Çünkü sorun RAM'lerde. Lütfen BIOS ayarlarınızı varsayılan ayara döndürüp Memtest86 testi uygulayın. Test bitince muhtemelen RAM'lerde arıza olduğunu görürsünüz. Tek RAM ile sistemi çalıştırın. Sağlam olan RAM'i takarsanız sistem kapanmaz ama sağlam olmayan (arızalı) RAM'i takarsanız bir süre kullanımda kapanır. Bu sayede de sorunlu RAM'i tespit edebilirsiniz.
Bu arada bu sistemle neden Windows 7 kullanıyorsunuz? Performansa önem veriyorsanız en azından Windows 8.1'e geçiş yapabilirsiniz.
[CODE title="Dökümler"]
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8EF24B4F\031421-68952-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`03657000 PsLoadedModuleList = 0xfffff800`0389a890
Debug session time: Sun Mar 14 02:37:57.218 2021 (UTC + 3:00)
System Uptime: 0 days 0:05:16.619
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`036ccbc0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`0b46e6f0=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80002f6b50
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2234
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15849
Key : Analysis.Init.CPU.mSec
Value: 2343
Key : Analysis.Init.Elapsed.mSec
Value: 97045
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: win7sp1_gdr
Key : WER.OS.Timestamp
Value: 2014-03-03T21:44:00Z
Key : WER.OS.Version
Value: 7.1.7601.18409
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: fffffa80002f6b50
BUGCHECK_P3: ffff
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff880`0b46e6e8 fffff800`0373dd50 : 00000000`0000001a 00000000`00041790 fffffa80`002f6b50 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0b46e6f0 fffff800`036ff7d9 : 00000000`00000000 000007fe`f6430fff fffffa80`00000000 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff880`0b46e8b0 fffff800`039e60f1 : fffffa80`0ad285b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0b46e9d0 fffff800`039e64f3 : fffff880`00000000 000007fe`f63c0000 fffffa80`00000001 fffffa80`055a1e30 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0b46ea90 fffff800`036cbe53 : 00000000`00000008 00000000`773ab0f0 fffffa80`0ada1b30 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f
fffff880`0b46eae0 00000000`0007f76a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`009aefb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7f76a
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.18409
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_41790_nt!_??_::FNODOBFM::_string_+35084
OS_VERSION: 7.1.7601.18409
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {c402e065-d922-371a-88cc-789738e852e3}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8EF76C4F\031321-32417-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`03402000 PsLoadedModuleList = 0xfffff800`03645890
Debug session time: Sat Mar 13 14:17:21.879 2021 (UTC + 3:00)
System Uptime: 0 days 0:38:29.243
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`03477bc0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`0bcfced0=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80002f6b50
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2171
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14916
Key : Analysis.Init.CPU.mSec
Value: 2280
Key : Analysis.Init.Elapsed.mSec
Value: 100973
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: win7sp1_gdr
Key : WER.OS.Timestamp
Value: 2014-03-03T21:44:00Z
Key : WER.OS.Version
Value: 7.1.7601.18409
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: fffffa80002f6b50
BUGCHECK_P3: ffff
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff880`0bcfcec8 fffff800`034e8d50 : 00000000`0000001a 00000000`00041790 fffffa80`002f6b50 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0bcfced0 fffff800`034aa7d9 : 00000000`00000000 00000000`0d8fffff fffffa80`00000000 fffff683`00000000 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff880`0bcfd090 fffff800`037910f1 : fffffa80`09d12970 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0bcfd1b0 fffff800`037914f3 : 00000000`00000000 00000000`0d800000 fffffa80`00000001 00000000`00000a01 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0bcfd270 fffff800`03476e53 : fffffa80`0a1a29f0 fffff880`0bcfd340 fffffa80`0a24db30 00000000`bae67100 : nt!NtUnmapViewOfSection+0x5f
fffff880`0bcfd2c0 00000000`7718155a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0096e178 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7718155a
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.18409
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_41790_nt!_??_::FNODOBFM::_string_+35084
OS_VERSION: 7.1.7601.18409
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {c402e065-d922-371a-88cc-789738e852e3}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8EFEAF4F\031321-32729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`03450000 PsLoadedModuleList = 0xfffff800`03693890
Debug session time: Sat Mar 13 23:14:31.273 2021 (UTC + 3:00)
System Uptime: 0 days 0:14:59.277
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`034c5bc0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff880`0adfd570=000000000000001a
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80002f6ac0
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2405
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20663
Key : Analysis.Init.CPU.mSec
Value: 2405
Key : Analysis.Init.Elapsed.mSec
Value: 94713
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: win7sp1_gdr
Key : WER.OS.Timestamp
Value: 2014-03-03T21:44:00Z
Key : WER.OS.Version
Value: 7.1.7601.18409
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: fffffa80002f6ac0
BUGCHECK_P3: ffff
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: N360Downloader
STACK_TEXT:
fffff880`0adfd568 fffff800`03536d50 : 00000000`0000001a 00000000`00041790 fffffa80`002f6ac0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0adfd570 fffff800`03496e75 : ffffffff`00000000 00000000`04e5ffff fffffa80`00000000 fffffa80`0a7bb880 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff880`0adfd730 fffff800`0379b05a : fffff8a0`063d5950 fffff880`0adfdae0 00000000`00000000 fffffa80`0a7bb880 : nt!MmCleanProcessAddressSpace+0x679
fffff880`0adfd780 fffff800`0377fb7d : 00000000`40010004 00000000`00000201 00000000`7efd5000 fffffa80`0b03eb50 : nt!PspExitThread+0x56a
fffff880`0adfd880 fffff800`034b86fa : 00000000`00000274 00000000`0000027c 00000000`00000290 00000000`00000288 : nt!PsExitSpecialApc+0x1d
fffff880`0adfd8b0 fffff800`034b8a40 : 00000000`00000246 fffff880`0adfd930 fffff800`0377faf0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0adfd930 fffff800`034c4ef7 : 00000000`00000001 fffffa80`0aea0060 00000000`00000000 fffff880`0adfda00 : nt!KiInitiateUserApc+0x70
fffff880`0adfda70 00000000`754a2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`007ef0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x754a2e09
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.18409
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_41790_nt!_??_::FNODOBFM::_string_+35084
OS_VERSION: 7.1.7601.18409
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {c402e065-d922-371a-88cc-789738e852e3}
Followup: MachineOwner
---------[/CODE]