Çözüldü R5 2600X sistem donuyor ya da mavi ekran veriyor

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Katılım
28 Kasım 2016
Mesajlar
24
Daha fazla  
Cinsiyet
Erkek
RAM
2 tane Kingston Hyperx Predator 8 GB 3000 MHz DDR4 CL15 HX430C15PB3/8 Ram
SSD veya HDD modeli
Samsung 500 GB 870 Evo MZ-77E500BW 2.5" SATA 3.0 S
Ekran kartı
MSI GEFORCE GTX 1060 GAMING X 3G 3GB GDDR5 192bit
Anakart
Asus B450M Dragon AM4 DDR4 Micro ATX Anakart
İşlemci
AMD Ryzen 5 2600X Altı Çekirdek 3.60 GHz İşlemci
FIFA 22 oynarken arkada Spotify açınca mavi ekran verdi. Hepsinde de neredeyse farklı hata kodlarıyla. Bazen tekrar açtığımda açıldı bazen de uğraşa uğraşa açtım. Format attım düzeldi 15 gün bir şey olmadı. Assassin's Creed Odyssey oynarken arkada Chrome açıp bir siteye girdiğimde bilgisayar donup kapanıyor. Bazen de mavi ekran veriyor. Valorant'ta da aynısı oldu. RAM'lerden kaynaklı diye düşündüm Memtest yaparkende dondu kapandı. Sonuna kadar ilerleyemedim. Prime95 testini başlattığımda da dondu. Anakartı Haziran'da değiştirdim. İşlemci 2 yıl olacak alalı. RAM'lerde Kingston ömür boyu garanti varmış. Hangisinde sıkıntı varsa garantiye vereceğim.
 
Çözüm
- Aslında siz sorunun kaynağını açıklamışsınız. Genel itibarı ile RAM'lerden birinde veya ikisinde de bir problem var.

- Memtest86 yapmışsınız ama bir de RAM'leri tek tek test yapın. Birini sökün, diğeri kalsın. Bitince öbürünü takın diğerini sökün. XMP kapalı olsun.

- Daha sonra bu testleri XMP açık bir şekilde yine ayrı ayrı yapın.

- Hangi RAM'de sıkıntı varsa onu yollarsınız.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000080, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066d20046b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1171

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7804

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2578

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 128

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092522-11218-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: 80

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8066d20046b

READ_ADDRESS: fffff8066dafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000080

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

TRAP_FRAME:  ffffd48c212117f0 -- (.trap 0xffffd48c212117f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000026fa96e000 rbx=0000000000000000 rcx=00000000c0000100
rdx=0000000000000026 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066d20046b rsp=ffffd48c21211980 rbp=000f8067b4bbbdff
 r8=0000000000000000  r9=fffff8066b235180 r10=0000fffff8067c35
r11=ffff86fe9d400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!SwapContext+0x43b:
fffff806`6d20046b 418b8080000000  mov     eax,dword ptr [r8+80h] ds:00000000`00000080=????????
Resetting default scope

STACK_TEXT:
ffffd48c`212116a8 fffff806`6d20af69     : 00000000`0000000a 00000000`00000080 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd48c`212116b0 fffff806`6d207269     : 00000000`120ee470 00000000`120edb10 00000000`00000058 00007ffc`9435376c : nt!KiBugCheckDispatch+0x69
ffffd48c`212117f0 fffff806`6d20046b     : 000f8067`b4bbbdff 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x469
ffffd48c`21211980 fffff806`6d200970     : 00007ffc`94d82680 00000000`00000000 fffff806`6d433f20 00000000`00000000 : nt!SwapContext+0x43b
ffffd48c`212119c0 fffff806`6d200900     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread
ffffd48c`21211b00 00007ffc`94d82680     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000026`80fff888 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`94d82680


SYMBOL_NAME:  nt!SwapContext+43b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  43b

FAILURE_BUCKET_ID:  AV_nt!SwapContext

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {47b746a3-60bf-1f5a-5fa5-88903b6a3204}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa6893d2a77c8, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80018403281, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5284

    Key  : Analysis.Init.CPU.mSec
    Value: 61

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3810

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 129

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092322-8484-01.dmp

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa6893d2a77c8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80018403281

BUGCHECK_P4: 2

READ_ADDRESS: fffff80018afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa6893d2a77c8

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

TRAP_FRAME:  ffffa689392a73f0 -- (.trap 0xffffa689392a73f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe00b875c87e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80018403281 rsp=ffffa689392a7580 rbp=ffffa689392a76a0
 r8=00000000001f0003  r9=0000000000000000 r10=0000000000000000
r11=ffffa689392a79f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ObpCreateHandle+0x41:
fffff800`18403281 4c8bbd28010000  mov     r15,qword ptr [rbp+128h] ss:0018:ffffa689`392a77c8=0000000000000000
Resetting default scope

STACK_TEXT:
ffffa689`392a7148 fffff800`18231a9d     : 00000000`00000050 ffffa689`3d2a77c8 00000000`00000000 ffffa689`392a73f0 : nt!KeBugCheckEx
ffffa689`392a7150 fffff800`180399e0     : 00000000`00000000 00000000`00000000 ffffa689`392a7470 00000000`00000000 : nt!MiSystemFault+0x1da08d
ffffa689`392a7250 fffff800`1820715e     : ffffe00b`87300000 00000000`00000001 fffff800`18a54628 fffff800`18a54618 : nt!MmAccessFault+0x400
ffffa689`392a73f0 fffff800`18403281     : 00000000`00000000 00000000`00000000 ffffa80b`2fafe7b0 00000000`00000000 : nt!KiPageFault+0x35e
ffffa689`392a7580 fffff800`184191e6     : ffffe00b`7a010340 ffffe00b`7a011880 ffffe00b`7a011ac0 00000000`00000080 : nt!ObpCreateHandle+0x41
ffffa689`392a7790 fffff800`184183d1     : 00000000`00000001 ffffa689`392a7b80 00000000`00000001 00000000`00000001 : nt!ObInsertObjectEx+0x156
ffffa689`392a7a20 fffff800`1820a9b8     : ffffe00b`869d6300 000000dc`b3cff968 ffffa689`392a7aa8 00000000`00000000 : nt!NtCreateEvent+0xe1
ffffa689`392a7a90 00007ffd`a9d4d904     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000dc`b3cff948 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`a9d4d904


SYMBOL_NAME:  nt!ObpCreateHandle+41

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  41

FAILURE_BUCKET_ID:  AV_R_(null)_nt!ObpCreateHandle

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {48c202f8-a564-ab26-552e-c82ebfe1b64e}

Followup:     MachineOwner
---------
- Aslında siz sorunun kaynağını açıklamışsınız. Genel itibarı ile RAM'lerden birinde veya ikisinde de bir problem var.

- Memtest86 yapmışsınız ama bir de RAM'leri tek tek test yapın. Birini sökün, diğeri kalsın. Bitince öbürünü takın diğerini sökün. XMP kapalı olsun.

- Daha sonra bu testleri XMP açık bir şekilde yine ayrı ayrı yapın.

- Hangi RAM'de sıkıntı varsa onu yollarsınız.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000080, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066d20046b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1171

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7804

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2578

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 128

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092522-11218-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: 80

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8066d20046b

READ_ADDRESS: fffff8066dafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000080

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

TRAP_FRAME:  ffffd48c212117f0 -- (.trap 0xffffd48c212117f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000026fa96e000 rbx=0000000000000000 rcx=00000000c0000100
rdx=0000000000000026 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066d20046b rsp=ffffd48c21211980 rbp=000f8067b4bbbdff
 r8=0000000000000000  r9=fffff8066b235180 r10=0000fffff8067c35
r11=ffff86fe9d400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!SwapContext+0x43b:
fffff806`6d20046b 418b8080000000  mov     eax,dword ptr [r8+80h] ds:00000000`00000080=????????
Resetting default scope

STACK_TEXT:
ffffd48c`212116a8 fffff806`6d20af69     : 00000000`0000000a 00000000`00000080 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd48c`212116b0 fffff806`6d207269     : 00000000`120ee470 00000000`120edb10 00000000`00000058 00007ffc`9435376c : nt!KiBugCheckDispatch+0x69
ffffd48c`212117f0 fffff806`6d20046b     : 000f8067`b4bbbdff 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x469
ffffd48c`21211980 fffff806`6d200970     : 00007ffc`94d82680 00000000`00000000 fffff806`6d433f20 00000000`00000000 : nt!SwapContext+0x43b
ffffd48c`212119c0 fffff806`6d200900     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread
ffffd48c`21211b00 00007ffc`94d82680     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000026`80fff888 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`94d82680


SYMBOL_NAME:  nt!SwapContext+43b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  43b

FAILURE_BUCKET_ID:  AV_nt!SwapContext

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {47b746a3-60bf-1f5a-5fa5-88903b6a3204}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa6893d2a77c8, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80018403281, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5284

    Key  : Analysis.Init.CPU.mSec
    Value: 61

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3810

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 129

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092322-8484-01.dmp

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa6893d2a77c8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80018403281

BUGCHECK_P4: 2

READ_ADDRESS: fffff80018afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa6893d2a77c8

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

TRAP_FRAME:  ffffa689392a73f0 -- (.trap 0xffffa689392a73f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe00b875c87e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80018403281 rsp=ffffa689392a7580 rbp=ffffa689392a76a0
 r8=00000000001f0003  r9=0000000000000000 r10=0000000000000000
r11=ffffa689392a79f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ObpCreateHandle+0x41:
fffff800`18403281 4c8bbd28010000  mov     r15,qword ptr [rbp+128h] ss:0018:ffffa689`392a77c8=0000000000000000
Resetting default scope

STACK_TEXT:
ffffa689`392a7148 fffff800`18231a9d     : 00000000`00000050 ffffa689`3d2a77c8 00000000`00000000 ffffa689`392a73f0 : nt!KeBugCheckEx
ffffa689`392a7150 fffff800`180399e0     : 00000000`00000000 00000000`00000000 ffffa689`392a7470 00000000`00000000 : nt!MiSystemFault+0x1da08d
ffffa689`392a7250 fffff800`1820715e     : ffffe00b`87300000 00000000`00000001 fffff800`18a54628 fffff800`18a54618 : nt!MmAccessFault+0x400
ffffa689`392a73f0 fffff800`18403281     : 00000000`00000000 00000000`00000000 ffffa80b`2fafe7b0 00000000`00000000 : nt!KiPageFault+0x35e
ffffa689`392a7580 fffff800`184191e6     : ffffe00b`7a010340 ffffe00b`7a011880 ffffe00b`7a011ac0 00000000`00000080 : nt!ObpCreateHandle+0x41
ffffa689`392a7790 fffff800`184183d1     : 00000000`00000001 ffffa689`392a7b80 00000000`00000001 00000000`00000001 : nt!ObInsertObjectEx+0x156
ffffa689`392a7a20 fffff800`1820a9b8     : ffffe00b`869d6300 000000dc`b3cff968 ffffa689`392a7aa8 00000000`00000000 : nt!NtCreateEvent+0xe1
ffffa689`392a7a90 00007ffd`a9d4d904     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000dc`b3cff948 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`a9d4d904


SYMBOL_NAME:  nt!ObpCreateHandle+41

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  41

FAILURE_BUCKET_ID:  AV_R_(null)_nt!ObpCreateHandle

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {48c202f8-a564-ab26-552e-c82ebfe1b64e}

Followup:     MachineOwner
---------
 
Çözüm
XMP açıkken test sonucu farklı mı çıkar ben onu bilmiyordum. Tek tek deneyeyim sonucu yazarım. Eğer sorun yoksa anakartta mıdır sorun peki?

@EgeN7 2. slota takarak RAM'leri tek tek XMP kapalı ve açık test ettim. Hata yok. 1. slota takınca farklı çıkmaz değil mi sonuç? Anakartta gibi sorun sanki. Başka bir sorun olabilir mi PSU kaynaklı ya da işlemci kaynaklı?

Az önce Cinebench testi yapaken ekran kapandı. Düğmeye basarak kapatıp açtım birkaç kez açıldı. F1e basmamı istedi BIOS'a girdi. RAM 2400MHz idi XMP açık olduğu halde sıfırlanmış gibiydi ayarları tekrar yaptırdı.

FIFA 22 oynarken arkada Spotify açınca mavi ekran verdi. Hepsinde de neredeyse farklı hata kodlarıyla. Bazen tekrar açtığımda açıldı bazen de uğraşa uğraşa açtım. Format attım düzeldi 15 gün bir şey olmadı. Assassin's Creed Odyssey oynarken arkada Chrome açıp bir siteye girdiğimde bilgisayar donup kapanıyor. Bazen de mavi ekran veriyor. Valorant'ta da aynısı oldu. RAM'lerden kaynaklı diye düşündüm Memtest yaparkende dondu kapandı. Sonuna kadar ilerleyemedim. Prime95 testini başlattığımda da dondu. Anakartı Haziran'da değiştirdim. İşlemci 2 yıl olacak alalı. RAM'lerde Kingston ömür boyu garanti varmış. Hangisinde sıkıntı varsa garantiye vereceğim.
Ramleri anakartı gönderdim servise ramlerin ikiside değişti. Ama farklı model göndermişler. Kingston fury beast 8gb 3200 mhz destekler mi anakart ve işlemci?
 
Son düzenleme:

Yeni konular

Geri
Yukarı