Çözüldü Minidump analiz

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

hakangaggo

Femtopat
Katılım
15 Mart 2021
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
Merhaba. 2014'te aldım notebook u garanti bittikten 2 hafta sonra kapandı. Sürekli mavi ekran hatası veriyor. Fişi çekerek kapattıktan sonra 2011'li bir sabit bir tarihe ayarlıyor kendini. RAM'leri çıkarıp temizledim, Fan'ı temizledim, lisanslı Norton alıp yükledim, Technopat'ta BIOS güncelleme dosyalarını indirip güncellemeye çalıştım ama dos ekranında güncelleyip dos ekranında kaldı. Dos ekranından çıkmak için kapatma tuşuna bastıktan sonra yeniden açılışta güncelleme olmadığını gördüm birçok kez denedim. PC bilgisi ve minidump dosyalarının bağlantılarını paylaştım. Yapabilirsem kendim yapmak istiyorum. Yardımcı olursanız sevinirim. Teşekkürler.
PC bilgisi için bağlantı:
1615874999087.png

Minidump dosyaları arşiv bağlantısı:
 
Çözüm
Çünkü sorun RAM'lerde. Lütfen BIOS ayarlarınızı varsayılan ayara döndürüp Memtest86 testi uygulayın. Test bitince muhtemelen RAM'lerde arıza olduğunu görürsünüz. Tek RAM ile sistemi çalıştırın. Sağlam olan RAM'i takarsanız sistem kapanmaz ama sağlam olmayan (arızalı) RAM'i takarsanız bir süre kullanımda kapanır. Bu sayede de sorunlu RAM'i tespit edebilirsiniz.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu arada bu sistemle neden Windows 7 kullanıyorsunuz? Performansa önem veriyorsanız en azından Windows 8.1'e geçiş yapabilirsiniz.

[CODE title="Dökümler"]
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8EF24B4F\031421-68952-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`03657000 PsLoadedModuleList = 0xfffff800`0389a890
Debug session time: Sun Mar 14 02:37:57.218 2021 (UTC + 3:00)
System Uptime: 0 days 0:05:16.619
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`036ccbc0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`0b46e6f0=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80002f6b50
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2234

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 15849

Key : Analysis.Init.CPU.mSec
Value: 2343

Key : Analysis.Init.Elapsed.mSec
Value: 97045

Key : Analysis.Memory.CommitPeak.Mb
Value: 72

Key : WER.OS.Branch
Value: win7sp1_gdr

Key : WER.OS.Timestamp
Value: 2014-03-03T21:44:00Z

Key : WER.OS.Version
Value: 7.1.7601.18409


BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffa80002f6b50

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
fffff880`0b46e6e8 fffff800`0373dd50 : 00000000`0000001a 00000000`00041790 fffffa80`002f6b50 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0b46e6f0 fffff800`036ff7d9 : 00000000`00000000 000007fe`f6430fff fffffa80`00000000 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff880`0b46e8b0 fffff800`039e60f1 : fffffa80`0ad285b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0b46e9d0 fffff800`039e64f3 : fffff880`00000000 000007fe`f63c0000 fffffa80`00000001 fffffa80`055a1e30 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0b46ea90 fffff800`036cbe53 : 00000000`00000008 00000000`773ab0f0 fffffa80`0ada1b30 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f
fffff880`0b46eae0 00000000`0007f76a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`009aefb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7f76a


SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 6.1.7601.18409

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x1a_41790_nt!_??_::FNODOBFM::_string_+35084

OS_VERSION: 7.1.7601.18409

BUILDLAB_STR: win7sp1_gdr

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

FAILURE_ID_HASH: {c402e065-d922-371a-88cc-789738e852e3}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8EF76C4F\031321-32417-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`03402000 PsLoadedModuleList = 0xfffff800`03645890
Debug session time: Sat Mar 13 14:17:21.879 2021 (UTC + 3:00)
System Uptime: 0 days 0:38:29.243
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`03477bc0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`0bcfced0=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80002f6b50
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2171

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 14916

Key : Analysis.Init.CPU.mSec
Value: 2280

Key : Analysis.Init.Elapsed.mSec
Value: 100973

Key : Analysis.Memory.CommitPeak.Mb
Value: 72

Key : WER.OS.Branch
Value: win7sp1_gdr

Key : WER.OS.Timestamp
Value: 2014-03-03T21:44:00Z

Key : WER.OS.Version
Value: 7.1.7601.18409


BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffa80002f6b50

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
fffff880`0bcfcec8 fffff800`034e8d50 : 00000000`0000001a 00000000`00041790 fffffa80`002f6b50 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0bcfced0 fffff800`034aa7d9 : 00000000`00000000 00000000`0d8fffff fffffa80`00000000 fffff683`00000000 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff880`0bcfd090 fffff800`037910f1 : fffffa80`09d12970 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0bcfd1b0 fffff800`037914f3 : 00000000`00000000 00000000`0d800000 fffffa80`00000001 00000000`00000a01 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0bcfd270 fffff800`03476e53 : fffffa80`0a1a29f0 fffff880`0bcfd340 fffffa80`0a24db30 00000000`bae67100 : nt!NtUnmapViewOfSection+0x5f
fffff880`0bcfd2c0 00000000`7718155a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0096e178 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7718155a


SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 6.1.7601.18409

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x1a_41790_nt!_??_::FNODOBFM::_string_+35084

OS_VERSION: 7.1.7601.18409

BUILDLAB_STR: win7sp1_gdr

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

FAILURE_ID_HASH: {c402e065-d922-371a-88cc-789738e852e3}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8EFEAF4F\031321-32729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`03450000 PsLoadedModuleList = 0xfffff800`03693890
Debug session time: Sat Mar 13 23:14:31.273 2021 (UTC + 3:00)
System Uptime: 0 days 0:14:59.277
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`034c5bc0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff880`0adfd570=000000000000001a
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80002f6ac0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2405

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20663

Key : Analysis.Init.CPU.mSec
Value: 2405

Key : Analysis.Init.Elapsed.mSec
Value: 94713

Key : Analysis.Memory.CommitPeak.Mb
Value: 72

Key : WER.OS.Branch
Value: win7sp1_gdr

Key : WER.OS.Timestamp
Value: 2014-03-03T21:44:00Z

Key : WER.OS.Version
Value: 7.1.7601.18409


BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffa80002f6ac0

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: N360Downloader

STACK_TEXT:
fffff880`0adfd568 fffff800`03536d50 : 00000000`0000001a 00000000`00041790 fffffa80`002f6ac0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0adfd570 fffff800`03496e75 : ffffffff`00000000 00000000`04e5ffff fffffa80`00000000 fffffa80`0a7bb880 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff880`0adfd730 fffff800`0379b05a : fffff8a0`063d5950 fffff880`0adfdae0 00000000`00000000 fffffa80`0a7bb880 : nt!MmCleanProcessAddressSpace+0x679
fffff880`0adfd780 fffff800`0377fb7d : 00000000`40010004 00000000`00000201 00000000`7efd5000 fffffa80`0b03eb50 : nt!PspExitThread+0x56a
fffff880`0adfd880 fffff800`034b86fa : 00000000`00000274 00000000`0000027c 00000000`00000290 00000000`00000288 : nt!PsExitSpecialApc+0x1d
fffff880`0adfd8b0 fffff800`034b8a40 : 00000000`00000246 fffff880`0adfd930 fffff800`0377faf0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0adfd930 fffff800`034c4ef7 : 00000000`00000001 fffffa80`0aea0060 00000000`00000000 fffff880`0adfda00 : nt!KiInitiateUserApc+0x70
fffff880`0adfda70 00000000`754a2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`007ef0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x754a2e09


SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 6.1.7601.18409

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x1a_41790_nt!_??_::FNODOBFM::_string_+35084

OS_VERSION: 7.1.7601.18409

BUILDLAB_STR: win7sp1_gdr

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

FAILURE_ID_HASH: {c402e065-d922-371a-88cc-789738e852e3}

Followup: MachineOwner
---------[/CODE]
Çünkü sorun RAM'lerde. Lütfen BIOS ayarlarınızı varsayılan ayara döndürüp Memtest86 testi uygulayın. Test bitince muhtemelen RAM'lerde arıza olduğunu görürsünüz. Tek RAM ile sistemi çalıştırın. Sağlam olan RAM'i takarsanız sistem kapanmaz ama sağlam olmayan (arızalı) RAM'i takarsanız bir süre kullanımda kapanır. Bu sayede de sorunlu RAM'i tespit edebilirsiniz.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu arada bu sistemle neden Windows 7 kullanıyorsunuz? Performansa önem veriyorsanız en azından Windows 8.1'e geçiş yapabilirsiniz.

[CODE title="Dökümler"]
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8EF24B4F\031421-68952-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`03657000 PsLoadedModuleList = 0xfffff800`0389a890
Debug session time: Sun Mar 14 02:37:57.218 2021 (UTC + 3:00)
System Uptime: 0 days 0:05:16.619
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`036ccbc0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`0b46e6f0=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80002f6b50
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2234

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 15849

Key : Analysis.Init.CPU.mSec
Value: 2343

Key : Analysis.Init.Elapsed.mSec
Value: 97045

Key : Analysis.Memory.CommitPeak.Mb
Value: 72

Key : WER.OS.Branch
Value: win7sp1_gdr

Key : WER.OS.Timestamp
Value: 2014-03-03T21:44:00Z

Key : WER.OS.Version
Value: 7.1.7601.18409


BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffa80002f6b50

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
fffff880`0b46e6e8 fffff800`0373dd50 : 00000000`0000001a 00000000`00041790 fffffa80`002f6b50 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0b46e6f0 fffff800`036ff7d9 : 00000000`00000000 000007fe`f6430fff fffffa80`00000000 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff880`0b46e8b0 fffff800`039e60f1 : fffffa80`0ad285b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0b46e9d0 fffff800`039e64f3 : fffff880`00000000 000007fe`f63c0000 fffffa80`00000001 fffffa80`055a1e30 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0b46ea90 fffff800`036cbe53 : 00000000`00000008 00000000`773ab0f0 fffffa80`0ada1b30 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f
fffff880`0b46eae0 00000000`0007f76a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`009aefb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7f76a


SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 6.1.7601.18409

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x1a_41790_nt!_??_::FNODOBFM::_string_+35084

OS_VERSION: 7.1.7601.18409

BUILDLAB_STR: win7sp1_gdr

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

FAILURE_ID_HASH: {c402e065-d922-371a-88cc-789738e852e3}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8EF76C4F\031321-32417-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`03402000 PsLoadedModuleList = 0xfffff800`03645890
Debug session time: Sat Mar 13 14:17:21.879 2021 (UTC + 3:00)
System Uptime: 0 days 0:38:29.243
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`03477bc0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`0bcfced0=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80002f6b50
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2171

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 14916

Key : Analysis.Init.CPU.mSec
Value: 2280

Key : Analysis.Init.Elapsed.mSec
Value: 100973

Key : Analysis.Memory.CommitPeak.Mb
Value: 72

Key : WER.OS.Branch
Value: win7sp1_gdr

Key : WER.OS.Timestamp
Value: 2014-03-03T21:44:00Z

Key : WER.OS.Version
Value: 7.1.7601.18409


BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffa80002f6b50

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
fffff880`0bcfcec8 fffff800`034e8d50 : 00000000`0000001a 00000000`00041790 fffffa80`002f6b50 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0bcfced0 fffff800`034aa7d9 : 00000000`00000000 00000000`0d8fffff fffffa80`00000000 fffff683`00000000 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff880`0bcfd090 fffff800`037910f1 : fffffa80`09d12970 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0bcfd1b0 fffff800`037914f3 : 00000000`00000000 00000000`0d800000 fffffa80`00000001 00000000`00000a01 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0bcfd270 fffff800`03476e53 : fffffa80`0a1a29f0 fffff880`0bcfd340 fffffa80`0a24db30 00000000`bae67100 : nt!NtUnmapViewOfSection+0x5f
fffff880`0bcfd2c0 00000000`7718155a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0096e178 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7718155a


SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 6.1.7601.18409

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x1a_41790_nt!_??_::FNODOBFM::_string_+35084

OS_VERSION: 7.1.7601.18409

BUILDLAB_STR: win7sp1_gdr

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

FAILURE_ID_HASH: {c402e065-d922-371a-88cc-789738e852e3}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8EFEAF4F\031321-32729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`03450000 PsLoadedModuleList = 0xfffff800`03693890
Debug session time: Sat Mar 13 23:14:31.273 2021 (UTC + 3:00)
System Uptime: 0 days 0:14:59.277
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`034c5bc0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff880`0adfd570=000000000000001a
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80002f6ac0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2405

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20663

Key : Analysis.Init.CPU.mSec
Value: 2405

Key : Analysis.Init.Elapsed.mSec
Value: 94713

Key : Analysis.Memory.CommitPeak.Mb
Value: 72

Key : WER.OS.Branch
Value: win7sp1_gdr

Key : WER.OS.Timestamp
Value: 2014-03-03T21:44:00Z

Key : WER.OS.Version
Value: 7.1.7601.18409


BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffa80002f6ac0

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: N360Downloader

STACK_TEXT:
fffff880`0adfd568 fffff800`03536d50 : 00000000`0000001a 00000000`00041790 fffffa80`002f6ac0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0adfd570 fffff800`03496e75 : ffffffff`00000000 00000000`04e5ffff fffffa80`00000000 fffffa80`0a7bb880 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff880`0adfd730 fffff800`0379b05a : fffff8a0`063d5950 fffff880`0adfdae0 00000000`00000000 fffffa80`0a7bb880 : nt!MmCleanProcessAddressSpace+0x679
fffff880`0adfd780 fffff800`0377fb7d : 00000000`40010004 00000000`00000201 00000000`7efd5000 fffffa80`0b03eb50 : nt!PspExitThread+0x56a
fffff880`0adfd880 fffff800`034b86fa : 00000000`00000274 00000000`0000027c 00000000`00000290 00000000`00000288 : nt!PsExitSpecialApc+0x1d
fffff880`0adfd8b0 fffff800`034b8a40 : 00000000`00000246 fffff880`0adfd930 fffff800`0377faf0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0adfd930 fffff800`034c4ef7 : 00000000`00000001 fffffa80`0aea0060 00000000`00000000 fffff880`0adfda00 : nt!KiInitiateUserApc+0x70
fffff880`0adfda70 00000000`754a2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`007ef0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x754a2e09


SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 6.1.7601.18409

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x1a_41790_nt!_??_::FNODOBFM::_string_+35084

OS_VERSION: 7.1.7601.18409

BUILDLAB_STR: win7sp1_gdr

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

FAILURE_ID_HASH: {c402e065-d922-371a-88cc-789738e852e3}

Followup: MachineOwner
---------[/CODE]
 
Çözüm
Teşekkür ederim. Memtest86 ile bozuk ram taraması yapıp dönüş yapıcam .
memtest86 hangi ram in arızalı olduğunu gösterir mi diyedüşünüyorum ?
 
Yardımlarınızla Bozuk ram i bulup değiştirdim. Artık Mavi ekran hatası vermiyor. Diğer sorunlar için açılmış başlıkları incelicem. Yardımlarınız için teşekkür ederim. Allah razı olsun.
 

Yeni konular

Geri
Yukarı