Windows 7 donup kalıyor ve dıt sesi çıkartıyor

mertpivvo

Kilopat
Katılım
12 Nisan 2020
Mesajlar
5.050
Makaleler
4
Çözümler
21
Daha fazla  
Cinsiyet
Erkek
Herkese merhaba, son 3 haftada yaşadığım bilgisayar sorununu anlatacağım. Tarayıcıda gezinirken değil, VPN açarken değil ama bazen bir şeye tıklıyorum, beklemediğim yerden anında donuyor. Ben şaşırıyorum doğrusu. Donduğu anda dıttt dıtt diye yüksek sesli kulak yırtan ses çıkıyor. Çok sinir olmaya başladım, mavi ekran anında donma gibi sorunlarla karşılaşıyorum. Her ne kadar mavi ekran hatası henüz vermese de PC anında donup kalması beni çok sinir ediyor doğrusu. Bir de bilgisayarın Power tuşuna bastığımda çok uzun süre bekledikten sonra (8-10 saniye), sonra açılıyor, eskiden hemen açılırdı. BIOS load default yapmayı denedim, bu donma sorununu çözemedim. Bu kötü durumu yaşayan varsa nasıl çözdüğünü anlatabilir mi? Yardım eden kişilere çok minnettar olurum.

Dump dosyaları:
 
Ram hatası emin olmak istersen memtest86 ile ramlerini test edip sonucunu paylaş.
[/
Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000007dc45, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0000000000000001, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  GoogleUpdate.e

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002ee3d5c to fffff80002e9eac0

STACK_TEXT: 
fffff880`06bf00c8 fffff800`02ee3d5c : 00000000`0000004e 00000000`00000099 00000000`0007dc45 00000000`00000002 : nt!KeBugCheckEx
fffff880`06bf00d0 fffff800`02f5c8dd : fffff8a0`03388040 00000000`00000000 00000000`00000000 fffffa80`02621580 : nt!MiBadShareCount+0x4c
fffff880`06bf0110 fffff800`02f62fe2 : fffffa80`03b62b00 6c800000`0000007d 00000003`000004c3 07d00000`7dc45025 : nt!MiDeletePfnList+0x48d
fffff880`06bf01a0 fffff800`02e47ebc : fffffa80`03b62b00 fffffa80`0000049c fffff8a0`000000e9 00000000`0000048f : nt!MiDeleteAddressesInWorkingSet+0x182
fffff880`06bf0a60 fffff800`032387c4 : fffff8a0`0b26f530 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCleanProcessAddressSpace+0xac
fffff880`06bf0ab0 fffff800`03296f35 : 00000000`00000000 00000000`00000001 00000000`7efdb000 00000000`00000000 : nt!PspExitThread+0x944
fffff880`06bf0b70 fffff800`02eacb53 : ffffffff`ffffffff fffffa80`03c90750 fffffa80`03b62b00 00000000`005628a0 : nt!NtTerminateProcess+0x2d5
fffff880`06bf0be0 00000000`773b8fda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0015e0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773b8fda


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02ee3d5c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x4e_99_nt!mibadsharecount+4c

FAILURE_ID_HASH:  {4c83cdad-f603-74ff-b7e1-9eb7f3029c2a}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000028c7
Arg4: fffff980125d7009

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  SearchIndexer.

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002a8199c to fffff80002aadac0

STACK_TEXT: 
fffff880`05be8258 fffff800`02a8199c : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`000028c7 : nt!KeBugCheckEx
fffff880`05be8260 fffff800`02b5a1e8 : fffff6fc`c006d838 00000000`00000008 00000000`00000038 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`05be82c0 fffff800`02b8c8db : fffff6fc`c006d800 00000000`6ab75921 fffff6fc`00000008 00000000`00000007 : nt!MiMakeSystemCacheRangeValid+0x198
fffff880`05be8440 fffff800`02a49944 : fffff980`0db00000 fffff980`0db00000 00000000`00000000 ffffffff`ffffff01 : nt!MmCheckCachedPageStates+0x48b
fffff880`05be85b0 fffff800`02d14ee0 : 00000000`00008000 00000000`00000000 00000000`096c0000 fffff880`05be86e0 : nt!CcFetchDataForRead+0x84
fffff880`05be8610 fffff880`012195a0 : fffff8a0`00000001 fffff880`00000005 fffffa80`00040000 fffffa80`03a89501 : nt!CcCopyRead+0x180
fffff880`05be86d0 fffff880`0121b083 : fffff8a0`01fa2801 fffff8a0`01fa2801 fffff880`05be88d0 00000000`00000001 : Ntfs!NtfsCachedRead+0x180
fffff880`05be8730 fffff880`0121b448 : fffffa80`03c80db0 fffffa80`03c3a010 fffff880`05be8800 fffffa80`03a89400 : Ntfs!NtfsCommonRead+0x19ea
fffff880`05be88a0 fffff880`010f183f : fffffa80`03c3a3b0 fffffa80`03c3a010 fffffa80`03a89450 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
fffff880`05be8950 fffff880`010f06df : fffffa80`0474cde0 fffffa80`060e04d0 fffffa80`03c3a000 fffffa80`03c3a010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`05be89e0 fffff800`02d16d98 : fffffa80`060e0480 fffff880`05be8c60 fffffa80`060e04d0 00000000`00000000 : fltmgr!FltpDispatch+0xcf
fffff880`05be8a40 fffff800`02abbb53 : fffffa80`060e0900 00000000`00000738 00000000`00000000 00000000`0033f5a0 : nt!NtReadFile+0x718
fffff880`05be8b70 00000000`76fa8d7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0453ee48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fa8d7a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02a8199c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiAllocateWsle+28c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!miallocatewsle+28c

FAILURE_ID_HASH:  {13ee2b15-66d1-652c-45a1-c2e7afb587be}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000017e7
Arg4: fffff9800acb6009

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  YandexDisk2.ex

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002ac099c to fffff80002aecac0

STACK_TEXT: 
fffff880`056f9558 fffff800`02ac099c : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`000017e7 : nt!KeBugCheckEx
fffff880`056f9560 fffff800`02b991e8 : fffff6fc`c0056330 00000000`00000010 00000000`00000030 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`056f95c0 fffff800`02bcc250 : fffff6fc`c0056380 00000000`4d7d4921 fffff6fc`00000010 00000000`0000000f : nt!MiMakeSystemCacheRangeValid+0x198
fffff880`056f9740 fffff800`02a88944 : fffff980`0ac41000 fffff980`0ac41011 00000000`00000000 ffffffff`ffffff01 : nt!MmCheckCachedPageStates+0xe00
fffff880`056f98b0 fffff800`02d53ee0 : 00000000`000f5000 00000000`00000000 00000000`00001000 fffff880`056f99e0 : nt!CcFetchDataForRead+0x84
fffff880`056f9910 fffff880`012b112f : fffff880`00000001 00000000`00000005 fffffa80`0003f000 fffffa80`043a9b01 : nt!CcCopyRead+0x180
fffff880`056f99d0 fffff880`0119c098 : fffffa80`043a9bc0 fffffa80`040ef8f0 00000000`00000000 00000000`00000001 : Ntfs!NtfsCopyReadA+0x18f
fffff880`056f9bb0 fffff880`0119f91a : fffff880`056f9c80 fffff880`011bb400 00000000`05b91000 fffffa80`043a9b03 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`056f9c10 fffff880`011bb630 : fffffa80`043a9bc0 00000000`00000000 fffff880`056f9d78 00000000`000f5000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`056f9c50 fffff800`02d55ac1 : fffffa80`043a9bc0 00000000`00000001 00000000`00000000 fffffa80`043a9bc0 : fltmgr!FltpFastIoRead+0x1d0
fffff880`056f9cf0 fffff800`02afab53 : fffff6fb`40000170 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x441
fffff880`056f9e20 00000000`77af8d7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012a9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77af8d7a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02ac099c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiAllocateWsle+28c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!miallocatewsle+28c

FAILURE_ID_HASH:  {13ee2b15-66d1-652c-45a1-c2e7afb587be}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000000103b
Arg4: 0000000007a87009

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  dllhost.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002ac699c to fffff80002af2ac0

STACK_TEXT: 
fffff880`0630d948 fffff800`02ac699c : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0000103b : nt!KeBugCheckEx
fffff880`0630d950 fffff800`02b9eed2 : fffff880`0630da00 00000000`00000001 80000000`0de96867 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`0630d9b0 fffff800`02bcd742 : 00000000`00000001 00000000`02b15000 00000000`00000000 ffffffff`ffffffff : nt!MiResolveDemandZeroFault+0x6f2
fffff880`0630da90 fffff800`02afebdc : 00000000`00000001 00000000`02b15000 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x34a2
fffff880`0630dbe0 000007fe`f982948b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35c
00000000`01ebc920 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`f982948b


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02ac699c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiAllocateWsle+28c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!miallocatewsle+28c

FAILURE_ID_HASH:  {13ee2b15-66d1-652c-45a1-c2e7afb587be}

Followup: MachineOwner
---------
SPOILER]
 
Kankam. RAM'in arızalı.
Ram hatası emin olmak istersen memtest86 ile ramlerini test edip sonucunu paylaş.
[/
Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000007dc45, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0000000000000001, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  GoogleUpdate.e

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002ee3d5c to fffff80002e9eac0

STACK_TEXT:
fffff880`06bf00c8 fffff800`02ee3d5c : 00000000`0000004e 00000000`00000099 00000000`0007dc45 00000000`00000002 : nt!KeBugCheckEx
fffff880`06bf00d0 fffff800`02f5c8dd : fffff8a0`03388040 00000000`00000000 00000000`00000000 fffffa80`02621580 : nt!MiBadShareCount+0x4c
fffff880`06bf0110 fffff800`02f62fe2 : fffffa80`03b62b00 6c800000`0000007d 00000003`000004c3 07d00000`7dc45025 : nt!MiDeletePfnList+0x48d
fffff880`06bf01a0 fffff800`02e47ebc : fffffa80`03b62b00 fffffa80`0000049c fffff8a0`000000e9 00000000`0000048f : nt!MiDeleteAddressesInWorkingSet+0x182
fffff880`06bf0a60 fffff800`032387c4 : fffff8a0`0b26f530 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCleanProcessAddressSpace+0xac
fffff880`06bf0ab0 fffff800`03296f35 : 00000000`00000000 00000000`00000001 00000000`7efdb000 00000000`00000000 : nt!PspExitThread+0x944
fffff880`06bf0b70 fffff800`02eacb53 : ffffffff`ffffffff fffffa80`03c90750 fffffa80`03b62b00 00000000`005628a0 : nt!NtTerminateProcess+0x2d5
fffff880`06bf0be0 00000000`773b8fda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0015e0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773b8fda


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02ee3d5c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x4e_99_nt!mibadsharecount+4c

FAILURE_ID_HASH:  {4c83cdad-f603-74ff-b7e1-9eb7f3029c2a}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000028c7
Arg4: fffff980125d7009

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  SearchIndexer.

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002a8199c to fffff80002aadac0

STACK_TEXT:
fffff880`05be8258 fffff800`02a8199c : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`000028c7 : nt!KeBugCheckEx
fffff880`05be8260 fffff800`02b5a1e8 : fffff6fc`c006d838 00000000`00000008 00000000`00000038 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`05be82c0 fffff800`02b8c8db : fffff6fc`c006d800 00000000`6ab75921 fffff6fc`00000008 00000000`00000007 : nt!MiMakeSystemCacheRangeValid+0x198
fffff880`05be8440 fffff800`02a49944 : fffff980`0db00000 fffff980`0db00000 00000000`00000000 ffffffff`ffffff01 : nt!MmCheckCachedPageStates+0x48b
fffff880`05be85b0 fffff800`02d14ee0 : 00000000`00008000 00000000`00000000 00000000`096c0000 fffff880`05be86e0 : nt!CcFetchDataForRead+0x84
fffff880`05be8610 fffff880`012195a0 : fffff8a0`00000001 fffff880`00000005 fffffa80`00040000 fffffa80`03a89501 : nt!CcCopyRead+0x180
fffff880`05be86d0 fffff880`0121b083 : fffff8a0`01fa2801 fffff8a0`01fa2801 fffff880`05be88d0 00000000`00000001 : Ntfs!NtfsCachedRead+0x180
fffff880`05be8730 fffff880`0121b448 : fffffa80`03c80db0 fffffa80`03c3a010 fffff880`05be8800 fffffa80`03a89400 : Ntfs!NtfsCommonRead+0x19ea
fffff880`05be88a0 fffff880`010f183f : fffffa80`03c3a3b0 fffffa80`03c3a010 fffffa80`03a89450 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
fffff880`05be8950 fffff880`010f06df : fffffa80`0474cde0 fffffa80`060e04d0 fffffa80`03c3a000 fffffa80`03c3a010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`05be89e0 fffff800`02d16d98 : fffffa80`060e0480 fffff880`05be8c60 fffffa80`060e04d0 00000000`00000000 : fltmgr!FltpDispatch+0xcf
fffff880`05be8a40 fffff800`02abbb53 : fffffa80`060e0900 00000000`00000738 00000000`00000000 00000000`0033f5a0 : nt!NtReadFile+0x718
fffff880`05be8b70 00000000`76fa8d7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0453ee48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fa8d7a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02a8199c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiAllocateWsle+28c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!miallocatewsle+28c

FAILURE_ID_HASH:  {13ee2b15-66d1-652c-45a1-c2e7afb587be}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000017e7
Arg4: fffff9800acb6009

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  YandexDisk2.ex

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002ac099c to fffff80002aecac0

STACK_TEXT:
fffff880`056f9558 fffff800`02ac099c : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`000017e7 : nt!KeBugCheckEx
fffff880`056f9560 fffff800`02b991e8 : fffff6fc`c0056330 00000000`00000010 00000000`00000030 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`056f95c0 fffff800`02bcc250 : fffff6fc`c0056380 00000000`4d7d4921 fffff6fc`00000010 00000000`0000000f : nt!MiMakeSystemCacheRangeValid+0x198
fffff880`056f9740 fffff800`02a88944 : fffff980`0ac41000 fffff980`0ac41011 00000000`00000000 ffffffff`ffffff01 : nt!MmCheckCachedPageStates+0xe00
fffff880`056f98b0 fffff800`02d53ee0 : 00000000`000f5000 00000000`00000000 00000000`00001000 fffff880`056f99e0 : nt!CcFetchDataForRead+0x84
fffff880`056f9910 fffff880`012b112f : fffff880`00000001 00000000`00000005 fffffa80`0003f000 fffffa80`043a9b01 : nt!CcCopyRead+0x180
fffff880`056f99d0 fffff880`0119c098 : fffffa80`043a9bc0 fffffa80`040ef8f0 00000000`00000000 00000000`00000001 : Ntfs!NtfsCopyReadA+0x18f
fffff880`056f9bb0 fffff880`0119f91a : fffff880`056f9c80 fffff880`011bb400 00000000`05b91000 fffffa80`043a9b03 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`056f9c10 fffff880`011bb630 : fffffa80`043a9bc0 00000000`00000000 fffff880`056f9d78 00000000`000f5000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`056f9c50 fffff800`02d55ac1 : fffffa80`043a9bc0 00000000`00000001 00000000`00000000 fffffa80`043a9bc0 : fltmgr!FltpFastIoRead+0x1d0
fffff880`056f9cf0 fffff800`02afab53 : fffff6fb`40000170 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x441
fffff880`056f9e20 00000000`77af8d7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012a9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77af8d7a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02ac099c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiAllocateWsle+28c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!miallocatewsle+28c

FAILURE_ID_HASH:  {13ee2b15-66d1-652c-45a1-c2e7afb587be}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000000103b
Arg4: 0000000007a87009

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  dllhost.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002ac699c to fffff80002af2ac0

STACK_TEXT:
fffff880`0630d948 fffff800`02ac699c : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0000103b : nt!KeBugCheckEx
fffff880`0630d950 fffff800`02b9eed2 : fffff880`0630da00 00000000`00000001 80000000`0de96867 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`0630d9b0 fffff800`02bcd742 : 00000000`00000001 00000000`02b15000 00000000`00000000 ffffffff`ffffffff : nt!MiResolveDemandZeroFault+0x6f2
fffff880`0630da90 fffff800`02afebdc : 00000000`00000001 00000000`02b15000 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x34a2
fffff880`0630dbe0 000007fe`f982948b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35c
00000000`01ebc920 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`f982948b


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02ac699c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiAllocateWsle+28c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!miallocatewsle+28c

FAILURE_ID_HASH:  {13ee2b15-66d1-652c-45a1-c2e7afb587be}

Followup: MachineOwner
---------
SPOILER]
RAM'lerini teste sokmanda fayda var
Cevap veremediğim için özür dilerim.. Dosya.co yüklememden ötürü ban yedim işte herneyse, Technopat son zamanlarda bildirim göndermiyor çok sıkıcı bir durum. Dump dosyalarından mı Nereden çıkardın bu sonucu acaba bilmek istiyorum? Cidden ikisinden biri bozuk mu?
@350070
 
Evet ramlerinden biri bozuk olmalı o yüzden memtest86 ile ram testi yapın dedim. Dump dosyaları ramlerin bozuk olduğunu söylüyor.
 
Ram hatası emin olmak istersen memtest86 ile ramlerini test edip sonucunu paylaş.
[/
Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000007dc45, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0000000000000001, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  GoogleUpdate.e

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002ee3d5c to fffff80002e9eac0

STACK_TEXT:
fffff880`06bf00c8 fffff800`02ee3d5c : 00000000`0000004e 00000000`00000099 00000000`0007dc45 00000000`00000002 : nt!KeBugCheckEx
fffff880`06bf00d0 fffff800`02f5c8dd : fffff8a0`03388040 00000000`00000000 00000000`00000000 fffffa80`02621580 : nt!MiBadShareCount+0x4c
fffff880`06bf0110 fffff800`02f62fe2 : fffffa80`03b62b00 6c800000`0000007d 00000003`000004c3 07d00000`7dc45025 : nt!MiDeletePfnList+0x48d
fffff880`06bf01a0 fffff800`02e47ebc : fffffa80`03b62b00 fffffa80`0000049c fffff8a0`000000e9 00000000`0000048f : nt!MiDeleteAddressesInWorkingSet+0x182
fffff880`06bf0a60 fffff800`032387c4 : fffff8a0`0b26f530 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCleanProcessAddressSpace+0xac
fffff880`06bf0ab0 fffff800`03296f35 : 00000000`00000000 00000000`00000001 00000000`7efdb000 00000000`00000000 : nt!PspExitThread+0x944
fffff880`06bf0b70 fffff800`02eacb53 : ffffffff`ffffffff fffffa80`03c90750 fffffa80`03b62b00 00000000`005628a0 : nt!NtTerminateProcess+0x2d5
fffff880`06bf0be0 00000000`773b8fda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0015e0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773b8fda


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02ee3d5c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x4e_99_nt!mibadsharecount+4c

FAILURE_ID_HASH:  {4c83cdad-f603-74ff-b7e1-9eb7f3029c2a}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000028c7
Arg4: fffff980125d7009

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  SearchIndexer.

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002a8199c to fffff80002aadac0

STACK_TEXT:
fffff880`05be8258 fffff800`02a8199c : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`000028c7 : nt!KeBugCheckEx
fffff880`05be8260 fffff800`02b5a1e8 : fffff6fc`c006d838 00000000`00000008 00000000`00000038 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`05be82c0 fffff800`02b8c8db : fffff6fc`c006d800 00000000`6ab75921 fffff6fc`00000008 00000000`00000007 : nt!MiMakeSystemCacheRangeValid+0x198
fffff880`05be8440 fffff800`02a49944 : fffff980`0db00000 fffff980`0db00000 00000000`00000000 ffffffff`ffffff01 : nt!MmCheckCachedPageStates+0x48b
fffff880`05be85b0 fffff800`02d14ee0 : 00000000`00008000 00000000`00000000 00000000`096c0000 fffff880`05be86e0 : nt!CcFetchDataForRead+0x84
fffff880`05be8610 fffff880`012195a0 : fffff8a0`00000001 fffff880`00000005 fffffa80`00040000 fffffa80`03a89501 : nt!CcCopyRead+0x180
fffff880`05be86d0 fffff880`0121b083 : fffff8a0`01fa2801 fffff8a0`01fa2801 fffff880`05be88d0 00000000`00000001 : Ntfs!NtfsCachedRead+0x180
fffff880`05be8730 fffff880`0121b448 : fffffa80`03c80db0 fffffa80`03c3a010 fffff880`05be8800 fffffa80`03a89400 : Ntfs!NtfsCommonRead+0x19ea
fffff880`05be88a0 fffff880`010f183f : fffffa80`03c3a3b0 fffffa80`03c3a010 fffffa80`03a89450 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
fffff880`05be8950 fffff880`010f06df : fffffa80`0474cde0 fffffa80`060e04d0 fffffa80`03c3a000 fffffa80`03c3a010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`05be89e0 fffff800`02d16d98 : fffffa80`060e0480 fffff880`05be8c60 fffffa80`060e04d0 00000000`00000000 : fltmgr!FltpDispatch+0xcf
fffff880`05be8a40 fffff800`02abbb53 : fffffa80`060e0900 00000000`00000738 00000000`00000000 00000000`0033f5a0 : nt!NtReadFile+0x718
fffff880`05be8b70 00000000`76fa8d7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0453ee48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fa8d7a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02a8199c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiAllocateWsle+28c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!miallocatewsle+28c

FAILURE_ID_HASH:  {13ee2b15-66d1-652c-45a1-c2e7afb587be}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000017e7
Arg4: fffff9800acb6009

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  YandexDisk2.ex

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002ac099c to fffff80002aecac0

STACK_TEXT:
fffff880`056f9558 fffff800`02ac099c : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`000017e7 : nt!KeBugCheckEx
fffff880`056f9560 fffff800`02b991e8 : fffff6fc`c0056330 00000000`00000010 00000000`00000030 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`056f95c0 fffff800`02bcc250 : fffff6fc`c0056380 00000000`4d7d4921 fffff6fc`00000010 00000000`0000000f : nt!MiMakeSystemCacheRangeValid+0x198
fffff880`056f9740 fffff800`02a88944 : fffff980`0ac41000 fffff980`0ac41011 00000000`00000000 ffffffff`ffffff01 : nt!MmCheckCachedPageStates+0xe00
fffff880`056f98b0 fffff800`02d53ee0 : 00000000`000f5000 00000000`00000000 00000000`00001000 fffff880`056f99e0 : nt!CcFetchDataForRead+0x84
fffff880`056f9910 fffff880`012b112f : fffff880`00000001 00000000`00000005 fffffa80`0003f000 fffffa80`043a9b01 : nt!CcCopyRead+0x180
fffff880`056f99d0 fffff880`0119c098 : fffffa80`043a9bc0 fffffa80`040ef8f0 00000000`00000000 00000000`00000001 : Ntfs!NtfsCopyReadA+0x18f
fffff880`056f9bb0 fffff880`0119f91a : fffff880`056f9c80 fffff880`011bb400 00000000`05b91000 fffffa80`043a9b03 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`056f9c10 fffff880`011bb630 : fffffa80`043a9bc0 00000000`00000000 fffff880`056f9d78 00000000`000f5000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`056f9c50 fffff800`02d55ac1 : fffffa80`043a9bc0 00000000`00000001 00000000`00000000 fffffa80`043a9bc0 : fltmgr!FltpFastIoRead+0x1d0
fffff880`056f9cf0 fffff800`02afab53 : fffff6fb`40000170 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x441
fffff880`056f9e20 00000000`77af8d7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012a9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77af8d7a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02ac099c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiAllocateWsle+28c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!miallocatewsle+28c

FAILURE_ID_HASH:  {13ee2b15-66d1-652c-45a1-c2e7afb587be}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000000103b
Arg4: 0000000007a87009

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  dllhost.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002ac699c to fffff80002af2ac0

STACK_TEXT:
fffff880`0630d948 fffff800`02ac699c : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0000103b : nt!KeBugCheckEx
fffff880`0630d950 fffff800`02b9eed2 : fffff880`0630da00 00000000`00000001 80000000`0de96867 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`0630d9b0 fffff800`02bcd742 : 00000000`00000001 00000000`02b15000 00000000`00000000 ffffffff`ffffffff : nt!MiResolveDemandZeroFault+0x6f2
fffff880`0630da90 fffff800`02afebdc : 00000000`00000001 00000000`02b15000 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x34a2
fffff880`0630dbe0 000007fe`f982948b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35c
00000000`01ebc920 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`f982948b


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02ac699c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiAllocateWsle+28c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e98e8bd

IMAGE_VERSION:  6.1.7601.24553

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

BUCKET_ID:  X64_0x1a_5003_nt!MiAllocateWsle+28c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!miallocatewsle+28c

FAILURE_ID_HASH:  {13ee2b15-66d1-652c-45a1-c2e7afb587be}

Followup: MachineOwner
---------
SPOILER]
Bu kodlar ne anlama geliyor bilmiyorum.
Tamam dediğin programı indiriyorum.
Evet ramlerinden biri bozuk olmalı o yüzden memtest86 ile ram testi yapın dedim. Dump dosyaları ramlerin bozuk olduğunu söylüyor.
programı kurdum hangi butona basayım?
1599506431620.png
 
Bunun için bir tane flaş belleğe ihtiyacınız var. bu videoda ki adımları uygulayınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
 
Bunun için bir tane flaş belleğe ihtiyacınız var. bu videoda ki adımları uygulayınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Hmm videoya bakmadan bir tahminde bulunsam.. Sanırım.. USB'ye bi takım dosyaları yazıp yeniden başlatıp boot tuşu ile USB boot edip oradan taratacağım sanırım teşekkürler.
 
Cevap veremediğim için özür dilerim. Dosya.co yüklememden ötürü ban yedim işte her neyse, Technopat son zamanlarda bildirim göndermiyor çok sıkıcı bir durum. Dump dosyalarından mı Nereden çıkardın bu sonucu acababilmek istiyorum? Cidden ikisinden biri bozuk mu?
@350070

Dump dosyasını, BlueScreen View adlı program ile açtım. Memory managment diye bir şey yazıyordu.
 

Geri
Yukarı