Çorba RAM yaptığınız için alıyorsunuz. RAM'lerin değerlerinin aynı olması bir anlam ifade etmez. Kit almadığınız sürece bu tür sorunlar yaşarsınız. Sorun belleklerin senkron çalışamamasıdır. Bu yüzdendir ki Memtet86'da hata çıkmaz ama gerçek dünya kullanımında hata alırsınız. Çünkü bellekler tek başına arızalı olmasa da gecikme farkları yüzünden soruna yola açarlar. Bu gecikme hızlarının kağıt üstünde aynı olması bir şeyi değiştirmez...Ben bu hatayı neden alıyorum.
Ama bunu almadan önce bu farkın herhangi bir problem oluşturup oluşturmayacağını sordum. Ve kesinlikle bir problem olmaz diye bir yanıt aldım.
Bakın ben aynı olursa sorun olmaz diyenler bile tecrübesizdir demişim, siz farklı olsa bile sorun olmaz diyenlere inanmışsınız. Onlara sorun bakalım, zararınızı karşılasınlar.Özellikleri aynı olursa sorun olmaz diyenlere itimat etmeyiniz. Bu kişiler tecrübesizdir.
Bunu neye dayanarak söylüyorsunuz? Bana elinizdeki RAM'ler çorba RAM gibi geldi. Dosyaları atın, bakalım.
Minidump Dosyalarını Paylaşın
Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi ekran hatalarının nedenini öğrenebiliriz. Minidump dosyaları C:\Windows\Minidump klasöründe bulunur ve DMP uzantılıdır. Bu dosyaları sizden istediğimizde...www.technopat.net
Bakın ben aynı olursa sorun olmaz diyenler bile tecrübesizdir demişim, siz farklı olsa bile sorun olmaz diyenlere inanmışsınız. Onlara sorun bakalım, zararınızı karşılasınlar.
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff280da2586c8
Arg3: 0000000020000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4686
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7959
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff280da2586c8
BUGCHECK_P3: 20000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffee89`ad2aefc8 fffff801`1034c03a : 00000000`0000001a 00000000`00041792 fffff280`da2586c8 00000000`20000000 : nt!KeBugCheckEx
ffffee89`ad2aefd0 fffff801`102e9666 : 00000000`00000000 ffffc77f`150144e0 00000000`00000006 fffff280`da2586c8 : nt!MiDeleteVa+0x153a
ffffee89`ad2af0d0 fffff801`102e977b : fffff2f9`406d12c0 ffffa606`32344700 ffffee89`00000000 ffffee89`ad2af540 : nt!MiWalkPageTablesRecursively+0x776
ffffee89`ad2af170 fffff801`102e977b : fffff2f9`7ca03688 ffffa606`32344700 ffffee89`00000001 ffffee89`ad2af550 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af210 fffff801`102e977b : fffff2f9`7ca03000 ffffa606`32344700 ffffee89`00000002 ffffee89`ad2af560 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af2b0 fffff801`102d86db : 00000000`00000000 ffffa606`32344700 1a000001`00000003 ffffee89`ad2af570 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af350 fffff801`1034a8d1 : ffffee89`ad2af4f0 ffffa606`00000000 fffff280`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffee89`ad2af450 fffff801`10322ae0 : 00000000`00000001 ffffee89`00000000 ffffa606`32344550 ffffa606`3244a040 : nt!MiDeletePagablePteRange+0x4f1
ffffee89`ad2af760 fffff801`10704aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffee89`ad2af870 fffff801`10704882 : ffffa606`333143f0 00000000`00000000 ffffa606`32344080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffee89`ad2af8a0 fffff801`107046f9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffee89`ad2af980 fffff801`10681f4c : ffffa606`3244a040 000001b4`4b000000 000001b4`49bac618 ffffa606`32344080 : nt!NtUnmapViewOfSectionEx+0x99
ffffee89`ad2af9d0 fffff801`10405fb5 : ffffa606`3244a000 ffffa606`330e1df0 ffffee89`ad2afa80 000001b4`49bea450 : nt!NtUnmapViewOfSection+0xc
ffffee89`ad2afa00 00007ffb`1de2c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ab`3d9fe0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1de2c2d4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff9a800a346b50
Arg3: 0000000000000003
Arg4: 0000000000000004
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9934
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffff9a800a346b50
BUGCHECK_P3: 3
BUGCHECK_P4: 4
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WerFault.exe
STACK_TEXT:
ffffec87`daebee88 fffff804`6e74951a : 00000000`0000001a 00000000`00041790 ffff9a80`0a346b50 00000000`00000003 : nt!KeBugCheckEx
ffffec87`daebee90 fffff804`6e749cae : 00000000`00000000 ffffec87`daebf5a0 fffff901`65751000 ffffec87`daebf4f0 : nt!MiDeletePteRun+0x17da
ffffec87`daebf0a0 fffff804`6e6e9b5d : 00000000`00000000 ffffdb06`756849c0 ffffec87`daebf4f0 fffff901`65750de0 : nt!MiDeleteVaTail+0x6e
ffffec87`daebf0d0 fffff804`6e6e977b : fffff97c`00000000 ffffdb06`756849c0 ffffec87`00000000 ffffec87`daebf540 : nt!MiWalkPageTablesRecursively+0xc6d
ffffec87`daebf170 fffff804`6e6e977b : fffff97c`be405958 ffffdb06`756849c0 ffffec87`00000001 ffffec87`daebf550 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf210 fffff804`6e6e977b : fffff97c`be405000 ffffdb06`756849c0 ffffec87`00000002 ffffec87`daebf560 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf2b0 fffff804`6e6d86db : 00000000`00000000 ffffdb06`756849c0 00000000`00000003 ffffec87`daebf570 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf350 fffff804`6e74a8d1 : ffffec87`daebf4f0 ffffdb06`00000000 ffffdb06`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffec87`daebf450 fffff804`6e722ae0 : 00000000`00000001 ffffec87`00000000 ffffdb06`75684810 ffffdb06`7b895080 : nt!MiDeletePagablePteRange+0x4f1
ffffec87`daebf760 fffff804`6eb04aa9 : 00000000`00000000 00000000`00000000 000002ca`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffec87`daebf870 fffff804`6eb04882 : ffffdb06`7b69a520 00000000`00000000 ffffdb06`75684340 00000000`00000000 : nt!MiUnmapVad+0x49
ffffec87`daebf8a0 fffff804`6eb046f9 : ffff848d`353d7e80 fffff804`6eaf138c 00000000`000003f8 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffec87`daebf980 fffff804`6ea81f4c : ffffdb06`7b895080 000002ca`e9e90000 00000000`00000004 ffffdb06`75684340 : nt!NtUnmapViewOfSectionEx+0x99
ffffec87`daebf9d0 fffff804`6e805fb5 : ffffdb06`7b895000 00000000`00000010 ffffec87`daebfa80 000002ca`e7cbda30 : nt!NtUnmapViewOfSection+0xc
ffffec87`daebfa00 00007ffe`2644c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ff`f4f47fa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2644c2d4
SYMBOL_NAME: nt!MiDeletePteRun+17da
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17da
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffd811cec01e0
Arg3: 0000000000010000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7530
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13211
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffffd811cec01e0
BUGCHECK_P3: 10000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: StartMenuExperienceHost.exe
STACK_TEXT:
ffff8381`9c04f348 fffff804`1094c03a : 00000000`0000001a 00000000`00041792 fffffd81`1cec01e0 00000000`00010000 : nt!KeBugCheckEx
ffff8381`9c04f350 fffff804`1094a86f : ffff8d81`4f15a700 00000000`00000000 ffff8d81`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffff8381`9c04f450 fffff804`10922ae0 : 00000000`00000001 ffff8381`00000000 ffff8d81`4f15a550 ffff8d81`4f038080 : nt!MiDeletePagablePteRange+0x48f
ffff8381`9c04f760 fffff804`10d04aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffff8381`9c04f870 fffff804`10d04882 : ffff8d81`4efd8460 00000000`00000000 ffff8d81`4f15a080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8381`9c04f8a0 fffff804`10d046f9 : ffffde85`a532c980 fffff804`10cf138c 00000000`000005a4 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffff8381`9c04f980 fffff804`10c81f4c : ffff8d81`4f038080 00000239`d8000000 00000000`00000003 ffff8d81`4f15a080 : nt!NtUnmapViewOfSectionEx+0x99
ffff8381`9c04f9d0 fffff804`10a05fb5 : ffff8d81`4f038000 00000000`00000001 ffff8381`9c04fa80 00000239`d6b0caa0 : nt!NtUnmapViewOfSection+0xc
ffff8381`9c04fa00 00007ffa`8178c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000cc`4dbfbc88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`8178c2d4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff200fc19c480
Arg3: 0000200000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7077
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7299
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff200fc19c480
BUGCHECK_P3: 200000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff98b`d4c05378 fffff800`0934c03a : 00000000`0000001a 00000000`00041792 fffff200`fc19c480 00002000`00000000 : nt!KeBugCheckEx
fffff98b`d4c05380 fffff800`092e9666 : 00000000`00000000 ffffa288`e36a1700 00000000`000001a5 fffff200`fc19c480 : nt!MiDeleteVa+0x153a
fffff98b`d4c05480 fffff800`092e977b : fffff279`00000000 ffffa288`e36a1700 fffff98b`00000000 fffff98b`d4c058f0 : nt!MiWalkPageTablesRecursively+0x776
fffff98b`d4c05520 fffff800`092e977b : fffff279`3c803f00 ffffa288`e36a1700 fffff98b`00000001 fffff98b`d4c05900 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c055c0 fffff800`092e977b : fffff279`3c803000 ffffa288`e36a1700 fffff98b`00000002 fffff98b`d4c05910 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05660 fffff800`092d86db : 00000000`00000000 ffffa288`e36a1700 fffff98b`00000003 fffff98b`d4c05920 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05700 fffff800`0934a8d1 : fffff98b`d4c058a0 ffffa288`00000000 fffff98b`00000002 fffff98b`00000000 : nt!MiWalkPageTables+0x36b
fffff98b`d4c05800 fffff800`09322ae0 : 00000000`00000005 fffff98b`00000000 ffffa288`e36a1550 ffffa288`e3662300 : nt!MiDeletePagablePteRange+0x4f1
fffff98b`d4c05b10 fffff800`09704aa9 : ffff8b01`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffff98b`d4c05c20 fffff800`09704882 : ffffa288`e6072ec0 00000000`00000000 ffffa288`e36a1080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff98b`d4c05c50 fffff800`097046f9 : ffff8b01`3f040d00 fffff800`096f138c 00000000`00000130 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff98b`d4c05d30 fffff800`09681f4c : ffffa288`e3662300 ffff8b01`42a6ee88 ffff8b01`42a6edb0 ffffa288`e36a1080 : nt!NtUnmapViewOfSectionEx+0x99
fffff98b`d4c05d80 fffff800`09405fb5 : 00000000`00000000 00000000`00000000 fffff98b`d4c05e30 00000000`00000002 : nt!NtUnmapViewOfSection+0xc
fffff98b`d4c05db0 fffff800`093f8400 : fffff800`0c83aa50 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 : nt!KiSystemServiceCopyEnd+0x25
fffff98b`d4c05f48 fffff800`0c83aa50 : 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 00000000`00000000 : nt!KiServiceLinkage
fffff98b`d4c05f50 fffff800`0c83b727 : fffff98b`d4c06130 ffff8b01`42a6edb0 00000000`00000000 00000000`00000000 : CI!I_MapCatalog+0x4a0
fffff98b`d4c06040 fffff800`0c83b2d3 : 00000000`00000000 ffff8b01`3ffab5b8 fffff98b`d4c061a1 00000000`000000d9 : CI!I_ReloadCatalog+0x263
fffff98b`d4c060c0 fffff800`0c83afa1 : 00000000`00000001 00000000`00000000 ffff8b01`00000001 00000000`00000000 : CI!I_ReloadCatalogDirectory+0x297
fffff98b`d4c061f0 fffff800`0c83941a : ffff8b01`3fe10e30 ffff8b01`00000001 fffff98b`d4c06360 00000000`00000004 : CI!I_ReloadCatalogs+0x1ad
fffff98b`d4c06260 fffff800`0c8390f4 : fffff98b`d4c065f0 00000000`00000014 ffff8b01`3fef7d80 00000000`00000001 : CI!I_FindFileOrHeaderHashInCatalogs+0x24a
fffff98b`d4c063c0 fffff800`0c844efe : fffff98b`d4c065ac fffff98b`d4c065b8 fffff98b`d4c065e8 fffff98b`d4c065f0 : CI!MinCrypK_VerifyHashInCatalog+0x110
fffff98b`d4c06470 fffff800`0c840770 : 00000000`00000000 00000000`00000000 ffff8b01`3fe10601 fffff800`0000002a : CI!CiVerifyFileHashInCatalogs+0x18e
fffff98b`d4c06550 fffff800`0c841c79 : 00000000`00000000 fffff98b`d4c06881 00000000`00000000 00000000`00000000 : CI!CipFindFileHash+0x2dc
fffff98b`d4c066b0 fffff800`0c8415ac : ffff8b01`3fe10660 ffffa288`ea592a80 ffffa288`e36a1080 fffff800`0ed20000 : CI!CipValidateFileHash+0x2d9
fffff98b`d4c06790 fffff800`0c83f9e2 : 00000000`00000088 00000000`00000000 ffffa288`ea592a80 fffff800`0ed20000 : CI!CipValidateImageHash+0x110
fffff98b`d4c068d0 fffff800`096735e5 : fffff98b`d4c06b10 fffff800`0ed20000 00000000`0000000f fffff800`0ed20000 : CI!CiValidateImageHeader+0x812
fffff98b`d4c06a50 fffff800`09673140 : 00000000`00000000 ffffa288`e372ea30 00000000`00000000 00000000`00018000 : nt!SeValidateImageHeader+0xd9
fffff98b`d4c06b00 fffff800`0960c09b : fffff98b`d4c07000 00000000`00000000 00000000`00000000 ffffffff`8000013c : nt!MiValidateSectionCreate+0x438
fffff98b`d4c06ce0 fffff800`0960b4e6 : fffff98b`d4c07020 fffff98b`d4c07020 fffff98b`d4c06e40 00000000`00000000 : nt!MiValidateSectionSigningPolicy+0xab
fffff98b`d4c06d40 fffff800`096ff71b : ffffa288`ea592a80 fffff98b`d4c07020 fffff98b`d4c07020 00002003`00000000 : nt!MiCreateNewSection+0x66e
fffff98b`d4c06eb0 fffff800`096fed64 : fffff98b`d4c06ee0 ffff8b01`3fe23030 ffffa288`ea592a80 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
fffff98b`d4c06fa0 fffff800`0936c1b8 : 00000000`00000000 00000000`ffffffff ffffffff`80000138 00000000`000001b0 : nt!MiCreateSection+0xf4
fffff98b`d4c07120 fffff800`09733fa2 : 00000000`00000000 fffff98b`d4c07239 ffffffff`80000138 00000000`00000000 : nt!MiCreateSystemSection+0xa4
fffff98b`d4c071c0 fffff800`0973187e : fffff800`09c2a310 ffffffff`80000138 fffff98b`d4c07358 00000000`00000000 : nt!MiCreateSectionForDriver+0x126
fffff98b`d4c072a0 fffff800`097310d2 : 00000000`00000000 fffff98b`d4c073f0 00000000`00000000 fffff800`00000000 : nt!MiObtainSectionForDriver+0xa6
fffff98b`d4c072f0 fffff800`09787c54 : fffff98b`d4c07540 00000000`00000000 fffff800`09c2a310 fffff800`097ad000 : nt!MmLoadSystemImageEx+0x156
fffff98b`d4c07490 fffff800`097328cc : fffff800`09c2a310 00000000`00000000 fffff98b`d4c07710 00000000`00000000 : nt!MiLoadImportDll+0x44
fffff98b`d4c074e0 fffff800`09732504 : ffffa288`e60eea20 fffff98b`d4c076e0 fffff98b`d4c07710 00000000`00000000 : nt!MiResolveImageReferences+0x214
fffff98b`d4c075f0 fffff800`0973160c : fffff98b`00001108 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiResolveImageImports+0x94
fffff98b`d4c07660 fffff800`09730f66 : fffff98b`d4c07898 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x690
fffff98b`d4c07800 fffff800`0971e124 : fffff98b`d4c07940 00000000`00000000 fffff800`09c458e0 00000000`00000000 : nt!MmLoadSystemImage+0x26
fffff98b`d4c07840 fffff800`09a53eaf : ffffa288`ea4f5a30 ffffa288`ea4f5a30 fffff98b`d4c07a80 00000000`00000000 : nt!IopLoadDriver+0x23c
fffff98b`d4c07a10 fffff800`09a60ad6 : ffffffff`00000000 ffff8b01`3fd2b940 00000000`00000000 fffff800`0577bcd0 : nt!IopInitializeSystemDrivers+0x157
fffff98b`d4c07ab0 fffff800`097946db : fffff800`0577bcd0 fffff800`09c47048 fffff800`097946a0 fffff800`0577bcd0 : nt!IoInitSystem+0x2e
fffff98b`d4c07ae0 fffff800`092a2ae5 : ffffa288`e3662300 fffff800`097946a0 fffff800`0577bcd0 054d842c`544fd5cc : nt!Phase1Initialization+0x3b
fffff98b`d4c07b10 fffff800`093fbbf8 : fffff800`05ae5180 ffffa288`e3662300 fffff800`092a2a90 9199d69c`9cf06576 : nt!PspSystemThreadStartup+0x55
fffff98b`d4c07b60 00000000`00000000 : fffff98b`d4c08000 fffff98b`d4c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Bu dosyalarda da bariz bir bellek hatası görünüyor. Ek olarak taktığınız RAM'i çıkarın, sistemi bir süre öyle kullanın. Sorun çıkmazsa sorun çorba RAM kullanmanızdandır.
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of. the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff280da2586c8. Arg3: 0000000020000000. Arg4: 0000000000000000. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4686. Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA. Key : Analysis.DebugData Value: CreateObject. Key : Analysis.DebugModel Value: CreateObject. Key : Analysis.Elapsed.mSec Value: 7959. Key : Analysis.Memory.CommitPeak.Mb Value: 76. Key : Analysis.System Value: CreateObject. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a. BUGCHECK_P1: 41792. BUGCHECK_P2: fffff280da2586c8. BUGCHECK_P3: 20000000. BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe STACK_TEXT: ffffee89`ad2aefc8 fffff801`1034c03a : 00000000`0000001a 00000000`00041792 fffff280`da2586c8 00000000`20000000 : nt!KeBugCheckEx ffffee89`ad2aefd0 fffff801`102e9666 : 00000000`00000000 ffffc77f`150144e0 00000000`00000006 fffff280`da2586c8 : nt!MiDeleteVa+0x153a ffffee89`ad2af0d0 fffff801`102e977b : fffff2f9`406d12c0 ffffa606`32344700 ffffee89`00000000 ffffee89`ad2af540 : nt!MiWalkPageTablesRecursively+0x776 ffffee89`ad2af170 fffff801`102e977b : fffff2f9`7ca03688 ffffa606`32344700 ffffee89`00000001 ffffee89`ad2af550 : nt!MiWalkPageTablesRecursively+0x88b ffffee89`ad2af210 fffff801`102e977b : fffff2f9`7ca03000 ffffa606`32344700 ffffee89`00000002 ffffee89`ad2af560 : nt!MiWalkPageTablesRecursively+0x88b ffffee89`ad2af2b0 fffff801`102d86db : 00000000`00000000 ffffa606`32344700 1a000001`00000003 ffffee89`ad2af570 : nt!MiWalkPageTablesRecursively+0x88b ffffee89`ad2af350 fffff801`1034a8d1 : ffffee89`ad2af4f0 ffffa606`00000000 fffff280`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffffee89`ad2af450 fffff801`10322ae0 : 00000000`00000001 ffffee89`00000000 ffffa606`32344550 ffffa606`3244a040 : nt!MiDeletePagablePteRange+0x4f1 ffffee89`ad2af760 fffff801`10704aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360 ffffee89`ad2af870 fffff801`10704882 : ffffa606`333143f0 00000000`00000000 ffffa606`32344080 00000000`00000000 : nt!MiUnmapVad+0x49 ffffee89`ad2af8a0 fffff801`107046f9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152 ffffee89`ad2af980 fffff801`10681f4c : ffffa606`3244a040 000001b4`4b000000 000001b4`49bac618 ffffa606`32344080 : nt!NtUnmapViewOfSectionEx+0x99 ffffee89`ad2af9d0 fffff801`10405fb5 : ffffa606`3244a000 ffffa606`330e1df0 ffffee89`ad2afa80 000001b4`49bea450 : nt!NtUnmapViewOfSection+0xc ffffee89`ad2afa00 00007ffb`1de2c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 000000ab`3d9fe0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1de2c2d4 MODULE_NAME: hardware. IMAGE_NAME: memory_corruption. STACK_COMMAND: .thread ; .cxr ; kb. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner. --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2 contains the address of the PFN for the corrupted page table page. On a 32 bit OS, parameter 2 contains a pointer to the number of used. PTEs, and parameter 3 contains the number of used PTEs. Arg2: ffff9a800a346b50. Arg3: 0000000000000003. Arg4: 0000000000000004. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6374. Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA. Key : Analysis.DebugData Value: CreateObject. Key : Analysis.DebugModel Value: CreateObject. Key : Analysis.Elapsed.mSec Value: 9934. Key : Analysis.Memory.CommitPeak.Mb Value: 76. Key : Analysis.System Value: CreateObject. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a. BUGCHECK_P1: 41790. BUGCHECK_P2: ffff9a800a346b50. BUGCHECK_P3: 3 BUGCHECK_P4: 4 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: WerFault.exe STACK_TEXT: ffffec87`daebee88 fffff804`6e74951a : 00000000`0000001a 00000000`00041790 ffff9a80`0a346b50 00000000`00000003 : nt!KeBugCheckEx ffffec87`daebee90 fffff804`6e749cae : 00000000`00000000 ffffec87`daebf5a0 fffff901`65751000 ffffec87`daebf4f0 : nt!MiDeletePteRun+0x17da ffffec87`daebf0a0 fffff804`6e6e9b5d : 00000000`00000000 ffffdb06`756849c0 ffffec87`daebf4f0 fffff901`65750de0 : nt!MiDeleteVaTail+0x6e ffffec87`daebf0d0 fffff804`6e6e977b : fffff97c`00000000 ffffdb06`756849c0 ffffec87`00000000 ffffec87`daebf540 : nt!MiWalkPageTablesRecursively+0xc6d ffffec87`daebf170 fffff804`6e6e977b : fffff97c`be405958 ffffdb06`756849c0 ffffec87`00000001 ffffec87`daebf550 : nt!MiWalkPageTablesRecursively+0x88b ffffec87`daebf210 fffff804`6e6e977b : fffff97c`be405000 ffffdb06`756849c0 ffffec87`00000002 ffffec87`daebf560 : nt!MiWalkPageTablesRecursively+0x88b ffffec87`daebf2b0 fffff804`6e6d86db : 00000000`00000000 ffffdb06`756849c0 00000000`00000003 ffffec87`daebf570 : nt!MiWalkPageTablesRecursively+0x88b ffffec87`daebf350 fffff804`6e74a8d1 : ffffec87`daebf4f0 ffffdb06`00000000 ffffdb06`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffffec87`daebf450 fffff804`6e722ae0 : 00000000`00000001 ffffec87`00000000 ffffdb06`75684810 ffffdb06`7b895080 : nt!MiDeletePagablePteRange+0x4f1 ffffec87`daebf760 fffff804`6eb04aa9 : 00000000`00000000 00000000`00000000 000002ca`00000000 00000000`00000000 : nt!MiDeleteVad+0x360 ffffec87`daebf870 fffff804`6eb04882 : ffffdb06`7b69a520 00000000`00000000 ffffdb06`75684340 00000000`00000000 : nt!MiUnmapVad+0x49 ffffec87`daebf8a0 fffff804`6eb046f9 : ffff848d`353d7e80 fffff804`6eaf138c 00000000`000003f8 00000000`00000000 : nt!MiUnmapViewOfSection+0x152 ffffec87`daebf980 fffff804`6ea81f4c : ffffdb06`7b895080 000002ca`e9e90000 00000000`00000004 ffffdb06`75684340 : nt!NtUnmapViewOfSectionEx+0x99 ffffec87`daebf9d0 fffff804`6e805fb5 : ffffdb06`7b895000 00000000`00000010 ffffec87`daebfa80 000002ca`e7cbda30 : nt!NtUnmapViewOfSection+0xc ffffec87`daebfa00 00007ffe`2644c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 000000ff`f4f47fa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2644c2d4 SYMBOL_NAME: nt!MiDeletePteRun+17da MODULE_NAME: nt. IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb. IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 17da. FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56} Followup: MachineOwner. --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of. the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffffd811cec01e0. Arg3: 0000000000010000. Arg4: 0000000000000000. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7530. Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA. Key : Analysis.DebugData Value: CreateObject. Key : Analysis.DebugModel Value: CreateObject. Key : Analysis.Elapsed.mSec Value: 13211. Key : Analysis.Memory.CommitPeak.Mb Value: 77. Key : Analysis.System Value: CreateObject. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a. BUGCHECK_P1: 41792. BUGCHECK_P2: fffffd811cec01e0. BUGCHECK_P3: 10000. BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT. CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: StartMenuExperienceHost.exe STACK_TEXT: ffff8381`9c04f348 fffff804`1094c03a : 00000000`0000001a 00000000`00041792 fffffd81`1cec01e0 00000000`00010000 : nt!KeBugCheckEx ffff8381`9c04f350 fffff804`1094a86f : ffff8d81`4f15a700 00000000`00000000 ffff8d81`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a ffff8381`9c04f450 fffff804`10922ae0 : 00000000`00000001 ffff8381`00000000 ffff8d81`4f15a550 ffff8d81`4f038080 : nt!MiDeletePagablePteRange+0x48f ffff8381`9c04f760 fffff804`10d04aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360 ffff8381`9c04f870 fffff804`10d04882 : ffff8d81`4efd8460 00000000`00000000 ffff8d81`4f15a080 00000000`00000000 : nt!MiUnmapVad+0x49 ffff8381`9c04f8a0 fffff804`10d046f9 : ffffde85`a532c980 fffff804`10cf138c 00000000`000005a4 00000000`00000000 : nt!MiUnmapViewOfSection+0x152 ffff8381`9c04f980 fffff804`10c81f4c : ffff8d81`4f038080 00000239`d8000000 00000000`00000003 ffff8d81`4f15a080 : nt!NtUnmapViewOfSectionEx+0x99 ffff8381`9c04f9d0 fffff804`10a05fb5 : ffff8d81`4f038000 00000000`00000001 ffff8381`9c04fa80 00000239`d6b0caa0 : nt!NtUnmapViewOfSection+0xc ffff8381`9c04fa00 00007ffa`8178c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 000000cc`4dbfbc88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`8178c2d4 MODULE_NAME: hardware. IMAGE_NAME: memory_corruption. STACK_COMMAND: .thread ; .cxr ; kb. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner. --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of. the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff200fc19c480. Arg3: 0000200000000000. Arg4: 0000000000000000. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7077. Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA. Key : Analysis.DebugData Value: CreateObject. Key : Analysis.DebugModel Value: CreateObject. Key : Analysis.Elapsed.mSec Value: 7299. Key : Analysis.Memory.CommitPeak.Mb Value: 74. Key : Analysis.System Value: CreateObject. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a. BUGCHECK_P1: 41792. BUGCHECK_P2: fffff200fc19c480. BUGCHECK_P3: 200000000000. BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT. BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. STACK_TEXT: fffff98b`d4c05378 fffff800`0934c03a : 00000000`0000001a 00000000`00041792 fffff200`fc19c480 00002000`00000000 : nt!KeBugCheckEx fffff98b`d4c05380 fffff800`092e9666 : 00000000`00000000 ffffa288`e36a1700 00000000`000001a5 fffff200`fc19c480 : nt!MiDeleteVa+0x153a fffff98b`d4c05480 fffff800`092e977b : fffff279`00000000 ffffa288`e36a1700 fffff98b`00000000 fffff98b`d4c058f0 : nt!MiWalkPageTablesRecursively+0x776 fffff98b`d4c05520 fffff800`092e977b : fffff279`3c803f00 ffffa288`e36a1700 fffff98b`00000001 fffff98b`d4c05900 : nt!MiWalkPageTablesRecursively+0x88b fffff98b`d4c055c0 fffff800`092e977b : fffff279`3c803000 ffffa288`e36a1700 fffff98b`00000002 fffff98b`d4c05910 : nt!MiWalkPageTablesRecursively+0x88b fffff98b`d4c05660 fffff800`092d86db : 00000000`00000000 ffffa288`e36a1700 fffff98b`00000003 fffff98b`d4c05920 : nt!MiWalkPageTablesRecursively+0x88b fffff98b`d4c05700 fffff800`0934a8d1 : fffff98b`d4c058a0 ffffa288`00000000 fffff98b`00000002 fffff98b`00000000 : nt!MiWalkPageTables+0x36b fffff98b`d4c05800 fffff800`09322ae0 : 00000000`00000005 fffff98b`00000000 ffffa288`e36a1550 ffffa288`e3662300 : nt!MiDeletePagablePteRange+0x4f1 fffff98b`d4c05b10 fffff800`09704aa9 : ffff8b01`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360 fffff98b`d4c05c20 fffff800`09704882 : ffffa288`e6072ec0 00000000`00000000 ffffa288`e36a1080 00000000`00000000 : nt!MiUnmapVad+0x49 fffff98b`d4c05c50 fffff800`097046f9 : ffff8b01`3f040d00 fffff800`096f138c 00000000`00000130 00000000`00000000 : nt!MiUnmapViewOfSection+0x152 fffff98b`d4c05d30 fffff800`09681f4c : ffffa288`e3662300 ffff8b01`42a6ee88 ffff8b01`42a6edb0 ffffa288`e36a1080 : nt!NtUnmapViewOfSectionEx+0x99 fffff98b`d4c05d80 fffff800`09405fb5 : 00000000`00000000 00000000`00000000 fffff98b`d4c05e30 00000000`00000002 : nt!NtUnmapViewOfSection+0xc fffff98b`d4c05db0 fffff800`093f8400 : fffff800`0c83aa50 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 : nt!KiSystemServiceCopyEnd+0x25 fffff98b`d4c05f48 fffff800`0c83aa50 : 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 00000000`00000000 : nt!KiServiceLinkage fffff98b`d4c05f50 fffff800`0c83b727 : fffff98b`d4c06130 ffff8b01`42a6edb0 00000000`00000000 00000000`00000000 : CI!I_MapCatalog+0x4a0 fffff98b`d4c06040 fffff800`0c83b2d3 : 00000000`00000000 ffff8b01`3ffab5b8 fffff98b`d4c061a1 00000000`000000d9 : CI!I_ReloadCatalog+0x263 fffff98b`d4c060c0 fffff800`0c83afa1 : 00000000`00000001 00000000`00000000 ffff8b01`00000001 00000000`00000000 : CI!I_ReloadCatalogDirectory+0x297 fffff98b`d4c061f0 fffff800`0c83941a : ffff8b01`3fe10e30 ffff8b01`00000001 fffff98b`d4c06360 00000000`00000004 : CI!I_ReloadCatalogs+0x1ad fffff98b`d4c06260 fffff800`0c8390f4 : fffff98b`d4c065f0 00000000`00000014 ffff8b01`3fef7d80 00000000`00000001 : CI!I_FindFileOrHeaderHashInCatalogs+0x24a fffff98b`d4c063c0 fffff800`0c844efe : fffff98b`d4c065ac fffff98b`d4c065b8 fffff98b`d4c065e8 fffff98b`d4c065f0 : CI!MinCrypK_VerifyHashInCatalog+0x110 fffff98b`d4c06470 fffff800`0c840770 : 00000000`00000000 00000000`00000000 ffff8b01`3fe10601 fffff800`0000002a : CI!CiVerifyFileHashInCatalogs+0x18e fffff98b`d4c06550 fffff800`0c841c79 : 00000000`00000000 fffff98b`d4c06881 00000000`00000000 00000000`00000000 : CI!CipFindFileHash+0x2dc fffff98b`d4c066b0 fffff800`0c8415ac : ffff8b01`3fe10660 ffffa288`ea592a80 ffffa288`e36a1080 fffff800`0ed20000 : CI!CipValidateFileHash+0x2d9 fffff98b`d4c06790 fffff800`0c83f9e2 : 00000000`00000088 00000000`00000000 ffffa288`ea592a80 fffff800`0ed20000 : CI!CipValidateImageHash+0x110 fffff98b`d4c068d0 fffff800`096735e5 : fffff98b`d4c06b10 fffff800`0ed20000 00000000`0000000f fffff800`0ed20000 : CI!CiValidateImageHeader+0x812 fffff98b`d4c06a50 fffff800`09673140 : 00000000`00000000 ffffa288`e372ea30 00000000`00000000 00000000`00018000 : nt!SeValidateImageHeader+0xd9 fffff98b`d4c06b00 fffff800`0960c09b : fffff98b`d4c07000 00000000`00000000 00000000`00000000 ffffffff`8000013c : nt!MiValidateSectionCreate+0x438 fffff98b`d4c06ce0 fffff800`0960b4e6 : fffff98b`d4c07020 fffff98b`d4c07020 fffff98b`d4c06e40 00000000`00000000 : nt!MiValidateSectionSigningPolicy+0xab fffff98b`d4c06d40 fffff800`096ff71b : ffffa288`ea592a80 fffff98b`d4c07020 fffff98b`d4c07020 00002003`00000000 : nt!MiCreateNewSection+0x66e fffff98b`d4c06eb0 fffff800`096fed64 : fffff98b`d4c06ee0 ffff8b01`3fe23030 ffffa288`ea592a80 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db fffff98b`d4c06fa0 fffff800`0936c1b8 : 00000000`00000000 00000000`ffffffff ffffffff`80000138 00000000`000001b0 : nt!MiCreateSection+0xf4 fffff98b`d4c07120 fffff800`09733fa2 : 00000000`00000000 fffff98b`d4c07239 ffffffff`80000138 00000000`00000000 : nt!MiCreateSystemSection+0xa4 fffff98b`d4c071c0 fffff800`0973187e : fffff800`09c2a310 ffffffff`80000138 fffff98b`d4c07358 00000000`00000000 : nt!MiCreateSectionForDriver+0x126 fffff98b`d4c072a0 fffff800`097310d2 : 00000000`00000000 fffff98b`d4c073f0 00000000`00000000 fffff800`00000000 : nt!MiObtainSectionForDriver+0xa6 fffff98b`d4c072f0 fffff800`09787c54 : fffff98b`d4c07540 00000000`00000000 fffff800`09c2a310 fffff800`097ad000 : nt!MmLoadSystemImageEx+0x156 fffff98b`d4c07490 fffff800`097328cc : fffff800`09c2a310 00000000`00000000 fffff98b`d4c07710 00000000`00000000 : nt!MiLoadImportDll+0x44 fffff98b`d4c074e0 fffff800`09732504 : ffffa288`e60eea20 fffff98b`d4c076e0 fffff98b`d4c07710 00000000`00000000 : nt!MiResolveImageReferences+0x214 fffff98b`d4c075f0 fffff800`0973160c : fffff98b`00001108 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiResolveImageImports+0x94 fffff98b`d4c07660 fffff800`09730f66 : fffff98b`d4c07898 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x690 fffff98b`d4c07800 fffff800`0971e124 : fffff98b`d4c07940 00000000`00000000 fffff800`09c458e0 00000000`00000000 : nt!MmLoadSystemImage+0x26 fffff98b`d4c07840 fffff800`09a53eaf : ffffa288`ea4f5a30 ffffa288`ea4f5a30 fffff98b`d4c07a80 00000000`00000000 : nt!IopLoadDriver+0x23c fffff98b`d4c07a10 fffff800`09a60ad6 : ffffffff`00000000 ffff8b01`3fd2b940 00000000`00000000 fffff800`0577bcd0 : nt!IopInitializeSystemDrivers+0x157 fffff98b`d4c07ab0 fffff800`097946db : fffff800`0577bcd0 fffff800`09c47048 fffff800`097946a0 fffff800`0577bcd0 : nt!IoInitSystem+0x2e fffff98b`d4c07ae0 fffff800`092a2ae5 : ffffa288`e3662300 fffff800`097946a0 fffff800`0577bcd0 054d842c`544fd5cc : nt!Phase1Initialization+0x3b fffff98b`d4c07b10 fffff800`093fbbf8 : fffff800`05ae5180 ffffa288`e3662300 fffff800`092a2a90 9199d69c`9cf06576 : nt!PspSystemThreadStartup+0x55 fffff98b`d4c07b60 00000000`00000000 : fffff98b`d4c08000 fffff98b`d4c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 MODULE_NAME: hardware. IMAGE_NAME: memory_corruption. STACK_COMMAND: .thread ; .cxr ; kb. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner. ---------
Hocam 4GB kullanmaktansa 8GB kullanmak daha mantıklı olmaz mı?Bu dosyalarda da bariz bir bellek hatası görünüyor. Ek olarak taktığınız RAM'i çıkarın, sistemi bir süre öyle kullanın. Sorun çıkmazsa sorun çorba RAM kullanmanızdandır.
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff280da2586c8 Arg3: 0000000020000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4686 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 7959 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: fffff280da2586c8 BUGCHECK_P3: 20000000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe STACK_TEXT: ffffee89`ad2aefc8 fffff801`1034c03a : 00000000`0000001a 00000000`00041792 fffff280`da2586c8 00000000`20000000 : nt!KeBugCheckEx ffffee89`ad2aefd0 fffff801`102e9666 : 00000000`00000000 ffffc77f`150144e0 00000000`00000006 fffff280`da2586c8 : nt!MiDeleteVa+0x153a ffffee89`ad2af0d0 fffff801`102e977b : fffff2f9`406d12c0 ffffa606`32344700 ffffee89`00000000 ffffee89`ad2af540 : nt!MiWalkPageTablesRecursively+0x776 ffffee89`ad2af170 fffff801`102e977b : fffff2f9`7ca03688 ffffa606`32344700 ffffee89`00000001 ffffee89`ad2af550 : nt!MiWalkPageTablesRecursively+0x88b ffffee89`ad2af210 fffff801`102e977b : fffff2f9`7ca03000 ffffa606`32344700 ffffee89`00000002 ffffee89`ad2af560 : nt!MiWalkPageTablesRecursively+0x88b ffffee89`ad2af2b0 fffff801`102d86db : 00000000`00000000 ffffa606`32344700 1a000001`00000003 ffffee89`ad2af570 : nt!MiWalkPageTablesRecursively+0x88b ffffee89`ad2af350 fffff801`1034a8d1 : ffffee89`ad2af4f0 ffffa606`00000000 fffff280`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffffee89`ad2af450 fffff801`10322ae0 : 00000000`00000001 ffffee89`00000000 ffffa606`32344550 ffffa606`3244a040 : nt!MiDeletePagablePteRange+0x4f1 ffffee89`ad2af760 fffff801`10704aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360 ffffee89`ad2af870 fffff801`10704882 : ffffa606`333143f0 00000000`00000000 ffffa606`32344080 00000000`00000000 : nt!MiUnmapVad+0x49 ffffee89`ad2af8a0 fffff801`107046f9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152 ffffee89`ad2af980 fffff801`10681f4c : ffffa606`3244a040 000001b4`4b000000 000001b4`49bac618 ffffa606`32344080 : nt!NtUnmapViewOfSectionEx+0x99 ffffee89`ad2af9d0 fffff801`10405fb5 : ffffa606`3244a000 ffffa606`330e1df0 ffffee89`ad2afa80 000001b4`49bea450 : nt!NtUnmapViewOfSection+0xc ffffee89`ad2afa00 00007ffb`1de2c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 000000ab`3d9fe0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1de2c2d4 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2 contains the address of the PFN for the corrupted page table page. On a 32 bit OS, parameter 2 contains a pointer to the number of used PTEs, and parameter 3 contains the number of used PTEs. Arg2: ffff9a800a346b50 Arg3: 0000000000000003 Arg4: 0000000000000004 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6374 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 9934 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 41790 BUGCHECK_P2: ffff9a800a346b50 BUGCHECK_P3: 3 BUGCHECK_P4: 4 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: WerFault.exe STACK_TEXT: ffffec87`daebee88 fffff804`6e74951a : 00000000`0000001a 00000000`00041790 ffff9a80`0a346b50 00000000`00000003 : nt!KeBugCheckEx ffffec87`daebee90 fffff804`6e749cae : 00000000`00000000 ffffec87`daebf5a0 fffff901`65751000 ffffec87`daebf4f0 : nt!MiDeletePteRun+0x17da ffffec87`daebf0a0 fffff804`6e6e9b5d : 00000000`00000000 ffffdb06`756849c0 ffffec87`daebf4f0 fffff901`65750de0 : nt!MiDeleteVaTail+0x6e ffffec87`daebf0d0 fffff804`6e6e977b : fffff97c`00000000 ffffdb06`756849c0 ffffec87`00000000 ffffec87`daebf540 : nt!MiWalkPageTablesRecursively+0xc6d ffffec87`daebf170 fffff804`6e6e977b : fffff97c`be405958 ffffdb06`756849c0 ffffec87`00000001 ffffec87`daebf550 : nt!MiWalkPageTablesRecursively+0x88b ffffec87`daebf210 fffff804`6e6e977b : fffff97c`be405000 ffffdb06`756849c0 ffffec87`00000002 ffffec87`daebf560 : nt!MiWalkPageTablesRecursively+0x88b ffffec87`daebf2b0 fffff804`6e6d86db : 00000000`00000000 ffffdb06`756849c0 00000000`00000003 ffffec87`daebf570 : nt!MiWalkPageTablesRecursively+0x88b ffffec87`daebf350 fffff804`6e74a8d1 : ffffec87`daebf4f0 ffffdb06`00000000 ffffdb06`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffffec87`daebf450 fffff804`6e722ae0 : 00000000`00000001 ffffec87`00000000 ffffdb06`75684810 ffffdb06`7b895080 : nt!MiDeletePagablePteRange+0x4f1 ffffec87`daebf760 fffff804`6eb04aa9 : 00000000`00000000 00000000`00000000 000002ca`00000000 00000000`00000000 : nt!MiDeleteVad+0x360 ffffec87`daebf870 fffff804`6eb04882 : ffffdb06`7b69a520 00000000`00000000 ffffdb06`75684340 00000000`00000000 : nt!MiUnmapVad+0x49 ffffec87`daebf8a0 fffff804`6eb046f9 : ffff848d`353d7e80 fffff804`6eaf138c 00000000`000003f8 00000000`00000000 : nt!MiUnmapViewOfSection+0x152 ffffec87`daebf980 fffff804`6ea81f4c : ffffdb06`7b895080 000002ca`e9e90000 00000000`00000004 ffffdb06`75684340 : nt!NtUnmapViewOfSectionEx+0x99 ffffec87`daebf9d0 fffff804`6e805fb5 : ffffdb06`7b895000 00000000`00000010 ffffec87`daebfa80 000002ca`e7cbda30 : nt!NtUnmapViewOfSection+0xc ffffec87`daebfa00 00007ffe`2644c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 000000ff`f4f47fa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2644c2d4 SYMBOL_NAME: nt!MiDeletePteRun+17da MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 17da FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffffd811cec01e0 Arg3: 0000000000010000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7530 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 13211 Key : Analysis.Memory.CommitPeak.Mb Value: 77 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: fffffd811cec01e0 BUGCHECK_P3: 10000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: StartMenuExperienceHost.exe STACK_TEXT: ffff8381`9c04f348 fffff804`1094c03a : 00000000`0000001a 00000000`00041792 fffffd81`1cec01e0 00000000`00010000 : nt!KeBugCheckEx ffff8381`9c04f350 fffff804`1094a86f : ffff8d81`4f15a700 00000000`00000000 ffff8d81`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a ffff8381`9c04f450 fffff804`10922ae0 : 00000000`00000001 ffff8381`00000000 ffff8d81`4f15a550 ffff8d81`4f038080 : nt!MiDeletePagablePteRange+0x48f ffff8381`9c04f760 fffff804`10d04aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360 ffff8381`9c04f870 fffff804`10d04882 : ffff8d81`4efd8460 00000000`00000000 ffff8d81`4f15a080 00000000`00000000 : nt!MiUnmapVad+0x49 ffff8381`9c04f8a0 fffff804`10d046f9 : ffffde85`a532c980 fffff804`10cf138c 00000000`000005a4 00000000`00000000 : nt!MiUnmapViewOfSection+0x152 ffff8381`9c04f980 fffff804`10c81f4c : ffff8d81`4f038080 00000239`d8000000 00000000`00000003 ffff8d81`4f15a080 : nt!NtUnmapViewOfSectionEx+0x99 ffff8381`9c04f9d0 fffff804`10a05fb5 : ffff8d81`4f038000 00000000`00000001 ffff8381`9c04fa80 00000239`d6b0caa0 : nt!NtUnmapViewOfSection+0xc ffff8381`9c04fa00 00007ffa`8178c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 000000cc`4dbfbc88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`8178c2d4 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff200fc19c480 Arg3: 0000200000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7077 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 7299 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: fffff200fc19c480 BUGCHECK_P3: 200000000000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: fffff98b`d4c05378 fffff800`0934c03a : 00000000`0000001a 00000000`00041792 fffff200`fc19c480 00002000`00000000 : nt!KeBugCheckEx fffff98b`d4c05380 fffff800`092e9666 : 00000000`00000000 ffffa288`e36a1700 00000000`000001a5 fffff200`fc19c480 : nt!MiDeleteVa+0x153a fffff98b`d4c05480 fffff800`092e977b : fffff279`00000000 ffffa288`e36a1700 fffff98b`00000000 fffff98b`d4c058f0 : nt!MiWalkPageTablesRecursively+0x776 fffff98b`d4c05520 fffff800`092e977b : fffff279`3c803f00 ffffa288`e36a1700 fffff98b`00000001 fffff98b`d4c05900 : nt!MiWalkPageTablesRecursively+0x88b fffff98b`d4c055c0 fffff800`092e977b : fffff279`3c803000 ffffa288`e36a1700 fffff98b`00000002 fffff98b`d4c05910 : nt!MiWalkPageTablesRecursively+0x88b fffff98b`d4c05660 fffff800`092d86db : 00000000`00000000 ffffa288`e36a1700 fffff98b`00000003 fffff98b`d4c05920 : nt!MiWalkPageTablesRecursively+0x88b fffff98b`d4c05700 fffff800`0934a8d1 : fffff98b`d4c058a0 ffffa288`00000000 fffff98b`00000002 fffff98b`00000000 : nt!MiWalkPageTables+0x36b fffff98b`d4c05800 fffff800`09322ae0 : 00000000`00000005 fffff98b`00000000 ffffa288`e36a1550 ffffa288`e3662300 : nt!MiDeletePagablePteRange+0x4f1 fffff98b`d4c05b10 fffff800`09704aa9 : ffff8b01`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360 fffff98b`d4c05c20 fffff800`09704882 : ffffa288`e6072ec0 00000000`00000000 ffffa288`e36a1080 00000000`00000000 : nt!MiUnmapVad+0x49 fffff98b`d4c05c50 fffff800`097046f9 : ffff8b01`3f040d00 fffff800`096f138c 00000000`00000130 00000000`00000000 : nt!MiUnmapViewOfSection+0x152 fffff98b`d4c05d30 fffff800`09681f4c : ffffa288`e3662300 ffff8b01`42a6ee88 ffff8b01`42a6edb0 ffffa288`e36a1080 : nt!NtUnmapViewOfSectionEx+0x99 fffff98b`d4c05d80 fffff800`09405fb5 : 00000000`00000000 00000000`00000000 fffff98b`d4c05e30 00000000`00000002 : nt!NtUnmapViewOfSection+0xc fffff98b`d4c05db0 fffff800`093f8400 : fffff800`0c83aa50 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 : nt!KiSystemServiceCopyEnd+0x25 fffff98b`d4c05f48 fffff800`0c83aa50 : 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 00000000`00000000 : nt!KiServiceLinkage fffff98b`d4c05f50 fffff800`0c83b727 : fffff98b`d4c06130 ffff8b01`42a6edb0 00000000`00000000 00000000`00000000 : CI!I_MapCatalog+0x4a0 fffff98b`d4c06040 fffff800`0c83b2d3 : 00000000`00000000 ffff8b01`3ffab5b8 fffff98b`d4c061a1 00000000`000000d9 : CI!I_ReloadCatalog+0x263 fffff98b`d4c060c0 fffff800`0c83afa1 : 00000000`00000001 00000000`00000000 ffff8b01`00000001 00000000`00000000 : CI!I_ReloadCatalogDirectory+0x297 fffff98b`d4c061f0 fffff800`0c83941a : ffff8b01`3fe10e30 ffff8b01`00000001 fffff98b`d4c06360 00000000`00000004 : CI!I_ReloadCatalogs+0x1ad fffff98b`d4c06260 fffff800`0c8390f4 : fffff98b`d4c065f0 00000000`00000014 ffff8b01`3fef7d80 00000000`00000001 : CI!I_FindFileOrHeaderHashInCatalogs+0x24a fffff98b`d4c063c0 fffff800`0c844efe : fffff98b`d4c065ac fffff98b`d4c065b8 fffff98b`d4c065e8 fffff98b`d4c065f0 : CI!MinCrypK_VerifyHashInCatalog+0x110 fffff98b`d4c06470 fffff800`0c840770 : 00000000`00000000 00000000`00000000 ffff8b01`3fe10601 fffff800`0000002a : CI!CiVerifyFileHashInCatalogs+0x18e fffff98b`d4c06550 fffff800`0c841c79 : 00000000`00000000 fffff98b`d4c06881 00000000`00000000 00000000`00000000 : CI!CipFindFileHash+0x2dc fffff98b`d4c066b0 fffff800`0c8415ac : ffff8b01`3fe10660 ffffa288`ea592a80 ffffa288`e36a1080 fffff800`0ed20000 : CI!CipValidateFileHash+0x2d9 fffff98b`d4c06790 fffff800`0c83f9e2 : 00000000`00000088 00000000`00000000 ffffa288`ea592a80 fffff800`0ed20000 : CI!CipValidateImageHash+0x110 fffff98b`d4c068d0 fffff800`096735e5 : fffff98b`d4c06b10 fffff800`0ed20000 00000000`0000000f fffff800`0ed20000 : CI!CiValidateImageHeader+0x812 fffff98b`d4c06a50 fffff800`09673140 : 00000000`00000000 ffffa288`e372ea30 00000000`00000000 00000000`00018000 : nt!SeValidateImageHeader+0xd9 fffff98b`d4c06b00 fffff800`0960c09b : fffff98b`d4c07000 00000000`00000000 00000000`00000000 ffffffff`8000013c : nt!MiValidateSectionCreate+0x438 fffff98b`d4c06ce0 fffff800`0960b4e6 : fffff98b`d4c07020 fffff98b`d4c07020 fffff98b`d4c06e40 00000000`00000000 : nt!MiValidateSectionSigningPolicy+0xab fffff98b`d4c06d40 fffff800`096ff71b : ffffa288`ea592a80 fffff98b`d4c07020 fffff98b`d4c07020 00002003`00000000 : nt!MiCreateNewSection+0x66e fffff98b`d4c06eb0 fffff800`096fed64 : fffff98b`d4c06ee0 ffff8b01`3fe23030 ffffa288`ea592a80 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db fffff98b`d4c06fa0 fffff800`0936c1b8 : 00000000`00000000 00000000`ffffffff ffffffff`80000138 00000000`000001b0 : nt!MiCreateSection+0xf4 fffff98b`d4c07120 fffff800`09733fa2 : 00000000`00000000 fffff98b`d4c07239 ffffffff`80000138 00000000`00000000 : nt!MiCreateSystemSection+0xa4 fffff98b`d4c071c0 fffff800`0973187e : fffff800`09c2a310 ffffffff`80000138 fffff98b`d4c07358 00000000`00000000 : nt!MiCreateSectionForDriver+0x126 fffff98b`d4c072a0 fffff800`097310d2 : 00000000`00000000 fffff98b`d4c073f0 00000000`00000000 fffff800`00000000 : nt!MiObtainSectionForDriver+0xa6 fffff98b`d4c072f0 fffff800`09787c54 : fffff98b`d4c07540 00000000`00000000 fffff800`09c2a310 fffff800`097ad000 : nt!MmLoadSystemImageEx+0x156 fffff98b`d4c07490 fffff800`097328cc : fffff800`09c2a310 00000000`00000000 fffff98b`d4c07710 00000000`00000000 : nt!MiLoadImportDll+0x44 fffff98b`d4c074e0 fffff800`09732504 : ffffa288`e60eea20 fffff98b`d4c076e0 fffff98b`d4c07710 00000000`00000000 : nt!MiResolveImageReferences+0x214 fffff98b`d4c075f0 fffff800`0973160c : fffff98b`00001108 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiResolveImageImports+0x94 fffff98b`d4c07660 fffff800`09730f66 : fffff98b`d4c07898 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x690 fffff98b`d4c07800 fffff800`0971e124 : fffff98b`d4c07940 00000000`00000000 fffff800`09c458e0 00000000`00000000 : nt!MmLoadSystemImage+0x26 fffff98b`d4c07840 fffff800`09a53eaf : ffffa288`ea4f5a30 ffffa288`ea4f5a30 fffff98b`d4c07a80 00000000`00000000 : nt!IopLoadDriver+0x23c fffff98b`d4c07a10 fffff800`09a60ad6 : ffffffff`00000000 ffff8b01`3fd2b940 00000000`00000000 fffff800`0577bcd0 : nt!IopInitializeSystemDrivers+0x157 fffff98b`d4c07ab0 fffff800`097946db : fffff800`0577bcd0 fffff800`09c47048 fffff800`097946a0 fffff800`0577bcd0 : nt!IoInitSystem+0x2e fffff98b`d4c07ae0 fffff800`092a2ae5 : ffffa288`e3662300 fffff800`097946a0 fffff800`0577bcd0 054d842c`544fd5cc : nt!Phase1Initialization+0x3b fffff98b`d4c07b10 fffff800`093fbbf8 : fffff800`05ae5180 ffffa288`e3662300 fffff800`092a2a90 9199d69c`9cf06576 : nt!PspSystemThreadStartup+0x55 fffff98b`d4c07b60 00000000`00000000 : fffff98b`d4c08000 fffff98b`d4c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------
4 GB'lık olan gömülü değilse yapabilir tabii.Hocam 4GB kullanmaktansa 8GB kullanmak daha mantıklı olmaz mı?
Eskiyi çıkarıp yeniyi kullanmaya devam edebilir.
Evet gömülü olduğu için böyle birşey yapamıyorum4 GB'lık olan gömülü değilse yapabilir tabii.