MEMORY_MANAGEMENT mavi ekran hatası

İşletim sistemi
Windows 11

mrmustafax53

Femtopat
Katılım
24 Haziran 2023
Mesajlar
1
Daha fazla  
Cinsiyet
Erkek
RAM
G.Skill 3600 MHZ CL 18 22 22 42 1.35V
SSD veya HDD modeli
SAMSUNG EVO 980 1TB
Ekran kartı
SAPPHİRE RX 6600 8GB
Anakart
ASUS B450M DRAGON
İşlemci
RYZEN 5 3600
Merhaba arkadaşlar. Sistemimi 0'dan dizmiş olmama rağmen oyunlarda olsun Chrome da olsun takılma sonrası mavi ekran yiyorum ve bu cidden sinirlerimi bozmaya başladı. Tüm driverları güncelledim ama olmuyor. Mavi ekranı bir türlü çözemedim. Gidip Memtest yaptım sisteme ve XMP açıkken 90 tane hata buldu. Ama XMP kapalıyken tekrar Memtest'e soktuğumda hiç hata vermedi. BIOS'u güncelledim. Ona rağmen geçmedi. XMP açmadan kullanıyorum şu an sistemi. 1 2 gündür mavi ekran yemedim. Minidump dosyalarımıda paylaşıyorum. Bilen birileri yardım edebilir mi?

tps://drive.google.com/file/d/1eyYiyGwz4-1BuEcSsGPcVwRH5VpVRu2h/view?usp=sharing
 
Öncelikle BIOS güncel olmasına rağmen chipset, Realtek ses sürücüsü ve Ethernet sürücüsü güncel değil.
Ses sürücüsünü buradan yükleyin.

Kod:
start end module name
fffff805`9d150000 fffff805`9d668000 RTKVHD64 (deferred)
 Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
 Image name: RTKVHD64.sys
 Browse all global symbols functions data
 Timestamp: Fri Jun 3 14:28:58 2016 (575169FA)
 CheckSum: 004EBE3A
 ImageSize: 00518000
 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
 Information from resource tables:

Realtek Ethernet sürücüsünü buradan güncelleyin.

Kod:
start end module name
fffff805`7c7b0000 fffff805`7c838000 rtcx21x64 (deferred)
 Mapped memory image file: C:\ProgramData\Dbg\sym\rtcx21x64.sys\615AA51C88000\rtcx21x64.sys
 Image path: \SystemRoot\System32\DriverStore\FileRepository\rtcx21x64.inf_amd64_516e5c9b75c49dc2\rtcx21x64.sys
 Image name: rtcx21x64.sys
 Browse all global symbols functions data
 Timestamp: Mon Oct 4 09:54:20 2021 (615AA51C)
 LegalCopyright: Copyright (C) 2021 Realtek Semiconductor Corporation. All Rights Reserved.

Chipset sürücüsünü buradan güncelleyin.

Kod:
start end module name
fffff805`a3d20000 fffff805`a3d2d000 amdgpio2 (deferred)
 Image path: \SystemRoot\System32\drivers\amdgpio2.sys
 Image name: amdgpio2.sys
 Browse all global symbols functions data
 Timestamp: Wed Mar 11 14:15:48 2020 (5E68C864)
 CheckSum: 0000FA1F
 ImageSize: 0000D000
 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
 Information from resource tables:

Son olarak Memtest86 ile RAM testi gerçekleştirin.


Güncel uygulamayı buradan edinin; MemTest86 - Official Site of the x86 Memory Testing Tool

Kod:
8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff83814ddaca88
Arg3: 81000000700a5867
Arg4: ffff8380fcb76630

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2952

    Key  : Analysis.Elapsed.mSec
    Value: 6730

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1829

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Failure.Bucket
    Value: 0x1a_403_nt!MiDeletePteRun

    Key  : Failure.Hash
    Value: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Version
    Value: 10.0.22621.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffff83814ddaca88

BUGCHECK_P3: 81000000700a5867

BUGCHECK_P4: ffff8380fcb76630

FILE_IN_CAB:  062323-7625-01.dmp

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

STACK_TEXT: 
ffffaa8b`d000ccd8 fffff805`6fea17ec     : 00000000`0000001a 00000000`00000403 ffff8381`4ddaca88 81000000`700a5867 : nt!KeBugCheckEx
ffffaa8b`d000cce0 fffff805`6fc78b48     : 00000000`00000000 ffffaa8b`d000d390 ffff8381`4ddacff8 00000000`00000000 : nt!MiDeletePteRun+0x22ca6c
ffffaa8b`d000ced0 fffff805`6fc318e9     : ffffaa8b`d000d2e0 ffff8381`4ddacff8 ffff6cf7`3e016e04 ffffae86`130e8700 : nt!MiDeleteVaTail+0x48
ffffaa8b`d000cf00 fffff805`6fc31a2a     : ffffaa8b`00000000 ffffae86`130e8700 ffff83c1`00000000 ffffaa8b`d000d330 : nt!MiWalkPageTablesRecursively+0x4e9
ffffaa8b`d000cf90 fffff805`6fc31a2a     : ffffaa8b`d000d2e0 ffffae86`130e8700 ffff83c1`00000000 ffffaa8b`d000d340 : nt!MiWalkPageTablesRecursively+0x62a
ffffaa8b`d000d020 fffff805`6fc31a2a     : ffffaa8b`d000d2e0 ffffae86`130e8700 ffff83c1`00000000 ffffaa8b`d000d350 : nt!MiWalkPageTablesRecursively+0x62a
ffffaa8b`d000d0b0 fffff805`6fc48de1     : 00000000`00000000 ffffae86`130e8700 00000000`00000000 ffffaa8b`d000d360 : nt!MiWalkPageTablesRecursively+0x62a
ffffaa8b`d000d140 fffff805`6fc79ea2     : ffffaa8b`d000d2e0 0000029b`00000001 00000000`00000002 ffffaa8b`00000000 : nt!MiWalkPageTables+0x371
ffffaa8b`d000d240 fffff805`6fc8aeee     : ffffae86`1b953080 fffff805`6fc843e2 ffffaa8b`d000d5e0 ffffae86`17967490 : nt!MiDeletePagablePteRange+0x3c2
ffffaa8b`d000d550 fffff805`700a6417     : 00000000`00000000 00000000`00000001 ffffaa8b`d000d620 ffffaa8b`d000d620 : nt!MiDeleteVirtualAddresses+0x4e
ffffaa8b`d000d5a0 fffff805`70173a26     : 0000029b`b4df0000 ffffae86`17967490 ffffae86`130e8080 00000000`00000000 : nt!MiDeleteVad+0x1b7
ffffaa8b`d000d660 fffff805`70088169     : ffffae86`1c917450 ffffae86`1c917450 ffffae86`1c917450 ffffae86`130e8080 : nt!MiCleanVad+0x42
ffffaa8b`d000d690 fffff805`700dd159     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffae86`130e8080 : nt!MmCleanProcessAddressSpace+0x10d
ffffaa8b`d000d710 fffff805`70104fea     : ffffae86`130e8080 ffff978a`139c0920 ffffaa8b`d000d939 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffffaa8b`d000d7a0 fffff805`701062b8     : 78d88168`00000001 2b70c860`9c773001 ffffae86`1b9530f4 000000c8`b8d24000 : nt!PspExitThread+0x64e
ffffaa8b`d000d8a0 fffff805`6fd1350d     : ffff8381`4df6ad78 ffffae86`130e8700 ffffae86`130e87c0 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffaa8b`d000d8e0 fffff805`6fe32420     : 00000000`00000001 ffffaa8b`d000d9a0 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x47d
ffffaa8b`d000d9a0 fffff805`6fe4108f     : ffffae86`1b953080 ffffae86`0e01fc60 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffaa8b`d000dae0 00007ffd`0d84ecd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c8`cb8ffbc8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`0d84ecd4


SYMBOL_NAME:  nt!MiDeletePteRun+22ca6c

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.1848

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  22ca6c

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------
 

Yeni konular

Geri
Yukarı