Çözüldü RTX 3060 SYSTEM_SERVICE_EXCEPTION hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

fl0w

Yoctopat
Katılım
25 Nisan 2023
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
RAM
G.SKILL Ripjaws V DDR4 3600 C18 2x8GB
SSD veya HDD modeli
Samsung SSD 970 Evo Plus 1 TB
Ekran kartı
Nvdia Geforce RTX 3060
Anakart
Asus TUF GAMING B450M-PRO II
İşlemci
AMD Ryzen 5 5600X-TRL 2,790
Merhaba, Technopat'da ilk girdim olacak bu, hata yaparsam affola. Son 2 aydır aralıklı olarak mavi ekran hatası almaktayım. Windows'un kendi minidump aracı ile analiz etsem de sorun ne anlayamadım. CMD Prompt'dan sfc/scannow ve restorehealth gibi komutları da denedim ama sorun devam etti. Özellikle en güncel tarihli (25 Nisan) minidump dosyasındaki sorunun ne olduğu ile ilgili yardımcı olursanız sevinirim.

Forumdan öğrendiğim şekilde DMP dosyasının linkini paylaşıyorum: 042523-7375-01 (2).zip
 
Son düzenleme:
Çözüm
Ramleriniz bozuk hocam.

Memtest86 ile test edin.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffaf80c1858e38
Arg3: 1000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3264

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9434

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2697

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 96

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : MemoryManagement.PFN
    Value: 0

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  033123-6359-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffaf80c1858e38

BUGCHECK_P3: 1000000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  QmlRenderer.exe

STACK_TEXT: 
ffffac87`926df118 fffff800`1e11ba3a     : 00000000`0000001a 00000000`00041792 ffffaf80`c1858e38 10000000`00000000 : nt!KeBugCheckEx
ffffac87`926df120 fffff800`1e0a3df6     : 00000000`00000000 ffff8003`d98c9700 00000000`000000bb ffffaf80`c1858e38 : nt!MiDeleteVa+0x153a
ffffac87`926df220 fffff800`1e0a3f0b     : ffffafd7`00000000 ffff8003`d98c9700 ffffac87`00000000 ffffac87`926df690 : nt!MiWalkPageTablesRecursively+0x776
ffffac87`926df2c0 fffff800`1e0a3f0b     : ffffafd7`ebe03060 ffff8003`d98c9700 ffffac87`00000001 ffffac87`926df6a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffac87`926df360 fffff800`1e0a3f0b     : ffffafd7`ebe03000 ffff8003`d98c9700 ffffac87`00000002 ffffac87`926df6b0 : nt!MiWalkPageTablesRecursively+0x88b
ffffac87`926df400 fffff800`1e076b3b     : ffffafd7`ebf5faf8 ffff8003`d98c9700 00000183`00000003 ffffac87`926df6c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffac87`926df4a0 fffff800`1e11a2d1     : ffffac87`926df640 ffff8003`00000000 00000183`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffac87`926df5a0 fffff800`1e124480     : 00000000`00000001 ffffac87`00000000 ffff8003`d98c9550 ffff8003`deeae080 : nt!MiDeletePagablePteRange+0x4f1
ffffac87`926df8b0 fffff800`1e4fdcf7     : ffff8003`deeae080 00000000`00000000 ffff8003`00000000 ffff8003`00000000 : nt!MiDeleteVad+0x360
ffffac87`926df9c0 fffff800`1e4fd783     : ffff8003`e5064500 ffff8003`e5064500 ffff8003`d86178a0 ffff8003`d98c9080 : nt!MiCleanVad+0x43
ffffac87`926df9f0 fffff800`1e46a3c8     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8003`d98c9080 : nt!MmCleanProcessAddressSpace+0x137
ffffac87`926dfa70 fffff800`1e70b322     : fffff800`1eb25440 ffff8003`d98c9080 fffff800`1e70b2f0 00000000`00000300 : nt!PspRundownSingleProcess+0x20c
ffffac87`926dfb00 fffff800`1e0bdef5     : ffff8003`deeae080 fffff800`1e43aa60 ffff8003`c58c3b10 ffff8003`00000000 : nt!PspProcessRundownWorkerSingle+0x32
ffffac87`926dfb30 fffff800`1e055485     : ffff8003`deeae080 00000000`00000080 ffff8003`c5878040 33323032`5f626577 : nt!ExpWorkerThread+0x105
ffffac87`926dfbd0 fffff800`1e202d48     : ffffdd00`16d80180 ffff8003`deeae080 fffff800`1e055430 752d6863`2d636573 : nt!PspSystemThreadStartup+0x55
ffffac87`926dfc20 00000000`00000000     : ffffac87`926e0000 ffffac87`926d9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
Ramleriniz bozuk hocam.

Memtest86 ile test edin.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffaf80c1858e38
Arg3: 1000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3264

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9434

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2697

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 96

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : MemoryManagement.PFN
    Value: 0

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  033123-6359-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffaf80c1858e38

BUGCHECK_P3: 1000000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  QmlRenderer.exe

STACK_TEXT: 
ffffac87`926df118 fffff800`1e11ba3a     : 00000000`0000001a 00000000`00041792 ffffaf80`c1858e38 10000000`00000000 : nt!KeBugCheckEx
ffffac87`926df120 fffff800`1e0a3df6     : 00000000`00000000 ffff8003`d98c9700 00000000`000000bb ffffaf80`c1858e38 : nt!MiDeleteVa+0x153a
ffffac87`926df220 fffff800`1e0a3f0b     : ffffafd7`00000000 ffff8003`d98c9700 ffffac87`00000000 ffffac87`926df690 : nt!MiWalkPageTablesRecursively+0x776
ffffac87`926df2c0 fffff800`1e0a3f0b     : ffffafd7`ebe03060 ffff8003`d98c9700 ffffac87`00000001 ffffac87`926df6a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffac87`926df360 fffff800`1e0a3f0b     : ffffafd7`ebe03000 ffff8003`d98c9700 ffffac87`00000002 ffffac87`926df6b0 : nt!MiWalkPageTablesRecursively+0x88b
ffffac87`926df400 fffff800`1e076b3b     : ffffafd7`ebf5faf8 ffff8003`d98c9700 00000183`00000003 ffffac87`926df6c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffac87`926df4a0 fffff800`1e11a2d1     : ffffac87`926df640 ffff8003`00000000 00000183`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffac87`926df5a0 fffff800`1e124480     : 00000000`00000001 ffffac87`00000000 ffff8003`d98c9550 ffff8003`deeae080 : nt!MiDeletePagablePteRange+0x4f1
ffffac87`926df8b0 fffff800`1e4fdcf7     : ffff8003`deeae080 00000000`00000000 ffff8003`00000000 ffff8003`00000000 : nt!MiDeleteVad+0x360
ffffac87`926df9c0 fffff800`1e4fd783     : ffff8003`e5064500 ffff8003`e5064500 ffff8003`d86178a0 ffff8003`d98c9080 : nt!MiCleanVad+0x43
ffffac87`926df9f0 fffff800`1e46a3c8     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8003`d98c9080 : nt!MmCleanProcessAddressSpace+0x137
ffffac87`926dfa70 fffff800`1e70b322     : fffff800`1eb25440 ffff8003`d98c9080 fffff800`1e70b2f0 00000000`00000300 : nt!PspRundownSingleProcess+0x20c
ffffac87`926dfb00 fffff800`1e0bdef5     : ffff8003`deeae080 fffff800`1e43aa60 ffff8003`c58c3b10 ffff8003`00000000 : nt!PspProcessRundownWorkerSingle+0x32
ffffac87`926dfb30 fffff800`1e055485     : ffff8003`deeae080 00000000`00000080 ffff8003`c5878040 33323032`5f626577 : nt!ExpWorkerThread+0x105
ffffac87`926dfbd0 fffff800`1e202d48     : ffffdd00`16d80180 ffff8003`deeae080 fffff800`1e055430 752d6863`2d636573 : nt!PspSystemThreadStartup+0x55
ffffac87`926dfc20 00000000`00000000     : ffffac87`926e0000 ffffac87`926d9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 
Çözüm
RAM'leriniz bozuk. Memtest86 ile RAM testi yapın ve sonuçları gönderin.
"DotA 2" silin.
"Corsair" ile ilgili ugulamaları silin.
BIOS sürümünüz güncel değil. Güncelleyin.
Emin olmak için tekrar sfc /scannow yapın.

Kod:
MEMORY_MANAGEMENT (1a)
 # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
 contains the address of the PFN for the corrupted page table page.
 On a 32 bit OS, parameter 2 contains a pointer to the number of used.
 PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffbc8001829220.
Arg3: 0000000000000000.
Arg4: 0000000000000001.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 10608.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 16318.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 1249.

 Key : Analysis.Init.Elapsed.mSec
 Value: 7439.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 91.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x1a.

 Key : Bugcheck.Code.Register
 Value: 0x1a.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 030723-7078-01.dmp

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41790.

BUGCHECK_P2: ffffbc8001829220.

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: StartMenuExperienceHost.exe

STACK_TEXT:
ffff8d84`dd9f6088 fffff803`4da33bf7 : 00000000`0000001a 00000000`00041790 ffffbc80`01829220 00000000`00000000 : nt!KeBugCheckEx
ffff8d84`dd9f6090 fffff803`4d9f14d8 : 00000000`00000001 ffff8d84`dd9f6200 00000000`00000000 00000000`00000000 : nt!MiDecreaseUsedPtesCount+0x1f08f3
ffff8d84`dd9f60d0 fffff803`4d8b5fe6 : 00000001`00000000 00000000`00000080 ffff8d84`dd9f6211 ffff8b45`00000000 : nt!MiReducePteUseCount+0x30
ffff8d84`dd9f6100 fffff803`4dcfb31d : ffff8f06`cb009540 ffff8f06`e2a31d48 ffff8f06`00000002 ffff8f06`00000000 : nt!MiDecommitPages+0xd46
ffff8d84`dd9f6cd0 fffff803`4dcfa983 : ffff8d84`dd9f6e50 00000000`00000000 ffff8d84`dd9f6e50 ffff8f06`e2a31d20 : nt!MiDecommitRegion+0x7d
ffff8d84`dd9f6d50 fffff803`4dcfa275 : ffffc089`d9c00100 fffff803`4d88f072 ffffc089`d9c00340 ffff8d84`dd9f71ff : nt!MmFreeVirtualMemory+0x6d3
ffff8d84`dd9f6ea0 fffff803`4da0d8f8 : ffff8f06`cb009540 01800040`00000a9d 00000000`00000103 00000000`00000000 : nt!NtFreeVirtualMemory+0x95
ffff8d84`dd9f6f00 fffff803`4d9fec70 : fffff803`65c70e9c ffffc08a`127aada0 ffff8d84`dd9f7159 ffffc08a`127aada0 : nt!KiSystemServiceCopyEnd+0x28
ffff8d84`dd9f7098 fffff803`65c70e9c : ffffc08a`127aada0 ffff8d84`dd9f7159 ffffc08a`127aada0 fffff803`65c73707 : nt!KiServiceLinkage
ffff8d84`dd9f70a0 fffff803`65c7b212 : 00000000`00144000 ffff8f06`ccb78900 ffff8f06`ccb78f10 ffffc08a`127ad860 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x160
ffff8d84`dd9f70f0 fffff803`65c216f4 : 00000000`00000000 00000000`00000001 ffff8f06`c7ffca30 ffff8f06`c7ffcbb0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::~VIDMM_RECYCLE_HEAP_MGR+0x34a
ffff8d84`dd9f71c0 fffff803`65c7b7df : ffffc089`ea9416f0 fffff803`00000000 ffff8f06`c8257088 01000000`00100000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::`vector deleting destructor'+0x14
ffff8d84`dd9f71f0 fffff803`65c21742 : ffffc089`ea9416f0 ffffc089`e0ad2de0 ffff8f06`c7ffca30 00000000`000000e0 : dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+0x9f
ffff8d84`dd9f7220 fffff803`57ba3b0d : 00000000`00000001 ffffc089`e0ad2eb0 00000000`00000000 00000000`00050206 : dxgmms2!VidMmTerminateProcess+0x12
ffff8d84`dd9f7250 fffff803`57ba32f3 : ffffc089`e0ad2f10 ffff8d84`dd9f7380 00000000`00000400 ffffc089`e0ad2de0 : dxgkrnl!VidMmTerminateProcessX+0x65
ffff8d84`dd9f7280 fffff803`57ba43f9 : ffffc089`e0ad2de0 00000000`00000000 ffffc089`e0ad2de0 ffffc089`e9979830 : dxgkrnl!DXGPROCESS::Destroy+0x1bf
ffff8d84`dd9f74f0 fffff803`57a96841 : 00000000`00000000 ffff8f06`cd29c730 00000000`00000000 fffff803`4fc7cda8 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8d84`dd9f7640 fffff803`4dcefb9f : 00000000`00000000 ffff8f06`c4992f70 ffff8f06`d11ca0c0 ffff8f06`cd2add50 : dxgkrnl!DxgkProcessNotify+0x1a1
ffff8d84`dd9f7690 fffff803`4dce640c : ffff8f06`d11ca000 ffff8f06`d11ca0c0 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8d84`dd9f7760 fffff803`4dcf134e : ffff8f06`cb009978 00000000`00000000 ffff8d84`dd9f7950 00000000`00000000 : nt!PspExitProcess+0x70
ffff8d84`dd9f7790 fffff803`4dc35d08 : ffff8f06`00000001 00000000`00000001 ffff8d84`00000002 00000045`02ff5000 : nt!PspExitThread+0x5b2
ffff8d84`dd9f7890 fffff803`4d880ad7 : ffff8f06`c8257000 fffff803`00000000 ffff8f06`c8257a90 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8d84`dd9f78d0 fffff803`4d9ff4e0 : 000001f2`54c62170 ffff8d84`dd9f7980 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffff8d84`dd9f7980 fffff803`4da0d99f : ffff8f06`cb009540 00000000`00000000 00000000`00000000 00000000`000002d8 : nt!KiInitiateUserApc+0x70
ffff8d84`dd9f7ac0 00007ffa`99a95cc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000045`039ff8d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`99a95cc4

SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+160

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.2728

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 160.

FAILURE_BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b4dd6f57-8ae8-5c62-c567-a68fe02d924e}

Followup: MachineOwner.
---------

Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff801476f60f0, The address that the exception occurred at.
Arg3: 0000000000000000, Parameter 0 of the exception.
Arg4: ffffffffffffffff, Parameter 1 of the exception.

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 10702.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 24129.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 1139.

 Key : Analysis.Init.Elapsed.mSec
 Value: 3730.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 92.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x1e.

 Key : Bugcheck.Code.Register
 Value: 0x1e.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 032223-6515-01.dmp

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff801476f60f0.

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff.

EXCEPTION_PARAMETER1: 0000000000000000.

EXCEPTION_PARAMETER2: ffffffffffffffff.

READ_ADDRESS: fffff80147cfb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dota2.exe

STACK_TEXT:
ffffb403`256e6ac8 fffff801`4747eb61 : 00000000`0000001e ffffffff`c0000005 fffff801`476f60f0 00000000`00000000 : nt!KeBugCheckEx
ffffb403`256e6ad0 fffff801`4740e26c : ffffb50f`dfea6010 fffff801`4728b519 00000000`00000042 ffffb403`256e7229 : nt!KiDispatchException+0x1a05a1
ffffb403`256e7190 fffff801`4740985a : 00000002`00000000 00000000`00004000 ffff9f88`ec5554a0 00000000`02705e00 : nt!KiExceptionDispatch+0x12c
ffffb403`256e7370 fffff801`476f60f0 : 00000000`00000000 ffffb50f`df3acd80 00000000`00000001 00000000`00000000 : nt!KiGeneralProtectionFault+0x31a
ffffb403`256e7500 fffff801`476f624c : ffffdf80`b1d15000 efff9f89`0c7260f4 00000000`00002708 00000000`00000000 : nt!MiApplyCompressedFixups+0x60
ffffb403`256e7560 fffff801`476f686d : ffffb50f`d5ff7080 ffffb50f`df3acd80 00007ffc`77660000 00000000`00002708 : nt!MiPerformFixups+0x88
ffffb403`256e7600 fffff801`47300ba0 : 00000000`00000000 00000000`0000000c 00000000`00000000 00000000`00000008 : nt!MiRelocateImagePfn+0x18d
ffffb403`256e7670 fffff801`47347104 : ffffb50f`00000000 00000000`00000000 00000000`00000000 ffffb50f`e99ab0c0 : nt!MiValidateInPage+0x260
ffffb403`256e7720 fffff801`47344e75 : ffffb403`00004000 ffffb403`256e7800 ffffb403`256e78b0 fffff801`00000000 : nt!MiWaitForInPageComplete+0x314
ffffb403`256e7810 fffff801`472a4dd8 : 00000000`c0033333 00000000`00000001 00007ffd`f9d67000 ffff9f88`fdc7b838 : nt!MiIssueHardFault+0x3c5
ffffb403`256e7920 fffff801`47409bd8 : 0000013d`dc571501 00000000`00000000 00000000`00000000 ffffffff`dc3cba01 : nt!MmAccessFault+0x468
ffffb403`256e7ac0 00007ffe`19c6c150 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
0000000e`4957e370 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`19c6c150

SYMBOL_NAME: nt!MiApplyCompressedFixups+60

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.2728

STACK_COMMAND: .cxr; .ecxr ; kb.

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 60.

FAILURE_BUCKET_ID: AV_R_nt!MiApplyCompressedFixups

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {8a8741f5-1153-77f4-de68-0ed23ffdb1ac}

Followup: MachineOwner.
---------

Kod:
MEMORY_MANAGEMENT (1a)
 # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
 the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffaf80c1858e38.
Arg3: 1000000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 7593.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 15754.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 1093.

 Key : Analysis.Init.Elapsed.mSec
 Value: 23206.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 96.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x1a.

 Key : Bugcheck.Code.Register
 Value: 0x1a.

 Key : MemoryManagement.PFN
 Value: 0

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 033123-6359-01.dmp

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: ffffaf80c1858e38.

BUGCHECK_P3: 1000000000000000.

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: QmlRenderer.exe

STACK_TEXT:
ffffac87`926df118 fffff800`1e11ba3a : 00000000`0000001a 00000000`00041792 ffffaf80`c1858e38 10000000`00000000 : nt!KeBugCheckEx
ffffac87`926df120 fffff800`1e0a3df6 : 00000000`00000000 ffff8003`d98c9700 00000000`000000bb ffffaf80`c1858e38 : nt!MiDeleteVa+0x153a
ffffac87`926df220 fffff800`1e0a3f0b : ffffafd7`00000000 ffff8003`d98c9700 ffffac87`00000000 ffffac87`926df690 : nt!MiWalkPageTablesRecursively+0x776
ffffac87`926df2c0 fffff800`1e0a3f0b : ffffafd7`ebe03060 ffff8003`d98c9700 ffffac87`00000001 ffffac87`926df6a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffac87`926df360 fffff800`1e0a3f0b : ffffafd7`ebe03000 ffff8003`d98c9700 ffffac87`00000002 ffffac87`926df6b0 : nt!MiWalkPageTablesRecursively+0x88b
ffffac87`926df400 fffff800`1e076b3b : ffffafd7`ebf5faf8 ffff8003`d98c9700 00000183`00000003 ffffac87`926df6c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffac87`926df4a0 fffff800`1e11a2d1 : ffffac87`926df640 ffff8003`00000000 00000183`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffac87`926df5a0 fffff800`1e124480 : 00000000`00000001 ffffac87`00000000 ffff8003`d98c9550 ffff8003`deeae080 : nt!MiDeletePagablePteRange+0x4f1
ffffac87`926df8b0 fffff800`1e4fdcf7 : ffff8003`deeae080 00000000`00000000 ffff8003`00000000 ffff8003`00000000 : nt!MiDeleteVad+0x360
ffffac87`926df9c0 fffff800`1e4fd783 : ffff8003`e5064500 ffff8003`e5064500 ffff8003`d86178a0 ffff8003`d98c9080 : nt!MiCleanVad+0x43
ffffac87`926df9f0 fffff800`1e46a3c8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8003`d98c9080 : nt!MmCleanProcessAddressSpace+0x137
ffffac87`926dfa70 fffff800`1e70b322 : fffff800`1eb25440 ffff8003`d98c9080 fffff800`1e70b2f0 00000000`00000300 : nt!PspRundownSingleProcess+0x20c
ffffac87`926dfb00 fffff800`1e0bdef5 : ffff8003`deeae080 fffff800`1e43aa60 ffff8003`c58c3b10 ffff8003`00000000 : nt!PspProcessRundownWorkerSingle+0x32
ffffac87`926dfb30 fffff800`1e055485 : ffff8003`deeae080 00000000`00000080 ffff8003`c5878040 33323032`5f626577 : nt!ExpWorkerThread+0x105
ffffac87`926dfbd0 fffff800`1e202d48 : ffffdd00`16d80180 ffff8003`deeae080 fffff800`1e055430 752d6863`2d636573 : nt!PspSystemThreadStartup+0x55
ffffac87`926dfc20 00000000`00000000 : ffffac87`926e0000 ffffac87`926d9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

MODULE_NAME: hardware.

IMAGE_NAME: memory_corruption.

STACK_COMMAND: .cxr; .ecxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner.
---------

Kod:
MEMORY_MANAGEMENT (1a)
 # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
 the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8200a1db4e38.
Arg3: 1000000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 5874.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 8234.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 1171.

 Key : Analysis.Init.Elapsed.mSec
 Value: 5322.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 92.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x1a.

 Key : Bugcheck.Code.Register
 Value: 0x1a.

 Key : MemoryManagement.PFN
 Value: 0

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 040723-6187-01.dmp

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: ffff8200a1db4e38.

BUGCHECK_P3: 1000000000000000.

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: iCUE.exe

STACK_TEXT:
ffff8605`9be7f0e8 fffff802`196bc49a : 00000000`0000001a 00000000`00041792 ffff8200`a1db4e38 10000000`00000000 : nt!KeBugCheckEx
ffff8605`9be7f0f0 fffff802`1966d836 : 00000000`00000000 ffffc38c`b665b700 00000000`000000db ffff8200`a1db4e38 : nt!MiDeleteVa+0x153a
ffff8605`9be7f1f0 fffff802`1966d94b : ffff8241`00000000 ffffc38c`b665b700 ffff8605`00000000 ffff8605`9be7f660 : nt!MiWalkPageTablesRecursively+0x776
ffff8605`9be7f290 fffff802`1966d94b : ffff8241`20802870 ffffc38c`b665b700 ffff8605`00000001 ffff8605`9be7f670 : nt!MiWalkPageTablesRecursively+0x88b
ffff8605`9be7f330 fffff802`1966d94b : ffff8241`20802000 ffffc38c`b665b700 ffff8605`00000002 ffff8605`9be7f680 : nt!MiWalkPageTablesRecursively+0x88b
ffff8605`9be7f3d0 fffff802`1966a94b : 00000000`00000000 ffffc38c`b665b700 00000000`00000003 ffff8605`9be7f690 : nt!MiWalkPageTablesRecursively+0x88b
ffff8605`9be7f470 fffff802`196bad31 : ffff8605`9be7f610 ffffc38c`00000000 ffff8200`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff8605`9be7f570 fffff802`1967e830 : 00000000`00000001 ffff8605`00000000 ffffc38c`b665b550 ffffc38c`b2b29040 : nt!MiDeletePagablePteRange+0x4f1
ffff8605`9be7f880 fffff802`19a85ab9 : ffffc38c`bf860ea0 00000000`00000000 ffffc38c`00000000 ffffc38c`00000000 : nt!MiDeleteVad+0x360
ffff8605`9be7f990 fffff802`19a8545c : ffffc38c`bf860ea0 ffffc38c`b5726a20 ffffc38c`b2b29040 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8605`9be7f9c0 fffff802`19a2432f : ffffc38c`c0dd5670 ffffc38c`c0dd5670 ffffc38c`bf860ea0 ffffc38c`b665b080 : nt!MiCleanVad+0x30
ffff8605`9be7f9f0 fffff802`19a31460 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc38c`b665b080 : nt!MmCleanProcessAddressSpace+0x137
ffff8605`9be7fa70 fffff802`19d0d992 : fffff802`1a125440 ffffc38c`b665b080 fffff802`19d0d960 00000000`00000200 : nt!PspRundownSingleProcess+0x20c
ffff8605`9be7fb00 fffff802`1968e5c5 : ffffc38c`b2b29040 fffff802`19af7210 ffffc38c`a7a8cce0 00000000`00000000 : nt!PspProcessRundownWorkerSingle+0x32
ffff8605`9be7fb30 fffff802`197265f5 : ffffc38c`b2b29040 00000000`00000080 ffffc38c`a7a89040 00131423`00131400 : nt!ExpWorkerThread+0x105
ffff8605`9be7fbd0 fffff802`19804828 : ffff9f81`a8990180 ffffc38c`b2b29040 fffff802`197265a0 00121425`00121425 : nt!PspSystemThreadStartup+0x55
ffff8605`9be7fc20 00000000`00000000 : ffff8605`9be80000 ffff8605`9be79000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

MODULE_NAME: hardware.

IMAGE_NAME: memory_corruption.

STACK_COMMAND: .cxr; .ecxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner.
---------

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff8077260746f, Address of the instruction which caused the BugCheck.
Arg3: ffffe6810018f920, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 5968.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 10408.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 1436.

 Key : Analysis.Init.Elapsed.mSec
 Value: 9739.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 92.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x3b.

 Key : Bugcheck.Code.Register
 Value: 0x3b.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 042523-7375-01.dmp

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8077260746f.

BUGCHECK_P3: ffffe6810018f920.

BUGCHECK_P4: 0

CONTEXT: ffffe6810018f920 -- (.cxr 0xffffe6810018f920)
rax=efffb081795dd7ec rbx=ffffb0816ead1050 rcx=0000000000000000
rdx=0000000000000000 rsi=ffffb081795dd6d0 rdi=ffffb081795dd808
rip=fffff8077260746f rsp=ffff86868a0a7820 rbp=ffff86868a0a7b40
 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff86868a0a76a0 r12=0000000000000000 r13=ffffffffffffffff
r14=0000000000000000 r15=ffffb0817fa0a540
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!NtWaitForWorkViaWorkerFactory+0xfdf:
fffff807`7260746f 8b00 mov eax,dword ptr [rax] ds:002b:efffb081`795dd7ec=????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: backgroundTaskHost.exe

STACK_TEXT:
ffff8686`8a0a7820 fffff807`7280f3f8 : 00000000`00000001 fffff807`72abd6dd 00000099`57dff9d8 ffff8686`8a0a7b40 : nt!NtWaitForWorkViaWorkerFactory+0xfdf
ffff8686`8a0a7a50 00007ffc`450f0ad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000099`57dffba8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`450f0ad4

SYMBOL_NAME: nt!NtWaitForWorkViaWorkerFactory+fdf

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.2846

STACK_COMMAND: .cxr 0xffffe6810018f920 ; kb.

BUCKET_ID_FUNC_OFFSET: fdf.

FAILURE_BUCKET_ID: AV_nt!NtWaitForWorkViaWorkerFactory

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {a4e651dc-f8e5-0523-719b-23e97778afc8}

Followup: MachineOwner.
---------

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.




@lazye Hocam biraz bize de bırakın da biz de yardım edelim bu ne hız. :D
 
@McGucket Hocam elimden geldiğince, çalışmıyorum şu an iş arefesinde olduğumdan evdeyim ve bol vaktim oluyor. 🙂
 
Zaman ayıran herkese teşekkürler. Memtest86 uyguladım ve 9 adet error aldım. Testin sonucu fail. Sanırım en büyük sorun bu: Test 7 [Moving inversions, 32-bit pattern] 0/4 (0%) tests passed, 7 errors. Ayrıca bitlerden biri de kırmızı yanıyor sonuç kağıdında.

Memtest86 sonucunu paylaşıyorum. Sorun çözülebilir mi ya da yeni RAM mi almam gerekiyor?
 

Dosya Ekleri

  • MemTest86-Report-20230425-194130.html.pdf
    79,9 KB · Görüntüleme: 163
Zaman ayıran herkese teşekkürler. Memtest86 uyguladım ve 9 adet error aldım. Testin sonucu fail. Sanırım en büyük sorun bu: Test 7 [Moving inversions, 32-bit pattern] 0/4 (0%) tests passed, 7 errors. Ayrıca bitlerden biri de kırmızı yanıyor sonuç kağıdında.

Memtest86 sonucunu paylaşıyorum. Sorun çözülebilir mi ya da yeni RAM mi almam gerekiyor?

Evet RAM'lerini değiştirip yeni RAM alman lazım o RAM'ler artık işe yaramaz.
 
Evet RAM'lerini değiştirip yeni RAM alman lazım o RAM'ler artık işe yaramaz.
Halbuki çok da iyi bakmıştım sisteme. En azından RAM'lerin garantisi 1 yıl daha devam ediyor, şimdilik idare edip uygun zamanda değişim yaparım. RAM'leri kullanmaya devam etmemin sistemin geri kalan parçalarına bir zararı var mıdır?
 
Halbuki çok da iyi bakmıştım sisteme. En azından RAM'lerin garantisi 1 yıl daha devam ediyor, şimdilik idare edip uygun zamanda değişim yaparım. RAM'leri kullanmaya devam etmemin sistemin geri kalan parçalarına bir zararı var mıdır?

Hayır sık sık mavi ekran yersiniz RAM'lerin garantisi var ise bana attığınız rapor ile RAM'leri garantiye verin ve değişim talep edin.
 

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı