R5 3600X sistemde mavi ekran hatası

İşletim sistemi
Windows 11

Xasthur

Hectopat
Katılım
4 Haziran 2020
Mesajlar
271
Yer
Safranbolu
Daha fazla  
Cinsiyet
Erkek
RAM
GSKILL 16GB (2x8GB) Ripjaws V Siyah 3200MHz CL16 DDR4
SSD veya HDD modeli
WD 500GB Blue NVMe M.2 SSD
Ekran kartı
MSI GeForce RTX 2060 SUPER GAMING X 8GB
Anakart
MSI B450M PRO VDH-MAX
İşlemci
R5 3600X
QUOTA_UNDERFLOW mavi ekran hatası aldım. Windows 10'da uzun zamandır mavi ekran çıkmıyordu. Memtest86 yapmıştım yakın zamanda hata çıkmamıştı.

Minidump: 101521-6984-01.zip
 
1- CMD'yi yönetici olarak açıp SFC/Scannow komutunu çalıştırın.
2-MemTest ile RAM testi yapınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
3-DDU ile ekran kartı sürücülerinizi kaldırın. (DDU ile ekran kartı driver silme)
4-BIOS update varsa yapınız.
 
Merhaba son günlerde 2 mavi ekran hatası aldım. Memtest86 yaptım sonuç temiz çıktı.
Minidump'ları paylaşıyorum. Yardımcı olursanız sevinirim.

Minidump: Minidump.zip

SFC/Scannow yaptım. Memtest yaptım temiz çıktı diye yazmıştım. DDU ile silip yüklerim fakat sorun nedir merak ettim.

Son 1 ayda 4 mavi ekran hatası aldım. Ondan önce de mavi ekran hatası konularım var. Bir türlü çözüm bulamıyorum.Sfc/scannow yaptım hata çıkmadı. DISM /online /cleanup-image /restorehealth yaptım hata çıkmadı. HD Tune testi yaptım hata çıkmadı. Memtest 86 3 defa yaptım hata çıkmadı. BIOS, Windows 11 ve sürücüler güncel. Son aldığım 4 mavi ekran hatasının Minidump'ını paylaşıyorum. Yardımcı olabilirseniz çok sevinirim.
@Recep Baltaş @Plyra

 
Son düzenleme:
Aldığın hataların olası üç sebebi var:
  • RAM
  • İşlemci
  • Anakart
PSU düşük ihtimal diyorum. İlk önerim işlemciyi söküp geri takman. Bazen iyi temas etmeyen işlemci bacaklarının AMD sistemde sorun çıkarabildiği oldu.

Memtest hangi sürümü kullandın test için ve bellekleri söküp taktın mı?


Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff818a07798f18, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80106a76d3f, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1562

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6598

    Key  : Analysis.IO.Other.Mb
    Value: 4

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 25

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 17609

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  102222-11781-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff818a07798f18

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80106a76d3f

BUGCHECK_P4: 0

READ_ADDRESS: fffff8010751c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff818a07798f18

MM_INTERNAL_CODE:  0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc400ae71dfe0 -- (.trap 0xffffc400ae71dfe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff818a07798f08 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff818a02349f08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80106a76d3f rsp=ffffc400ae71e170 rbp=ffff818a02349f08
 r8=ffff818a02349f08  r9=ffff818a02349f18 r10=ffff8189e30002d0
r11=ffff818a0cb9df08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlRbRemoveNode+0x51f:
fffff801`06a76d3f f6401001        test    byte ptr [rax+10h],1 ds:ffff818a`07798f18=??
Resetting default scope

STACK_TEXT: 
ffffc400`ae71ddb8 fffff801`06c7e557     : 00000000`00000050 ffff818a`07798f18 00000000`00000000 ffffc400`ae71dfe0 : nt!KeBugCheckEx
ffffc400`ae71ddc0 fffff801`06a53c4c     : 00000000`00000000 00000000`00000000 ffffc400`ae71df79 00000000`00000000 : nt!MiSystemFault+0x22d827
ffffc400`ae71dec0 fffff801`06c36edd     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`06b1f2d2 : nt!MmAccessFault+0x29c
ffffc400`ae71dfe0 fffff801`06a76d3f     : ffff818a`0b4b1f00 00000000`000004f2 ffff818a`0b4ac000 00000027`000e0000 : nt!KiPageFault+0x35d
ffffc400`ae71e170 fffff801`06a76362     : 00000000`00000000 ffffc400`ae71e390 ffff818a`0b4acfe0 00000000`00000027 : nt!RtlRbRemoveNode+0x51f
ffffc400`ae71e1a0 fffff801`06a73a19     : ffff8189`e30002c0 00000000`00000000 00000000`00002bed ffffc400`ae71e268 : nt!RtlpHpVsChunkCoalesce+0x272
ffffc400`ae71e1f0 fffff801`06a73932     : ffff818a`0aa51ca0 ffff8189`00000000 ffff8189`e30002c0 00000000`00000000 : nt!RtlpHpVsChunkFree+0x49
ffffc400`ae71e260 fffff801`06b21bfe     : ffff8189`f38eb640 ffff818a`0a7a6d60 00000000`00000000 fffff801`06800000 : nt!RtlpHpVsContextFreeList+0x102
ffffc400`ae71e2d0 fffff801`06b21927     : ffff8189`e3000140 00000000`00000000 ffff8189`f38eb650 fffff801`06b21873 : nt!RtlpHpVsContextFree+0xfe
ffffc400`ae71e310 fffff801`0729aca5     : 00000000`6e664d46 fffff801`00000003 01000000`00000220 00000000`00000220 : nt!ExFreeHeapPool+0x3a7
ffffc400`ae71e3c0 fffff801`06a9314a     : ffffffff`ffffffff fffff801`0476ff74 00000000`00000000 fffff801`0473b936 : nt!ExFreePool+0x25
ffffc400`ae71e400 fffff801`047705c7     : 00000000`00000000 fffff801`0473b936 ffffb00c`8c142c04 ffffb00c`9cb29150 : nt!ExFreeToNPagedLookasideList+0x2a
ffffc400`ae71e430 fffff801`047704c4     : 00000000`00004000 ffff8189`f38eb678 ffffb00c`939860c0 fffff801`0475b060 : FLTMGR!FltpFreeFileNameInformation+0x67
ffffc400`ae71e470 fffff801`047397f5     : 00000000`00000000 ffffb00c`9cb29150 ffffb00c`00004000 00000000`00000000 : FLTMGR!FltpRemoveAllNamesCachedForFileObject+0x214
ffffc400`ae71e4f0 fffff801`04738e21     : ffffc400`ae71e710 00000000`00000002 ffffb00c`00000000 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x7d5
ffffc400`ae71e600 fffff801`04737da9     : ffffc400`ae71f000 ffffc400`ae719000 ffffb00c`916ccaa0 ffffc400`ae71e720 : FLTMGR!FltpPassThroughInternal+0xd1
ffffc400`ae71e650 fffff801`04737b8b     : ffffffff`fffe7960 00000000`00000000 00000000`00000080 ffffb00c`8c08fd20 : FLTMGR!FltpPassThrough+0x179
ffffc400`ae71e6f0 fffff801`06acb875     : ffffb00c`9cb29150 fffff801`06ad4468 ffffb00c`9f8b8650 ffffb00c`87010000 : FLTMGR!FltpDispatch+0x8b
ffffc400`ae71e750 fffff801`06ec7bcc     : ffffb00c`9cb29150 ffff818a`01db5e10 ffffb00c`8c1a5030 00000000`00000000 : nt!IofCallDriver+0x55
ffffc400`ae71e790 fffff801`06ec254e     : ffffb00c`86f9b980 00000000`00000000 ffffb00c`9cb29120 ffff818a`01db5e10 : nt!IopDeleteFile+0x13c
ffffc400`ae71e810 fffff801`06acd3ff     : 00000000`00000000 00000000`00000000 ffff818a`01db5e10 ffffb00c`9cb29150 : nt!ObpRemoveObjectRoutine+0x7e
ffffc400`ae71e870 fffff801`06f7315d     : 00000000`00000000 ffffb00c`9f8b8610 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0x8f
ffffc400`ae71e8b0 fffff801`06e0f307     : 00000000`00000001 00000000`00000000 ffffc400`ae71e980 fffff801`0746afc0 : nt!MiSegmentDelete+0xf5
ffffc400`ae71e900 fffff801`06ce485d     : fffff801`00000000 00000000`00000001 00000000`00000000 fffff801`0746b560 : nt!MiProcessDereferenceList+0x113
ffffc400`ae71e9c0 fffff801`06b08887     : ffffb00c`8c1dd280 ffffb00c`8c1dd280 00000000`00000080 fffff801`06bdae50 : nt!MiDereferenceSegmentThread+0x109a0d
ffffc400`ae71ebf0 fffff801`06c2c214     : ffffe700`a8b11180 ffffb00c`8c1dd280 fffff801`06b08830 00000000`00000000 : nt!PspSystemThreadStartup+0x57
ffffc400`ae71ec40 00000000`00000000     : ffffc400`ae71f000 ffffc400`ae719000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


SYMBOL_NAME:  nt!RtlRbRemoveNode+51f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.675

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  51f

FAILURE_BUCKET_ID:  AV_R_(null)_nt!RtlRbRemoveNode

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f2fc99a7-a568-9000-189c-318e268059a1}

Followup:     MachineOwner
---------

4: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2594]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends International, LLC.
BiosVersion = B.G0
BiosReleaseDate = 07/26/2022
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7A38
SystemFamily = To be filled by O.E.M.
SystemVersion = 8.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-VDH MAX (MS-7A38)
BaseBoardVersion = 8.0
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000001, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000005, error status (normally i/o status code)
Arg3: ffffa10e364d5080, current process (virtual address for lock type 3, or PTE)
Arg4: ffffdcbffa8b9000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1483

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5374

    Key  : Analysis.IO.Other.Mb
    Value: 4

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 24

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 15752

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x7a

    Key  : Bugcheck.Code.Register
    Value: 0x7a

    Key  : Dump.Attributes.AsUlong
    Value: 808

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  KERNEL_DATA_INPAGE_ERROR.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7a

BUGCHECK_P1: 1

BUGCHECK_P2: ffffffffc0000005

BUGCHECK_P3: ffffa10e364d5080

BUGCHECK_P4: ffffdcbffa8b9000

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

BLACKBOXDISK: 1

DISKSEC_ORG_ID: 

DISKSEC_MODEL: 

DISKSEC_MANUFACTURING_ID: 

DISKSEC_ISSUE_DESC_STR: 

DISKSEC_TOTAL_SIZE: 0

DISKSEC_REASON: 0

DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 0

DISKSEC_PUBLIC_OFFSET: 0

DISKSEC_PUBLIC_DATA_SIZE: 0

DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 0

DISKSEC_PRIVATE_OFFSET: 0

DISKSEC_PRIVATE_DATA_SIZE: 0

PROCESS_NAME:  WmiPrvSE.exe

STACK_TEXT: 
fffffd00`dc4d1238 fffff801`63e80693     : 00000000`0000007a 00000000`00000001 ffffffff`c0000005 ffffa10e`364d5080 : nt!KeBugCheckEx
fffffd00`dc4d1240 fffff801`63c5bc6c     : 00000000`00000000 fffffd00`dc4d16b0 00000000`00000000 80000000`00000000 : nt!MiGetNextPageTablePte+0x223fe3
fffffd00`dc4d1300 fffff801`63c5beed     : ffffdcee`00000000 fffffd00`00000000 00000000`00000001 ffffa10e`364d5700 : nt!MiWalkPageTablesRecursively+0x6ac
fffffd00`dc4d1390 fffff801`63c5beed     : ffffdcee`00000000 fffffd00`00000000 00000000`00000002 ffffa10e`364d5700 : nt!MiWalkPageTablesRecursively+0x92d
fffffd00`dc4d1420 fffff801`63c7efb1     : 00000000`00000000 00000000`00000000 00000000`00000003 ffffa10e`364d5700 : nt!MiWalkPageTablesRecursively+0x92d
fffffd00`dc4d14b0 fffff801`63c4c3b3     : fffffd00`dc4d16b0 ffffdcbf`00000001 00000000`00000002 ffffdcee`00000000 : nt!MiWalkPageTables+0x371
fffffd00`dc4d15b0 fffff801`63c49a75     : 00000000`00000000 fffffd00`00000000 00000000`00000002 00000000`00000000 : nt!MiQueryAddressState+0x293
fffffd00`dc4d17c0 fffff801`640b2167     : fffffd00`dc4d1910 00007ff5`16c98000 ffffa10e`36550000 ffffa10e`365591c0 : nt!MiQueryAddressSpan+0x2a5
fffffd00`dc4d1880 fffff801`640b1a15     : ffff93e7`6b4e96e4 00000000`00000000 00000279`060023e8 00000000`00000000 : nt!MmQueryVirtualMemory+0x737
fffffd00`dc4d1a20 fffff801`63e3aa68     : 00000279`0ad6dbc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryVirtualMemory+0x25
fffffd00`dc4d1a70 00007ffe`f8a8f1d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000db`5fc7daa8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f8a8f1d4


SYMBOL_NAME:  nt!MiGetNextPageTablePte+223fe3

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.608

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  223fe3

FAILURE_BUCKET_ID:  0x7a_c0000005_nt!MiGetNextPageTablePte

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d4584103-842d-cac6-0c84-edfb0f8fe0b3}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffcc852b21d080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3030

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11716

    Key  : Analysis.IO.Other.Mb
    Value: 4

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 23

    Key  : Analysis.Init.CPU.mSec
    Value: 249

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13449

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xef

    Key  : Bugcheck.Code.Register
    Value: 0xef

    Key  : CriticalProcessDied.ExceptionCode
    Value: 25c49040

    Key  : CriticalProcessDied.Process
    Value: svchost.exe

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  CRITICAL_PROCESS_DIED.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffcc852b21d080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_RECORD:  ffffcc852b21d7c0 -- (.exr 0xffffcc852b21d7c0)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x25c49040 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

EXCEPTION_STR:  0x0

STACK_TEXT: 
ffffc78d`abed0d48 fffff807`39faf063     : 00000000`000000ef ffffcc85`2b21d080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc78d`abed0d50 fffff807`39ec0215     : ffffcc85`2b21d080 fffff807`3993ce65 00000000`00000002 fffff807`3993cd53 : nt!PspCatchCriticalBreak+0x11b
ffffc78d`abed0de0 fffff807`39d9bdd4     : ffffcc85`2b21d080 00000000`c0000409 ffffcc85`2b21d080 ffffc78d`abed1a00 : nt!PspTerminateAllThreads+0x161d41
ffffc78d`abed0e50 fffff807`39d9bbb0     : ffffffff`ffffffff ffffcc85`2b21d080 ffffcc85`25c49040 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffc78d`abed0e90 fffff807`39a2d278     : ffffc78d`00000e44 ffffcc85`25c49040 ffffcc85`2b21d080 fffff807`39de36a2 : nt!NtTerminateProcess+0xb0
ffffc78d`abed0f10 fffff807`39a1f510     : fffff807`39aae518 ffffffff`ffffffff ffffffff`ffffffff 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
ffffc78d`abed10a8 fffff807`39aae518     : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000001 ffffc78d`abed10e0 : nt!KiServiceLinkage
ffffc78d`abed10b0 fffff807`39a2dd06     : ffffcc85`2b21d7c0 fffff807`3986edc1 00000000`00000000 00007ffa`4a22ba40 : nt!KiDispatchException+0x1a0188
ffffc78d`abed1900 fffff807`39a2bfd2     : ffffcc85`25c49040 000000af`50bfebc0 000000af`50bff3e0 00000000`00000000 : nt!KiFastFailDispatch+0xc6
ffffc78d`abed1ae0 00007ffa`4a22ba78     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x312
000000af`50bfe3d0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4a22ba78


SYMBOL_NAME:  nt!PspCatchCriticalBreak+11b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.1042

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  11b

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_25c49040_nt!PspCatchCriticalBreak

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f54aec41-b9ff-fc4d-24ba-fb42c367a96e}

Followup:     MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffffc2013133cf88
Arg3: 8100000284712825
Arg4: ffff8183e98e21c8

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1436

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4756

    Key  : Analysis.IO.Other.Mb
    Value: 3

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 24

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13724

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 808

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  102022-11984-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffffc2013133cf88

BUGCHECK_P3: 8100000284712825

BUGCHECK_P4: ffff8183e98e21c8

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

STACK_TEXT: 
fffffc88`0a43cf78 fffff803`2ea81bdd     : 00000000`0000001a 00000000`00000403 ffffc201`3133cf88 81000002`84712825 : nt!KeBugCheckEx
fffffc88`0a43cf80 fffff803`2e865855     : fffffc88`0a43d320 fffffc88`0a43d2b0 00000262`67800000 fffffc88`0a43d200 : nt!MiDeletePteRun+0x21f90d
fffffc88`0a43d180 fffff803`2e866f4d     : ffffc201`3133cff8 00000000`00000000 00000000`00000000 ffffc261`009899e0 : nt!MiDeleteVaTail+0x55
fffffc88`0a43d1b0 fffff803`2e8a1d02     : 00000000`00000000 fffff803`2e8a1ecd fffffc88`0a43d578 ffffe202`f0f0b080 : nt!MiDeletePagablePteRange+0x53d
fffffc88`0a43d4e0 fffff803`2ecae378     : 00000000`00000000 00000000`00000001 00000000`00000000 fffffc88`0a43d5b0 : nt!MiDeleteVirtualAddresses+0x52
fffffc88`0a43d530 fffff803`2ecf4b1e     : ffffe202`f04fa080 ffffe202`f5ac8180 ffffe202`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
fffffc88`0a43d5f0 fffff803`2ecf4685     : ffffe202`f46f4010 ffffe202`f46f4010 ffffe202`f46f4010 ffffe202`f04fa080 : nt!MiCleanVad+0x42
fffffc88`0a43d620 fffff803`2ed3f0c1     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe202`f04fa080 : nt!MmCleanProcessAddressSpace+0x10d
fffffc88`0a43d6a0 fffff803`2ec8b464     : ffffe202`f04fa080 ffff8183`e8ad5630 fffffc88`0a43d8c9 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
fffffc88`0a43d730 fffff803`2edc6f48     : ffffe202`000000ff ffff4cb6`99a2c401 ffffe202`f0f0b0f4 00000062`8a008000 : nt!PspExitThread+0x63c
fffffc88`0a43d830 fffff803`2e817b67     : 00000000`00000000 fffff803`2e89c68a fffffc88`0a43d954 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffffc88`0a43d870 fffff803`2ea2d1a0     : 00000000`00000001 fffffc88`0a43d930 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x4a7
fffffc88`0a43d930 fffff803`2ea3ab0f     : ffffe202`f1b82d00 ffff9d00`f1c51180 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffffc88`0a43da70 00007ffe`2e8329c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000062`8bfff858 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2e8329c4


SYMBOL_NAME:  nt!MiDeletePteRun+21f90d

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.674

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  21f90d

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------
 
Bilgisayarınızdan SSD'yi çıkarıp deneme amaçlı HDD'ye Windows kurar misiniz? Ben sorunun SSD kaynaklı olduğunu düşünüyorum.

HDD yok ise başka bir SSD'ye kurun.
 
Son düzenleyen: Moderatör:
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…