Gece cevap yazamadım kusura bakma. Testi yaptım ama herhangi bir sorun çıkmadı yine. RAM'leri çıkarıp tek tek test yapsam fark eder mi acaba?
Memtest: memtest14.zip
Gece cevap yazamadım kusura bakma. Testi yaptım ama herhangi bir sorun çıkmadı yine. RAM'leri çıkarıp tek tek test yapsam fark eder mi acaba?
Memtest: memtest14.zip
sfc/ scannow
komutunu gir ve %100 olmasını bekle.DISM /Online /Cleanup-Image /RestoreHealth
komutunu gir ve %100 olmasını bekle.OS_VERSION: 10.0.19041.1
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80083b546cb, The address that the exception occurred at
Arg3: fffff687e5f62348, Exception Record Address
Arg4: fffff687e5f61b80, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3577
Key : Analysis.Elapsed.mSec
Value: 22652
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 12
Key : Analysis.Init.CPU.mSec
Value: 500
Key : Analysis.Init.Elapsed.mSec
Value: 3111
Key : Analysis.Memory.CommitPeak.Mb
Value: 101
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Failure.Bucket
Value: 0x7E_C000001D_BAD_IP_dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource
Key : Failure.Hash
Value: {2052b81a-a996-6bab-f8e6-bb7b5f1f8630}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff80083b546cb
BUGCHECK_P3: fffff687e5f62348
BUGCHECK_P4: fffff687e5f61b80
FILE_IN_CAB: 113023-4265-01.dmp
EXCEPTION_RECORD: fffff687e5f62348 -- (.exr 0xfffff687e5f62348)
ExceptionAddress: fffff80083b546cb (dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+0x00000000000000db)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: fffff687e5f61b80 -- (.cxr 0xfffff687e5f61b80)
rax=0000000000800002 rbx=ffffe307097876f0 rcx=0000000000800000
rdx=0000000001001002 rsi=0000000000000002 rdi=ffffb80120d20db0
rip=fffff80083b546cb rsp=fffff687e5f62580 rbp=0000000000000000
r8=fffff687e5f62270 r9=0000000000000000 r10=ffffb80120fbf000
r11=fffff687e5f623e0 r12=ffffe307097878c8 r13=0000000000000000
r14=ffffe3070e945610 r15=ffffb80120fbf000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+0xdb:
fffff800`83b546cb 89434c mov dword ptr [rbx+4Ch],eax ds:002b:ffffe307`0978773c=00020040
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld .
EXCEPTION_CODE_STR: c000001d
EXCEPTION_STR: 0xc000001d
FAILED_INSTRUCTION_ADDRESS:
dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+db
fffff800`83b546cb 89434c mov dword ptr [rbx+4Ch],eax
STACK_TEXT:
fffff687`e5f62580 fffff800`83b5e511 : ffffe307`097876f0 ffffe307`097876f0 00000000`00000000 ffffb801`25c05d10 : dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+0xdb
fffff687`e5f625c0 fffff800`83b5cb85 : ffffe307`0c6c6a80 00000000`00000000 ffffb801`20fc9e80 ffffe307`097876f0 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1d1
fffff687`e5f626e0 fffff800`83b7d15e : 00000000`00000000 00000000`00989680 ffffe307`04cb55a0 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xe25
fffff687`e5f62900 fffff800`83b87309 : ffffe307`04cb54d0 ffffb801`20ebe201 00000000`00000100 00000000`026fbe00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e
fffff687`e5f62ae0 fffff800`5290e6f5 : ffffb801`20ebe280 fffff800`83b87300 ffffe307`04cb54d0 000fa4ef`bd9bbfff : dxgmms2!VidMmWorkerThreadProc+0x9
fffff687`e5f62b10 fffff800`52a06278 : ffffcf01`9ebe8180 ffffb801`20ebe280 fffff800`5290e6a0 01da22f0`ce2b60c0 : nt!PspSystemThreadStartup+0x55
fffff687`e5f62b60 00000000`00000000 : fffff687`e5f63000 fffff687`e5f5c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+db
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.3570
STACK_COMMAND: .cxr 0xfffff687e5f61b80 ; kb
BUCKET_ID_FUNC_OFFSET: db
FAILURE_BUCKET_ID: 0x7E_C000001D_BAD_IP_dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2052b81a-a996-6bab-f8e6-bb7b5f1f8630}
Followup: MachineOwner
---------
: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the BugCheck.
Arg2: fffff80051f7fe40
Arg3: 0000000000000019
Arg4: ffffde07cc05ef50
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2921
Key : Analysis.Elapsed.mSec
Value: 16159
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 10
Key : Analysis.Init.CPU.mSec
Value: 436
Key : Analysis.Init.Elapsed.mSec
Value: 10768
Key : Analysis.Memory.CommitPeak.Mb
Value: 104
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
Key : Failure.Hash
Value: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: fffff80051f7fe40
BUGCHECK_P3: 19
BUGCHECK_P4: ffffde07cc05ef50
FILE_IN_CAB: 113023-4359-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffde07`cc05eda8 fffff800`4d82cfc6 : 00000000`0000001a 00000000`00061941 fffff800`51f7fe40 00000000`00000019 : nt!KeBugCheckEx
ffffde07`cc05edb0 fffff800`4d80d1d8 : ffffde07`cc05efb0 ffffde07`cc05f070 0fffffff`fffffff0 00000000`00000002 : nt!MmAccessFault+0x1fcc96
ffffde07`cc05ef50 fffff800`51f7fe40 : fffff800`51f43cc5 ffffde07`cc05f230 fffff800`4d6544f7 00000000`00000000 : nt!KiPageFault+0x358
ffffde07`cc05f0e8 fffff800`51f43cc5 : ffffde07`cc05f230 fffff800`4d6544f7 00000000`00000000 00000000`00000000 : ndis!memset
ffffde07`cc05f0f0 fffff800`520b4260 : 00000000`0000002a fffff800`520b2590 00000000`00000006 ffffc98d`e158d068 : ndis!NdisAllocateNetBufferAndNetBufferList+0x1b5
ffffde07`cc05f150 fffff800`520b4174 : 00000000`0000002a 00000000`0000000e 00000000`00000000 6801a8c0`ffff0000 : NETIO!NetioAllocateAndReferenceNetBufferAndNetBufferList+0x40
ffffde07`cc05f190 fffff800`520b4076 : ffffc98d`dcd5b410 00000000`00000000 00000000`00000004 00000000`00000010 : NETIO!NetioPhAllocatePacket+0x34
ffffde07`cc05f1d0 fffff800`5221bc5c : ffffde07`00000001 ffffc98d`dcd5b410 ffffc98d`e158a0c8 ffffde07`cc05f4d0 : NETIO!NetioPhCreateArpPacket+0x56
ffffde07`cc05f210 fffff800`5221bbc2 : 00000000`00000000 ffffc98d`e158a040 ffffc98d`dcd0b0e0 ffffc98d`e158c040 : tcpip!Fl48pSendArpPacket+0x8c
ffffde07`cc05f290 fffff800`52219f30 : ffffc98d`dcd0b0e0 fffff800`52222107 ffffde07`cc05f398 00000000`00000000 : tcpip!Fl48SendNeighborSolicitation+0x22
ffffde07`cc05f2d0 fffff800`521e8063 : ffffc98d`e158a002 ffffc98d`e158a040 00000000`00000000 ffffc98d`e158c040 : tcpip!Ipv4pSendNeighborSolicitation+0x60
ffffde07`cc05f320 fffff800`521e7ec8 : ffffffff`ffffffb0 00060080`01000000 ffffde07`cc05f490 ffffde07`cc05f480 : tcpip!IppSendNeighborSolicitation+0xf3
ffffde07`cc05f390 fffff800`521e72c9 : 00000000`00000000 00000000`00004ae0 ffffc98d`dcc538a0 fffff800`4d645bd0 : tcpip!IppNeighborSetTimeout+0x3c4
ffffde07`cc05f570 fffff800`521eb169 : ffffc98d`dc2288a0 fffff800`52389a70 ffffde07`00000200 fffff800`52389a00 : tcpip!Ipv4pInterfaceSetTimeout+0x289
ffffde07`cc05f620 fffff800`4d64db52 : 00000000`00000002 ffff9280`6e2e6180 00000000`00000080 00000000`00000000 : tcpip!IppTimeout+0x649
ffffde07`cc05f7e0 fffff800`4d64cbcd : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00002cb9 : nt!KiProcessExpiredTimerList+0x172
ffffde07`cc05f8d0 fffff800`4d801f3e : ffffffff`00000000 ffff9280`6e2e6180 ffff9280`6e2f1240 ffffc98d`e13b5080 : nt!KiRetireDpcList+0x5dd
ffffde07`cc05fb60 00000000`00000000 : ffffde07`cc060000 ffffde07`cc059000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
Sistemdeki RAM'ler mevta olmuş görünüyor hatta sadece RAM'ler değil ekran kartının VRAM'inin de sorun olabileceğini düşünüyorum.
Adım adım gidelim.
Intel® Driver & Support Assistant aracılığıyla indirip yükle tarama gerçekleştir, Intel alakalı tüm sürücülerini günceller.
Intel® Driver & Support Assistant
The Intel® Driver & Support Assistant helps keeps your system up-to-date by detecting when updates are available.www.intel.com
Mavi ekranlardan biri symbol dosyalarının bozulduğunu gösteriyor. Bu sebeple CMD yönetici olarak çalıştır;
Öncesfc/ scannow
komutunu gir ve %100 olmasını bekle.
Sonra;DISM /Online /Cleanup-Image /RestoreHealth
komutunu gir ve %100 olmasını bekle.
DISM Aracıyla Windows Onarma Rehberi
Windows 10'da karşılaştığınız sorunları SFC komutu ile çözemiyorsanız, DISM aracını kullanarak Windows imajını onarıp, SFC'nin işini yapmasınıwww.technopat.net
Windows 10 sürümünü 22H2'ye güncelleyin.
OS_VERSION: 10.0.19041.1
Ek olarak asıl sorun RAM'lerden kaynaklanıyor gibi görünüyor. Memtest86 ile RAM testi yapın. RAM bozulmuş olduğu belli ediyor kendini ama deneyin. En son test bittikten sonra sonuçları konu altından paylaşın.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Mavi ekranlardan biri de ekran kartından kaynaklandığı görülüyor. Şu adımları deneyin. Önce DDU ile ekran kartı sürücüsünü kaldırın ve en güncel sürücüyü ekran kartının üreticisinin web sitesinden indirin.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
En güncel ekran kartı yazılımını yükledikten sonra OCCT yazılımı ile VRAM testi yapın. Sonuçları burada paylaşın.
Rehber: OCCT ile güç kaynağı testi
Arkadaşlar, rehberime hoş geldiniz. İlk rehberim olduğundan dolayı biraz acemiyim, şimdiden sizlerden özür dilerim. Konumuza gelecek olursak; OCCT ile stres testi nasıl yapılır? Konumuz güç kaynağı testi olacaktır. Güç kaynağı testi nasıl gerçekleşiyor? Peki gelin buna bakalım. Ekran kartınızı...www.technopat.net
Yukarıdaki link örnek olarak gösterilmiştir. Power testi yerinde VRAM testi gerçekleştirin ve bu süre en az 30 dakika boyunca sürsün.
Ekran kartı VRAM testi nasıl yapılır?
Ekran kartına yük binince görüntü bozuluyor ve tuşundan bilgisayarı kapatmak zorunda kalıyorum. Yeniden açınca WattMan hatası veriyor sorunun VRAM de olduğunu düşünüyorum. Şu an görüntü alabiliyorum karttan, nasıl test edebilirim?www.technopat.net
Kod:0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc000001d, The exception code that was not handled Arg2: fffff80083b546cb, The address that the exception occurred at Arg3: fffff687e5f62348, Exception Record Address Arg4: fffff687e5f61b80, Context Record Address Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3577 Key : Analysis.Elapsed.mSec Value: 22652 Key : Analysis.IO.Other.Mb Value: 7 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 12 Key : Analysis.Init.CPU.mSec Value: 500 Key : Analysis.Init.Elapsed.mSec Value: 3111 Key : Analysis.Memory.CommitPeak.Mb Value: 101 Key : Bugcheck.Code.LegacyAPI Value: 0x1000007e Key : Failure.Bucket Value: 0x7E_C000001D_BAD_IP_dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource Key : Failure.Hash Value: {2052b81a-a996-6bab-f8e6-bb7b5f1f8630} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc000001d BUGCHECK_P2: fffff80083b546cb BUGCHECK_P3: fffff687e5f62348 BUGCHECK_P4: fffff687e5f61b80 FILE_IN_CAB: 113023-4265-01.dmp EXCEPTION_RECORD: fffff687e5f62348 -- (.exr 0xfffff687e5f62348) ExceptionAddress: fffff80083b546cb (dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+0x00000000000000db) ExceptionCode: c000001d (Illegal instruction) ExceptionFlags: 00000000 NumberParameters: 0 CONTEXT: fffff687e5f61b80 -- (.cxr 0xfffff687e5f61b80) rax=0000000000800002 rbx=ffffe307097876f0 rcx=0000000000800000 rdx=0000000001001002 rsi=0000000000000002 rdi=ffffb80120d20db0 rip=fffff80083b546cb rsp=fffff687e5f62580 rbp=0000000000000000 r8=fffff687e5f62270 r9=0000000000000000 r10=ffffb80120fbf000 r11=fffff687e5f623e0 r12=ffffe307097878c8 r13=0000000000000000 r14=ffffe3070e945610 r15=ffffb80120fbf000 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202 dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+0xdb: fffff800`83b546cb 89434c mov dword ptr [rbx+4Ch],eax ds:002b:ffffe307`0978773c=00020040 Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld . EXCEPTION_CODE_STR: c000001d EXCEPTION_STR: 0xc000001d FAILED_INSTRUCTION_ADDRESS: dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+db fffff800`83b546cb 89434c mov dword ptr [rbx+4Ch],eax STACK_TEXT: fffff687`e5f62580 fffff800`83b5e511 : ffffe307`097876f0 ffffe307`097876f0 00000000`00000000 ffffb801`25c05d10 : dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+0xdb fffff687`e5f625c0 fffff800`83b5cb85 : ffffe307`0c6c6a80 00000000`00000000 ffffb801`20fc9e80 ffffe307`097876f0 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1d1 fffff687`e5f626e0 fffff800`83b7d15e : 00000000`00000000 00000000`00989680 ffffe307`04cb55a0 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xe25 fffff687`e5f62900 fffff800`83b87309 : ffffe307`04cb54d0 ffffb801`20ebe201 00000000`00000100 00000000`026fbe00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e fffff687`e5f62ae0 fffff800`5290e6f5 : ffffb801`20ebe280 fffff800`83b87300 ffffe307`04cb54d0 000fa4ef`bd9bbfff : dxgmms2!VidMmWorkerThreadProc+0x9 fffff687`e5f62b10 fffff800`52a06278 : ffffcf01`9ebe8180 ffffb801`20ebe280 fffff800`5290e6a0 01da22f0`ce2b60c0 : nt!PspSystemThreadStartup+0x55 fffff687`e5f62b60 00000000`00000000 : fffff687`e5f63000 fffff687`e5f5c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+db MODULE_NAME: dxgmms2 IMAGE_NAME: dxgmms2.sys IMAGE_VERSION: 10.0.19041.3570 STACK_COMMAND: .cxr 0xfffff687e5f61b80 ; kb BUCKET_ID_FUNC_OFFSET: db FAILURE_BUCKET_ID: 0x7E_C000001D_BAD_IP_dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {2052b81a-a996-6bab-f8e6-bb7b5f1f8630} Followup: MachineOwner --------- : kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000061941, The subtype of the BugCheck. Arg2: fffff80051f7fe40 Arg3: 0000000000000019 Arg4: ffffde07cc05ef50 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2921 Key : Analysis.Elapsed.mSec Value: 16159 Key : Analysis.IO.Other.Mb Value: 7 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 10 Key : Analysis.Init.CPU.mSec Value: 436 Key : Analysis.Init.Elapsed.mSec Value: 10768 Key : Analysis.Memory.CommitPeak.Mb Value: 104 Key : Bugcheck.Code.LegacyAPI Value: 0x1a Key : Failure.Bucket Value: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram Key : Failure.Hash Value: {c6e5c6cf-692e-7852-5dc5-b74944540fc0} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 1a BUGCHECK_P1: 61941 BUGCHECK_P2: fffff80051f7fe40 BUGCHECK_P3: 19 BUGCHECK_P4: ffffde07cc05ef50 FILE_IN_CAB: 113023-4359-01.dmp BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffffde07`cc05eda8 fffff800`4d82cfc6 : 00000000`0000001a 00000000`00061941 fffff800`51f7fe40 00000000`00000019 : nt!KeBugCheckEx ffffde07`cc05edb0 fffff800`4d80d1d8 : ffffde07`cc05efb0 ffffde07`cc05f070 0fffffff`fffffff0 00000000`00000002 : nt!MmAccessFault+0x1fcc96 ffffde07`cc05ef50 fffff800`51f7fe40 : fffff800`51f43cc5 ffffde07`cc05f230 fffff800`4d6544f7 00000000`00000000 : nt!KiPageFault+0x358 ffffde07`cc05f0e8 fffff800`51f43cc5 : ffffde07`cc05f230 fffff800`4d6544f7 00000000`00000000 00000000`00000000 : ndis!memset ffffde07`cc05f0f0 fffff800`520b4260 : 00000000`0000002a fffff800`520b2590 00000000`00000006 ffffc98d`e158d068 : ndis!NdisAllocateNetBufferAndNetBufferList+0x1b5 ffffde07`cc05f150 fffff800`520b4174 : 00000000`0000002a 00000000`0000000e 00000000`00000000 6801a8c0`ffff0000 : NETIO!NetioAllocateAndReferenceNetBufferAndNetBufferList+0x40 ffffde07`cc05f190 fffff800`520b4076 : ffffc98d`dcd5b410 00000000`00000000 00000000`00000004 00000000`00000010 : NETIO!NetioPhAllocatePacket+0x34 ffffde07`cc05f1d0 fffff800`5221bc5c : ffffde07`00000001 ffffc98d`dcd5b410 ffffc98d`e158a0c8 ffffde07`cc05f4d0 : NETIO!NetioPhCreateArpPacket+0x56 ffffde07`cc05f210 fffff800`5221bbc2 : 00000000`00000000 ffffc98d`e158a040 ffffc98d`dcd0b0e0 ffffc98d`e158c040 : tcpip!Fl48pSendArpPacket+0x8c ffffde07`cc05f290 fffff800`52219f30 : ffffc98d`dcd0b0e0 fffff800`52222107 ffffde07`cc05f398 00000000`00000000 : tcpip!Fl48SendNeighborSolicitation+0x22 ffffde07`cc05f2d0 fffff800`521e8063 : ffffc98d`e158a002 ffffc98d`e158a040 00000000`00000000 ffffc98d`e158c040 : tcpip!Ipv4pSendNeighborSolicitation+0x60 ffffde07`cc05f320 fffff800`521e7ec8 : ffffffff`ffffffb0 00060080`01000000 ffffde07`cc05f490 ffffde07`cc05f480 : tcpip!IppSendNeighborSolicitation+0xf3 ffffde07`cc05f390 fffff800`521e72c9 : 00000000`00000000 00000000`00004ae0 ffffc98d`dcc538a0 fffff800`4d645bd0 : tcpip!IppNeighborSetTimeout+0x3c4 ffffde07`cc05f570 fffff800`521eb169 : ffffc98d`dc2288a0 fffff800`52389a70 ffffde07`00000200 fffff800`52389a00 : tcpip!Ipv4pInterfaceSetTimeout+0x289 ffffde07`cc05f620 fffff800`4d64db52 : 00000000`00000002 ffff9280`6e2e6180 00000000`00000080 00000000`00000000 : tcpip!IppTimeout+0x649 ffffde07`cc05f7e0 fffff800`4d64cbcd : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00002cb9 : nt!KiProcessExpiredTimerList+0x172 ffffde07`cc05f8d0 fffff800`4d801f3e : ffffffff`00000000 ffff9280`6e2e6180 ffff9280`6e2f1240 ffffc98d`e13b5080 : nt!KiRetireDpcList+0x5dd ffffde07`cc05fb60 00000000`00000000 : ffffde07`cc060000 ffffde07`cc059000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e MODULE_NAME: hardware IMAGE_NAME: hardware_ram STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0} Followup: MachineOwner ---------
Diğer testleri de tekrar yapmama gerek var mı?Memtest'e tekrar gir ve test14 [dma] manuel olarak seçip tekrar çalıştır. Test aşamasında olduğundan test 14 kullanıcı seçmez ise program otomatik olarak teste sokmuyor.
Diğer testleri de tekrar yapmama gerek var mı?
Gece cevap yazamadım kusura bakma. Testi yaptım ama herhangi bir sorun çıkmadı yine. RAM'leri çıkarıp tek tek test yapsam farkeder mi acaba?Memtest test 14 tekrar yap. OCCT için zaten yapamıyorsun.
Gece cevap yazamadım kusura bakma. Testi yaptım ama herhangi bir sorun çıkmadı yine. RAM'leri çıkarıp tek tek test yapsam fark eder mi acaba?
Memtest: memtest14.zip
Gece cevap yazamadım kusura bakma. Testi yaptım ama herhangi bir sorun çıkmadı yine. RAM'leri çıkarıp tek tek test yapsam fark eder mi acaba?
Memtest: memtest14.zip
Sorun RAM'de sanırsam. İlk önce RAM'i çıkartıp bilgisayar hata vericekmi diye test ettim ve herhangi bir hata vermedi. Bu sırada VRAM testini de yaptım ve onda da bir sorun çıkmadı.Denemelisin.
Denemelisin. Ekran kartını çıkartıp işlemciden anakartin görüntü çıkışından görüntü almayı dene ve sistemi tekrar çalıştır.