Oyunlarda grafik bozulması ve bilgisayarın kitlenmesi

kubilay054

Kilopat
Katılım
1 Mayıs 2016
Mesajlar
32
Daha fazla  
Cinsiyet
Erkek
Merhaba,

Intel i5 7500.
Rx580 4 gb.
16 Gb 2133 Mhz ram.
Msi Bazokaa b250m Anakart.
kcas 600w 80+ güç kaynağı.

sistemim bu arkadaşlar. Oyunlarda grafiklerde bozulma yaşıyorum. Bir süre sonra grafikler bozuluyor ve çizgiler çıkmaya başlıyor. Sorunu biraz araştırdım genellikle sorun için Artifact sorunu yazmışlar. Bu şekilde oynamaya devam ettikçe bilgisayar bir süre sonra kitleniyor ve oyunu kapatıyor veya nadiren de olsa bilgisayar reset atıyor. Isı değerlerine baktım, işlemci ve ekran kartı ısınması normal düzeyde hatta ikisininde macununu yeniledim.

Rustta yaşadığım probleme örnek olarak;
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Örnekler;
3a798d426508dafe53384d1c8391c6a1 - Hızlı Resim
71123baaea5c8020457d695b5988e1ef - Hızlı Resim


Ekran kartı voltajını düşürsem bir süre daha idare edebilir miyim? Teşekkürler...
 
Son düzenleme:
Voltaj düşürmeyi deneyiniz. mavi ekran için dump dosyalarını paylaşınız.
 
Voltaj düşürmeyi deneyiniz. mavi ekran için dump dosyalarını paylaşınız.
dmp.rar
Buyrun dump dosyaları.
 
Hatalar bellek bozulmasına işaret ediyor Memtest86 ile bellek testi yapınız. DDU ile ekran kartı sürücüsünü kaldırıp 20.4.2 sürümünü kurunuz. Vanguard kaldırınız. HDD Sentinel ile diskinizin sağlık durumunu paylaşınız. Başka bir monitör ile sistemi test ediniz. Easy Anti-cheat kaldırınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff948ff777c080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9952

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 27750

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffff948ff777c080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  services.exe

CRITICAL_PROCESS:  services.exe

EXCEPTION_RECORD:  0000000000000001 -- (.exr 0x1)
Cannot read Exception record @ 0000000000000001

ERROR_CODE: (NTSTATUS) 0xf936f080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffffbe83`1a576438 fffff801`84506fe2     : 00000000`000000ef ffff948f`f777c080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffbe83`1a576440 fffff801`843d7d83     : 00000000`00000001 fffff801`83e60ea5 00000000`00000002 fffff801`83e60dcf : nt!PspCatchCriticalBreak+0x10e
ffffbe83`1a5764e0 fffff801`8424a9b0     : ffff948f`00000000 00000000`00000000 ffff948f`f777c080 ffff948f`f777c4b8 : nt!PspTerminateAllThreads+0x1ee377
ffffbe83`1a576550 fffff801`8424a7ac     : ffff948f`f777c080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffbe83`1a576590 fffff801`84005fb5     : ffff948f`f777c080 ffff948f`f936f080 ffffbe83`1a576680 fffff801`84316372 : nt!NtTerminateProcess+0x9c
ffffbe83`1a576600 fffff801`83ff8400     : fffff801`8403017f ffffbe83`1a5777c0 ffffbe83`1a5777c0 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x25
ffffbe83`1a576798 fffff801`8403017f     : ffffbe83`1a5777c0 ffffbe83`1a5777c0 ffffffff`ffffffff ffffffff`ffffffff : nt!KiServiceLinkage
ffffbe83`1a5767a0 fffff801`8411bc72     : 00000000`00000001 ffffbe83`1a577080 00000097`abc95000 00000000`00000003 : nt!KiDispatchException+0x1de95f
ffffbe83`1a577050 fffff801`83ff501b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseException+0x2b2
ffffbe83`1a5778c0 fffff801`84005fb5     : 00007ffd`2d6c47b3 ffffbe83`1a577a80 00000097`abe7f130 00000000`00000000 : nt!NtRaiseException+0x7b
ffffbe83`1a577a00 00007ffd`2d68590c     : 00000000`00000000 00000097`abc95000 00000097`abc95000 00000000`0000000f : nt!KiSystemServiceCopyEnd+0x25
00000097`abe7f3d0 00000000`00000000     : 00000097`abc95000 00000097`abc95000 00000000`0000000f 000001d6`d14045a0 : 0x00007ffd`2d68590c


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_f936f080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bf76032c-f733-b2c5-2908-ea4b161d4efe}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80378adb4f8, Address of the instruction which caused the bugcheck
Arg3: ffffd60f4314e460, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8405

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22559

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80378adb4f8

BUGCHECK_P3: ffffd60f4314e460

BUGCHECK_P4: 0

CONTEXT:  ffffd60f4314e460 -- (.cxr 0xffffd60f4314e460)
rax=0000000000000000 rbx=ffffda0b8fae7158 rcx=0000000000000011
rdx=0000000fbc869bf0 rsi=0000000fbc869bf0 rdi=ffffda0b8fae7710
rip=fffff80378adb4f8 rsp=ffffd60f4314ee60 rbp=0000000000000000
 r8=ffffd60f4314eec0  r9=0000000000000005 r10=7ffffffffffffffc
r11=ffffd60f4314ef38 r12=ffffc48ca581e000 r13=0000000000000001
r14=0000000000000001 r15=ffffd60f4314f1a0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExAcquirePushLockSharedEx+0x108:
fffff803`78adb4f8 f0480fb10e      lock cmpxchg qword ptr [rsi],rcx ds:002b:0000000f`bc869bf0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

STACK_TEXT: 
ffffd60f`4314ee60 fffff803`78eeb022     : ffffda0b`8fae7710 fffff803`00000000 ffffda0b`00000000 ffffc48c`a297ee40 : nt!ExAcquirePushLockSharedEx+0x108
ffffd60f`4314eeb0 fffff803`78ee9047     : ffffc48c`a2550be0 ffffc48c`a2550be0 ffffd60f`4314f0d0 fffff803`00000005 : nt!CmpPerformSingleKcbCacheLookup+0xe2
ffffd60f`4314ef40 fffff803`78ee948a     : 00000000`94ef0001 ffffd60f`4314f000 ffffd60f`00000005 00000000`00000000 : nt!CmpPerformCompleteKcbCacheLookup+0x77
ffffd60f`4314efd0 fffff803`78ee82e3     : 00000001`0000001c ffffd60f`4314f320 ffffd60f`4314f2d8 ffffda0b`8ac31010 : nt!CmpDoParseKey+0x2da
ffffd60f`4314f270 fffff803`78eec3ae     : fffff803`78ee8001 00000000`00000000 ffffda0b`8ac31010 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffd60f`4314f410 fffff803`78ef566a     : ffffda0b`8ac31000 ffffd60f`4314f678 00000026`00000040 ffffda0b`7fad5c40 : nt!ObpLookupObjectName+0x3fe
ffffd60f`4314f5e0 fffff803`78ef544c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffda0b`7fad5c40 : nt!ObOpenObjectByNameEx+0x1fa
ffffd60f`4314f710 fffff803`78ef4f71     : 00000026`2fe7d998 ffffd60f`4314fa80 00000000`00000001 fffff803`78a9ccce : nt!ObOpenObjectByName+0x5c
ffffd60f`4314f760 fffff803`78ef4c9f     : 00000000`00000000 00000163`e793c530 00000000`00000000 00000000`00000103 : nt!CmOpenKey+0x2c1
ffffd60f`4314f9c0 fffff803`78c05fb5     : ffffda0b`8fae7000 ffffd60f`00000000 ffffd60f`4314fa80 ffffda0b`90a113f0 : nt!NtOpenKeyEx+0xf
ffffd60f`4314fa00 00007ff8`07d6e184     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000026`2fe7d8b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`07d6e184


SYMBOL_NAME:  nt!ExAcquirePushLockSharedEx+108

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffd60f4314e460 ; kb

BUCKET_ID_FUNC_OFFSET:  108

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExAcquirePushLockSharedEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0a07b27c-d6fc-450f-cce4-99edf8dde3d7}

Followup:     MachineOwner
---------
 
Hatalar bellek bozulmasına işaret ediyor Memtest86 ile bellek testi yapınız. DDU ile ekran kartı sürücüsünü kaldırıp 20.4.2 sürümünü kurunuz. Vanguard kaldırınız. HDD Sentinel ile diskinizin sağlık durumunu paylaşınız. Başka bir monitör ile sistemi test ediniz. Easy Anti-cheat kaldırınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff948ff777c080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9952

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 27750

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffff948ff777c080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  services.exe

CRITICAL_PROCESS:  services.exe

EXCEPTION_RECORD:  0000000000000001 -- (.exr 0x1)
Cannot read Exception record @ 0000000000000001

ERROR_CODE: (NTSTATUS) 0xf936f080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:
ffffbe83`1a576438 fffff801`84506fe2     : 00000000`000000ef ffff948f`f777c080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffbe83`1a576440 fffff801`843d7d83     : 00000000`00000001 fffff801`83e60ea5 00000000`00000002 fffff801`83e60dcf : nt!PspCatchCriticalBreak+0x10e
ffffbe83`1a5764e0 fffff801`8424a9b0     : ffff948f`00000000 00000000`00000000 ffff948f`f777c080 ffff948f`f777c4b8 : nt!PspTerminateAllThreads+0x1ee377
ffffbe83`1a576550 fffff801`8424a7ac     : ffff948f`f777c080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffbe83`1a576590 fffff801`84005fb5     : ffff948f`f777c080 ffff948f`f936f080 ffffbe83`1a576680 fffff801`84316372 : nt!NtTerminateProcess+0x9c
ffffbe83`1a576600 fffff801`83ff8400     : fffff801`8403017f ffffbe83`1a5777c0 ffffbe83`1a5777c0 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x25
ffffbe83`1a576798 fffff801`8403017f     : ffffbe83`1a5777c0 ffffbe83`1a5777c0 ffffffff`ffffffff ffffffff`ffffffff : nt!KiServiceLinkage
ffffbe83`1a5767a0 fffff801`8411bc72     : 00000000`00000001 ffffbe83`1a577080 00000097`abc95000 00000000`00000003 : nt!KiDispatchException+0x1de95f
ffffbe83`1a577050 fffff801`83ff501b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseException+0x2b2
ffffbe83`1a5778c0 fffff801`84005fb5     : 00007ffd`2d6c47b3 ffffbe83`1a577a80 00000097`abe7f130 00000000`00000000 : nt!NtRaiseException+0x7b
ffffbe83`1a577a00 00007ffd`2d68590c     : 00000000`00000000 00000097`abc95000 00000097`abc95000 00000000`0000000f : nt!KiSystemServiceCopyEnd+0x25
00000097`abe7f3d0 00000000`00000000     : 00000097`abc95000 00000097`abc95000 00000000`0000000f 000001d6`d14045a0 : 0x00007ffd`2d68590c


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_f936f080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bf76032c-f733-b2c5-2908-ea4b161d4efe}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80378adb4f8, Address of the instruction which caused the bugcheck
Arg3: ffffd60f4314e460, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8405

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22559

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80378adb4f8

BUGCHECK_P3: ffffd60f4314e460

BUGCHECK_P4: 0

CONTEXT:  ffffd60f4314e460 -- (.cxr 0xffffd60f4314e460)
rax=0000000000000000 rbx=ffffda0b8fae7158 rcx=0000000000000011
rdx=0000000fbc869bf0 rsi=0000000fbc869bf0 rdi=ffffda0b8fae7710
rip=fffff80378adb4f8 rsp=ffffd60f4314ee60 rbp=0000000000000000
r8=ffffd60f4314eec0  r9=0000000000000005 r10=7ffffffffffffffc
r11=ffffd60f4314ef38 r12=ffffc48ca581e000 r13=0000000000000001
r14=0000000000000001 r15=ffffd60f4314f1a0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExAcquirePushLockSharedEx+0x108:
fffff803`78adb4f8 f0480fb10e      lock cmpxchg qword ptr [rsi],rcx ds:002b:0000000f`bc869bf0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

STACK_TEXT:
ffffd60f`4314ee60 fffff803`78eeb022     : ffffda0b`8fae7710 fffff803`00000000 ffffda0b`00000000 ffffc48c`a297ee40 : nt!ExAcquirePushLockSharedEx+0x108
ffffd60f`4314eeb0 fffff803`78ee9047     : ffffc48c`a2550be0 ffffc48c`a2550be0 ffffd60f`4314f0d0 fffff803`00000005 : nt!CmpPerformSingleKcbCacheLookup+0xe2
ffffd60f`4314ef40 fffff803`78ee948a     : 00000000`94ef0001 ffffd60f`4314f000 ffffd60f`00000005 00000000`00000000 : nt!CmpPerformCompleteKcbCacheLookup+0x77
ffffd60f`4314efd0 fffff803`78ee82e3     : 00000001`0000001c ffffd60f`4314f320 ffffd60f`4314f2d8 ffffda0b`8ac31010 : nt!CmpDoParseKey+0x2da
ffffd60f`4314f270 fffff803`78eec3ae     : fffff803`78ee8001 00000000`00000000 ffffda0b`8ac31010 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffd60f`4314f410 fffff803`78ef566a     : ffffda0b`8ac31000 ffffd60f`4314f678 00000026`00000040 ffffda0b`7fad5c40 : nt!ObpLookupObjectName+0x3fe
ffffd60f`4314f5e0 fffff803`78ef544c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffda0b`7fad5c40 : nt!ObOpenObjectByNameEx+0x1fa
ffffd60f`4314f710 fffff803`78ef4f71     : 00000026`2fe7d998 ffffd60f`4314fa80 00000000`00000001 fffff803`78a9ccce : nt!ObOpenObjectByName+0x5c
ffffd60f`4314f760 fffff803`78ef4c9f     : 00000000`00000000 00000163`e793c530 00000000`00000000 00000000`00000103 : nt!CmOpenKey+0x2c1
ffffd60f`4314f9c0 fffff803`78c05fb5     : ffffda0b`8fae7000 ffffd60f`00000000 ffffd60f`4314fa80 ffffda0b`90a113f0 : nt!NtOpenKeyEx+0xf
ffffd60f`4314fa00 00007ff8`07d6e184     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000026`2fe7d8b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`07d6e184


SYMBOL_NAME:  nt!ExAcquirePushLockSharedEx+108

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffd60f4314e460 ; kb

BUCKET_ID_FUNC_OFFSET:  108

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExAcquirePushLockSharedEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0a07b27c-d6fc-450f-cce4-99edf8dde3d7}

Followup:     MachineOwner
---------
Merhaba,

Bellek testini yaptım Recep Baltaş'ın yaptığı gibi herhangi bir sorun çıkmadı büyük ihtimalle sorun ekran kartında bir tamirciye göstereceğim artık teşekkür ederim yardımlarınız için.
 

Geri
Yukarı