermedi dün de aynısı oldu. Memtest86 testi yaptım hiç hataya rastlamadı. Önceden 20H2 kullanıyordum 1909 da yükledim aynı sorunu yaşadım. Bunun nedeni ne olabilir?

Not: Format atarken de bir kere mavi ekran vermişti.

Sistem: MSI B450M PRO-VDH \ MSI 1050 Ti OC 4 GB \ Ryzen 5 3600 \ Kingston A2000 \corsair Vengeance 8 GB DDR4 2400 MHz + Corsair Vengeance 8 GB DDR4 3200 MHz. (8 GB 2400 MHz'lik RAM 2017'den kalma.)

[CODE title="Dökümler"]*******************************************************************************************************************************************************************************

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 3296.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 3384.

Key: Analysis. Init. CPU. Msec.
Value: 1515.

Key: Analysis. Init. Elapsed. Msec.
Value: 16249.

Key: Analysis. Memory.commitpeak. MB.
Value: 70.

Key: Memorymanagement. Pfn.
Value: 4000.

Key: Wer. OS. Branch.
Value: 19h1_release.

Key: Wer. OS. Timestamp.
Value: 2019-03-18t12:02:00Z

Key: Wer. OS. Version.
Value: 10.0.18362.1

Bugcheck_code: 1a.

Bugcheck_p1: 41792.

Bugcheck_p2: Fffff180C9875108.

Bugcheck_p3: 4000000.

Bugcheck_p4: 0

Memory_corruptor: One_bıt.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: rundll32.exe

Stack_text:
Ffffb70C'F48C9da8 fffff806'07025286: 00000000'0000001A 00000000'00041792 fffff180'C9875108 00000000'04000000: NT! Kebugcheckex.
Ffffb70C'F48C9dB0 fffff806'06eacdb7: 00000000'00000000 fffff180'C9875108 00000000'00000000 00000000'00000000: NT! Mideleteva+0x1766D6
Ffffb70C'F48C9ec0 fffff806'06ead271: Ffffb70C'F48ca310 fffff1F8'C064C3A8 00000000'00000000 0A000001'56F96867: NT! Miwalkpagetablesrecursively+0x1e7
Ffffb70C'F48C9F80 fffff806'06ead271: Ffffb70C'F48ca310 fffff1F8'FC603260 00000000'00000000 0A000001'54a5D867: NT! Miwalkpagetablesrecursively+0x6a1
Ffffb70C'F48ca040 fffff806'06ead271: Ffffb70C'F48ca310 fffff1F8'FC7e3018 fffff1F8'00000000 0A000001'4B65C867: NT! Miwalkpagetablesrecursively+0x6a1
Ffffb70C'F48ca100 fffff806'06eac9fc: Ffffb70C'F48ca310 fffff1F8'FC7e3F18 ffffb70C'00000000 ffffb70C'F48ca289: NT! Miwalkpagetablesrecursively+0x6a1
Ffffb70C'F48ca1C0 fffff806'06eaae68: Ffffb70C'F48ca310 ffffcd8D'00000002 00000000'00000001 00000000'00000000: NT! Miwalkpagetables+0x36C
Ffffb70C'F48ca2C0 fffff806'06eb8fc0: Ffffffff'ffffffff ffffcd8D'452b93F8 00000000'00000001 00000000'00000000: NT! Mideletepagablepterange+0x268
Ffffb70C'F48ca660 fffff806'073C786D: Ffffcd8D'421b70C0 ffffcd8D'421b70C0 ffffcd8D'4362E180 ffffcd8D'452b93F0: NT! Mideletevad+0x860
Ffffb70C'F48ca820 fffff806'073D9C24: Ffffcd8D'4362E180 ffffcd8D'44F329a0 ffffcd8D'421b70C0 00000000'00000000: NT! Miunmapvad+0x49
Ffffb70C'F48ca850 fffff806'073D96df: Ffffcd8D'39e341b0 ffffcd8D'39e341b0 ffffcd8D'452B9080 fffff806'0726A480: NT! Micleanvad+0x30
Ffffb70C'F48ca880 fffff806'07437BB1: Ffffffff'00000000 ffffffff'ffffffff ffffb70C'F48caB01 ffffcd8D'452b9080: NT! Mmcleanprocessaddressspace+0x137
Ffffb70C'F48ca900 fffff806'0745E1C3: Ffffcd8D'452B9080 ffff9F84'7B67E7B0 ffffb70C'F48caB80 00000000'00000000: NT! Psprundownsingleprocess+0x139
Ffffb70C'F48ca980 fffff806'0743922B: 00000000'00000000 ffffb70C'F48caB01 00000047'E6518000 ffffcd8D'421b70C0: NT! Pspexitthread+0x60B
Ffffb70C'F48caa90 fffff806'06fd2B18: Ffffcd8D'000025F8 ffffcd8D'421b70C0 ffffcd8D'452B9080 00000000'00050024: NT! Ntterminateprocess+0xeb
Ffffb70C'F48caB00 00007FFA'1fa9C644: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000047'E63df8F8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffa`1fa9c644

Module_name: Hardware.

Image_name: Memory_corruption.

Stack_command: Thread. Cxr; KB.

Faılure_bucket_ıd: Memory_corruptıon_one_bıt

Os_versıon: 10.0.18362.1

Buıldlab_str: 19h1_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {e3FAF315-C3D0-81DB-819a-6C43D23C63A7}

Followup: Machineowner.
---------
*******************************************************************************************************************************************************************************

Microsoft (r) Windows debugger version 10.0.21349. 1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.

Loading dump file [C:\Users\Whan\Desktop\Yeni klasör\062921-5312-02.dmp]
Mini kernel dump file: Only registers and stack trace are available.

************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 18362 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 18362.1.AMD64fre. 19h1_release. 190318-1202
Machine name:
Kernel base = 0xfffff802`47200000 psloadedmodulelist = 0xfffff802`47648210
Debug session time: Tue jun 29 12:44:17.837 2021 (utc + 3:00)
System uptime: 0 days 0:00:17.533
Loading kernel symbols.

Loading user symbols.
Loading unloaded module list.

For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff802'473C1220 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff858F'68A60dB0 = 000000000000001A.
8: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, a corrupt pte has been detected. Parameter 2 contains the address of.
The pte. Parameters 3/4 contain the low/high parts of the pte.
Arg2: Ffff9fbffab3eca0.
Arg3: 0000000000004000.
Arg4: 0000000000000000.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 4015.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 26360.

Key: Analysis. Init. CPU. Msec.
Value: 1514.

Key: Analysis. Init. Elapsed. Msec.
Value: 11158.

Key: Analysis. Memory.commitpeak. MB.
Value: 72.

Key: Memorymanagement. Pfn.
Value: 4

Key: Wer. OS. Branch.
Value: 19h1_release.

Key: Wer. OS. Timestamp.
Value: 2019-03-18t12:02:00Z

Key: Wer. OS. Version.
Value: 10.0.18362.1

Bugcheck_code: 1a.

Bugcheck_p1: 41792.

Bugcheck_p2: Ffff9fbffab3eca0.

Bugcheck_p3: 4000.

Bugcheck_p4: 0

Memory_corruptor: One_bıt.

Customer_crash_count: 2

Process_name: taskhostw.exe

Stack_text:
Ffff858F'68A60da8 fffff802'47425286: 00000000'0000001A 00000000'00041792 ffff9fbf'fab3eca0 00000000'00004000: NT! Kebugcheckex.
Ffff858F'68A60dB0 fffff802'472acdb7: 00000000'00000000 ffff9fbf'fab3eca0 00000000'00000000 00000000'00000000: NT! Mideleteva+0x1766D6
Ffff858F'68A60ec0 fffff802'472ad271: Ffff858F'68A61310 ffff9fcf'dffd59F0 00000000'00000000 0A000001'55b30867: NT! Miwalkpagetablesrecursively+0x1e7
Ffff858F'68A60F80 fffff802'472ad271: Ffff858F'68A61310 ffff9fcf'e7effea8 00000000'00000000 0A000001'55b2F867: NT! Miwalkpagetablesrecursively+0x6a1
Ffff858F'68A61040 fffff802'472ad271: Ffff858F'68A61310 ffff9fcf'e7F3F7F8 00000000'00000000 0A000001'55b2e867: NT! Miwalkpagetablesrecursively+0x6a1
Ffff858F'68A61100 fffff802'472AC9fc: Ffff858F'68A61310 ffff9fcf'e7F3F9F8 ffff858F'00000000 ffff858F'68A61289: NT! Miwalkpagetablesrecursively+0x6a1
Ffff858F'68A611C0 fffff802'472aae68: Ffff858F'68A61310 00000000'00000002 00000000'00000001 00000000'00000000: NT! Miwalkpagetables+0x36C
Ffff858F'68A612C0 fffff802'472b8fc0: Ffffffff'ffffffff ffffb285'47b603F8 ffff858F'00000001 00000000'00000000: NT! Mideletepagablepterange+0x268
Ffff858F'68A61660 fffff802'477C786D: Ffffb285'466F2440 ffffb285'466F2440 ffffb285'4663A340 ffffb285'47b603F0: NT! Mideletevad+0x860
Ffff858F'68A61820 fffff802'477D9C24: Ffffb285'4663A340 ffffb285'47b60ba0 ffffb285'466F2440 00000000'00000000: NT! Miunmapvad+0x49
Ffff858F'68A61850 fffff802'477D96df: Ffffb285'46624360 ffffb285'46624360 ffffb285'47b60080 fffff802'4766A480: NT! Micleanvad+0x30
Ffff858F'68A61880 fffff802'47837BB1: Ffffffff'00000000 ffffffff'ffffffff ffff858F'68A61B01 ffffb285'47b60080: NT! Mmcleanprocessaddressspace+0x137
Ffff858F'68A61900 fffff802'4785E1C3: Ffffb285'47b60080 ffffa101'FB8C1060 ffff858F'68A61B80 00000000'00000000: NT! Psprundownsingleprocess+0x139
Ffff858F'68A61980 fffff802'4783922B: 00000000'00000000 ffff858F'68A61B01 000000E1'a5baB000 ffffb285'466F2440: NT! Pspexitthread+0x60B
Ffff858F'68A61A90 fffff802'473D2B18: Ffffb285'00002780 ffffb285'466F2440 ffffb285'47b60080 00000208'347D1250: NT! Ntterminateprocess+0xeb
Ffff858F'68A61B00 00007FF8'7C51C644: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
000000E1'A59ef608 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ff8`7c51c644

Module_name: Hardware.

Image_name: Memory_corruption.

Stack_command: Thread. Cxr; KB.

Faılure_bucket_ıd: Memory_corruptıon_one_bıt

Os_versıon: 10.0.18362.1

Buıldlab_str: 19h1_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {e3FAF315-C3D0-81DB-819a-6C43D23C63A7}

Followup: Machineowner.
---------
*******************************************************************************************************************************************************************************

Microsoft (r) Windows debugger version 10.0.21349. 1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.

Loading dump file [C:\Users\Whan\Desktop\Yeni klasör\062921-5437-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.

************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 18362 MP (12 procs) Free X64.
PROduct: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 18362.1.AMD64fre. 19h1_release. 190318-1202
Machine name:
Kernel base = 0xfffff804`27a00000 psloadedmodulelist = 0xfffff804`27e48210
Debug session time: Tue jun 29 12:45:06.276 2021 (utc + 3:00)
System uptime: 0 days 0:00:19.972
Loading kernel symbols.



Loading user symbols.
Loading unloaded module list.

For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff804'27bc1220 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffffc30e'9A036E90 = 000000000000001A.
0: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, a corrupt pte has been detected. Parameter 2 contains the address of.
The pte. Parameters 3/4 contain the low/high parts of the pte.
Arg2: FFFFD90137FE6678.
Arg3: 0000000000004000.
Arg4: 0000000000000000.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 4749.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 49068.

Key: Analysis. Init. CPU. Msec.
Value: 1514.

Key: Analysis. Init. Elapsed. Msec.
Value: 6998.

Key: Analysis. Memory.commitpeak. MB.
Value: 71.

Key: Memorymanagement. Pfn.
Value: 4

Key: Wer. OS. Branch.
Value: 19h1_release.

Key: Wer. OS. Timestamp.
Value: 2019-03-18t12:02:00Z

Key: Wer. OS. Version.
Value: 10.0.18362.1

Bugcheck_code: 1A.

Bugcheck_p1: 41792.

Bugcheck_p2: FFFFD90137FE6678.

Bugcheck_p3: 4000.

Bugcheck_p4: 0

Memory_corruptor: One_bıt.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: SettingSyncHost.exe

Stack_text:
Ffffc30e'9A036E88 fffff804'27C25286: 00000000'0000001A 00000000'00041792 ffffd901'37FE6678 00000000'00004000: NT! Kebugcheckex.
Ffffc30e'9A036E90 fffff804'27aacdb7: 00000000'00000000 ffffd901'37FE6678 00000000'00000000 00000000'00000000: NT! Mideleteva+0x1766D6
Ffffc30e'9A036FA0 fffff804'27aad271: Ffffc30e'9A0373F0 ffffd96C'809bff30 00000000'00000000 0A000001'9C516867: NT! Miwalkpagetablesrecursively+0x1e7
Ffffc30e'9A037060 fffff804'27aad271: Ffffc30e'9A0373F0 ffffd96C'B6404DF8 00000000'00000000 0A000001'8388E867: NT! Miwalkpagetablesrecursively+0x6a1
Ffffc30e'9A037120 fffff804'27aad271: Ffffc30e'9A0373F0 ffffd96C'B65B2020 ffffd96C'00000000 0A000001'8388D867: NT! Miwalkpagetablesrecursively+0x6a1
Ffffc30e'9A0371E0 fffff804'27aac9fc: Ffffc30e'9A0373F0 00000000'00000000 00000000'00000000 ffffac8F'AE508450: NT! Miwalkpagetablesrecursively+0x6a1
Ffffc30e'9A0372A0 fffff804'27aaae68: Ffffc30e'9A0373F0 00000000'00000002 ffffac8F'00000001 00000000'00000000: NT! Miwalkpagetables+0x36C
Ffffc30e'9A0373A0 fffff804'27ab8fc0: Ffffffff'ffffffff ffffac8F'AC4513F8 ffffc30e'00000001 00000000'00000000: NT! Mideletepagablepterange+0x268
Ffffc30e'9A037740 fffff804'27A5919a: 00000000'26ffcd90 ffffac8F'adcd0080 00000000'00000000 fffff804'27ab3F9a: NT! Mideletevad+0x860
Ffffc30e'9A037900 fffff804'2805B310: 00000000'00000000 00000000'00000000 ffffc30e'9A037A60 ffffffff'ffffffff: NT! Mifreevadrange+0x9E
Ffffc30e'9A037960 fffff804'2805AF4B: 00000000'00000000 00000000'00000000 000000A0'67D7e1a0 0000026F'fcc90000: NT! Mmfreevirtualmemory+0x390
Ffffc30e'9A037AA0 fffff804'27bd2B18: Ffffac8F'adcd0080 ffffc30e'9A037B80 ffffc30e'9A037B80 00000000'00000000: NT! Ntfreevirtualmemory+0x8B
Ffffc30e'9A037B00 00007FFC'1fb7C484: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
000000A0'67D7e1b8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffc`1fb7c484

Module_name: Hardware.

Image_name: Memory_corruption.

Stack_command: Thread. Cxr; KB.

Faılure_bucket_ıd: Memory_corruptıon_one_bıt

Os_versıon: 10.0.18362.1

Buıldlab_str: 19h1_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {e3FAF315-C3D0-81DB-819a-6C43D23C63A7}

Followup: Machineowner.
---------
*******************************************************************************************************************************************************************************

Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Whan\Desktop\Yeni klasör\062921-5593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff800`0e600000 PsLoadedModuleList = 0xfffff800`0ea48210
Debug session time: Tue Jun 29 12:47:09.600 2021 (UTC + 3:00)
System Uptime: 0 days 0:00:22.278
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`0e7c1220 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff982`1ab29dc0=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffa50005f43420
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3217

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 23542

Key : Analysis.Init.CPU.mSec
Value: 1484

Key : Analysis.Init.Elapsed.mSec
Value: 4077

Key : Analysis.Memory.CommitPeak.Mb
Value: 71

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffa50005f43420

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: WerFault.exe

STACK_TEXT:
fffff982`1ab29db8 fffff800`0e7e9548 : 00000000`0000001a 00000000`00041790 ffffa500`05f43420 00000000`00000000 : nt!KeBugCheckEx
fffff982`1ab29dc0 fffff800`0e6b15c7 : 00000000`00000003 fffff982`1ab2a510 fffff982`1ab2a510 fffff982`1ab2a460 : nt!MiDeletePteRun+0x1d32e8
fffff982`1ab29fe0 fffff800`0e6ad0e2 : ffffe282`5f6975c0 ffffa880`00036000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffff982`1ab2a010 fffff800`0e6ad271 : fffff982`1ab2a460 ffffa8d4`400001a8 00000000`00000000 0a000001`fc116867 : nt!MiWalkPageTablesRecursively+0x512
fffff982`1ab2a0d0 fffff800`0e6ad271 : fffff982`1ab2a460 ffffa8d4`6a200000 00000000`00000000 0a000001`f969c867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff982`1ab2a190 fffff800`0e6ad271 : fffff982`1ab2a460 ffffa8d4`6a351000 ffffa8d4`00000000 0a000001`f739b867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff982`1ab2a250 fffff800`0e6ac9fc : fffff982`1ab2a460 00000000`06c01000 ffffa500`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff982`1ab2a310 fffff800`0e6aae68 : fffff982`1ab2a460 00000000`00000002 ffffe282`00000001 90000001`00000000 : nt!MiWalkPageTables+0x36c
fffff982`1ab2a410 fffff800`0e6b8fc0 : ffffffff`ffffffff ffffe282`5f697438 ffffe282`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff982`1ab2a7b0 fffff800`0ebc786d : 00000000`00000000 00000000`000066e0 ffffe282`5f5d1420 00000000`00000000 : nt!MiDeleteVad+0x860
fffff982`1ab2a970 fffff800`0ebc7663 : ffffe282`5f5d1420 00000000`00000000 00000000`066e0000 00000000`00000000 : nt!MiUnmapVad+0x49
fffff982`1ab2a9a0 fffff800`0ebc74f9 : ffffe282`5f6970c0 00000000`00000008 ffffe282`542b67a0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
fffff982`1ab2aa80 fffff800`0ebc71ec : ffffe282`549e9080 00007ffb`36444e01 00000000`00000003 ffffe282`5f6970c0 : nt!NtUnmapViewOfSectionEx+0x99
fffff982`1ab2aad0 fffff800`0e7d2b18 : ffffe282`549e9080 00007ffb`36444901 00000000`02721000 00000000`003a9c28 : nt!NtUnmapViewOfSection+0xc
fffff982`1ab2ab00 00007ffb`375bc604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0036e4a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`375bc604


SYMBOL_NAME: nt!MiDeletePteRun+1d32e8

MODULE_NAME: nt

IMAGE_VERSION: 10.0.18362.418

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 1d32e8

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup: MachineOwner
---------[/CODE]
 
Son düzenleyen: Moderatör:
Çözüm
Sorun RAM'de görünüyor. BIOS'tan XMP modu açıksa kapatıp öyle Memtest86 testi uygular mısınız? Ayrıca sistemi XMP kapalıyken kullanmayı da deneyebilirsiniz.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Sorun RAM'de görünüyor. BIOS'tan XMP modu açıksa kapatıp öyle Memtest86 testi uygular mısınız? Ayrıca sistemi XMP kapalıyken kullanmayı da deneyebilirsiniz.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
 
Çözüm
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…