Çözüldü B550 ve Ryzen 5 2600X Oyunda Mavi Ekran Veriyor

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

thecrowly34

Hectopat
Katılım
10 Haziran 2020
Mesajlar
285
Makaleler
1
Çözümler
3
Merhaba arkadaşlar, eve bir bilgisayar daha topladık. Sistem özellikleri şöyle: B550 ASUS TUF Gaming, 3060 Ti, 750W +80 Power, 2x8GB 3600MHz RAM, Ryzen 5 2600X. Anakartı aldıgımda işlemciyi desteklemediğini biliyordum ama şanşımı denemek istedim ve ekran geliyor sıkıntısız ama oyunlarda mavi ekran veriyor ve oyundan atıyor. Aklımda şüphe kalmaması adına soruyorum bunu: Anakart ile işlemci nesli uyumsuzluğundan mı yapar veya başka bir sıkıntı olabilir mi?
 
Çözüm
Peki, hepsini deneyip uyguladıktan sonra belirtirsiniz artık. Ben bekliyorum geri dönüşünüzü. :)

Hocam denemeye kalmadan ekran kartına alıcı geldi yarın yeni ekran kartı aldıktan sonar test edeceğim ve dediğiniz her şeyi bilgilendirme amaçlı yazıyorum, yarın güncelleyeceğim. Cok teşekkür ederim.

Peki, hepsini deneyip uyguladıktan sonra belirtirsiniz artık. Ben bekliyorum geri dönüşünüzü. :)

Hocam dediğiniz her şeyi yaptım tekrar aynı hatalar devam etti, arkadaştan ödünç alarak 3600X işlemciyle denedm sorun kalktı. Bütün sorun işlemci anakart uyumsuzluğundanmış. Cok sağ olun.
Yani evet, işlemci destek listesinde en düşük Ryzen 3 3100 yer alıyor fakat yine de incelememiz için minidump dosyalarınızı paylaşabilirsiniz. (Yine de dediğim gibi sorunun kaynağı bu olabilir ki siz de belirtmişsiniz.)

Anakart destek listesi: TUF GAMING B550-PLUS İşlemci Desteği | Anakart | ASUS Türkiye

Minidump rehberi: Minidump Dosyalarını Paylaşın
Tabii ki, buyurun. Üç adet minidump dosyası vardı.

Desktop - Google Drive
 
1) BattlEye kaldırın.

2) CFosSpeed kaldırın.

3) MSI Afterburner kaldırın.

4) CPU-Z kaldırın.

5) Kaspersky kaldırın.

6) PUBG'nin Anti-Cheat yazılımını kaldırın, olmazsa oynamayın.

7) BIOS güncelleyin. Aşırı derecede eski bir BIOS sürümündesiniz.

8) Aşağıdaki sürücüyü indirip kurun.(LAN)

9) HWiNFO yazılımı kurdunuz mu? Kurdursanız kaldırın.

10) Aşağıdaki rehberi uygulayıp sonucun ekran alıntısını paylaşın.

NOT: Lütfen 3. parti sürücü güncelleştirici yazılımlardan herhangi birini kullanıp kullanmadığınızı belirtin.

NOT: Sorun çözülürse çözüm olarak seçmeyi, çözülmezse de yeni minidump dosyanızı paylaşmayı unutmayın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80030815173, Address of the instruction which caused the bugcheck
Arg3: ffffae8e5c9e18a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19700

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80030815173

BUGCHECK_P3: ffffae8e5c9e18a0

BUGCHECK_P4: 0

CONTEXT:  ffffae8e5c9e18a0 -- (.cxr 0xffffae8e5c9e18a0)
rax=00000000ffffffff rbx=0000008000000000 rcx=0000008000000000
rdx=0000000000000008 rsi=ffff8b850256e330 rdi=00000000000000e3
rip=fffff80030815173 rsp=ffffae8e5c9e22a0 rbp=ffff8b84e2afb0c0
r8=0000000000000001  r9=0000000000000000 r10=0000fffff800308b
r11=ffffcc7b47600000 r12=0000000000000000 r13=00000000000000a8
r14=ffff8b850256e330 r15=0000008000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!PspDereferenceQuotaBlock+0x1b:
fffff800`30815173 f00fc18100020000 lock xadd dword ptr [rcx+200h],eax ds:002b:00000080`00000200=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffffae8e`5c9e22a0 fffff800`307fb19f     : ffff8b85`0256e350 ffff8b85`0256e330 00000000`000000e3 fffff800`3044caf2 : nt!PspDereferenceQuotaBlock+0x1b
ffffae8e`5c9e22d0 fffff800`307faef8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x24f
ffffae8e`5c9e2330 fffff800`30461277     : 00000000`00000000 00000000`00000000 ffffae8e`5c9e2600 ffff8b85`0256e380 : nt!ObpRemoveObjectRoutine+0x88
ffffae8e`5c9e2390 fffff800`3046119e     : ffff8b84`fd732a70 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7
ffffae8e`5c9e23d0 fffff800`30800c76     : ffffae8e`5c9e2600 ffff8b84`fbe1a2c0 ffff8b84`fd732a40 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffffae8e`5c9e2400 fffff800`307faef0     : ffffae8e`5c9e2609 00000000`00000000 ffff8b84`e2afcf00 ffff8b84`fbe1a2c0 : nt!IopDeleteFile+0x226
ffffae8e`5c9e2480 fffff800`30461277     : 00000000`00000000 00000000`00000000 ffffae8e`5c9e2609 ffff8b84`fd732a70 : nt!ObpRemoveObjectRoutine+0x80
ffffae8e`5c9e24e0 fffff800`3082887e     : ffff8b84`e2afcf00 00000000`00000000 00000000`00000000 ffff8b84`e2afcf00 : nt!ObfDereferenceObjectWithTag+0xc7
ffffae8e`5c9e2520 fffff800`307d5f55     : ffff8b84`f2b4e098 fffff800`30461569 ffff8b84`f2b4e060 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffae8e`5c9e2660 fffff800`307d823d     : ffff8b84`f2b4e060 ffff8b84`fb2c0080 ffffffff`ffffff01 ffff8b84`ff1e34d8 : nt!ExSweepHandleTable+0xd5
ffffae8e`5c9e2710 fffff800`3085d6dc     : ffffffff`ffffffff ffff8b84`ff1e3080 ffffae8e`5c9e2760 fffff800`308655dc : nt!ObKillProcess+0x35
ffffae8e`5c9e2740 fffff800`30906596     : ffff8b84`ff1e3080 ffffb30c`a8e1e5f0 ffffae8e`5c9e2990 00000000`00000000 : nt!PspRundownSingleProcess+0x204
ffffae8e`5c9e27d0 fffff800`308d22e8     : 00000201`00000000 00000000`00000001 ffffae8e`5c9e29e0 000000d3`f57d4000 : nt!PspExitThread+0x5f6
ffffae8e`5c9e28d0 fffff800`30467fb7     : 00000000`40910088 00000000`00000000 00000000`00000000 fffff800`3040ecc6 : nt!KiSchedulerApcTerminate+0x38
ffffae8e`5c9e2910 fffff800`305f9d20     : 000000d3`f77ff8b8 ffffae8e`5c9e29c0 ffffae8e`5c9e2b80 000002c5`00000000 : nt!KiDeliverApc+0x487
ffffae8e`5c9e29c0 fffff800`3060725f     : ffff8b84`fb2c0080 ffff8b85`02fc3660 ffffae8e`5c9e2b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffae8e`5c9e2b00 00007ff8`ae8cc034     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000d3`f77ff888 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`ae8cc034


SYMBOL_NAME:  nt!PspDereferenceQuotaBlock+1b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xffffae8e5c9e18a0 ; kb

BUCKET_ID_FUNC_OFFSET:  1b

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!PspDereferenceQuotaBlock

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7a45ee28-7cce-d9df-0178-12f4a9caa1f3}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff93cc0ce64240, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffff93cc0ce64240, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11405

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 24043

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff93cc0ce64240

BUGCHECK_P2: 10

BUGCHECK_P3: ffff93cc0ce64240

BUGCHECK_P4: 2

READ_ADDRESS: fffff8047e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047e40f330: Unable to get Flags value from nt!KdVersionBlock
fffff8047e40f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff93cc0ce64240

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffffe10e61d1ded0 -- (.trap 0xffffe10e61d1ded0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0854a2a4080 rbx=0000000000000000 rcx=ffff939180649af0
rdx=ffffe10e61d1e240 rsi=0000000000000000 rdi=0000000000000000
rip=ffff93cc0ce64240 rsp=ffffe10e61d1e068 rbp=ffffe10e61d1e0b0
r8=ffffe10e61d1e050  r9=000000000000002f r10=fffff8047da609e0
r11=ffff86f977600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffff93cc`0ce64240 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
ffff93cc`0ce64240 ??              ???

STACK_TEXT:
ffffe10e`61d1dc28 fffff804`7dc1e8bb     : 00000000`00000050 ffff93cc`0ce64240 00000000`00000010 ffffe10e`61d1ded0 : nt!KeBugCheckEx
ffffe10e`61d1dc30 fffff804`7da0c960     : 00000000`00000000 00000000`00000010 ffffe10e`61d1df50 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffe10e`61d1dd30 fffff804`7dc0395e     : ffffe10e`61d1dee8 ffff86f9`77600000 fffff804`7dbf1e30 ffff93cc`0c1e04e6 : nt!MmAccessFault+0x400
ffffe10e`61d1ded0 ffff93cc`0ce64240     : ffff93cc`0be60982 ffffe10e`61d1e280 00000000`00989680 ffffe10e`61d1e1a0 : nt!KiPageFault+0x35e
ffffe10e`61d1e068 ffff93cc`0be60982     : ffffe10e`61d1e280 00000000`00989680 ffffe10e`61d1e1a0 000002a0`000006ec : 0xffff93cc`0ce64240
ffffe10e`61d1e070 ffff93cc`0bfc8985     : 000002a0`000006ec 000002a0`000006ec ffff9391`806067e8 00000000`00000000 : win32kbase!CMouseProcessor::ProcessMouseInputData+0xba
ffffe10e`61d1e0f0 ffff93cc`0bfb9baa     : ffff9391`806067d0 ffff93cc`0bfb9c95 ffffd085`45ac90c8 ffff9391`806062d0 : win32kbase!CMouseProcessor::ProcessInput+0x549
ffffe10e`61d1e330 ffff93cc`0bfb9f13     : ffff9391`806062d0 00000077`5111f3ff ffff9391`806067d0 ffffd085`45ac90c8 : win32kbase!CMouseSensor::FlushMouseReports+0x42
ffffe10e`61d1e370 ffff93cc`0bfb9e44     : ffff9391`84677050 00000000`00000018 ffff9391`80606200 ffff9391`806062d0 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0xb3
ffffe10e`61d1e3c0 ffff93cc`0bfac04a     : ffff93cc`0c010700 ffffe10e`61d1e500 ffff9391`806062d0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x54
ffffe10e`61d1e400 ffff93cc`0be64c1d     : 00000000`00000040 ffff93cc`0c010700 00000000`00000001 ffff9391`806479c0 : win32kbase!CBaseInput::OnReadNotification+0x52a
ffffe10e`61d1e540 ffff93cc`0be64d52     : ffffd085`4a2a4080 ffff9391`806479c0 00000000`00000006 ffff1496`a37a88a0 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
ffffe10e`61d1e680 ffff93cc`0be586de     : ffff93cc`0c0582a0 ffff9391`806479c0 ffff93cc`0c051970 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffffe10e`61d1e6b0 ffff93cc`0be58430     : 00000000`00000006 ffff93cc`0c0582a0 00000000`00000006 ffff9391`806479c0 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffffe10e`61d1e6e0 ffff93cc`0c1a07a8     : ffff9391`80620960 ffff9391`80620960 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
ffffe10e`61d1e810 ffff93cc`0c1a0374     : 00000000`00000004 00000000`00000004 00000000`0000000d ffff93cc`0c059a70 : win32kfull!xxxDesktopThreadWaiter+0x130
ffffe10e`61d1e890 ffff93cc`0bec60c3     : ffffd085`4a2a4080 ffffd085`4a2a4080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
ffffe10e`61d1e970 ffff93cc`0c138d80     : ffffd085`4a2a4080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffe10e`61d1eaa0 ffff93cc`0c6a474d     : ffffd085`4a2a4080 ffffd085`4a2a4080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffe10e`61d1ead0 fffff804`7dc071b8     : ffffd085`00000005 00000000`00000005 00000255`94c04140 00000000`00001d14 : win32k!NtUserCallNoParam+0x15
ffffe10e`61d1eb00 00007ffe`1deb10e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c0`5b5ff858 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1deb10e4


SYMBOL_NAME:  win32kbase!CMouseProcessor::ProcessMouseInputData+ba

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ba

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_win32kbase!CMouseProcessor::ProcessMouseInputData

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {40e69f4a-c754-e8fe-9604-8471585f3f8c}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb97dae752138, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8015960cfcb, address which referenced memory

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9718

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15737

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffb97dae752138

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8015960cfcb

READ_ADDRESS: fffff8015a0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8015a00f330: Unable to get Flags value from nt!KdVersionBlock
fffff8015a00f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb97dae752138

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffff8c869b1c6740 -- (.trap 0xffff8c869b1c6740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb97dae752080 rbx=0000000000000000 rcx=0000017c2a5f0000
rdx=ffff00000000ffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015960cfcb rsp=ffff8c869b1c68d0 rbp=ffffb90dae40f7c0
r8=0000000000121582  r9=000000000000462d r10=fffff8015a050b40
r11=ffffb90dae40f080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiUserFault+0x38b:
fffff801`5960cfcb 488b98b8000000  mov     rbx,qword ptr [rax+0B8h] ds:ffffb97d`ae752138=????????????????
Resetting default scope

STACK_TEXT:
ffff8c86`9b1c65f8 fffff801`59807769     : 00000000`0000000a ffffb97d`ae752138 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8c86`9b1c6600 fffff801`59803a69     : ffffa58e`b0a00301 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8c86`9b1c6740 fffff801`5960cfcb     : 00000000`00000000 ffffb90d`ae40f080 ffffb90d`ae40f080 00000000`00000001 : nt!KiPageFault+0x469
ffff8c86`9b1c68d0 fffff801`5960c6ca     : 00000000`00000000 ffffb90d`00000000 ffff8450`c5f50000 00000000`00000000 : nt!MiUserFault+0x38b
ffff8c86`9b1c6960 fffff801`5980395e     : ffffb90d`ae552080 00000000`000003e8 00000000`00000000 00000000`00000250 : nt!MmAccessFault+0x16a
ffff8c86`9b1c6b00 00007ffd`6f1d93ba     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000003`a56ff580 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6f1d93ba


SYMBOL_NAME:  nt!MiUserFault+38b

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  38b

FAILURE_BUCKET_ID:  AV_nt!MiUserFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ebaa4318-8301-ca38-45f3-29102df77128}

Followup:     MachineOwner
---------
 
1) BattlEye kaldırın.

2) CFosSpeed kaldırın.

3) MSI Afterburner kaldırın.

4) CPU-Z kaldırın.

5) Kaspersky kaldırın.

6) PUBG'nin Anti-Cheat yazılımını kaldırın, olmazsa oynamayın.

7) BIOS güncelleyin. Aşırı derecede eski bir BIOS sürümündesiniz.

8) Aşağıdaki sürücüyü indirip kurun.(LAN)

9) HWiNFO yazılımı kurdunuz mu? Kurdursanız kaldırın.

10) Aşağıdaki rehberi uygulayıp sonucun ekran alıntısını paylaşın.

NOT: Lütfen 3. parti sürücü güncelleştirici yazılımlardan herhangi birini kullanıp kullanmadığınızı belirtin.

NOT: Sorun çözülürse çözüm olarak seçmeyi, çözülmezse de yeni minidump dosyanızı paylaşmayı unutmayın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80030815173, Address of the instruction which caused the bugcheck
Arg3: ffffae8e5c9e18a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19700

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80030815173

BUGCHECK_P3: ffffae8e5c9e18a0

BUGCHECK_P4: 0

CONTEXT:  ffffae8e5c9e18a0 -- (.cxr 0xffffae8e5c9e18a0)
rax=00000000ffffffff rbx=0000008000000000 rcx=0000008000000000
rdx=0000000000000008 rsi=ffff8b850256e330 rdi=00000000000000e3
rip=fffff80030815173 rsp=ffffae8e5c9e22a0 rbp=ffff8b84e2afb0c0
r8=0000000000000001  r9=0000000000000000 r10=0000fffff800308b
r11=ffffcc7b47600000 r12=0000000000000000 r13=00000000000000a8
r14=ffff8b850256e330 r15=0000008000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!PspDereferenceQuotaBlock+0x1b:
fffff800`30815173 f00fc18100020000 lock xadd dword ptr [rcx+200h],eax ds:002b:00000080`00000200=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffffae8e`5c9e22a0 fffff800`307fb19f     : ffff8b85`0256e350 ffff8b85`0256e330 00000000`000000e3 fffff800`3044caf2 : nt!PspDereferenceQuotaBlock+0x1b
ffffae8e`5c9e22d0 fffff800`307faef8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x24f
ffffae8e`5c9e2330 fffff800`30461277     : 00000000`00000000 00000000`00000000 ffffae8e`5c9e2600 ffff8b85`0256e380 : nt!ObpRemoveObjectRoutine+0x88
ffffae8e`5c9e2390 fffff800`3046119e     : ffff8b84`fd732a70 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7
ffffae8e`5c9e23d0 fffff800`30800c76     : ffffae8e`5c9e2600 ffff8b84`fbe1a2c0 ffff8b84`fd732a40 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffffae8e`5c9e2400 fffff800`307faef0     : ffffae8e`5c9e2609 00000000`00000000 ffff8b84`e2afcf00 ffff8b84`fbe1a2c0 : nt!IopDeleteFile+0x226
ffffae8e`5c9e2480 fffff800`30461277     : 00000000`00000000 00000000`00000000 ffffae8e`5c9e2609 ffff8b84`fd732a70 : nt!ObpRemoveObjectRoutine+0x80
ffffae8e`5c9e24e0 fffff800`3082887e     : ffff8b84`e2afcf00 00000000`00000000 00000000`00000000 ffff8b84`e2afcf00 : nt!ObfDereferenceObjectWithTag+0xc7
ffffae8e`5c9e2520 fffff800`307d5f55     : ffff8b84`f2b4e098 fffff800`30461569 ffff8b84`f2b4e060 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffae8e`5c9e2660 fffff800`307d823d     : ffff8b84`f2b4e060 ffff8b84`fb2c0080 ffffffff`ffffff01 ffff8b84`ff1e34d8 : nt!ExSweepHandleTable+0xd5
ffffae8e`5c9e2710 fffff800`3085d6dc     : ffffffff`ffffffff ffff8b84`ff1e3080 ffffae8e`5c9e2760 fffff800`308655dc : nt!ObKillProcess+0x35
ffffae8e`5c9e2740 fffff800`30906596     : ffff8b84`ff1e3080 ffffb30c`a8e1e5f0 ffffae8e`5c9e2990 00000000`00000000 : nt!PspRundownSingleProcess+0x204
ffffae8e`5c9e27d0 fffff800`308d22e8     : 00000201`00000000 00000000`00000001 ffffae8e`5c9e29e0 000000d3`f57d4000 : nt!PspExitThread+0x5f6
ffffae8e`5c9e28d0 fffff800`30467fb7     : 00000000`40910088 00000000`00000000 00000000`00000000 fffff800`3040ecc6 : nt!KiSchedulerApcTerminate+0x38
ffffae8e`5c9e2910 fffff800`305f9d20     : 000000d3`f77ff8b8 ffffae8e`5c9e29c0 ffffae8e`5c9e2b80 000002c5`00000000 : nt!KiDeliverApc+0x487
ffffae8e`5c9e29c0 fffff800`3060725f     : ffff8b84`fb2c0080 ffff8b85`02fc3660 ffffae8e`5c9e2b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffae8e`5c9e2b00 00007ff8`ae8cc034     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000d3`f77ff888 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`ae8cc034


SYMBOL_NAME:  nt!PspDereferenceQuotaBlock+1b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xffffae8e5c9e18a0 ; kb

BUCKET_ID_FUNC_OFFSET:  1b

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!PspDereferenceQuotaBlock

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7a45ee28-7cce-d9df-0178-12f4a9caa1f3}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff93cc0ce64240, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffff93cc0ce64240, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11405

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 24043

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff93cc0ce64240

BUGCHECK_P2: 10

BUGCHECK_P3: ffff93cc0ce64240

BUGCHECK_P4: 2

READ_ADDRESS: fffff8047e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047e40f330: Unable to get Flags value from nt!KdVersionBlock
fffff8047e40f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff93cc0ce64240

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffffe10e61d1ded0 -- (.trap 0xffffe10e61d1ded0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0854a2a4080 rbx=0000000000000000 rcx=ffff939180649af0
rdx=ffffe10e61d1e240 rsi=0000000000000000 rdi=0000000000000000
rip=ffff93cc0ce64240 rsp=ffffe10e61d1e068 rbp=ffffe10e61d1e0b0
r8=ffffe10e61d1e050  r9=000000000000002f r10=fffff8047da609e0
r11=ffff86f977600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffff93cc`0ce64240 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
ffff93cc`0ce64240 ??              ???

STACK_TEXT:
ffffe10e`61d1dc28 fffff804`7dc1e8bb     : 00000000`00000050 ffff93cc`0ce64240 00000000`00000010 ffffe10e`61d1ded0 : nt!KeBugCheckEx
ffffe10e`61d1dc30 fffff804`7da0c960     : 00000000`00000000 00000000`00000010 ffffe10e`61d1df50 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffe10e`61d1dd30 fffff804`7dc0395e     : ffffe10e`61d1dee8 ffff86f9`77600000 fffff804`7dbf1e30 ffff93cc`0c1e04e6 : nt!MmAccessFault+0x400
ffffe10e`61d1ded0 ffff93cc`0ce64240     : ffff93cc`0be60982 ffffe10e`61d1e280 00000000`00989680 ffffe10e`61d1e1a0 : nt!KiPageFault+0x35e
ffffe10e`61d1e068 ffff93cc`0be60982     : ffffe10e`61d1e280 00000000`00989680 ffffe10e`61d1e1a0 000002a0`000006ec : 0xffff93cc`0ce64240
ffffe10e`61d1e070 ffff93cc`0bfc8985     : 000002a0`000006ec 000002a0`000006ec ffff9391`806067e8 00000000`00000000 : win32kbase!CMouseProcessor::ProcessMouseInputData+0xba
ffffe10e`61d1e0f0 ffff93cc`0bfb9baa     : ffff9391`806067d0 ffff93cc`0bfb9c95 ffffd085`45ac90c8 ffff9391`806062d0 : win32kbase!CMouseProcessor::ProcessInput+0x549
ffffe10e`61d1e330 ffff93cc`0bfb9f13     : ffff9391`806062d0 00000077`5111f3ff ffff9391`806067d0 ffffd085`45ac90c8 : win32kbase!CMouseSensor::FlushMouseReports+0x42
ffffe10e`61d1e370 ffff93cc`0bfb9e44     : ffff9391`84677050 00000000`00000018 ffff9391`80606200 ffff9391`806062d0 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0xb3
ffffe10e`61d1e3c0 ffff93cc`0bfac04a     : ffff93cc`0c010700 ffffe10e`61d1e500 ffff9391`806062d0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x54
ffffe10e`61d1e400 ffff93cc`0be64c1d     : 00000000`00000040 ffff93cc`0c010700 00000000`00000001 ffff9391`806479c0 : win32kbase!CBaseInput::OnReadNotification+0x52a
ffffe10e`61d1e540 ffff93cc`0be64d52     : ffffd085`4a2a4080 ffff9391`806479c0 00000000`00000006 ffff1496`a37a88a0 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
ffffe10e`61d1e680 ffff93cc`0be586de     : ffff93cc`0c0582a0 ffff9391`806479c0 ffff93cc`0c051970 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffffe10e`61d1e6b0 ffff93cc`0be58430     : 00000000`00000006 ffff93cc`0c0582a0 00000000`00000006 ffff9391`806479c0 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffffe10e`61d1e6e0 ffff93cc`0c1a07a8     : ffff9391`80620960 ffff9391`80620960 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
ffffe10e`61d1e810 ffff93cc`0c1a0374     : 00000000`00000004 00000000`00000004 00000000`0000000d ffff93cc`0c059a70 : win32kfull!xxxDesktopThreadWaiter+0x130
ffffe10e`61d1e890 ffff93cc`0bec60c3     : ffffd085`4a2a4080 ffffd085`4a2a4080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
ffffe10e`61d1e970 ffff93cc`0c138d80     : ffffd085`4a2a4080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffe10e`61d1eaa0 ffff93cc`0c6a474d     : ffffd085`4a2a4080 ffffd085`4a2a4080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffe10e`61d1ead0 fffff804`7dc071b8     : ffffd085`00000005 00000000`00000005 00000255`94c04140 00000000`00001d14 : win32k!NtUserCallNoParam+0x15
ffffe10e`61d1eb00 00007ffe`1deb10e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c0`5b5ff858 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1deb10e4


SYMBOL_NAME:  win32kbase!CMouseProcessor::ProcessMouseInputData+ba

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ba

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_win32kbase!CMouseProcessor::ProcessMouseInputData

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {40e69f4a-c754-e8fe-9604-8471585f3f8c}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb97dae752138, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8015960cfcb, address which referenced memory

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9718

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15737

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffb97dae752138

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8015960cfcb

READ_ADDRESS: fffff8015a0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8015a00f330: Unable to get Flags value from nt!KdVersionBlock
fffff8015a00f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb97dae752138

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffff8c869b1c6740 -- (.trap 0xffff8c869b1c6740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb97dae752080 rbx=0000000000000000 rcx=0000017c2a5f0000
rdx=ffff00000000ffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015960cfcb rsp=ffff8c869b1c68d0 rbp=ffffb90dae40f7c0
r8=0000000000121582  r9=000000000000462d r10=fffff8015a050b40
r11=ffffb90dae40f080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiUserFault+0x38b:
fffff801`5960cfcb 488b98b8000000  mov     rbx,qword ptr [rax+0B8h] ds:ffffb97d`ae752138=????????????????
Resetting default scope

STACK_TEXT:
ffff8c86`9b1c65f8 fffff801`59807769     : 00000000`0000000a ffffb97d`ae752138 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8c86`9b1c6600 fffff801`59803a69     : ffffa58e`b0a00301 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8c86`9b1c6740 fffff801`5960cfcb     : 00000000`00000000 ffffb90d`ae40f080 ffffb90d`ae40f080 00000000`00000001 : nt!KiPageFault+0x469
ffff8c86`9b1c68d0 fffff801`5960c6ca     : 00000000`00000000 ffffb90d`00000000 ffff8450`c5f50000 00000000`00000000 : nt!MiUserFault+0x38b
ffff8c86`9b1c6960 fffff801`5980395e     : ffffb90d`ae552080 00000000`000003e8 00000000`00000000 00000000`00000250 : nt!MmAccessFault+0x16a
ffff8c86`9b1c6b00 00007ffd`6f1d93ba     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000003`a56ff580 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6f1d93ba


SYMBOL_NAME:  nt!MiUserFault+38b

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  38b

FAILURE_BUCKET_ID:  AV_nt!MiUserFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ebaa4318-8301-ca38-45f3-29102df77128}

Followup:     MachineOwner
---------
Hemen deneyi yazacağım hocam
 
Peki, hepsini deneyip uyguladıktan sonra belirtirsiniz artık. Ben bekliyorum geri dönüşünüzü. :)

Hocam denemeye kalmadan ekran kartına alıcı geldi yarın yeni ekran kartı aldıktan sonar test edeceğim ve dediğiniz her şeyi bilgilendirme amaçlı yazıyorum, yarın güncelleyeceğim. Cok teşekkür ederim.

Peki, hepsini deneyip uyguladıktan sonra belirtirsiniz artık. Ben bekliyorum geri dönüşünüzü. :)

Hocam dediğiniz her şeyi yaptım tekrar aynı hatalar devam etti, arkadaştan ödünç alarak 3600X işlemciyle denedm sorun kalktı. Bütün sorun işlemci anakart uyumsuzluğundanmış. Cok sağ olun.
 
Son düzenleme:
Çözüm

Geri
Yukarı