Çözüldü Anno 1800 Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

KARA57

Kilopat
Katılım
12 Haziran 2016
Mesajlar
1.014
Çözümler
2
Daha fazla  
Cinsiyet
Erkek

Minidump linktedir, sebebini çözemedim. Sürekli oyun oynuyorum, ilk defa hata aldım. Anno 1800 oynarken aldım hatayı acaba OC kaynaklı bir hata mı yoksa başka bir sorun mu var?
 
Son düzenleyen: Moderatör:
Çözüm
Kulaklık modeliniz Steelseries Siberia V2 Illuminated mı? Bu ise kulaklığınızı çıkartın. Ek olarak klavye ve mouse harici ne kadar USB aygıtı varsa çıkartın. Bu arada USB hub var mı sistemde?

Ek olarak ya ESET'i ya da Kaspersky'ı kaldırın. Aynı anda sistemde 2 farklı AV bulundurulmasını tavsiye etmem.

Dediğiniz gibi yeni çıkan BIOS sürümüne geçin.

Son olarak BattlEye'ı ve Bluestacks'i kaldırın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80533e4baf9, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7952

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-5QPUIS0

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 53846

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: d0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80533e4baf9

READ_ADDRESS: fffff805348fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053480f330: Unable to get Flags value from nt!KdVersionBlock
fffff8053480f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000000d0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

DPC_STACK_BASE:  FFFFF80537496FB0

TRAP_FRAME:  fffff80537496740 -- (.trap 0xfffff80537496740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffce83ab017080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80533e4baf9 rsp=fffff805374968d0 rbp=fffff805374969b1
r8=fffff80537496a68  r9=0000000000000000 r10=0000000000000fff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiChooseTargetProcessor+0x89:
fffff805`33e4baf9 410fb683d0000000 movzx   eax,byte ptr [r11+0D0h] ds:00000000`000000d0=??
Resetting default scope

STACK_TEXT:
fffff805`374965f8 fffff805`34007a69     : 00000000`0000000a 00000000`000000d0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`37496600 fffff805`34003d69     : 00000000`00000000 fffff805`3749682c 00000000`a0324300 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`37496740 fffff805`33e4baf9     : ffffce83`9562c1b0 ffffce83`9562c1b0 00000000`00000000 fffff805`00000000 : nt!KiPageFault+0x469
fffff805`374968d0 fffff805`33e4addb     : fffff805`37496a02 ffffce83`9a285738 00000000`00000000 fffff805`36797091 : nt!KiChooseTargetProcessor+0x89
fffff805`37496a10 fffff805`33e44c4d     : 00000000`0005b80a fffff805`37496e60 00000000`00000080 fffff805`2ef2a180 : nt!KiDeferredReadySingleThread+0x28b
fffff805`37496c00 fffff805`33e45030     : fffff805`2ef2a180 00000000`00000000 ffffce83`ab0171f0 ffffce83`9a479ba0 : nt!KiReadyThread+0x4d
fffff805`37496c30 fffff805`33e072e9     : fffff805`2ef2a180 00000000`00000000 00000000`00000008 00000000`0005b80a : nt!KiProcessExpiredTimerList+0x290
fffff805`37496d20 fffff805`33ffcac5     : 00000000`00000000 fffff805`2ef2a180 fffff805`348f39e0 00000000`0a85e508 : nt!KiRetireDpcList+0x9d9
fffff805`37496fb0 fffff805`33ffc8b0     : fffff805`33ff1b70 fffff805`33eec5ca 00000000`00000000 00000000`2029f7f4 : nt!KxRetireDpcList+0x5
ffffc909`6a11eac0 fffff805`33ffc165     : 00000000`0a85e508 fffff805`33ff7b11 00000000`2029f6d0 ffffce83`9ea020c0 : nt!KiDispatchInterruptContinue
ffffc909`6a11eaf0 fffff805`33ff7b11     : 00000000`2029f6d0 ffffce83`9ea020c0 ffffc909`6a11eb18 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffc909`6a11eb00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME:  nt!KiChooseTargetProcessor+89

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  89

FAILURE_BUCKET_ID:  AV_nt!KiChooseTargetProcessor

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73fcfa5f-3a46-b7e6-d0fb-72b61d4db0b4}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8056e7a8068, Virtual address for the attempted execute.
Arg2: 8000000195136929, PTE contents.
Arg3: ffffd50e245f15d0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11999

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-5QPUIS0

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 134860

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  fc

BUGCHECK_P1: fffff8056e7a8068

BUGCHECK_P2: 8000000195136929

BUGCHECK_P3: ffffd50e245f15d0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  BEService.exe

TRAP_FRAME:  ffffd50e245f15d0 -- (.trap 0xffffd50e245f15d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001400f8783 rbx=0000000000000000 rcx=00000000000af286
rdx=fffff80570de8783 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8056e7a8068 rsp=ffffd50e245f1760 rbp=0000000000000084
r8=ffffffff0260de4f  r9=ffffd50e245f1980 r10=fffff8056e7a8068
r11=fffff80570de87e7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
fffff805`6e7a8068 0000            add     byte ptr [rax],al ds:00000001`400f8783=??
Resetting default scope

STACK_TEXT:
ffffd50e`245f12e8 fffff805`1bc718f0     : 00000000`000000fc fffff805`6e7a8068 80000001`95136929 ffffd50e`245f15d0 : nt!KeBugCheckEx
ffffd50e`245f12f0 fffff805`1ba2aed6     : fffff805`6e7a8068 ffffd50e`245f14f0 ffffd50e`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffd50e`245f1330 fffff805`1ba0c960     : 00000000`00000111 00000000`00000011 ffffd50e`245f1650 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffd50e`245f1430 fffff805`1bc03c5e     : ffffffff`fd8190d1 ffffd50e`245f1650 ffffffff`ffff0850 00000000`00000001 : nt!MmAccessFault+0x400
ffffd50e`245f15d0 fffff805`6e7a8068     : 00000000`00000000 00000000`00000000 00000000`00000212 ffffd782`9f785bf0 : nt!KiPageFault+0x35e
ffffd50e`245f1760 00000000`00000000     : 00000000`00000000 00000000`00000212 ffffd782`9f785bf0 ffffd782`aa735a90 : 0xfffff805`6e7a8068


SYMBOL_NAME:  nt!MiCheckSystemNxFault+159368

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  159368

FAILURE_BUCKET_ID:  0xFC_nt!MiCheckSystemNxFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup:     MachineOwner
---------
Kulaklık modeliniz Steelseries Siberia V2 Illuminated mı? Bu ise kulaklığınızı çıkartın. Ek olarak klavye ve mouse harici ne kadar USB aygıtı varsa çıkartın. Bu arada USB hub var mı sistemde?

Ek olarak ya ESET'i ya da Kaspersky'ı kaldırın. Aynı anda sistemde 2 farklı AV bulundurulmasını tavsiye etmem.

Dediğiniz gibi yeni çıkan BIOS sürümüne geçin.

Son olarak BattlEye'ı ve Bluestacks'i kaldırın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80533e4baf9, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7952

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-5QPUIS0

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 53846

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: d0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80533e4baf9

READ_ADDRESS: fffff805348fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053480f330: Unable to get Flags value from nt!KdVersionBlock
fffff8053480f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000000d0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

DPC_STACK_BASE:  FFFFF80537496FB0

TRAP_FRAME:  fffff80537496740 -- (.trap 0xfffff80537496740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffce83ab017080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80533e4baf9 rsp=fffff805374968d0 rbp=fffff805374969b1
r8=fffff80537496a68  r9=0000000000000000 r10=0000000000000fff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiChooseTargetProcessor+0x89:
fffff805`33e4baf9 410fb683d0000000 movzx   eax,byte ptr [r11+0D0h] ds:00000000`000000d0=??
Resetting default scope

STACK_TEXT:
fffff805`374965f8 fffff805`34007a69     : 00000000`0000000a 00000000`000000d0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`37496600 fffff805`34003d69     : 00000000`00000000 fffff805`3749682c 00000000`a0324300 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`37496740 fffff805`33e4baf9     : ffffce83`9562c1b0 ffffce83`9562c1b0 00000000`00000000 fffff805`00000000 : nt!KiPageFault+0x469
fffff805`374968d0 fffff805`33e4addb     : fffff805`37496a02 ffffce83`9a285738 00000000`00000000 fffff805`36797091 : nt!KiChooseTargetProcessor+0x89
fffff805`37496a10 fffff805`33e44c4d     : 00000000`0005b80a fffff805`37496e60 00000000`00000080 fffff805`2ef2a180 : nt!KiDeferredReadySingleThread+0x28b
fffff805`37496c00 fffff805`33e45030     : fffff805`2ef2a180 00000000`00000000 ffffce83`ab0171f0 ffffce83`9a479ba0 : nt!KiReadyThread+0x4d
fffff805`37496c30 fffff805`33e072e9     : fffff805`2ef2a180 00000000`00000000 00000000`00000008 00000000`0005b80a : nt!KiProcessExpiredTimerList+0x290
fffff805`37496d20 fffff805`33ffcac5     : 00000000`00000000 fffff805`2ef2a180 fffff805`348f39e0 00000000`0a85e508 : nt!KiRetireDpcList+0x9d9
fffff805`37496fb0 fffff805`33ffc8b0     : fffff805`33ff1b70 fffff805`33eec5ca 00000000`00000000 00000000`2029f7f4 : nt!KxRetireDpcList+0x5
ffffc909`6a11eac0 fffff805`33ffc165     : 00000000`0a85e508 fffff805`33ff7b11 00000000`2029f6d0 ffffce83`9ea020c0 : nt!KiDispatchInterruptContinue
ffffc909`6a11eaf0 fffff805`33ff7b11     : 00000000`2029f6d0 ffffce83`9ea020c0 ffffc909`6a11eb18 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffc909`6a11eb00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME:  nt!KiChooseTargetProcessor+89

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  89

FAILURE_BUCKET_ID:  AV_nt!KiChooseTargetProcessor

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73fcfa5f-3a46-b7e6-d0fb-72b61d4db0b4}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8056e7a8068, Virtual address for the attempted execute.
Arg2: 8000000195136929, PTE contents.
Arg3: ffffd50e245f15d0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11999

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-5QPUIS0

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 134860

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  fc

BUGCHECK_P1: fffff8056e7a8068

BUGCHECK_P2: 8000000195136929

BUGCHECK_P3: ffffd50e245f15d0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  BEService.exe

TRAP_FRAME:  ffffd50e245f15d0 -- (.trap 0xffffd50e245f15d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001400f8783 rbx=0000000000000000 rcx=00000000000af286
rdx=fffff80570de8783 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8056e7a8068 rsp=ffffd50e245f1760 rbp=0000000000000084
r8=ffffffff0260de4f  r9=ffffd50e245f1980 r10=fffff8056e7a8068
r11=fffff80570de87e7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
fffff805`6e7a8068 0000            add     byte ptr [rax],al ds:00000001`400f8783=??
Resetting default scope

STACK_TEXT:
ffffd50e`245f12e8 fffff805`1bc718f0     : 00000000`000000fc fffff805`6e7a8068 80000001`95136929 ffffd50e`245f15d0 : nt!KeBugCheckEx
ffffd50e`245f12f0 fffff805`1ba2aed6     : fffff805`6e7a8068 ffffd50e`245f14f0 ffffd50e`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffd50e`245f1330 fffff805`1ba0c960     : 00000000`00000111 00000000`00000011 ffffd50e`245f1650 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffd50e`245f1430 fffff805`1bc03c5e     : ffffffff`fd8190d1 ffffd50e`245f1650 ffffffff`ffff0850 00000000`00000001 : nt!MmAccessFault+0x400
ffffd50e`245f15d0 fffff805`6e7a8068     : 00000000`00000000 00000000`00000000 00000000`00000212 ffffd782`9f785bf0 : nt!KiPageFault+0x35e
ffffd50e`245f1760 00000000`00000000     : 00000000`00000000 00000000`00000212 ffffd782`9f785bf0 ffffd782`aa735a90 : 0xfffff805`6e7a8068


SYMBOL_NAME:  nt!MiCheckSystemNxFault+159368

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  159368

FAILURE_BUCKET_ID:  0xFC_nt!MiCheckSystemNxFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup:     MachineOwner
---------
 
Son düzenleme:
Çözüm
Klavye mouse bunları çıkarınca nasıl kullanacağım onu anlamadım. Yıllardır kullandım donanım BIOS bir yenilim onunla alakalı gibi geliyor ama şu USB ile bağlı olan şeyler mi sebebi onu anlamadım.

BIOS kaynaklıymış sorun sorunsuz çalışıyor sadece şunu da anladım bana denk gelen R5 3600 harbi leşmiş 4.1 üzerine çıkmadı işlemci.
 
Son düzenleyen: Moderatör:

Geri
Yukarı