Minidump dosyasını incelediğimde aşağıdaki veriye ulaştım ama ben çözemedim.
Aklıma gelmişken arada klavye veya mouse 5-10 saniyeliğine çalışmayı kesiyor. O sırada işlemci tam yüke çıkıyor. Sonrasında bir anda bastığım tuşlar saniyesinde çalışıyor.
MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff1c246402278 Arg3: 0000000010000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1656 Key : Analysis.Elapsed.mSec Value: 6663 Key : Analysis.IO.Other.Mb Value: 14 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 25 Key : Analysis.Init.CPU.mSec Value: 765 Key : Analysis.Init.Elapsed.mSec Value: 51575 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Analysis.Version.DbgEng Value: 10.0.27793.1000 Key : Analysis.Version.Description Value: 10.2410.02.02 amd64fre Key : Analysis.Version.Ext Value: 1.2410.2.2 Key : Bugcheck.Code.LegacyAPI Value: 0x1a Key : Bugcheck.Code.TargetModel Value: 0x1a Key : Failure.Bucket Value: MEMORY_CORRUPTION_ONE_BIT Key : Failure.Hash Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Key : MemoryManagement.PFN Value: 0x10000 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: fffff1c246402278 BUGCHECK_P3: 10000000 BUGCHECK_P4: 0 FILE_IN_CAB: 041625-10375-01.dmp FAULTING_THREAD: ffff87862455b080 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: msedge.exe STACK_TEXT: ffffee8c`36f08ee8 fffff801`4d46fe1a : 00000000`0000001a 00000000`00041792 fffff1c2`46402278 00000000`10000000 : nt!KeBugCheckEx ffffee8c`36f08ef0 fffff801`4d40cfc6 : 00000000`00000000 00000000`00000000 00000000`0000000b fffff1c2`46402278 : nt!MiDeleteVa+0x153a ffffee8c`36f08ff0 fffff801`4d40d0db : fffff1f8`e1232010 ffff8786`1dec6740 ffffee8c`00000000 ffffee8c`36f09460 : nt!MiWalkPageTablesRecursively+0x776 ffffee8c`36f09090 fffff801`4d40d0db : fffff1f8`fc709190 ffff8786`1dec6740 ffffee8c`00000001 ffffee8c`36f09470 : nt!MiWalkPageTablesRecursively+0x88b ffffee8c`36f09130 fffff801`4d40d0db : fffff1f8`fc709000 ffff8786`1dec6740 ffffee8c`00000002 ffffee8c`36f09480 : nt!MiWalkPageTablesRecursively+0x88b ffffee8c`36f091d0 fffff801`4d40a0db : 00000000`00000000 ffff8786`1dec6740 ffffee8c`00000003 ffffee8c`36f09490 : nt!MiWalkPageTablesRecursively+0x88b ffffee8c`36f09270 fffff801`4d46e6b1 : ffffee8c`36f09410 ffff8786`00000001 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffffee8c`36f09370 fffff801`4d8e5b04 : 000327c7`00000000 00000000`00000000 00000000`00000000 ffff8786`14066040 : nt!MiDeletePagablePteRange+0x4f1 ffffee8c`36f09680 fffff801`4d545a4c : ffff8786`1dec60c0 00000000`03a70b80 00000000`00000002 fffff801`00000000 : nt!MiDeleteVadBitmap+0x8c ffffee8c`36f09710 fffff801`4d8e5980 : ffff8786`1dec60c0 ffff8786`1dec6800 ffff8786`1dec6740 ffff8786`2455b080 : nt!MiDeleteFinalPageTables+0xc8 ffffee8c`36f097d0 fffff801`4d8e24bf : ffff8786`1dec60c0 ffffee8c`36f09890 ffff8786`2455b080 ffff8786`1dec6508 : nt!MmDeleteProcessAddressSpace+0x64 ffffee8c`36f09820 fffff801`4d807220 : ffff8786`1dec6090 ffff8786`1dec6090 00000000`00000000 ffff8786`140b44e0 : nt!PspProcessDelete+0x13f ffffee8c`36f098b0 fffff801`4d42eb67 : 00000000`00000000 00000000`00000000 ffffee8c`36f09a39 ffff8786`1dec60c0 : nt!ObpRemoveObjectRoutine+0x80 ffffee8c`36f09910 fffff801`4d80ca89 : ffff8786`1dec6090 00000000`00000000 00000000`00000000 ffff8786`234130c0 : nt!ObfDereferenceObjectWithTag+0xc7 ffffee8c`36f09950 fffff801`4d8077cc : 00000000`00000c30 ffffee8c`36f09b80 ffffee8c`00000000 ffff8786`327e1b60 : nt!ObCloseHandleTableEntry+0x6c9 ffffee8c`36f09a90 fffff801`4d611f08 : 000028ac`00e30100 00000247`41db0000 ffffee8c`36f09b80 00000000`00000000 : nt!NtClose+0xec ffffee8c`36f09b00 00007ff8`488ad6d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000d8`ef5fe198 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`488ad6d4 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .process /r /p 0xffff8786234130c0; .thread 0xffff87862455b080 ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------