Çözüldü Farklı frekanslarda belleklere sahip sistem oyunlarda mavi ekran veriyor

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 11

mehmethan91

Zeptopat
Katılım
8 Temmuz 2023
Mesajlar
2
Daha fazla  
Cinsiyet
Erkek
RAM
G.Skill RipjawsV 16GB 3200MHz DDR4 Ram
SSD veya HDD modeli
WD BLUE SA510 500GB 560-530MB/s Sata3 SSD WDS500G3
Ekran kartı
zotac 3060 eagle 12 gb twin edge
Anakart
A320M PRO-E
İşlemci
AMD Ryzen 5 5600 6-Core Processor
Bazı oyunlarda crash verip atıyor bazılarında hata dahi vermeden atıyor arada mavi ekran veremeyede başladı.
08.07.2023 Tarihinde Paylaşılan Öğeler dump dosyaları.

1.RAM: G.Skill RipjawsV 16GB 3200MHz DDR4
2. RAM: Crucial Ballistix 8 GB 2400MHz DDR4 bls8g4D240FSBk
 
Son düzenleyen: Moderatör:
Çözüm
* Dökümlerin ikisi RAM, bir diğeri ise EasyAntiCheat_EOS.sys sebebiyle kaynaklanmış.

* 2 farklı RAM kullanmanız sorun oluşturuyor olabilir. Çünkü bu RAM'lerdeki CL, frekans, timing, voltaj vb. değerlerin farklılığı sistemde uyumsuzluğa, stabilitenin bozulmasına sebebiyet verebilir. Benim önerim elinizdeki RAM'leri satıp kit şeklinde 2x8 GB almanız olacaktır.

* EasyAntiCheat çözümüne gelecek olursak:

* Görev yöneticisinde EAC ile alakalı ne varsa hepsini sonlandırın.

- Bu anti-hileyi tamamen temizleyip tekrar yükleyin.
- Mesela Steam'de Apex Legends EasyAntiCheat kullanıyor.
- Steam'den Apex dizinine gidip oradaki EasyAntiCheat dosyasını kaldırabilirsiniz.
- Daha sonra Apex'e sağ tıklayıp "oyun dosyalarının bütünlüğünü doğrula" yapabilirsiniz.
- Veya direkt oyunun kendisine girmeye çalışınca otomatik indirecek.
- Bende Apex olduğu için örnek olarak verdim, sizde EasyAntiCheat kullanan hangi oyunlar varsa onların her birine tek tek bu işlemleri yapın.


* BIOS güncelleyin.
* 7A36vH74(Beta version) sürümünü kullanıyorsunuz.
* 7A36vH75(Beta version) olana güncelleyebilirsiniz.


* Güncelledikten sonra BIOS'a girip F6'ya basın ve gelen "Load optimized defaults?" sorusuna Yes deyip çıkın, sonra tekrar BIOS'a girin ve ayarlarınızı yapın (RAM XMP profili açma, fan profilleri vs.)

1687879969444.png


* VIDEO REHBER: MSI BIOS Güncelleme


* Chipset sürücülerini güncelleyin.
  • Denetim masası > Program ekle / kaldırdan "AMD Chipset Software" silin.
  • Aşağıdan güncel olanı indirin ama kurmayın.
  • İndirdikten sonra interneti kesin ve PC'yi yeniden başlatın.
  • PC açılınca yeni chipset sürücülerini kurun.
  • İnterneti bağlayabilirsiniz.

Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000eac, Type of memory safety violation
Arg2: ffff828e8018b700, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff828e8018b658, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for EasyAntiCheat_EOS.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1780

    Key  : Analysis.Elapsed.mSec
    Value: 7482

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 156

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3409

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 154

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x139

    Key  : FailFast.Type
    Value: 3756

    Key  : Failure.Bucket
    Value: 0x139_MISSING_GSFRAME_EasyAntiCheat_EOS!unknown_function

    Key  : Failure.Hash
    Value: {dde04553-d42f-b4d7-f06a-e1871a067075}

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Version
    Value: 10.0.22621.1


BUGCHECK_CODE:  139

BUGCHECK_P1: eac

BUGCHECK_P2: ffff828e8018b700

BUGCHECK_P3: ffff828e8018b658

BUGCHECK_P4: 0

FILE_IN_CAB:  070423-7484-01.dmp

TRAP_FRAME:  ffff828e8018b700 -- (.trap 0xffff828e8018b700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffffb7d5fe0 rbx=0000000000000000 rcx=0000000000000eac
rdx=ffffffffffffffc1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8078e2fca4d rsp=ffff828e8018b898 rbp=0000000000000000
 r8=0000000000000048  r9=0000000000000000 r10=ffffb78f40865300
r11=fffff8078ddd1e11 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
EasyAntiCheat_EOS+0xafca4d:
fffff807`8e2fca4d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff828e8018b658 -- (.exr 0xffff828e8018b658)
ExceptionAddress: fffff8078e2fca4d (EasyAntiCheat_EOS+0x0000000000afca4d)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000eac
Subcode: 0xeac (unknown subcode)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000eac

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff828e`8018b3d8 fffff807`24e418a9     : 00000000`00000139 00000000`00000eac ffff828e`8018b700 ffff828e`8018b658 : nt!KeBugCheckEx
ffff828e`8018b3e0 fffff807`24e41e32     : 00000000`0bdcb883 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff828e`8018b520 fffff807`24e3fc06     : f7bf26b5`f762944e fd108d9b`f1305472 0000e85a`f3b1ba67 f3025ab7`00323d71 : nt!KiFastFailDispatch+0xb2
ffff828e`8018b700 fffff807`8e2fca4d     : fa019978`feff56d4 0001110c`ffd7b90f f4c0f62d`fa6da6f9 00778b55`f755a35f : nt!KiRaiseSecurityCheckFailure+0x346
ffff828e`8018b898 fa019978`feff56d4     : 0001110c`ffd7b90f f4c0f62d`fa6da6f9 00778b55`f755a35f ff591613`f6fdf370 : EasyAntiCheat_EOS+0xafca4d
ffff828e`8018b8a0 0001110c`ffd7b90f     : f4c0f62d`fa6da6f9 00778b55`f755a35f ff591613`f6fdf370 fb844d47`ff58944a : 0xfa019978`feff56d4
ffff828e`8018b8a8 f4c0f62d`fa6da6f9     : 00778b55`f755a35f ff591613`f6fdf370 fb844d47`ff58944a ffffffff`50200dba : 0x0001110c`ffd7b90f
ffff828e`8018b8b0 00778b55`f755a35f     : ff591613`f6fdf370 fb844d47`ff58944a ffffffff`50200dba ffe11476`f8a7f6c0 : 0xf4c0f62d`fa6da6f9
ffff828e`8018b8b8 ff591613`f6fdf370     : fb844d47`ff58944a ffffffff`50200dba ffe11476`f8a7f6c0 f654bea0`ffced61c : 0x00778b55`f755a35f
ffff828e`8018b8c0 fb844d47`ff58944a     : ffffffff`50200dba ffe11476`f8a7f6c0 f654bea0`ffced61c fffff807`8d800000 : 0xff591613`f6fdf370
ffff828e`8018b8c8 ffffffff`50200dba     : ffe11476`f8a7f6c0 f654bea0`ffced61c fffff807`8d800000 00000000`00000000 : 0xfb844d47`ff58944a
ffff828e`8018b8d0 ffe11476`f8a7f6c0     : f654bea0`ffced61c fffff807`8d800000 00000000`00000000 00000000`00000000 : 0xffffffff`50200dba
ffff828e`8018b8d8 f654bea0`ffced61c     : fffff807`8d800000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffe11476`f8a7f6c0
ffff828e`8018b8e0 fffff807`8d800000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xf654bea0`ffced61c
ffff828e`8018b8e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : EasyAntiCheat_EOS


SYMBOL_NAME:  EasyAntiCheat_EOS+afca4d

MODULE_NAME: EasyAntiCheat_EOS

IMAGE_NAME:  EasyAntiCheat_EOS.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  afca4d

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_EasyAntiCheat_EOS!unknown_function

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dde04553-d42f-b4d7-f06a-e1871a067075}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffd1000c7e96c0
Arg3: 0000000000000036
Arg4: 0000000000000037

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1156

    Key  : Analysis.Elapsed.mSec
    Value: 3878

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 202

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1321

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 145

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Failure.Bucket
    Value: 0x1a_41790_nt!MiDecreaseUsedPtesCount

    Key  : Failure.Hash
    Value: {3a4e374b-adfe-575c-a9c4-4050eb1047a4}

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Version
    Value: 10.0.22621.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffd1000c7e96c0

BUGCHECK_P3: 36

BUGCHECK_P4: 37

FILE_IN_CAB:  070723-5453-01.dmp

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffff084`9e72ec28 fffff804`62085651     : 00000000`0000001a 00000000`00041790 ffffd100`0c7e96c0 00000000`00000036 : nt!KeBugCheckEx
fffff084`9e72ec30 fffff804`61e7557d     : 00000000`00000000 fffff804`61eb09e5 00000000`0000fb80 00007ffa`f820a000 : nt!MiDecreaseUsedPtesCount+0x26c2d1
fffff084`9e72ec70 fffff804`61e78b48     : 00000000`00000000 fffff084`9e72f320 ffffdebf`fd7c1ff8 00000000`00000000 : nt!MiDeletePteRun+0x7fd
fffff084`9e72ee60 fffff804`61e318e9     : fffff084`9e72f270 ffffdebf`fd7c1ff8 ffff1cbf`90327076 ffffdf83`b99e3700 : nt!MiDeleteVaTail+0x48
fffff084`9e72ee90 fffff804`61e31a2a     : fffff084`00000000 ffffdf83`b99e3700 ffffdeef`00000000 fffff084`9e72f2c0 : nt!MiWalkPageTablesRecursively+0x4e9
fffff084`9e72ef20 fffff804`61e31a2a     : fffff084`9e72f270 ffffdf83`b99e3700 ffffdeef`00000000 fffff084`9e72f2d0 : nt!MiWalkPageTablesRecursively+0x62a
fffff084`9e72efb0 fffff804`61e31a2a     : fffff084`9e72f270 ffffdf83`b99e3700 ffffdeef`00000000 fffff084`9e72f2e0 : nt!MiWalkPageTablesRecursively+0x62a
fffff084`9e72f040 fffff804`61e48de1     : ffffdeef`77bbdde8 ffffdf83`b99e3700 00000000`00000000 fffff084`9e72f2f0 : nt!MiWalkPageTablesRecursively+0x62a
fffff084`9e72f0d0 fffff804`61e79ea2     : fffff084`9e72f270 00000000`00000001 00000000`00000002 fffff084`00000000 : nt!MiWalkPageTables+0x371
fffff084`9e72f1d0 fffff804`61e8aeee     : ffffdf83`ae42b080 fffff804`61e843e2 fffff084`9e72f570 ffffdf83`b86518c0 : nt!MiDeletePagablePteRange+0x3c2
fffff084`9e72f4e0 fffff804`622a6417     : 00000000`00000000 00000000`00000001 00000000`00000000 fffff084`9e72f5b0 : nt!MiDeleteVirtualAddresses+0x4e
fffff084`9e72f530 fffff804`62373e4d     : 00007ffa`f69b0000 ffffdf83`b86518c0 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1b7
fffff084`9e72f5f0 fffff804`62373a13     : ffffdf83`b86518c0 00000000`00000000 ffffdf83`ae42b080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff084`9e72f620 fffff804`62288169     : ffffdf83`b8666ea0 ffffdf83`b8666ea0 ffffdf83`b8666ea0 ffffdf83`b99e3080 : nt!MiCleanVad+0x2f
fffff084`9e72f650 fffff804`622dd159     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdf83`b99e3080 : nt!MmCleanProcessAddressSpace+0x10d
fffff084`9e72f6d0 fffff804`62304fea     : ffffdf83`b99e3080 ffff8008`935c18f0 fffff084`9e72f8f9 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
fffff084`9e72f760 fffff804`623062b8     : fffff084`00000000 fffff804`62035701 ffffdf83`ae42b0f4 00000013`19a9f000 : nt!PspExitThread+0x64e
fffff084`9e72f860 fffff804`61f1350d     : 417057f6`60d4fdf4 00000000`00000000 3ff19999`9999999a ffff9081`2815f180 : nt!KiSchedulerApcTerminate+0x38
fffff084`9e72f8a0 fffff804`62032420     : 00000000`00000001 fffff084`9e72f960 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x47d
fffff084`9e72f960 fffff804`6204108f     : ffffdf83`ae42b080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff084`9e72faa0 00007ffb`904cecd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000013`23bff168 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`904cecd4


SYMBOL_NAME:  nt!MiDecreaseUsedPtesCount+26c2d1

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.1848

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  26c2d1

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDecreaseUsedPtesCount

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3a4e374b-adfe-575c-a9c4-4050eb1047a4}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffdd, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff801196d5a9c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1187

    Key  : Analysis.Elapsed.mSec
    Value: 7724

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1210

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 151

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_R_(null)_nt!PspExitThread

    Key  : Failure.Hash
    Value: {44c252ad-a25b-1ac9-1196-2c90718334fe}

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Version
    Value: 10.0.22621.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffffdd

BUGCHECK_P2: 0

BUGCHECK_P3: fffff801196d5a9c

BUGCHECK_P4: 2

FILE_IN_CAB:  070823-6234-01.dmp

READ_ADDRESS: fffff80119b1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffdd

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SearchHost.exe

TRAP_FRAME:  fffff98d666cf560 -- (.trap 0xfffff98d666cf560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00ffffffffffffff
rdx=ffffa785c0bb6080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801196d5a9c rsp=fffff98d666cf6f0 rbp=fffff98d666cf889
 r8=00000000000000ff  r9=7ffffffffffffffc r10=fffff8011903b9c0
r11=ffffbbff35600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!PspExitThread+0x1d1100:
fffff801`196d5a9c 0fb64be8        movzx   ecx,byte ptr [rbx-18h] ds:ffffffff`ffffffe8=??
Resetting default scope

STACK_TEXT:
fffff98d`666cf338 fffff801`1928d6b9     : 00000000`00000050 ffffffff`ffffffdd 00000000`00000000 fffff98d`666cf560 : nt!KeBugCheckEx
fffff98d`666cf340 fffff801`19033f0c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffdd : nt!MiSystemFault+0x25d1e9
fffff98d`666cf440 fffff801`1923ce29     : fffff801`19506280 00000000`00000502 00000000`00000006 00000000`00000000 : nt!MmAccessFault+0x29c
fffff98d`666cf560 fffff801`196d5a9c     : ffffa785`ba7bc4b8 fffff98d`666cf889 00000000`00000000 ffffa785`c0bb6080 : nt!KiPageFault+0x369
fffff98d`666cf6f0 fffff801`195062b8     : 00000000`00000001 ffffa785`c0bb6000 fffff98d`666cf898 00000000`00000000 : nt!PspExitThread+0x1d1100
fffff98d`666cf7f0 fffff801`1911350d     : 000001db`a5bcc6f8 00000000`fe000000 00000000`00020000 fffff801`194c00c0 : nt!KiSchedulerApcTerminate+0x38
fffff98d`666cf830 fffff801`19232420     : ffffa785`ba70a601 fffff98d`666cf8f0 00000000`00000000 00000000`00010000 : nt!KiDeliverApc+0x47d
fffff98d`666cf8f0 fffff801`1924108f     : ffffa785`c0bb6080 fffff98d`666cfb20 0000000d`e121f488 fffff98d`666cfa48 : nt!KiInitiateUserApc+0x70
fffff98d`666cfa30 00007ffd`105afdc4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000000d`e121f468 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`105afdc4


SYMBOL_NAME:  nt!PspExitThread+1d1100

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.1848

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1d1100

FAILURE_BUCKET_ID:  AV_R_(null)_nt!PspExitThread

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {44c252ad-a25b-1ac9-1196-2c90718334fe}

Followup:     MachineOwner
---------
* Dökümlerin ikisi RAM, bir diğeri ise EasyAntiCheat_EOS.sys sebebiyle kaynaklanmış.

* 2 farklı RAM kullanmanız sorun oluşturuyor olabilir. Çünkü bu RAM'lerdeki CL, frekans, timing, voltaj vb. değerlerin farklılığı sistemde uyumsuzluğa, stabilitenin bozulmasına sebebiyet verebilir. Benim önerim elinizdeki RAM'leri satıp kit şeklinde 2x8 GB almanız olacaktır.

* EasyAntiCheat çözümüne gelecek olursak:

* Görev yöneticisinde EAC ile alakalı ne varsa hepsini sonlandırın.

- Bu anti-hileyi tamamen temizleyip tekrar yükleyin.
- Mesela Steam'de Apex Legends EasyAntiCheat kullanıyor.
- Steam'den Apex dizinine gidip oradaki EasyAntiCheat dosyasını kaldırabilirsiniz.
- Daha sonra Apex'e sağ tıklayıp "oyun dosyalarının bütünlüğünü doğrula" yapabilirsiniz.
- Veya direkt oyunun kendisine girmeye çalışınca otomatik indirecek.
- Bende Apex olduğu için örnek olarak verdim, sizde EasyAntiCheat kullanan hangi oyunlar varsa onların her birine tek tek bu işlemleri yapın.


* BIOS güncelleyin.
* 7A36vH74(Beta version) sürümünü kullanıyorsunuz.
* 7A36vH75(Beta version) olana güncelleyebilirsiniz.


* Güncelledikten sonra BIOS'a girip F6'ya basın ve gelen "Load optimized defaults?" sorusuna Yes deyip çıkın, sonra tekrar BIOS'a girin ve ayarlarınızı yapın (RAM XMP profili açma, fan profilleri vs.)

1687879969444.png


* VIDEO REHBER: MSI BIOS Güncelleme


* Chipset sürücülerini güncelleyin.
  • Denetim masası > Program ekle / kaldırdan "AMD Chipset Software" silin.
  • Aşağıdan güncel olanı indirin ama kurmayın.
  • İndirdikten sonra interneti kesin ve PC'yi yeniden başlatın.
  • PC açılınca yeni chipset sürücülerini kurun.
  • İnterneti bağlayabilirsiniz.

Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000eac, Type of memory safety violation
Arg2: ffff828e8018b700, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff828e8018b658, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for EasyAntiCheat_EOS.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1780

    Key  : Analysis.Elapsed.mSec
    Value: 7482

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 156

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3409

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 154

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x139

    Key  : FailFast.Type
    Value: 3756

    Key  : Failure.Bucket
    Value: 0x139_MISSING_GSFRAME_EasyAntiCheat_EOS!unknown_function

    Key  : Failure.Hash
    Value: {dde04553-d42f-b4d7-f06a-e1871a067075}

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Version
    Value: 10.0.22621.1


BUGCHECK_CODE:  139

BUGCHECK_P1: eac

BUGCHECK_P2: ffff828e8018b700

BUGCHECK_P3: ffff828e8018b658

BUGCHECK_P4: 0

FILE_IN_CAB:  070423-7484-01.dmp

TRAP_FRAME:  ffff828e8018b700 -- (.trap 0xffff828e8018b700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffffb7d5fe0 rbx=0000000000000000 rcx=0000000000000eac
rdx=ffffffffffffffc1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8078e2fca4d rsp=ffff828e8018b898 rbp=0000000000000000
 r8=0000000000000048  r9=0000000000000000 r10=ffffb78f40865300
r11=fffff8078ddd1e11 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
EasyAntiCheat_EOS+0xafca4d:
fffff807`8e2fca4d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff828e8018b658 -- (.exr 0xffff828e8018b658)
ExceptionAddress: fffff8078e2fca4d (EasyAntiCheat_EOS+0x0000000000afca4d)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000eac
Subcode: 0xeac (unknown subcode)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000eac

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff828e`8018b3d8 fffff807`24e418a9     : 00000000`00000139 00000000`00000eac ffff828e`8018b700 ffff828e`8018b658 : nt!KeBugCheckEx
ffff828e`8018b3e0 fffff807`24e41e32     : 00000000`0bdcb883 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff828e`8018b520 fffff807`24e3fc06     : f7bf26b5`f762944e fd108d9b`f1305472 0000e85a`f3b1ba67 f3025ab7`00323d71 : nt!KiFastFailDispatch+0xb2
ffff828e`8018b700 fffff807`8e2fca4d     : fa019978`feff56d4 0001110c`ffd7b90f f4c0f62d`fa6da6f9 00778b55`f755a35f : nt!KiRaiseSecurityCheckFailure+0x346
ffff828e`8018b898 fa019978`feff56d4     : 0001110c`ffd7b90f f4c0f62d`fa6da6f9 00778b55`f755a35f ff591613`f6fdf370 : EasyAntiCheat_EOS+0xafca4d
ffff828e`8018b8a0 0001110c`ffd7b90f     : f4c0f62d`fa6da6f9 00778b55`f755a35f ff591613`f6fdf370 fb844d47`ff58944a : 0xfa019978`feff56d4
ffff828e`8018b8a8 f4c0f62d`fa6da6f9     : 00778b55`f755a35f ff591613`f6fdf370 fb844d47`ff58944a ffffffff`50200dba : 0x0001110c`ffd7b90f
ffff828e`8018b8b0 00778b55`f755a35f     : ff591613`f6fdf370 fb844d47`ff58944a ffffffff`50200dba ffe11476`f8a7f6c0 : 0xf4c0f62d`fa6da6f9
ffff828e`8018b8b8 ff591613`f6fdf370     : fb844d47`ff58944a ffffffff`50200dba ffe11476`f8a7f6c0 f654bea0`ffced61c : 0x00778b55`f755a35f
ffff828e`8018b8c0 fb844d47`ff58944a     : ffffffff`50200dba ffe11476`f8a7f6c0 f654bea0`ffced61c fffff807`8d800000 : 0xff591613`f6fdf370
ffff828e`8018b8c8 ffffffff`50200dba     : ffe11476`f8a7f6c0 f654bea0`ffced61c fffff807`8d800000 00000000`00000000 : 0xfb844d47`ff58944a
ffff828e`8018b8d0 ffe11476`f8a7f6c0     : f654bea0`ffced61c fffff807`8d800000 00000000`00000000 00000000`00000000 : 0xffffffff`50200dba
ffff828e`8018b8d8 f654bea0`ffced61c     : fffff807`8d800000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffe11476`f8a7f6c0
ffff828e`8018b8e0 fffff807`8d800000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xf654bea0`ffced61c
ffff828e`8018b8e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : EasyAntiCheat_EOS


SYMBOL_NAME:  EasyAntiCheat_EOS+afca4d

MODULE_NAME: EasyAntiCheat_EOS

IMAGE_NAME:  EasyAntiCheat_EOS.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  afca4d

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_EasyAntiCheat_EOS!unknown_function

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dde04553-d42f-b4d7-f06a-e1871a067075}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffd1000c7e96c0
Arg3: 0000000000000036
Arg4: 0000000000000037

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1156

    Key  : Analysis.Elapsed.mSec
    Value: 3878

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 202

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1321

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 145

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Failure.Bucket
    Value: 0x1a_41790_nt!MiDecreaseUsedPtesCount

    Key  : Failure.Hash
    Value: {3a4e374b-adfe-575c-a9c4-4050eb1047a4}

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Version
    Value: 10.0.22621.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffd1000c7e96c0

BUGCHECK_P3: 36

BUGCHECK_P4: 37

FILE_IN_CAB:  070723-5453-01.dmp

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffff084`9e72ec28 fffff804`62085651     : 00000000`0000001a 00000000`00041790 ffffd100`0c7e96c0 00000000`00000036 : nt!KeBugCheckEx
fffff084`9e72ec30 fffff804`61e7557d     : 00000000`00000000 fffff804`61eb09e5 00000000`0000fb80 00007ffa`f820a000 : nt!MiDecreaseUsedPtesCount+0x26c2d1
fffff084`9e72ec70 fffff804`61e78b48     : 00000000`00000000 fffff084`9e72f320 ffffdebf`fd7c1ff8 00000000`00000000 : nt!MiDeletePteRun+0x7fd
fffff084`9e72ee60 fffff804`61e318e9     : fffff084`9e72f270 ffffdebf`fd7c1ff8 ffff1cbf`90327076 ffffdf83`b99e3700 : nt!MiDeleteVaTail+0x48
fffff084`9e72ee90 fffff804`61e31a2a     : fffff084`00000000 ffffdf83`b99e3700 ffffdeef`00000000 fffff084`9e72f2c0 : nt!MiWalkPageTablesRecursively+0x4e9
fffff084`9e72ef20 fffff804`61e31a2a     : fffff084`9e72f270 ffffdf83`b99e3700 ffffdeef`00000000 fffff084`9e72f2d0 : nt!MiWalkPageTablesRecursively+0x62a
fffff084`9e72efb0 fffff804`61e31a2a     : fffff084`9e72f270 ffffdf83`b99e3700 ffffdeef`00000000 fffff084`9e72f2e0 : nt!MiWalkPageTablesRecursively+0x62a
fffff084`9e72f040 fffff804`61e48de1     : ffffdeef`77bbdde8 ffffdf83`b99e3700 00000000`00000000 fffff084`9e72f2f0 : nt!MiWalkPageTablesRecursively+0x62a
fffff084`9e72f0d0 fffff804`61e79ea2     : fffff084`9e72f270 00000000`00000001 00000000`00000002 fffff084`00000000 : nt!MiWalkPageTables+0x371
fffff084`9e72f1d0 fffff804`61e8aeee     : ffffdf83`ae42b080 fffff804`61e843e2 fffff084`9e72f570 ffffdf83`b86518c0 : nt!MiDeletePagablePteRange+0x3c2
fffff084`9e72f4e0 fffff804`622a6417     : 00000000`00000000 00000000`00000001 00000000`00000000 fffff084`9e72f5b0 : nt!MiDeleteVirtualAddresses+0x4e
fffff084`9e72f530 fffff804`62373e4d     : 00007ffa`f69b0000 ffffdf83`b86518c0 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1b7
fffff084`9e72f5f0 fffff804`62373a13     : ffffdf83`b86518c0 00000000`00000000 ffffdf83`ae42b080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff084`9e72f620 fffff804`62288169     : ffffdf83`b8666ea0 ffffdf83`b8666ea0 ffffdf83`b8666ea0 ffffdf83`b99e3080 : nt!MiCleanVad+0x2f
fffff084`9e72f650 fffff804`622dd159     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdf83`b99e3080 : nt!MmCleanProcessAddressSpace+0x10d
fffff084`9e72f6d0 fffff804`62304fea     : ffffdf83`b99e3080 ffff8008`935c18f0 fffff084`9e72f8f9 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
fffff084`9e72f760 fffff804`623062b8     : fffff084`00000000 fffff804`62035701 ffffdf83`ae42b0f4 00000013`19a9f000 : nt!PspExitThread+0x64e
fffff084`9e72f860 fffff804`61f1350d     : 417057f6`60d4fdf4 00000000`00000000 3ff19999`9999999a ffff9081`2815f180 : nt!KiSchedulerApcTerminate+0x38
fffff084`9e72f8a0 fffff804`62032420     : 00000000`00000001 fffff084`9e72f960 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x47d
fffff084`9e72f960 fffff804`6204108f     : ffffdf83`ae42b080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff084`9e72faa0 00007ffb`904cecd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000013`23bff168 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`904cecd4


SYMBOL_NAME:  nt!MiDecreaseUsedPtesCount+26c2d1

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.1848

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  26c2d1

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDecreaseUsedPtesCount

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3a4e374b-adfe-575c-a9c4-4050eb1047a4}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffdd, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff801196d5a9c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1187

    Key  : Analysis.Elapsed.mSec
    Value: 7724

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1210

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 151

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_R_(null)_nt!PspExitThread

    Key  : Failure.Hash
    Value: {44c252ad-a25b-1ac9-1196-2c90718334fe}

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Version
    Value: 10.0.22621.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffffdd

BUGCHECK_P2: 0

BUGCHECK_P3: fffff801196d5a9c

BUGCHECK_P4: 2

FILE_IN_CAB:  070823-6234-01.dmp

READ_ADDRESS: fffff80119b1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffdd

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SearchHost.exe

TRAP_FRAME:  fffff98d666cf560 -- (.trap 0xfffff98d666cf560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00ffffffffffffff
rdx=ffffa785c0bb6080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801196d5a9c rsp=fffff98d666cf6f0 rbp=fffff98d666cf889
 r8=00000000000000ff  r9=7ffffffffffffffc r10=fffff8011903b9c0
r11=ffffbbff35600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!PspExitThread+0x1d1100:
fffff801`196d5a9c 0fb64be8        movzx   ecx,byte ptr [rbx-18h] ds:ffffffff`ffffffe8=??
Resetting default scope

STACK_TEXT:
fffff98d`666cf338 fffff801`1928d6b9     : 00000000`00000050 ffffffff`ffffffdd 00000000`00000000 fffff98d`666cf560 : nt!KeBugCheckEx
fffff98d`666cf340 fffff801`19033f0c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffdd : nt!MiSystemFault+0x25d1e9
fffff98d`666cf440 fffff801`1923ce29     : fffff801`19506280 00000000`00000502 00000000`00000006 00000000`00000000 : nt!MmAccessFault+0x29c
fffff98d`666cf560 fffff801`196d5a9c     : ffffa785`ba7bc4b8 fffff98d`666cf889 00000000`00000000 ffffa785`c0bb6080 : nt!KiPageFault+0x369
fffff98d`666cf6f0 fffff801`195062b8     : 00000000`00000001 ffffa785`c0bb6000 fffff98d`666cf898 00000000`00000000 : nt!PspExitThread+0x1d1100
fffff98d`666cf7f0 fffff801`1911350d     : 000001db`a5bcc6f8 00000000`fe000000 00000000`00020000 fffff801`194c00c0 : nt!KiSchedulerApcTerminate+0x38
fffff98d`666cf830 fffff801`19232420     : ffffa785`ba70a601 fffff98d`666cf8f0 00000000`00000000 00000000`00010000 : nt!KiDeliverApc+0x47d
fffff98d`666cf8f0 fffff801`1924108f     : ffffa785`c0bb6080 fffff98d`666cfb20 0000000d`e121f488 fffff98d`666cfa48 : nt!KiInitiateUserApc+0x70
fffff98d`666cfa30 00007ffd`105afdc4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000000d`e121f468 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`105afdc4


SYMBOL_NAME:  nt!PspExitThread+1d1100

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.1848

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1d1100

FAILURE_BUCKET_ID:  AV_R_(null)_nt!PspExitThread

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {44c252ad-a25b-1ac9-1196-2c90718334fe}

Followup:     MachineOwner
---------
 
Çözüm
* Dökümlerin ikisi RAM, bir diğeri ise EasyAntiCheat_EOS.sys sebebiyle kaynaklanmış.

* 2 farklı RAM kullanmanız sorun oluşturuyor olabilir. Çünkü bu RAM'lerdeki CL, frekans, timing, voltaj vb. değerlerin farklılığı sistemde uyumsuzluğa, stabilitenin bozulmasına sebebiyet verebilir. Benim önerim elinizdeki RAM'leri satıp kit şeklinde 2x8 GB almanız olacaktır.

* Easy Anti-Cheat çözümüne gelecek olursak:

* Görev yöneticisinde EAC ile alakalı ne varsa hepsini sonlandırın.

- Bu anti-hileyi tamamen temizleyip tekrar yükleyin.
- Mesela Steam'de Apex Legends Easy Anti-Cheat kullanıyor.
- Steam'den Apex dizinine gidip oradaki Easy Anti-Cheat dosyasını kaldırabilirsiniz.
- Daha sonra Apex'e sağ tıklayıp "oyun dosyalarının bütünlüğünü doğrula" yapabilirsiniz.
- Veya direkt oyunun kendisine girmeye çalışınca otomatik indirecek.
- Bende Apex olduğu için örnek olarak verdim, sizde Easy Anti-Cheat kullanan hangi oyunlar varsa onların her birine tek tek bu işlemleri yapın.

* BIOS güncelleyin.
* 7A36VH74(beta version) sürümünü kullanıyorsunuz.
* 7A36vH75(Beta version) olana güncelleyebilirsiniz.


* Güncelledikten sonra BIOS'a girip F6'ya basın ve gelen "load optimized defaults?" sorusuna yes deyip çıkın, sonra tekrar BIOS'a girin ve ayarlarınızı yapın (RAM XMP profili açma, fan profilleri vs.)

Eki Görüntüle 1853017

* Vıdeo rehber: MSI BIOS Güncelleme

* Chipset sürücülerini güncelleyin.
  • Denetim Masası > program ekle / kaldırdan "AMD chipset software" silin.
  • Aşağıdan güncel olanı indirin ama kurmayın.
  • İndirdikten sonra interneti kesin ve PC'yi yeniden başlatın.
  • PC açılınca yeni chipset sürücülerini kurun.
  • İnterneti bağlayabilirsiniz.

Dökümler:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000eac, Type of memory safety violation.
Arg2: ffff828e8018b700, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffff828e8018b658, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for EasyAntiCheat_EOS.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1780.

 Key : Analysis.Elapsed.mSec
 Value: 7482.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 156.

 Key : Analysis.Init.Elapsed.mSec
 Value: 3409.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 154.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x139.

 Key : FailFast.Type
 Value: 3756.

 Key : Failure.Bucket
 Value: 0x139_MISSING_GSFRAME_EasyAntiCheat_EOS!unknown_function

 Key : Failure.Hash
 Value: {dde04553-d42f-b4d7-f06a-e1871a067075}

 Key : WER.OS.Branch
 Value: ni_release.

 Key : WER.OS.Version
 Value: 10.0.22621.1

BUGCHECK_CODE: 139.

BUGCHECK_P1: eac.

BUGCHECK_P2: ffff828e8018b700.

BUGCHECK_P3: ffff828e8018b658.

BUGCHECK_P4: 0

FILE_IN_CAB: 070423-7484-01.dmp

TRAP_FRAME: ffff828e8018b700 -- (.trap 0xffff828e8018b700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffffb7d5fe0 rbx=0000000000000000 rcx=0000000000000eac
rdx=ffffffffffffffc1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8078e2fca4d rsp=ffff828e8018b898 rbp=0000000000000000
 r8=0000000000000048 r9=0000000000000000 r10=ffffb78f40865300
r11=fffff8078ddd1e11 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy.
EasyAntiCheat_EOS+0xafca4d:
fffff807`8e2fca4d cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff828e8018b658 -- (.exr 0xffff828e8018b658)
ExceptionAddress: fffff8078e2fca4d (EasyAntiCheat_EOS+0x0000000000afca4d)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000eac.
Subcode: 0xeac (unknown subcode)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000eac.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff828e`8018b3d8 fffff807`24e418a9 : 00000000`00000139 00000000`00000eac ffff828e`8018b700 ffff828e`8018b658 : nt!KeBugCheckEx
ffff828e`8018b3e0 fffff807`24e41e32 : 00000000`0bdcb883 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff828e`8018b520 fffff807`24e3fc06 : f7bf26b5`f762944e fd108d9b`f1305472 0000e85a`f3b1ba67 f3025ab7`00323d71 : nt!KiFastFailDispatch+0xb2
ffff828e`8018b700 fffff807`8e2fca4d : fa019978`feff56d4 0001110c`ffd7b90f f4c0f62d`fa6da6f9 00778b55`f755a35f : nt!KiRaiseSecurityCheckFailure+0x346
ffff828e`8018b898 fa019978`feff56d4 : 0001110c`ffd7b90f f4c0f62d`fa6da6f9 00778b55`f755a35f ff591613`f6fdf370 : EasyAntiCheat_EOS+0xafca4d
ffff828e`8018b8a0 0001110c`ffd7b90f : f4c0f62d`fa6da6f9 00778b55`f755a35f ff591613`f6fdf370 fb844d47`ff58944a : 0xfa019978`feff56d4
ffff828e`8018b8a8 f4c0f62d`fa6da6f9 : 00778b55`f755a35f ff591613`f6fdf370 fb844d47`ff58944a ffffffff`50200dba : 0x0001110c`ffd7b90f
ffff828e`8018b8b0 00778b55`f755a35f : ff591613`f6fdf370 fb844d47`ff58944a ffffffff`50200dba ffe11476`f8a7f6c0 : 0xf4c0f62d`fa6da6f9
ffff828e`8018b8b8 ff591613`f6fdf370 : fb844d47`ff58944a ffffffff`50200dba ffe11476`f8a7f6c0 f654bea0`ffced61c : 0x00778b55`f755a35f
ffff828e`8018b8c0 fb844d47`ff58944a : ffffffff`50200dba ffe11476`f8a7f6c0 f654bea0`ffced61c fffff807`8d800000 : 0xff591613`f6fdf370
ffff828e`8018b8c8 ffffffff`50200dba : ffe11476`f8a7f6c0 f654bea0`ffced61c fffff807`8d800000 00000000`00000000 : 0xfb844d47`ff58944a
ffff828e`8018b8d0 ffe11476`f8a7f6c0 : f654bea0`ffced61c fffff807`8d800000 00000000`00000000 00000000`00000000 : 0xffffffff`50200dba
ffff828e`8018b8d8 f654bea0`ffced61c : fffff807`8d800000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffe11476`f8a7f6c0
ffff828e`8018b8e0 fffff807`8d800000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xf654bea0`ffced61c
ffff828e`8018b8e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : EasyAntiCheat_EOS.

SYMBOL_NAME: EasyAntiCheat_EOS+afca4d

MODULE_NAME: EasyAntiCheat_EOS.

IMAGE_NAME: EasyAntiCheat_EOS.sys

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: afca4d.

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_EasyAntiCheat_EOS!unknown_function

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {dde04553-d42f-b4d7-f06a-e1871a067075}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
 # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
 contains the address of the PFN for the corrupted page table page.
 On a 32 bit OS, parameter 2 contains a pointer to the number of used.
 PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffd1000c7e96c0.
Arg3: 0000000000000036.
Arg4: 0000000000000037.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1156.

 Key : Analysis.Elapsed.mSec
 Value: 3878.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 202.

 Key : Analysis.Init.Elapsed.mSec
 Value: 1321.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 145.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x1a.

 Key : Failure.Bucket
 Value: 0x1a_41790_nt!MiDecreaseUsedPtesCount

 Key : Failure.Hash
 Value: {3a4e374b-adfe-575c-a9c4-4050eb1047a4}

 Key : WER.OS.Branch
 Value: ni_release.

 Key : WER.OS.Version
 Value: 10.0.22621.1

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41790.

BUGCHECK_P2: ffffd1000c7e96c0.

BUGCHECK_P3: 36.

BUGCHECK_P4: 37.

FILE_IN_CAB: 070723-5453-01.dmp

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
fffff084`9e72ec28 fffff804`62085651 : 00000000`0000001a 00000000`00041790 ffffd100`0c7e96c0 00000000`00000036 : nt!KeBugCheckEx
fffff084`9e72ec30 fffff804`61e7557d : 00000000`00000000 fffff804`61eb09e5 00000000`0000fb80 00007ffa`f820a000 : nt!MiDecreaseUsedPtesCount+0x26c2d1
fffff084`9e72ec70 fffff804`61e78b48 : 00000000`00000000 fffff084`9e72f320 ffffdebf`fd7c1ff8 00000000`00000000 : nt!MiDeletePteRun+0x7fd
fffff084`9e72ee60 fffff804`61e318e9 : fffff084`9e72f270 ffffdebf`fd7c1ff8 ffff1cbf`90327076 ffffdf83`b99e3700 : nt!MiDeleteVaTail+0x48
fffff084`9e72ee90 fffff804`61e31a2a : fffff084`00000000 ffffdf83`b99e3700 ffffdeef`00000000 fffff084`9e72f2c0 : nt!MiWalkPageTablesRecursively+0x4e9
fffff084`9e72ef20 fffff804`61e31a2a : fffff084`9e72f270 ffffdf83`b99e3700 ffffdeef`00000000 fffff084`9e72f2d0 : nt!MiWalkPageTablesRecursively+0x62a
fffff084`9e72efb0 fffff804`61e31a2a : fffff084`9e72f270 ffffdf83`b99e3700 ffffdeef`00000000 fffff084`9e72f2e0 : nt!MiWalkPageTablesRecursively+0x62a
fffff084`9e72f040 fffff804`61e48de1 : ffffdeef`77bbdde8 ffffdf83`b99e3700 00000000`00000000 fffff084`9e72f2f0 : nt!MiWalkPageTablesRecursively+0x62a
fffff084`9e72f0d0 fffff804`61e79ea2 : fffff084`9e72f270 00000000`00000001 00000000`00000002 fffff084`00000000 : nt!MiWalkPageTables+0x371
fffff084`9e72f1d0 fffff804`61e8aeee : ffffdf83`ae42b080 fffff804`61e843e2 fffff084`9e72f570 ffffdf83`b86518c0 : nt!MiDeletePagablePteRange+0x3c2
fffff084`9e72f4e0 fffff804`622a6417 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff084`9e72f5b0 : nt!MiDeleteVirtualAddresses+0x4e
fffff084`9e72f530 fffff804`62373e4d : 00007ffa`f69b0000 ffffdf83`b86518c0 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1b7
fffff084`9e72f5f0 fffff804`62373a13 : ffffdf83`b86518c0 00000000`00000000 ffffdf83`ae42b080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff084`9e72f620 fffff804`62288169 : ffffdf83`b8666ea0 ffffdf83`b8666ea0 ffffdf83`b8666ea0 ffffdf83`b99e3080 : nt!MiCleanVad+0x2f
fffff084`9e72f650 fffff804`622dd159 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdf83`b99e3080 : nt!MmCleanProcessAddressSpace+0x10d
fffff084`9e72f6d0 fffff804`62304fea : ffffdf83`b99e3080 ffff8008`935c18f0 fffff084`9e72f8f9 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
fffff084`9e72f760 fffff804`623062b8 : fffff084`00000000 fffff804`62035701 ffffdf83`ae42b0f4 00000013`19a9f000 : nt!PspExitThread+0x64e
fffff084`9e72f860 fffff804`61f1350d : 417057f6`60d4fdf4 00000000`00000000 3ff19999`9999999a ffff9081`2815f180 : nt!KiSchedulerApcTerminate+0x38
fffff084`9e72f8a0 fffff804`62032420 : 00000000`00000001 fffff084`9e72f960 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x47d
fffff084`9e72f960 fffff804`6204108f : ffffdf83`ae42b080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff084`9e72faa0 00007ffb`904cecd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000013`23bff168 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`904cecd4

SYMBOL_NAME: nt!MiDecreaseUsedPtesCount+26c2d1

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.22621.1848

STACK_COMMAND: .cxr; .ecxr ; kb.

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 26c2d1.

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDecreaseUsedPtesCount

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {3a4e374b-adfe-575c-a9c4-4050eb1047a4}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffdd, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
 bit 1 is set if the fault was due to a write, clear if a read.
 bit 3 is set if the processor decided the fault was due to a corrupted PTE.
 bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
 - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
 bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff801196d5a9c, If non-zero, the instruction address which referenced the bad memory.
 address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : AV.Type
 Value: Read.

 Key : Analysis.CPU.mSec
 Value: 1187.

 Key : Analysis.Elapsed.mSec
 Value: 7724.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 93.

 Key : Analysis.Init.Elapsed.mSec
 Value: 1210.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 151.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x50.

 Key : Failure.Bucket
 Value: AV_R_(null)_nt!PspExitThread

 Key : Failure.Hash
 Value: {44c252ad-a25b-1ac9-1196-2c90718334fe}

 Key : WER.OS.Branch
 Value: ni_release.

 Key : WER.OS.Version
 Value: 10.0.22621.1

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffffffffffffdd.

BUGCHECK_P2: 0

BUGCHECK_P3: fffff801196d5a9c.

BUGCHECK_P4: 2

FILE_IN_CAB: 070823-6234-01.dmp

READ_ADDRESS: fffff80119b1c468: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffdd.

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: SearchHost.exe

TRAP_FRAME: fffff98d666cf560 -- (.trap 0xfffff98d666cf560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00ffffffffffffff
rdx=ffffa785c0bb6080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801196d5a9c rsp=fffff98d666cf6f0 rbp=fffff98d666cf889
 r8=00000000000000ff r9=7ffffffffffffffc r10=fffff8011903b9c0
r11=ffffbbff35600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy.
nt!PspExitThread+0x1d1100:
fffff801`196d5a9c 0fb64be8 movzx ecx,byte ptr [rbx-18h] ds:ffffffff`ffffffe8=??
Resetting default scope.

STACK_TEXT:
fffff98d`666cf338 fffff801`1928d6b9 : 00000000`00000050 ffffffff`ffffffdd 00000000`00000000 fffff98d`666cf560 : nt!KeBugCheckEx
fffff98d`666cf340 fffff801`19033f0c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffdd : nt!MiSystemFault+0x25d1e9
fffff98d`666cf440 fffff801`1923ce29 : fffff801`19506280 00000000`00000502 00000000`00000006 00000000`00000000 : nt!MmAccessFault+0x29c
fffff98d`666cf560 fffff801`196d5a9c : ffffa785`ba7bc4b8 fffff98d`666cf889 00000000`00000000 ffffa785`c0bb6080 : nt!KiPageFault+0x369
fffff98d`666cf6f0 fffff801`195062b8 : 00000000`00000001 ffffa785`c0bb6000 fffff98d`666cf898 00000000`00000000 : nt!PspExitThread+0x1d1100
fffff98d`666cf7f0 fffff801`1911350d : 000001db`a5bcc6f8 00000000`fe000000 00000000`00020000 fffff801`194c00c0 : nt!KiSchedulerApcTerminate+0x38
fffff98d`666cf830 fffff801`19232420 : ffffa785`ba70a601 fffff98d`666cf8f0 00000000`00000000 00000000`00010000 : nt!KiDeliverApc+0x47d
fffff98d`666cf8f0 fffff801`1924108f : ffffa785`c0bb6080 fffff98d`666cfb20 0000000d`e121f488 fffff98d`666cfa48 : nt!KiInitiateUserApc+0x70
fffff98d`666cfa30 00007ffd`105afdc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000000d`e121f468 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`105afdc4

SYMBOL_NAME: nt!PspExitThread+1d1100

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.1848

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1d1100.

FAILURE_BUCKET_ID: AV_R_(null)_nt!PspExitThread

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {44c252ad-a25b-1ac9-1196-2c90718334fe}

Followup: MachineOwner.
---------

Çok teşekkür ederim dediklerinizi uygulayıp geri dönüş yapacağım.
 
Son düzenleyen: Moderatör:

Geri
Yukarı