Windows 10 MEMORY_MANAGEMENT mavi ekran hatası

sweiss

Megapat
Katılım
14 Ocak 2019
Mesajlar
5.367
Çözümler
70
Yer
Pendik, İstanbul
Memory_managament hatası ile mavi ekran aldım. Sorunun RAM'ler ile alakalı olduğunu sanmıyorum. Önceden de 2-3 defa aynı sorun adı altında konu açmıştım. Her konu açışımda Memtest86 ile test yaptım ve herhangi bir hata yoktu. Genede bu gece tekrar test edeceğim. Ayrıca konularda MSI Afterburner ve Dragon Center ile alakalı olabileceği yazılmıştı. Ancak bilgisayarıma 1 hafta önce format attım ve bu sefer MSI uygulamalarını da kurmadım. Hata ile formattan sonra ilk defa karşılaştım. Bir daha karşılaşır mıyım bilmiyorum.

 
Memory_managament hatası ile mavi ekran aldım. Sorunun RAM'ler ile alakalı olduğunu sanmıyorum. Önceden de 2-3 defa aynı sorun adı altında konu açmıştım. Her konu açışımda Memtest86 ile test yaptım ve herhangi bir hata yoktu. Genede bu gece tekrar test edeceğim. Ayrıca konularda MSI Afterburner ve Dragon Center ile alakalı olabileceği yazılmıştı. Ancak bilgisayarıma 1 hafta önce format attım ve bu sefer MSI uygulamalarını da kurmadım. Hata ile formattan sonra ilk defa karşılaştım. Bir daha karşılaşır mıyım bilmiyorum.


Telefon da olduğumdan dolayı minidump okuyamıyorum, XMP açıksa kapatabilme şansınız var mı ayrıca anakart ile RAM'i yazarsanız daha iyi olur.
Telefon da olduğumdan dolayı minidump okuyamıyorum, XMP açıksa kapatabilme şansınız var mı ayrıca anakart ile RAM'i yazarsanız daha iyi olur.
RAM ile alakası yok demişsiniz pardon.
Telefon da olduğumdan dolayı minidump okuyamıyorum, XMP açıksa kapatabilme şansınız var mı ayrıca anakart ile RAM'i yazarsanız daha iyi olur.
RAM ile alakası yok demişsiniz pardon.
 
Telefon da olduğumdan dolayı minidump okuyamıyorum, XMP açıksa kapatabilme şansınız var mı ayrıca anakart ile RAM'i yazarsanız daha iyi olur.

RAM ile alakası yok demişsiniz pardon.

RAM ile alakası yok demişsiniz pardon.
Çok özür dilerim. Sistem bilgisini yazmayı unutmuşum.

MSI B450-A Pro MAX
Ryzen 5 3600 X
MSI RTX 2070S Gaming X Trio
GSkill XFlare 2X8 3200MHZ CL16
Thermaltake 600W +80 PSU
 
Kod:
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\YIIT~1\AppData\Local\Temp\Rar$DIa4080.41709\060121-12921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`57600000 PsLoadedModuleList = 0xfffff805`5822a2b0
Debug session time: Tue Jun  1 18:56:56.047 2021 (UTC + 3:00)
System Uptime: 0 days 16:58:29.700
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`579f6c90 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9c8d`ddc82c80=000000000000001a
10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1874

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11634

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 44945

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffff97bffe06ae08

BUGCHECK_P3: 60000041d308025

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9     : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae     : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d     : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab     : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab     : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab     : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b     : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1     : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10     : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49     : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0     : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af     : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916     : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758     : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230     : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f     : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4


SYMBOL_NAME:  nt!MiDeletePteRun+17b9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1023

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17b9

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 2763

    Key  : Analysis.Init.CPU.mSec
    Value: 2249

    Key  : Analysis.Init.Elapsed.mSec
    Value: 56582

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffff97bffe06ae08

BUGCHECK_P3: 60000041d308025

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9     : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae     : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d     : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab     : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab     : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab     : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b     : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1     : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10     : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49     : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0     : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af     : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916     : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758     : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230     : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f     : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4


SYMBOL_NAME:  nt!MiDeletePteRun+17b9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1023

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17b9

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------

10: kd> lmvm nt
Browse full module list
start             end                 module name
fffff805`57600000 fffff805`58646000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\121F238DD43DA32C1476AC846D4FEA741\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\E304EA6D1046000\ntoskrnl.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        E304EA6D (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00A5BFB2
    ImageSize:        01046000
    File version:     10.0.19041.1023
    Product version:  10.0.19041.1023
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     ntkrnlmp.exe
        OriginalFilename: ntkrnlmp.exe
        ProductVersion:   10.0.19041.1023
        FileVersion:      10.0.19041.1023 (WinBuild.160101.0800)
        FileDescription:  NT Kernel & System
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
Kod:
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\YIIT~1\AppData\Local\Temp\Rar$DIa4080.41709\060121-12921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`57600000 PsLoadedModuleList = 0xfffff805`5822a2b0
Debug session time: Tue Jun  1 18:56:56.047 2021 (UTC + 3:00)
System Uptime: 0 days 16:58:29.700
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`579f6c90 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9c8d`ddc82c80=000000000000001a
10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1874

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11634

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 44945

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffff97bffe06ae08

BUGCHECK_P3: 60000041d308025

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9     : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae     : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d     : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab     : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab     : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab     : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b     : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1     : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10     : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49     : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0     : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af     : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916     : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758     : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230     : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f     : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4


SYMBOL_NAME:  nt!MiDeletePteRun+17b9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1023

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17b9

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 2763

    Key  : Analysis.Init.CPU.mSec
    Value: 2249

    Key  : Analysis.Init.Elapsed.mSec
    Value: 56582

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffff97bffe06ae08

BUGCHECK_P3: 60000041d308025

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9     : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae     : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d     : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab     : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab     : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab     : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b     : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1     : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10     : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49     : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0     : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af     : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916     : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758     : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230     : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f     : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4


SYMBOL_NAME:  nt!MiDeletePteRun+17b9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1023

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17b9

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------

10: kd> lmvm nt
Browse full module list
start             end                 module name
fffff805`57600000 fffff805`58646000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\121F238DD43DA32C1476AC846D4FEA741\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\E304EA6D1046000\ntoskrnl.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        E304EA6D (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00A5BFB2
    ImageSize:        01046000
    File version:     10.0.19041.1023
    Product version:  10.0.19041.1023
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     ntkrnlmp.exe
        OriginalFilename: ntkrnlmp.exe
        ProductVersion:   10.0.19041.1023
        FileVersion:      10.0.19041.1023 (WinBuild.160101.0800)
        FileDescription:  NT Kernel & System
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
Minidump dosyalarını okumayı tam olarak bilmiyorum fakat sorun RAM gibi duruyor, XMP kapalı Memtest86 yaptınız mı? Ayrıca 3200 MHz de çalışan RAM'i eğer 2666 MHz yaparsanız sorun kalkabilir denemekte fayda var.
 

Geri
Yukarı