Çözüldü RAM yükseltmeden sonra mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

enesuznc

Femtopat
Katılım
19 Ekim 2020
Mesajlar
11
Daha fazla  
Cinsiyet
Erkek
Bilgisayarım 4 GB RAM ile çalışmaktayken RAM yükseltme için 8 GB RAM aldım. Taktım her şey sorunsuz tek sorun mavi ekran hatası alıyor olmam. RAM uyumluluğu vs. sorunsuzdur. Memtest ile test sonucu da olumludur. Herhangi bir sorun yok. Ben bu hatayı neden alıyorum.
 
Çözüm
Ben bu hatayı neden alıyorum.
Çorba RAM yaptığınız için alıyorsunuz. RAM'lerin değerlerinin aynı olması bir anlam ifade etmez. Kit almadığınız sürece bu tür sorunlar yaşarsınız. Sorun belleklerin senkron çalışamamasıdır. Bu yüzdendir ki Memtet86'da hata çıkmaz ama gerçek dünya kullanımında hata alırsınız. Çünkü bellekler tek başına arızalı olmasa da gecikme farkları yüzünden soruna yola açarlar. Bu gecikme hızlarının kağıt üstünde aynı olması bir şeyi değiştirmez...

Özellikleri aynı olursa sorun olmaz diyenlere itimat etmeyiniz. Bu kişiler tecrübesizdir.
Ama bunu almadan önce bu farkın herhangi bir problem oluşturup oluşturmayacağını sordum. Ve kesinlikle bir problem olmaz diye bir yanıt aldım.
Özellikleri aynı olursa sorun olmaz diyenlere itimat etmeyiniz. Bu kişiler tecrübesizdir.
Bakın ben aynı olursa sorun olmaz diyenler bile tecrübesizdir demişim, siz farklı olsa bile sorun olmaz diyenlere inanmışsınız. Onlara sorun bakalım, zararınızı karşılasınlar.
 
Bunu neye dayanarak söylüyorsunuz? Bana elinizdeki RAM'ler çorba RAM gibi geldi. Dosyaları atın, bakalım.
Bakın ben aynı olursa sorun olmaz diyenler bile tecrübesizdir demişim, siz farklı olsa bile sorun olmaz diyenlere inanmışsınız. Onlara sorun bakalım, zararınızı karşılasınlar.

Bu dosyalar tam olarak sorunun ne olduğunu açıklıyorsa yardımcı olmanızı bekliyorum. Şimdiden teşekkür ederim.
 
Bu dosyalarda da bariz bir bellek hatası görünüyor. Ek olarak taktığınız RAM'i çıkarın, sistemi bir süre öyle kullanın. Sorun çıkmazsa sorun çorba RAM kullanmanızdandır.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff280da2586c8
Arg3: 0000000020000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4686

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7959

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff280da2586c8

BUGCHECK_P3: 20000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
ffffee89`ad2aefc8 fffff801`1034c03a     : 00000000`0000001a 00000000`00041792 fffff280`da2586c8 00000000`20000000 : nt!KeBugCheckEx
ffffee89`ad2aefd0 fffff801`102e9666     : 00000000`00000000 ffffc77f`150144e0 00000000`00000006 fffff280`da2586c8 : nt!MiDeleteVa+0x153a
ffffee89`ad2af0d0 fffff801`102e977b     : fffff2f9`406d12c0 ffffa606`32344700 ffffee89`00000000 ffffee89`ad2af540 : nt!MiWalkPageTablesRecursively+0x776
ffffee89`ad2af170 fffff801`102e977b     : fffff2f9`7ca03688 ffffa606`32344700 ffffee89`00000001 ffffee89`ad2af550 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af210 fffff801`102e977b     : fffff2f9`7ca03000 ffffa606`32344700 ffffee89`00000002 ffffee89`ad2af560 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af2b0 fffff801`102d86db     : 00000000`00000000 ffffa606`32344700 1a000001`00000003 ffffee89`ad2af570 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af350 fffff801`1034a8d1     : ffffee89`ad2af4f0 ffffa606`00000000 fffff280`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffee89`ad2af450 fffff801`10322ae0     : 00000000`00000001 ffffee89`00000000 ffffa606`32344550 ffffa606`3244a040 : nt!MiDeletePagablePteRange+0x4f1
ffffee89`ad2af760 fffff801`10704aa9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffee89`ad2af870 fffff801`10704882     : ffffa606`333143f0 00000000`00000000 ffffa606`32344080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffee89`ad2af8a0 fffff801`107046f9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffee89`ad2af980 fffff801`10681f4c     : ffffa606`3244a040 000001b4`4b000000 000001b4`49bac618 ffffa606`32344080 : nt!NtUnmapViewOfSectionEx+0x99
ffffee89`ad2af9d0 fffff801`10405fb5     : ffffa606`3244a000 ffffa606`330e1df0 ffffee89`ad2afa80 000001b4`49bea450 : nt!NtUnmapViewOfSection+0xc
ffffee89`ad2afa00 00007ffb`1de2c2d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ab`3d9fe0a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1de2c2d4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff9a800a346b50
Arg3: 0000000000000003
Arg4: 0000000000000004

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9934

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff9a800a346b50

BUGCHECK_P3: 3

BUGCHECK_P4: 4

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WerFault.exe

STACK_TEXT: 
ffffec87`daebee88 fffff804`6e74951a     : 00000000`0000001a 00000000`00041790 ffff9a80`0a346b50 00000000`00000003 : nt!KeBugCheckEx
ffffec87`daebee90 fffff804`6e749cae     : 00000000`00000000 ffffec87`daebf5a0 fffff901`65751000 ffffec87`daebf4f0 : nt!MiDeletePteRun+0x17da
ffffec87`daebf0a0 fffff804`6e6e9b5d     : 00000000`00000000 ffffdb06`756849c0 ffffec87`daebf4f0 fffff901`65750de0 : nt!MiDeleteVaTail+0x6e
ffffec87`daebf0d0 fffff804`6e6e977b     : fffff97c`00000000 ffffdb06`756849c0 ffffec87`00000000 ffffec87`daebf540 : nt!MiWalkPageTablesRecursively+0xc6d
ffffec87`daebf170 fffff804`6e6e977b     : fffff97c`be405958 ffffdb06`756849c0 ffffec87`00000001 ffffec87`daebf550 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf210 fffff804`6e6e977b     : fffff97c`be405000 ffffdb06`756849c0 ffffec87`00000002 ffffec87`daebf560 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf2b0 fffff804`6e6d86db     : 00000000`00000000 ffffdb06`756849c0 00000000`00000003 ffffec87`daebf570 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf350 fffff804`6e74a8d1     : ffffec87`daebf4f0 ffffdb06`00000000 ffffdb06`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffec87`daebf450 fffff804`6e722ae0     : 00000000`00000001 ffffec87`00000000 ffffdb06`75684810 ffffdb06`7b895080 : nt!MiDeletePagablePteRange+0x4f1
ffffec87`daebf760 fffff804`6eb04aa9     : 00000000`00000000 00000000`00000000 000002ca`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffec87`daebf870 fffff804`6eb04882     : ffffdb06`7b69a520 00000000`00000000 ffffdb06`75684340 00000000`00000000 : nt!MiUnmapVad+0x49
ffffec87`daebf8a0 fffff804`6eb046f9     : ffff848d`353d7e80 fffff804`6eaf138c 00000000`000003f8 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffec87`daebf980 fffff804`6ea81f4c     : ffffdb06`7b895080 000002ca`e9e90000 00000000`00000004 ffffdb06`75684340 : nt!NtUnmapViewOfSectionEx+0x99
ffffec87`daebf9d0 fffff804`6e805fb5     : ffffdb06`7b895000 00000000`00000010 ffffec87`daebfa80 000002ca`e7cbda30 : nt!NtUnmapViewOfSection+0xc
ffffec87`daebfa00 00007ffe`2644c2d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ff`f4f47fa8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2644c2d4


SYMBOL_NAME:  nt!MiDeletePteRun+17da

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17da

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffd811cec01e0
Arg3: 0000000000010000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7530

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13211

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffffd811cec01e0

BUGCHECK_P3: 10000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

STACK_TEXT: 
ffff8381`9c04f348 fffff804`1094c03a     : 00000000`0000001a 00000000`00041792 fffffd81`1cec01e0 00000000`00010000 : nt!KeBugCheckEx
ffff8381`9c04f350 fffff804`1094a86f     : ffff8d81`4f15a700 00000000`00000000 ffff8d81`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffff8381`9c04f450 fffff804`10922ae0     : 00000000`00000001 ffff8381`00000000 ffff8d81`4f15a550 ffff8d81`4f038080 : nt!MiDeletePagablePteRange+0x48f
ffff8381`9c04f760 fffff804`10d04aa9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffff8381`9c04f870 fffff804`10d04882     : ffff8d81`4efd8460 00000000`00000000 ffff8d81`4f15a080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8381`9c04f8a0 fffff804`10d046f9     : ffffde85`a532c980 fffff804`10cf138c 00000000`000005a4 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffff8381`9c04f980 fffff804`10c81f4c     : ffff8d81`4f038080 00000239`d8000000 00000000`00000003 ffff8d81`4f15a080 : nt!NtUnmapViewOfSectionEx+0x99
ffff8381`9c04f9d0 fffff804`10a05fb5     : ffff8d81`4f038000 00000000`00000001 ffff8381`9c04fa80 00000239`d6b0caa0 : nt!NtUnmapViewOfSection+0xc
ffff8381`9c04fa00 00007ffa`8178c2d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000cc`4dbfbc88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`8178c2d4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff200fc19c480
Arg3: 0000200000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7077

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7299

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff200fc19c480

BUGCHECK_P3: 200000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff98b`d4c05378 fffff800`0934c03a     : 00000000`0000001a 00000000`00041792 fffff200`fc19c480 00002000`00000000 : nt!KeBugCheckEx
fffff98b`d4c05380 fffff800`092e9666     : 00000000`00000000 ffffa288`e36a1700 00000000`000001a5 fffff200`fc19c480 : nt!MiDeleteVa+0x153a
fffff98b`d4c05480 fffff800`092e977b     : fffff279`00000000 ffffa288`e36a1700 fffff98b`00000000 fffff98b`d4c058f0 : nt!MiWalkPageTablesRecursively+0x776
fffff98b`d4c05520 fffff800`092e977b     : fffff279`3c803f00 ffffa288`e36a1700 fffff98b`00000001 fffff98b`d4c05900 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c055c0 fffff800`092e977b     : fffff279`3c803000 ffffa288`e36a1700 fffff98b`00000002 fffff98b`d4c05910 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05660 fffff800`092d86db     : 00000000`00000000 ffffa288`e36a1700 fffff98b`00000003 fffff98b`d4c05920 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05700 fffff800`0934a8d1     : fffff98b`d4c058a0 ffffa288`00000000 fffff98b`00000002 fffff98b`00000000 : nt!MiWalkPageTables+0x36b
fffff98b`d4c05800 fffff800`09322ae0     : 00000000`00000005 fffff98b`00000000 ffffa288`e36a1550 ffffa288`e3662300 : nt!MiDeletePagablePteRange+0x4f1
fffff98b`d4c05b10 fffff800`09704aa9     : ffff8b01`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffff98b`d4c05c20 fffff800`09704882     : ffffa288`e6072ec0 00000000`00000000 ffffa288`e36a1080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff98b`d4c05c50 fffff800`097046f9     : ffff8b01`3f040d00 fffff800`096f138c 00000000`00000130 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff98b`d4c05d30 fffff800`09681f4c     : ffffa288`e3662300 ffff8b01`42a6ee88 ffff8b01`42a6edb0 ffffa288`e36a1080 : nt!NtUnmapViewOfSectionEx+0x99
fffff98b`d4c05d80 fffff800`09405fb5     : 00000000`00000000 00000000`00000000 fffff98b`d4c05e30 00000000`00000002 : nt!NtUnmapViewOfSection+0xc
fffff98b`d4c05db0 fffff800`093f8400     : fffff800`0c83aa50 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 : nt!KiSystemServiceCopyEnd+0x25
fffff98b`d4c05f48 fffff800`0c83aa50     : 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 00000000`00000000 : nt!KiServiceLinkage
fffff98b`d4c05f50 fffff800`0c83b727     : fffff98b`d4c06130 ffff8b01`42a6edb0 00000000`00000000 00000000`00000000 : CI!I_MapCatalog+0x4a0
fffff98b`d4c06040 fffff800`0c83b2d3     : 00000000`00000000 ffff8b01`3ffab5b8 fffff98b`d4c061a1 00000000`000000d9 : CI!I_ReloadCatalog+0x263
fffff98b`d4c060c0 fffff800`0c83afa1     : 00000000`00000001 00000000`00000000 ffff8b01`00000001 00000000`00000000 : CI!I_ReloadCatalogDirectory+0x297
fffff98b`d4c061f0 fffff800`0c83941a     : ffff8b01`3fe10e30 ffff8b01`00000001 fffff98b`d4c06360 00000000`00000004 : CI!I_ReloadCatalogs+0x1ad
fffff98b`d4c06260 fffff800`0c8390f4     : fffff98b`d4c065f0 00000000`00000014 ffff8b01`3fef7d80 00000000`00000001 : CI!I_FindFileOrHeaderHashInCatalogs+0x24a
fffff98b`d4c063c0 fffff800`0c844efe     : fffff98b`d4c065ac fffff98b`d4c065b8 fffff98b`d4c065e8 fffff98b`d4c065f0 : CI!MinCrypK_VerifyHashInCatalog+0x110
fffff98b`d4c06470 fffff800`0c840770     : 00000000`00000000 00000000`00000000 ffff8b01`3fe10601 fffff800`0000002a : CI!CiVerifyFileHashInCatalogs+0x18e
fffff98b`d4c06550 fffff800`0c841c79     : 00000000`00000000 fffff98b`d4c06881 00000000`00000000 00000000`00000000 : CI!CipFindFileHash+0x2dc
fffff98b`d4c066b0 fffff800`0c8415ac     : ffff8b01`3fe10660 ffffa288`ea592a80 ffffa288`e36a1080 fffff800`0ed20000 : CI!CipValidateFileHash+0x2d9
fffff98b`d4c06790 fffff800`0c83f9e2     : 00000000`00000088 00000000`00000000 ffffa288`ea592a80 fffff800`0ed20000 : CI!CipValidateImageHash+0x110
fffff98b`d4c068d0 fffff800`096735e5     : fffff98b`d4c06b10 fffff800`0ed20000 00000000`0000000f fffff800`0ed20000 : CI!CiValidateImageHeader+0x812
fffff98b`d4c06a50 fffff800`09673140     : 00000000`00000000 ffffa288`e372ea30 00000000`00000000 00000000`00018000 : nt!SeValidateImageHeader+0xd9
fffff98b`d4c06b00 fffff800`0960c09b     : fffff98b`d4c07000 00000000`00000000 00000000`00000000 ffffffff`8000013c : nt!MiValidateSectionCreate+0x438
fffff98b`d4c06ce0 fffff800`0960b4e6     : fffff98b`d4c07020 fffff98b`d4c07020 fffff98b`d4c06e40 00000000`00000000 : nt!MiValidateSectionSigningPolicy+0xab
fffff98b`d4c06d40 fffff800`096ff71b     : ffffa288`ea592a80 fffff98b`d4c07020 fffff98b`d4c07020 00002003`00000000 : nt!MiCreateNewSection+0x66e
fffff98b`d4c06eb0 fffff800`096fed64     : fffff98b`d4c06ee0 ffff8b01`3fe23030 ffffa288`ea592a80 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
fffff98b`d4c06fa0 fffff800`0936c1b8     : 00000000`00000000 00000000`ffffffff ffffffff`80000138 00000000`000001b0 : nt!MiCreateSection+0xf4
fffff98b`d4c07120 fffff800`09733fa2     : 00000000`00000000 fffff98b`d4c07239 ffffffff`80000138 00000000`00000000 : nt!MiCreateSystemSection+0xa4
fffff98b`d4c071c0 fffff800`0973187e     : fffff800`09c2a310 ffffffff`80000138 fffff98b`d4c07358 00000000`00000000 : nt!MiCreateSectionForDriver+0x126
fffff98b`d4c072a0 fffff800`097310d2     : 00000000`00000000 fffff98b`d4c073f0 00000000`00000000 fffff800`00000000 : nt!MiObtainSectionForDriver+0xa6
fffff98b`d4c072f0 fffff800`09787c54     : fffff98b`d4c07540 00000000`00000000 fffff800`09c2a310 fffff800`097ad000 : nt!MmLoadSystemImageEx+0x156
fffff98b`d4c07490 fffff800`097328cc     : fffff800`09c2a310 00000000`00000000 fffff98b`d4c07710 00000000`00000000 : nt!MiLoadImportDll+0x44
fffff98b`d4c074e0 fffff800`09732504     : ffffa288`e60eea20 fffff98b`d4c076e0 fffff98b`d4c07710 00000000`00000000 : nt!MiResolveImageReferences+0x214
fffff98b`d4c075f0 fffff800`0973160c     : fffff98b`00001108 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiResolveImageImports+0x94
fffff98b`d4c07660 fffff800`09730f66     : fffff98b`d4c07898 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x690
fffff98b`d4c07800 fffff800`0971e124     : fffff98b`d4c07940 00000000`00000000 fffff800`09c458e0 00000000`00000000 : nt!MmLoadSystemImage+0x26
fffff98b`d4c07840 fffff800`09a53eaf     : ffffa288`ea4f5a30 ffffa288`ea4f5a30 fffff98b`d4c07a80 00000000`00000000 : nt!IopLoadDriver+0x23c
fffff98b`d4c07a10 fffff800`09a60ad6     : ffffffff`00000000 ffff8b01`3fd2b940 00000000`00000000 fffff800`0577bcd0 : nt!IopInitializeSystemDrivers+0x157
fffff98b`d4c07ab0 fffff800`097946db     : fffff800`0577bcd0 fffff800`09c47048 fffff800`097946a0 fffff800`0577bcd0 : nt!IoInitSystem+0x2e
fffff98b`d4c07ae0 fffff800`092a2ae5     : ffffa288`e3662300 fffff800`097946a0 fffff800`0577bcd0 054d842c`544fd5cc : nt!Phase1Initialization+0x3b
fffff98b`d4c07b10 fffff800`093fbbf8     : fffff800`05ae5180 ffffa288`e3662300 fffff800`092a2a90 9199d69c`9cf06576 : nt!PspSystemThreadStartup+0x55
fffff98b`d4c07b60 00000000`00000000     : fffff98b`d4c08000 fffff98b`d4c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 
Bu dosyalarda da bariz bir bellek hatası görünüyor. Ek olarak taktığınız RAM'i çıkarın, sistemi bir süre öyle kullanın. Sorun çıkmazsa sorun çorba RAM kullanmanızdandır.

Kod:
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff280da2586c8.
Arg3: 0000000020000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4686.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 7959.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: fffff280da2586c8.

BUGCHECK_P3: 20000000.

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffee89`ad2aefc8 fffff801`1034c03a : 00000000`0000001a 00000000`00041792 fffff280`da2586c8 00000000`20000000 : nt!KeBugCheckEx
ffffee89`ad2aefd0 fffff801`102e9666 : 00000000`00000000 ffffc77f`150144e0 00000000`00000006 fffff280`da2586c8 : nt!MiDeleteVa+0x153a
ffffee89`ad2af0d0 fffff801`102e977b : fffff2f9`406d12c0 ffffa606`32344700 ffffee89`00000000 ffffee89`ad2af540 : nt!MiWalkPageTablesRecursively+0x776
ffffee89`ad2af170 fffff801`102e977b : fffff2f9`7ca03688 ffffa606`32344700 ffffee89`00000001 ffffee89`ad2af550 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af210 fffff801`102e977b : fffff2f9`7ca03000 ffffa606`32344700 ffffee89`00000002 ffffee89`ad2af560 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af2b0 fffff801`102d86db : 00000000`00000000 ffffa606`32344700 1a000001`00000003 ffffee89`ad2af570 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af350 fffff801`1034a8d1 : ffffee89`ad2af4f0 ffffa606`00000000 fffff280`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffee89`ad2af450 fffff801`10322ae0 : 00000000`00000001 ffffee89`00000000 ffffa606`32344550 ffffa606`3244a040 : nt!MiDeletePagablePteRange+0x4f1
ffffee89`ad2af760 fffff801`10704aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffee89`ad2af870 fffff801`10704882 : ffffa606`333143f0 00000000`00000000 ffffa606`32344080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffee89`ad2af8a0 fffff801`107046f9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffee89`ad2af980 fffff801`10681f4c : ffffa606`3244a040 000001b4`4b000000 000001b4`49bac618 ffffa606`32344080 : nt!NtUnmapViewOfSectionEx+0x99
ffffee89`ad2af9d0 fffff801`10405fb5 : ffffa606`3244a000 ffffa606`330e1df0 ffffee89`ad2afa80 000001b4`49bea450 : nt!NtUnmapViewOfSection+0xc
ffffee89`ad2afa00 00007ffb`1de2c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ab`3d9fe0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1de2c2d4

MODULE_NAME: hardware.

IMAGE_NAME: memory_corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used.
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff9a800a346b50.
Arg3: 0000000000000003.
Arg4: 0000000000000004.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6374.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 9934.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41790.

BUGCHECK_P2: ffff9a800a346b50.

BUGCHECK_P3: 3

BUGCHECK_P4: 4

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: WerFault.exe

STACK_TEXT:
ffffec87`daebee88 fffff804`6e74951a : 00000000`0000001a 00000000`00041790 ffff9a80`0a346b50 00000000`00000003 : nt!KeBugCheckEx
ffffec87`daebee90 fffff804`6e749cae : 00000000`00000000 ffffec87`daebf5a0 fffff901`65751000 ffffec87`daebf4f0 : nt!MiDeletePteRun+0x17da
ffffec87`daebf0a0 fffff804`6e6e9b5d : 00000000`00000000 ffffdb06`756849c0 ffffec87`daebf4f0 fffff901`65750de0 : nt!MiDeleteVaTail+0x6e
ffffec87`daebf0d0 fffff804`6e6e977b : fffff97c`00000000 ffffdb06`756849c0 ffffec87`00000000 ffffec87`daebf540 : nt!MiWalkPageTablesRecursively+0xc6d
ffffec87`daebf170 fffff804`6e6e977b : fffff97c`be405958 ffffdb06`756849c0 ffffec87`00000001 ffffec87`daebf550 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf210 fffff804`6e6e977b : fffff97c`be405000 ffffdb06`756849c0 ffffec87`00000002 ffffec87`daebf560 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf2b0 fffff804`6e6d86db : 00000000`00000000 ffffdb06`756849c0 00000000`00000003 ffffec87`daebf570 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf350 fffff804`6e74a8d1 : ffffec87`daebf4f0 ffffdb06`00000000 ffffdb06`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffec87`daebf450 fffff804`6e722ae0 : 00000000`00000001 ffffec87`00000000 ffffdb06`75684810 ffffdb06`7b895080 : nt!MiDeletePagablePteRange+0x4f1
ffffec87`daebf760 fffff804`6eb04aa9 : 00000000`00000000 00000000`00000000 000002ca`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffec87`daebf870 fffff804`6eb04882 : ffffdb06`7b69a520 00000000`00000000 ffffdb06`75684340 00000000`00000000 : nt!MiUnmapVad+0x49
ffffec87`daebf8a0 fffff804`6eb046f9 : ffff848d`353d7e80 fffff804`6eaf138c 00000000`000003f8 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffec87`daebf980 fffff804`6ea81f4c : ffffdb06`7b895080 000002ca`e9e90000 00000000`00000004 ffffdb06`75684340 : nt!NtUnmapViewOfSectionEx+0x99
ffffec87`daebf9d0 fffff804`6e805fb5 : ffffdb06`7b895000 00000000`00000010 ffffec87`daebfa80 000002ca`e7cbda30 : nt!NtUnmapViewOfSection+0xc
ffffec87`daebfa00 00007ffe`2644c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ff`f4f47fa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2644c2d4

SYMBOL_NAME: nt!MiDeletePteRun+17da

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.572

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 17da.

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffd811cec01e0.
Arg3: 0000000000010000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7530.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 13211.

Key : Analysis.Memory.CommitPeak.Mb
Value: 77.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: fffffd811cec01e0.

BUGCHECK_P3: 10000.

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: StartMenuExperienceHost.exe

STACK_TEXT:
ffff8381`9c04f348 fffff804`1094c03a : 00000000`0000001a 00000000`00041792 fffffd81`1cec01e0 00000000`00010000 : nt!KeBugCheckEx
ffff8381`9c04f350 fffff804`1094a86f : ffff8d81`4f15a700 00000000`00000000 ffff8d81`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffff8381`9c04f450 fffff804`10922ae0 : 00000000`00000001 ffff8381`00000000 ffff8d81`4f15a550 ffff8d81`4f038080 : nt!MiDeletePagablePteRange+0x48f
ffff8381`9c04f760 fffff804`10d04aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffff8381`9c04f870 fffff804`10d04882 : ffff8d81`4efd8460 00000000`00000000 ffff8d81`4f15a080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8381`9c04f8a0 fffff804`10d046f9 : ffffde85`a532c980 fffff804`10cf138c 00000000`000005a4 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffff8381`9c04f980 fffff804`10c81f4c : ffff8d81`4f038080 00000239`d8000000 00000000`00000003 ffff8d81`4f15a080 : nt!NtUnmapViewOfSectionEx+0x99
ffff8381`9c04f9d0 fffff804`10a05fb5 : ffff8d81`4f038000 00000000`00000001 ffff8381`9c04fa80 00000239`d6b0caa0 : nt!NtUnmapViewOfSection+0xc
ffff8381`9c04fa00 00007ffa`8178c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000cc`4dbfbc88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`8178c2d4

MODULE_NAME: hardware.

IMAGE_NAME: memory_corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff200fc19c480.
Arg3: 0000200000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7077.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 7299.

Key : Analysis.Memory.CommitPeak.Mb
Value: 74.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: fffff200fc19c480.

BUGCHECK_P3: 200000000000.

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

STACK_TEXT:
fffff98b`d4c05378 fffff800`0934c03a : 00000000`0000001a 00000000`00041792 fffff200`fc19c480 00002000`00000000 : nt!KeBugCheckEx
fffff98b`d4c05380 fffff800`092e9666 : 00000000`00000000 ffffa288`e36a1700 00000000`000001a5 fffff200`fc19c480 : nt!MiDeleteVa+0x153a
fffff98b`d4c05480 fffff800`092e977b : fffff279`00000000 ffffa288`e36a1700 fffff98b`00000000 fffff98b`d4c058f0 : nt!MiWalkPageTablesRecursively+0x776
fffff98b`d4c05520 fffff800`092e977b : fffff279`3c803f00 ffffa288`e36a1700 fffff98b`00000001 fffff98b`d4c05900 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c055c0 fffff800`092e977b : fffff279`3c803000 ffffa288`e36a1700 fffff98b`00000002 fffff98b`d4c05910 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05660 fffff800`092d86db : 00000000`00000000 ffffa288`e36a1700 fffff98b`00000003 fffff98b`d4c05920 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05700 fffff800`0934a8d1 : fffff98b`d4c058a0 ffffa288`00000000 fffff98b`00000002 fffff98b`00000000 : nt!MiWalkPageTables+0x36b
fffff98b`d4c05800 fffff800`09322ae0 : 00000000`00000005 fffff98b`00000000 ffffa288`e36a1550 ffffa288`e3662300 : nt!MiDeletePagablePteRange+0x4f1
fffff98b`d4c05b10 fffff800`09704aa9 : ffff8b01`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffff98b`d4c05c20 fffff800`09704882 : ffffa288`e6072ec0 00000000`00000000 ffffa288`e36a1080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff98b`d4c05c50 fffff800`097046f9 : ffff8b01`3f040d00 fffff800`096f138c 00000000`00000130 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff98b`d4c05d30 fffff800`09681f4c : ffffa288`e3662300 ffff8b01`42a6ee88 ffff8b01`42a6edb0 ffffa288`e36a1080 : nt!NtUnmapViewOfSectionEx+0x99
fffff98b`d4c05d80 fffff800`09405fb5 : 00000000`00000000 00000000`00000000 fffff98b`d4c05e30 00000000`00000002 : nt!NtUnmapViewOfSection+0xc
fffff98b`d4c05db0 fffff800`093f8400 : fffff800`0c83aa50 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 : nt!KiSystemServiceCopyEnd+0x25
fffff98b`d4c05f48 fffff800`0c83aa50 : 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 00000000`00000000 : nt!KiServiceLinkage
fffff98b`d4c05f50 fffff800`0c83b727 : fffff98b`d4c06130 ffff8b01`42a6edb0 00000000`00000000 00000000`00000000 : CI!I_MapCatalog+0x4a0
fffff98b`d4c06040 fffff800`0c83b2d3 : 00000000`00000000 ffff8b01`3ffab5b8 fffff98b`d4c061a1 00000000`000000d9 : CI!I_ReloadCatalog+0x263
fffff98b`d4c060c0 fffff800`0c83afa1 : 00000000`00000001 00000000`00000000 ffff8b01`00000001 00000000`00000000 : CI!I_ReloadCatalogDirectory+0x297
fffff98b`d4c061f0 fffff800`0c83941a : ffff8b01`3fe10e30 ffff8b01`00000001 fffff98b`d4c06360 00000000`00000004 : CI!I_ReloadCatalogs+0x1ad
fffff98b`d4c06260 fffff800`0c8390f4 : fffff98b`d4c065f0 00000000`00000014 ffff8b01`3fef7d80 00000000`00000001 : CI!I_FindFileOrHeaderHashInCatalogs+0x24a
fffff98b`d4c063c0 fffff800`0c844efe : fffff98b`d4c065ac fffff98b`d4c065b8 fffff98b`d4c065e8 fffff98b`d4c065f0 : CI!MinCrypK_VerifyHashInCatalog+0x110
fffff98b`d4c06470 fffff800`0c840770 : 00000000`00000000 00000000`00000000 ffff8b01`3fe10601 fffff800`0000002a : CI!CiVerifyFileHashInCatalogs+0x18e
fffff98b`d4c06550 fffff800`0c841c79 : 00000000`00000000 fffff98b`d4c06881 00000000`00000000 00000000`00000000 : CI!CipFindFileHash+0x2dc
fffff98b`d4c066b0 fffff800`0c8415ac : ffff8b01`3fe10660 ffffa288`ea592a80 ffffa288`e36a1080 fffff800`0ed20000 : CI!CipValidateFileHash+0x2d9
fffff98b`d4c06790 fffff800`0c83f9e2 : 00000000`00000088 00000000`00000000 ffffa288`ea592a80 fffff800`0ed20000 : CI!CipValidateImageHash+0x110
fffff98b`d4c068d0 fffff800`096735e5 : fffff98b`d4c06b10 fffff800`0ed20000 00000000`0000000f fffff800`0ed20000 : CI!CiValidateImageHeader+0x812
fffff98b`d4c06a50 fffff800`09673140 : 00000000`00000000 ffffa288`e372ea30 00000000`00000000 00000000`00018000 : nt!SeValidateImageHeader+0xd9
fffff98b`d4c06b00 fffff800`0960c09b : fffff98b`d4c07000 00000000`00000000 00000000`00000000 ffffffff`8000013c : nt!MiValidateSectionCreate+0x438
fffff98b`d4c06ce0 fffff800`0960b4e6 : fffff98b`d4c07020 fffff98b`d4c07020 fffff98b`d4c06e40 00000000`00000000 : nt!MiValidateSectionSigningPolicy+0xab
fffff98b`d4c06d40 fffff800`096ff71b : ffffa288`ea592a80 fffff98b`d4c07020 fffff98b`d4c07020 00002003`00000000 : nt!MiCreateNewSection+0x66e
fffff98b`d4c06eb0 fffff800`096fed64 : fffff98b`d4c06ee0 ffff8b01`3fe23030 ffffa288`ea592a80 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
fffff98b`d4c06fa0 fffff800`0936c1b8 : 00000000`00000000 00000000`ffffffff ffffffff`80000138 00000000`000001b0 : nt!MiCreateSection+0xf4
fffff98b`d4c07120 fffff800`09733fa2 : 00000000`00000000 fffff98b`d4c07239 ffffffff`80000138 00000000`00000000 : nt!MiCreateSystemSection+0xa4
fffff98b`d4c071c0 fffff800`0973187e : fffff800`09c2a310 ffffffff`80000138 fffff98b`d4c07358 00000000`00000000 : nt!MiCreateSectionForDriver+0x126
fffff98b`d4c072a0 fffff800`097310d2 : 00000000`00000000 fffff98b`d4c073f0 00000000`00000000 fffff800`00000000 : nt!MiObtainSectionForDriver+0xa6
fffff98b`d4c072f0 fffff800`09787c54 : fffff98b`d4c07540 00000000`00000000 fffff800`09c2a310 fffff800`097ad000 : nt!MmLoadSystemImageEx+0x156
fffff98b`d4c07490 fffff800`097328cc : fffff800`09c2a310 00000000`00000000 fffff98b`d4c07710 00000000`00000000 : nt!MiLoadImportDll+0x44
fffff98b`d4c074e0 fffff800`09732504 : ffffa288`e60eea20 fffff98b`d4c076e0 fffff98b`d4c07710 00000000`00000000 : nt!MiResolveImageReferences+0x214
fffff98b`d4c075f0 fffff800`0973160c : fffff98b`00001108 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiResolveImageImports+0x94
fffff98b`d4c07660 fffff800`09730f66 : fffff98b`d4c07898 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x690
fffff98b`d4c07800 fffff800`0971e124 : fffff98b`d4c07940 00000000`00000000 fffff800`09c458e0 00000000`00000000 : nt!MmLoadSystemImage+0x26
fffff98b`d4c07840 fffff800`09a53eaf : ffffa288`ea4f5a30 ffffa288`ea4f5a30 fffff98b`d4c07a80 00000000`00000000 : nt!IopLoadDriver+0x23c
fffff98b`d4c07a10 fffff800`09a60ad6 : ffffffff`00000000 ffff8b01`3fd2b940 00000000`00000000 fffff800`0577bcd0 : nt!IopInitializeSystemDrivers+0x157
fffff98b`d4c07ab0 fffff800`097946db : fffff800`0577bcd0 fffff800`09c47048 fffff800`097946a0 fffff800`0577bcd0 : nt!IoInitSystem+0x2e
fffff98b`d4c07ae0 fffff800`092a2ae5 : ffffa288`e3662300 fffff800`097946a0 fffff800`0577bcd0 054d842c`544fd5cc : nt!Phase1Initialization+0x3b
fffff98b`d4c07b10 fffff800`093fbbf8 : fffff800`05ae5180 ffffa288`e3662300 fffff800`092a2a90 9199d69c`9cf06576 : nt!PspSystemThreadStartup+0x55
fffff98b`d4c07b60 00000000`00000000 : fffff98b`d4c08000 fffff98b`d4c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

MODULE_NAME: hardware.

IMAGE_NAME: memory_corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner.
---------

Evet RAM'i çıkardım ve bir hata almıyorum. Peki sistemimi nasıl yükselteceğim?
 
Uyumlu bir RAM alarak. CPU-Z uygulamasından Memory ve SPD kısımlarının ekran görüntüsünü alıp yeni bir konu açarsanız yardımcı olabiliriz, bu konu amacına ulaştı.
 
Bu dosyalarda da bariz bir bellek hatası görünüyor. Ek olarak taktığınız RAM'i çıkarın, sistemi bir süre öyle kullanın. Sorun çıkmazsa sorun çorba RAM kullanmanızdandır.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff280da2586c8
Arg3: 0000000020000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4686

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7959

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff280da2586c8

BUGCHECK_P3: 20000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT:
ffffee89`ad2aefc8 fffff801`1034c03a     : 00000000`0000001a 00000000`00041792 fffff280`da2586c8 00000000`20000000 : nt!KeBugCheckEx
ffffee89`ad2aefd0 fffff801`102e9666     : 00000000`00000000 ffffc77f`150144e0 00000000`00000006 fffff280`da2586c8 : nt!MiDeleteVa+0x153a
ffffee89`ad2af0d0 fffff801`102e977b     : fffff2f9`406d12c0 ffffa606`32344700 ffffee89`00000000 ffffee89`ad2af540 : nt!MiWalkPageTablesRecursively+0x776
ffffee89`ad2af170 fffff801`102e977b     : fffff2f9`7ca03688 ffffa606`32344700 ffffee89`00000001 ffffee89`ad2af550 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af210 fffff801`102e977b     : fffff2f9`7ca03000 ffffa606`32344700 ffffee89`00000002 ffffee89`ad2af560 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af2b0 fffff801`102d86db     : 00000000`00000000 ffffa606`32344700 1a000001`00000003 ffffee89`ad2af570 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af350 fffff801`1034a8d1     : ffffee89`ad2af4f0 ffffa606`00000000 fffff280`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffee89`ad2af450 fffff801`10322ae0     : 00000000`00000001 ffffee89`00000000 ffffa606`32344550 ffffa606`3244a040 : nt!MiDeletePagablePteRange+0x4f1
ffffee89`ad2af760 fffff801`10704aa9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffee89`ad2af870 fffff801`10704882     : ffffa606`333143f0 00000000`00000000 ffffa606`32344080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffee89`ad2af8a0 fffff801`107046f9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffee89`ad2af980 fffff801`10681f4c     : ffffa606`3244a040 000001b4`4b000000 000001b4`49bac618 ffffa606`32344080 : nt!NtUnmapViewOfSectionEx+0x99
ffffee89`ad2af9d0 fffff801`10405fb5     : ffffa606`3244a000 ffffa606`330e1df0 ffffee89`ad2afa80 000001b4`49bea450 : nt!NtUnmapViewOfSection+0xc
ffffee89`ad2afa00 00007ffb`1de2c2d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ab`3d9fe0a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1de2c2d4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff9a800a346b50
Arg3: 0000000000000003
Arg4: 0000000000000004

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9934

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff9a800a346b50

BUGCHECK_P3: 3

BUGCHECK_P4: 4

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WerFault.exe

STACK_TEXT:
ffffec87`daebee88 fffff804`6e74951a     : 00000000`0000001a 00000000`00041790 ffff9a80`0a346b50 00000000`00000003 : nt!KeBugCheckEx
ffffec87`daebee90 fffff804`6e749cae     : 00000000`00000000 ffffec87`daebf5a0 fffff901`65751000 ffffec87`daebf4f0 : nt!MiDeletePteRun+0x17da
ffffec87`daebf0a0 fffff804`6e6e9b5d     : 00000000`00000000 ffffdb06`756849c0 ffffec87`daebf4f0 fffff901`65750de0 : nt!MiDeleteVaTail+0x6e
ffffec87`daebf0d0 fffff804`6e6e977b     : fffff97c`00000000 ffffdb06`756849c0 ffffec87`00000000 ffffec87`daebf540 : nt!MiWalkPageTablesRecursively+0xc6d
ffffec87`daebf170 fffff804`6e6e977b     : fffff97c`be405958 ffffdb06`756849c0 ffffec87`00000001 ffffec87`daebf550 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf210 fffff804`6e6e977b     : fffff97c`be405000 ffffdb06`756849c0 ffffec87`00000002 ffffec87`daebf560 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf2b0 fffff804`6e6d86db     : 00000000`00000000 ffffdb06`756849c0 00000000`00000003 ffffec87`daebf570 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf350 fffff804`6e74a8d1     : ffffec87`daebf4f0 ffffdb06`00000000 ffffdb06`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffec87`daebf450 fffff804`6e722ae0     : 00000000`00000001 ffffec87`00000000 ffffdb06`75684810 ffffdb06`7b895080 : nt!MiDeletePagablePteRange+0x4f1
ffffec87`daebf760 fffff804`6eb04aa9     : 00000000`00000000 00000000`00000000 000002ca`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffec87`daebf870 fffff804`6eb04882     : ffffdb06`7b69a520 00000000`00000000 ffffdb06`75684340 00000000`00000000 : nt!MiUnmapVad+0x49
ffffec87`daebf8a0 fffff804`6eb046f9     : ffff848d`353d7e80 fffff804`6eaf138c 00000000`000003f8 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffec87`daebf980 fffff804`6ea81f4c     : ffffdb06`7b895080 000002ca`e9e90000 00000000`00000004 ffffdb06`75684340 : nt!NtUnmapViewOfSectionEx+0x99
ffffec87`daebf9d0 fffff804`6e805fb5     : ffffdb06`7b895000 00000000`00000010 ffffec87`daebfa80 000002ca`e7cbda30 : nt!NtUnmapViewOfSection+0xc
ffffec87`daebfa00 00007ffe`2644c2d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ff`f4f47fa8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2644c2d4


SYMBOL_NAME:  nt!MiDeletePteRun+17da

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17da

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffd811cec01e0
Arg3: 0000000000010000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7530

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13211

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffffd811cec01e0

BUGCHECK_P3: 10000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

STACK_TEXT:
ffff8381`9c04f348 fffff804`1094c03a     : 00000000`0000001a 00000000`00041792 fffffd81`1cec01e0 00000000`00010000 : nt!KeBugCheckEx
ffff8381`9c04f350 fffff804`1094a86f     : ffff8d81`4f15a700 00000000`00000000 ffff8d81`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffff8381`9c04f450 fffff804`10922ae0     : 00000000`00000001 ffff8381`00000000 ffff8d81`4f15a550 ffff8d81`4f038080 : nt!MiDeletePagablePteRange+0x48f
ffff8381`9c04f760 fffff804`10d04aa9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffff8381`9c04f870 fffff804`10d04882     : ffff8d81`4efd8460 00000000`00000000 ffff8d81`4f15a080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8381`9c04f8a0 fffff804`10d046f9     : ffffde85`a532c980 fffff804`10cf138c 00000000`000005a4 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffff8381`9c04f980 fffff804`10c81f4c     : ffff8d81`4f038080 00000239`d8000000 00000000`00000003 ffff8d81`4f15a080 : nt!NtUnmapViewOfSectionEx+0x99
ffff8381`9c04f9d0 fffff804`10a05fb5     : ffff8d81`4f038000 00000000`00000001 ffff8381`9c04fa80 00000239`d6b0caa0 : nt!NtUnmapViewOfSection+0xc
ffff8381`9c04fa00 00007ffa`8178c2d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000cc`4dbfbc88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`8178c2d4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff200fc19c480
Arg3: 0000200000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7077

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7299

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff200fc19c480

BUGCHECK_P3: 200000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
fffff98b`d4c05378 fffff800`0934c03a     : 00000000`0000001a 00000000`00041792 fffff200`fc19c480 00002000`00000000 : nt!KeBugCheckEx
fffff98b`d4c05380 fffff800`092e9666     : 00000000`00000000 ffffa288`e36a1700 00000000`000001a5 fffff200`fc19c480 : nt!MiDeleteVa+0x153a
fffff98b`d4c05480 fffff800`092e977b     : fffff279`00000000 ffffa288`e36a1700 fffff98b`00000000 fffff98b`d4c058f0 : nt!MiWalkPageTablesRecursively+0x776
fffff98b`d4c05520 fffff800`092e977b     : fffff279`3c803f00 ffffa288`e36a1700 fffff98b`00000001 fffff98b`d4c05900 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c055c0 fffff800`092e977b     : fffff279`3c803000 ffffa288`e36a1700 fffff98b`00000002 fffff98b`d4c05910 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05660 fffff800`092d86db     : 00000000`00000000 ffffa288`e36a1700 fffff98b`00000003 fffff98b`d4c05920 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05700 fffff800`0934a8d1     : fffff98b`d4c058a0 ffffa288`00000000 fffff98b`00000002 fffff98b`00000000 : nt!MiWalkPageTables+0x36b
fffff98b`d4c05800 fffff800`09322ae0     : 00000000`00000005 fffff98b`00000000 ffffa288`e36a1550 ffffa288`e3662300 : nt!MiDeletePagablePteRange+0x4f1
fffff98b`d4c05b10 fffff800`09704aa9     : ffff8b01`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffff98b`d4c05c20 fffff800`09704882     : ffffa288`e6072ec0 00000000`00000000 ffffa288`e36a1080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff98b`d4c05c50 fffff800`097046f9     : ffff8b01`3f040d00 fffff800`096f138c 00000000`00000130 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff98b`d4c05d30 fffff800`09681f4c     : ffffa288`e3662300 ffff8b01`42a6ee88 ffff8b01`42a6edb0 ffffa288`e36a1080 : nt!NtUnmapViewOfSectionEx+0x99
fffff98b`d4c05d80 fffff800`09405fb5     : 00000000`00000000 00000000`00000000 fffff98b`d4c05e30 00000000`00000002 : nt!NtUnmapViewOfSection+0xc
fffff98b`d4c05db0 fffff800`093f8400     : fffff800`0c83aa50 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 : nt!KiSystemServiceCopyEnd+0x25
fffff98b`d4c05f48 fffff800`0c83aa50     : 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 00000000`00000000 : nt!KiServiceLinkage
fffff98b`d4c05f50 fffff800`0c83b727     : fffff98b`d4c06130 ffff8b01`42a6edb0 00000000`00000000 00000000`00000000 : CI!I_MapCatalog+0x4a0
fffff98b`d4c06040 fffff800`0c83b2d3     : 00000000`00000000 ffff8b01`3ffab5b8 fffff98b`d4c061a1 00000000`000000d9 : CI!I_ReloadCatalog+0x263
fffff98b`d4c060c0 fffff800`0c83afa1     : 00000000`00000001 00000000`00000000 ffff8b01`00000001 00000000`00000000 : CI!I_ReloadCatalogDirectory+0x297
fffff98b`d4c061f0 fffff800`0c83941a     : ffff8b01`3fe10e30 ffff8b01`00000001 fffff98b`d4c06360 00000000`00000004 : CI!I_ReloadCatalogs+0x1ad
fffff98b`d4c06260 fffff800`0c8390f4     : fffff98b`d4c065f0 00000000`00000014 ffff8b01`3fef7d80 00000000`00000001 : CI!I_FindFileOrHeaderHashInCatalogs+0x24a
fffff98b`d4c063c0 fffff800`0c844efe     : fffff98b`d4c065ac fffff98b`d4c065b8 fffff98b`d4c065e8 fffff98b`d4c065f0 : CI!MinCrypK_VerifyHashInCatalog+0x110
fffff98b`d4c06470 fffff800`0c840770     : 00000000`00000000 00000000`00000000 ffff8b01`3fe10601 fffff800`0000002a : CI!CiVerifyFileHashInCatalogs+0x18e
fffff98b`d4c06550 fffff800`0c841c79     : 00000000`00000000 fffff98b`d4c06881 00000000`00000000 00000000`00000000 : CI!CipFindFileHash+0x2dc
fffff98b`d4c066b0 fffff800`0c8415ac     : ffff8b01`3fe10660 ffffa288`ea592a80 ffffa288`e36a1080 fffff800`0ed20000 : CI!CipValidateFileHash+0x2d9
fffff98b`d4c06790 fffff800`0c83f9e2     : 00000000`00000088 00000000`00000000 ffffa288`ea592a80 fffff800`0ed20000 : CI!CipValidateImageHash+0x110
fffff98b`d4c068d0 fffff800`096735e5     : fffff98b`d4c06b10 fffff800`0ed20000 00000000`0000000f fffff800`0ed20000 : CI!CiValidateImageHeader+0x812
fffff98b`d4c06a50 fffff800`09673140     : 00000000`00000000 ffffa288`e372ea30 00000000`00000000 00000000`00018000 : nt!SeValidateImageHeader+0xd9
fffff98b`d4c06b00 fffff800`0960c09b     : fffff98b`d4c07000 00000000`00000000 00000000`00000000 ffffffff`8000013c : nt!MiValidateSectionCreate+0x438
fffff98b`d4c06ce0 fffff800`0960b4e6     : fffff98b`d4c07020 fffff98b`d4c07020 fffff98b`d4c06e40 00000000`00000000 : nt!MiValidateSectionSigningPolicy+0xab
fffff98b`d4c06d40 fffff800`096ff71b     : ffffa288`ea592a80 fffff98b`d4c07020 fffff98b`d4c07020 00002003`00000000 : nt!MiCreateNewSection+0x66e
fffff98b`d4c06eb0 fffff800`096fed64     : fffff98b`d4c06ee0 ffff8b01`3fe23030 ffffa288`ea592a80 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
fffff98b`d4c06fa0 fffff800`0936c1b8     : 00000000`00000000 00000000`ffffffff ffffffff`80000138 00000000`000001b0 : nt!MiCreateSection+0xf4
fffff98b`d4c07120 fffff800`09733fa2     : 00000000`00000000 fffff98b`d4c07239 ffffffff`80000138 00000000`00000000 : nt!MiCreateSystemSection+0xa4
fffff98b`d4c071c0 fffff800`0973187e     : fffff800`09c2a310 ffffffff`80000138 fffff98b`d4c07358 00000000`00000000 : nt!MiCreateSectionForDriver+0x126
fffff98b`d4c072a0 fffff800`097310d2     : 00000000`00000000 fffff98b`d4c073f0 00000000`00000000 fffff800`00000000 : nt!MiObtainSectionForDriver+0xa6
fffff98b`d4c072f0 fffff800`09787c54     : fffff98b`d4c07540 00000000`00000000 fffff800`09c2a310 fffff800`097ad000 : nt!MmLoadSystemImageEx+0x156
fffff98b`d4c07490 fffff800`097328cc     : fffff800`09c2a310 00000000`00000000 fffff98b`d4c07710 00000000`00000000 : nt!MiLoadImportDll+0x44
fffff98b`d4c074e0 fffff800`09732504     : ffffa288`e60eea20 fffff98b`d4c076e0 fffff98b`d4c07710 00000000`00000000 : nt!MiResolveImageReferences+0x214
fffff98b`d4c075f0 fffff800`0973160c     : fffff98b`00001108 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiResolveImageImports+0x94
fffff98b`d4c07660 fffff800`09730f66     : fffff98b`d4c07898 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x690
fffff98b`d4c07800 fffff800`0971e124     : fffff98b`d4c07940 00000000`00000000 fffff800`09c458e0 00000000`00000000 : nt!MmLoadSystemImage+0x26
fffff98b`d4c07840 fffff800`09a53eaf     : ffffa288`ea4f5a30 ffffa288`ea4f5a30 fffff98b`d4c07a80 00000000`00000000 : nt!IopLoadDriver+0x23c
fffff98b`d4c07a10 fffff800`09a60ad6     : ffffffff`00000000 ffff8b01`3fd2b940 00000000`00000000 fffff800`0577bcd0 : nt!IopInitializeSystemDrivers+0x157
fffff98b`d4c07ab0 fffff800`097946db     : fffff800`0577bcd0 fffff800`09c47048 fffff800`097946a0 fffff800`0577bcd0 : nt!IoInitSystem+0x2e
fffff98b`d4c07ae0 fffff800`092a2ae5     : ffffa288`e3662300 fffff800`097946a0 fffff800`0577bcd0 054d842c`544fd5cc : nt!Phase1Initialization+0x3b
fffff98b`d4c07b10 fffff800`093fbbf8     : fffff800`05ae5180 ffffa288`e3662300 fffff800`092a2a90 9199d69c`9cf06576 : nt!PspSystemThreadStartup+0x55
fffff98b`d4c07b60 00000000`00000000     : fffff98b`d4c08000 fffff98b`d4c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
Hocam 4GB kullanmaktansa 8GB kullanmak daha mantıklı olmaz mı?
Eskiyi çıkarıp yeniyi kullanmaya devam edebilir.
 
Hocam 4GB kullanmaktansa 8GB kullanmak daha mantıklı olmaz mı?
Eskiyi çıkarıp yeniyi kullanmaya devam edebilir.
4 GB'lık olan gömülü değilse yapabilir tabii.
 

Yeni konular

Geri
Yukarı