Yeni RTX 3060 Ti sistemde Mavi Ekran / Sebepsiz Restartlar

İşletim sistemi
Windows 11

Lozu

Femtopat
Katılım
26 Aralık 2022
Mesajlar
3
Yer
Ankara
Daha fazla  
Cinsiyet
Erkek
Meslek
Avukat
RAM
GSKILL 32GB (2x16GB) FLARE X5 DDR5 6000MHz CL36
SSD veya HDD modeli
KINGSTON KC3000 2 TB NVME
Ekran kartı
3060 Ti
Anakart
Asus TUF Gaming X670E-Plus WIFI
İşlemci
AMD Ryzen 7 7700X
Merhaba, çoğu sorunumun çözümü için forumdan faydalanıyordum. Fakat bu sefer çözemediğim bir sorun için üye oldum ve ilk mesajımla sizlerden yardım rica ediyorum. Elimden geldiğince detaylı açıklamaya çalışacağım.

Yeni bir sistem topladım, sistemin özellikleri:

Windows 11 Pro kullanıyorum.

GSKILL 32GB (2x16GB) FLARE X5 DDR5 6000MHz CL36 1.35V PC RAM
Asus TUF Gaming X670E-Plus WIFI AMD X670
AMD Ryzen 7 7700X 4.5 GHz
KINGSTON KC3000 2 TB NVME GEN4 SSD 7000/7000
COOLER MASTER MASTELIQUID ML240 SIVI SOGUTMA KITI
MSI MAG FORGE 112R
Gigabyte 3060 Ti Vision
COUGAR GEX850 850W 80PLUS GOLD GÜÇ KAYNAĞI

Bazen durduk yere, bazen Chrome kullanırken, bazen Steam üzerinden oyuna çalıştır dediğim anda, bazen oyun içerisinden ana-menüye dönerken değişik ve random zamanlarda mavi ekran hatası alıyorum. Bazense, sistem mavi ekran hatası vermeden direkt kendini resetliyor.
Forumda gördüğüm ve araştırabildiğim her yöntemi denedim. (Sfcscan, DISM, sistemi formatlayıp sıfırdan kurma, tüm driverlar ve Windows güncel, BIOS güncel, GPU'da herhangi bir OC yok, CPU Max: 72 derece, GPU sıcaklığı Max: 85)

Memtest86 sonucu temiz çıktı, sonuca ilişkin görüntü:
mem.jpeg

-BIOS'ta yaptığım tek ayar, AI Overclock Tuner => Expo2 ve CPU Core Ratio = AI Optimized. Bu iki değişiklikten başka BIOS'ta bir değişiklik yapmadım.
2.jpeg


1.jpeg


3.jpeg

Minidump Dosyalarından birkaçı:

Mavi ekran almadığım zamanlar için olay görüntüleyiciden birkaç örnek:
1.jpg


2.jpg


3.jpg


4.jpg


5.jpg

Zahmet verip vaktinizden ayırıp okuduğunuz için teşekkür ederim. Gerçekten çözüm noktasında fikrim kalmadı.
OC ve Undervoltage konularında oldukça zayıfım. Hele ki yeni seri işlemciler konusunda epey uzak kaldım.
Bu nedenle stok ayarlar dışında pek bir değişiklik yapmadım/yapamadım.
Kıymetli geri dönüşleriniz için şimdiden teşekkürler.
 
Son düzenleme:
Gigabyte programlarını - sürücülerini kaldırıp tekrar yükleyin.
MediaTek Wi-Fi sürücüsünü güncelleyin.

Gigabyte programlarını kaldırıp tekrar yükledim, hatta format sonrası ekran kartı için Gigabyte programını hiç yüklemeden denedim sonuç aynıydı.

MediaTek Wi-Fi için önerinizi deneyeceğim.

Gigabyte programlarını - sürücülerini kaldırıp tekrar yükleyin.
MediaTek Wi-Fi sürücüsünü güncelleyin.

Hocam görüntüdeki aygıtların hepsi güncel gözüküyor.
Sitesinden indirdiğim MediaTek-Wifi Driver V3.3.0525 rardan çıkardığım halde, setup dosyasını tıkladığım zaman herhangi bir kurulum başlamıyor. Asus ile irtibata geçeceğim fakat sizlerin bir önerisi var mı?
Teşekkürler.

Mediatek Hem wifi hem bluetooth, Asus'un sitesindeki en güncel sürüm gözükmekte.
Alternatif öneriniz var mı acaba?

-----
Güncel Mesaj:

27.12.2022 tarihi itibari ile almış olduğum mavi ekrana ilişkin minidump dosyası:

Mavi ekrandan önce ekranda ufak bir git-gel oldu sanırım. Olay görüntüleyici kayıtları:
ekran git gel.jpg ekran git gel 3.jpg ekran git gel2.jpg

İlginiz için tekrar teşekkürler.

----

28.12.2022 tarihli minidump:

An itibari bilgisayara format atıp windows 11 home kurulumu sağladım. Sadece asus üzerinden driverlar, ekran kartı driverını ve steelseries/logitech driverlarını kurdum.
Hiçbir şey yapmazken mavi ekran almaya devam ediyorum.
Çaresizce yardımlarınızı rica ediyorum.

 

Dosya Ekleri

  • mediatek.jpg
    mediatek.jpg
    75,2 KB · Görüntüleme: 34
  • wifi.jpg
    wifi.jpg
    45,5 KB · Görüntüleme: 40
  • realtekwifi.jpg
    realtekwifi.jpg
    43,5 KB · Görüntüleme: 37
Son düzenleme:
28.12.2022 tarihli minidump:
X.M.P açık mı? Açık ve kapalı olarak RAM testi yapabilir misiniz? Konudaki testte nasıldı? Disk ya da RAM kaynaklı kanımca, disk sağlıklarını da paylaşabilir misiniz?
@Enes3078

Hocam siz de bir göz atabilir misiniz?


Kod:
Debug session time: Wed Dec 28 02:35:05.193 2022 (UTC + 3:00)
Loading Dump File [C:\SysnativeBSODApps\122822-10578-01.dmp]
System Uptime: 0 days 0:23:39.932
BugCheck Info: NTFS_FILE_SYSTEM (24)
Bugcheck code 00000024
Arguments:
Arg1: 000000af000c0a1d
Arg2: 0000000004c38348
Arg3: 0000000140000000
Arg4: 0000000140000000
PROCESS_NAME:  AacKingstonDra
Probably caused by: Ntfs.sys ( Ntfs+3bea9 )
FAILURE_BUCKET_ID:  0x24_Ntfs!unknown_function
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Debug session time: Wed Dec 28 02:02:49.791 2022 (UTC + 3:00)
Loading Dump File [C:\SysnativeBSODApps\122822-10437-01.dmp]
System Uptime: 0 days 0:01:28.530
BugCheck Info: MEMORY_MANAGEMENT (1a)
Bugcheck code 0000001A
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffbf80ca80a540
Arg3: 0000001c00000000
Arg4: 0000000000000000
PROCESS_NAME:  chrome.exe
Probably caused by: ntkrnlmp.exe ( nt!MiDeleteVa+1597 )
FAILURE_BUCKET_ID:  0x1a_41792_nt!MiDeleteVa
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Debug session time: Wed Dec 28 01:57:30.842 2022 (UTC + 3:00)
Loading Dump File [C:\SysnativeBSODApps\122822-10531-01.dmp]
System Uptime: 0 days 0:03:33.588
BugCheck Info: CRITICAL_PROCESS_DIED (ef)
Bugcheck code 000000eF
Arguments:
Arg1: ffffe409258d51c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: ffffe409258d51c0, The process object that initiated the termination.
Arg4: 0000000000000000
PROCESS_NAME:  services.exe
Probably caused by: bcryptPrimitives.dll
FAILURE_BUCKET_ID:  0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_25be3080_bcryptPrimitives.dll!_IMAGE_bcryptPrimitives.dll
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Debug session time: Wed Dec 28 00:02:25.797 2022 (UTC + 3:00)
Loading Dump File [C:\SysnativeBSODApps\122822-8937-01.dmp]
System Uptime: 0 days 0:09:11.384
BugCheck Info: IRQL_NOT_LESS_OR_EQUAL (a)
Bugcheck code 0000000A
Arguments:
Arg1: ffffa38f00000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040fe4990e, address which referenced memory
PROCESS_NAME:  chrome.exe
Probably caused by: ntkrnlmp.exe ( nt!MiGetPageProtection+be )
FAILURE_BUCKET_ID:  AV_nt!MiGetPageProtection
BiosVersion = 0821
BiosReleaseDate = 11/15/2022
SystemManufacturer = ASUS
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
SystemProductName = System Product Name
BaseBoardProduct = TUF GAMING X670E-PLUS WIFI
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``

Kod:
STACK_TEXT:   
ffffe680`e733eb18 fffff805`4766bea9     : 00000000`00000024 000000af`000c0a1d 00000000`04c38348 00000001`40000000 : nt!KeBugCheckEx
ffffe680`e733eb20 fffff805`4766a3ce     : ffff9f03`00000000 00000000`00000000 ffff9f02`e4ced1b0 0000004c`38348000 : Ntfs+0x3bea9
ffffe680`e733ec50 fffff805`440cb975     : ffff9f02`f880baa0 ffff9f03`01fc8a10 ffff9f02`e4b31d60 ffff9f03`01fc8e40 : Ntfs+0x3a3ce
ffffe680`e733ed40 fffff805`40d99f5b     : 00000000`00000000 ffff9f02`f880baa0 ffffe5f2`c0000040 fffff805`4411e8c5 : nt!IofCallDriver+0x55
ffffe680`e733ed80 fffff805`40d97ba3     : ffffe680`e733ee10 00000000`00000000 ffffffff`ffffff00 ffffe680`e733ee58 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b
ffffe680`e733edf0 fffff805`440cb975     : ffff9f03`01fc8a10 fffff805`440cb587 00000000`00000001 00000000`00000043 : FLTMGR!FltpDispatch+0xa3
ffffe680`e733ee50 fffff805`440aedac     : ffff9f03`01fc8a10 00000000`00000000 00000000`00000002 ffffffff`ffffffff : nt!IofCallDriver+0x55
ffffe680`e733ee90 fffff805`440d6427     : 00000000`00000000 fffff805`44055966 ffff9f02`f1b1e730 ffff9f02`f1b1e6f0 : nt!IoPageReadEx+0x46c
ffffe680`e733ef10 fffff805`440d59c7     : 00000000`00000002 ffffe680`e733f160 ffff9f02`f1b1e6d0 fffff805`440c19f9 : nt!MiIssueHardFaultIo+0x107
ffffe680`e733ef60 fffff805`4429b5ba     : 04c38348`307502fe ffff9f02`ed188650 ffffe680`e733f380 00000000`00000000 : nt!MiIssueHardFault+0x207
ffffe680`e733f060 fffff805`44054dc2     : 0a000007`c38bf867 00000000`00000000 04c38348`307502fe ffffe5f2`c0000040 : nt!MiInPagePageTable+0x1bfcaa
ffffe680`e733f240 fffff805`44054339     : ffffe680`e733f3a0 00000000`00000000 ffff9f02`ed2f7080 00000000`00000000 : nt!MiResolvePageTablePage+0x1d2
ffffe680`e733f2b0 fffff805`44053b4b     : ffff9f02`ed2ec080 00000000`00000000 00000000`00000000 ffffb000`be111180 : nt!MiUserFault+0x409
ffffe680`e733f340 fffff805`44239329     : 00000000`00000000 00000000`00000000 00000000`010dfda0 ffffffff`ff676980 : nt!MmAccessFault+0x13b
ffffe680`e733f460 00000000`77721cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x369
00000000`010deb38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77721cf3


SYMBOL_NAME:  Ntfs+3bea9

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.22621.1028

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Dec 28 02:02:49.791 2022 (UTC + 3:00)**************************
STACK_TEXT:   
ffff8b89`7d2e6758 fffff806`27668967     : 00000000`0000001a 00000000`00041792 ffffbf80`ca80a540 0000001c`00000000 : nt!KeBugCheckEx
ffff8b89`7d2e6760 fffff806`2765830d     : 00000000`00000000 ffff8b89`7d2e6c60 ffffb876`05f4636e 00000000`00000000 : nt!MiDeleteVa+0x1597
ffff8b89`7d2e6860 fffff806`2765810d     : ffffbf80`00000000 00000000`00000000 00000000`00000000 ffff8d87`42922700 : nt!MiWalkPageTablesRecursively+0xb2d
ffff8b89`7d2e68f0 fffff806`2765810d     : ffffbfdf`00000000 00000000`00000000 00000000`00000001 ffff8d87`42922700 : nt!MiWalkPageTablesRecursively+0x92d
ffff8b89`7d2e6980 fffff806`2765810d     : ffffbfdf`00000000 00000000`00000000 00000000`00000002 ffff8d87`42922700 : nt!MiWalkPageTablesRecursively+0x92d
ffff8b89`7d2e6a10 fffff806`2767b1d1     : ffff8b89`00000000 ffffbfdf`00000000 00000189`00000003 ffff8d87`42922700 : nt!MiWalkPageTablesRecursively+0x92d
ffff8b89`7d2e6aa0 fffff806`276671b7     : ffff8b89`7d2e6c60 00000000`00000001 00000189`00000002 00000000`00000000 : nt!MiWalkPageTables+0x371
ffff8b89`7d2e6ba0 fffff806`276a1e02     : 00000000`00000000 fffff806`276a1fcd ffff8b89`7d2e6f68 ffff8d87`4101a080 : nt!MiDeletePagablePteRange+0x747
ffff8b89`7d2e6ed0 fffff806`27ab13d8     : 00000000`00000000 00000000`00000001 00000000`00000000 ffff8b89`7d2e6fa0 : nt!MiDeleteVirtualAddresses+0x52
ffff8b89`7d2e6f20 fffff806`27af816e     : ffff8d87`42922080 ffff8d87`40c77f30 ffff8d87`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
ffff8b89`7d2e6fe0 fffff806`27af7cd5     : ffff8d87`40c77c10 ffff8d87`40c77c10 ffff8d87`40c77c10 ffff8d87`42922080 : nt!MiCleanVad+0x42
ffff8b89`7d2e7010 fffff806`27b42711     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8d87`42922080 : nt!MmCleanProcessAddressSpace+0x10d
ffff8b89`7d2e7090 fffff806`27a8e4a4     : ffff8d87`42922080 ffffad01`2c6f7060 ffff8b89`7d2e72b9 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffff8b89`7d2e7120 fffff806`27bc9188     : ffff8d87`c0000005 fffff806`276c9e01 ffff8d87`4101a0f4 00000047`3b10d000 : nt!PspExitThread+0x63c
ffff8b89`7d2e7220 fffff806`27617bc7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8b89`7d2e7260 fffff806`2782e8a0     : 00000003`8e803e01 ffff8b89`7d2e7320 00000000`00000000 00000003`8ebfffff : nt!KiDeliverApc+0x4a7
ffff8b89`7d2e7320 fffff806`2783d58f     : ffff8d87`4101a080 ffff8d87`42817960 ffff8b89`7d2e7478 ffffffff`eced3000 : nt!KiInitiateUserApc+0x70
ffff8b89`7d2e7460 00007ffc`09acee84     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000047`3e9ff5d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`09acee84


SYMBOL_NAME:  nt!MiDeleteVa+1597

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.963

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Dec 28 01:57:30.842 2022 (UTC + 3:00)**************************
STACK_TEXT:   
ffffd08f`8da77298 fffff801`6ebaa3ab     : 00000000`000000ef ffffe409`258d51c0 00000000`00000000 ffffe409`258d51c0 : nt!KeBugCheckEx
ffffd08f`8da772a0 fffff801`6eae3c9b     : ffffe409`258d51c0 fffff801`6e5359c9 00000000`00000002 fffff801`6e50734b : nt!PspCatchCriticalBreak+0x11b
ffffd08f`8da77330 fffff801`6e96ee5f     : ffffe409`258d51c0 00000000`c0000005 ffffe409`258d51c0 ffffe409`258d51c0 : nt!PspTerminateAllThreads+0x172fa7
ffffd08f`8da773a0 fffff801`6e96ec31     : ffffffff`ffffffff ffffe409`258d51c0 ffffe409`25be3080 ffffe409`258d51c0 : nt!PspTerminateProcess+0xe3
ffffd08f`8da773e0 fffff801`6e63d4e8     : ffffe409`00000488 ffffe409`25be3080 ffffe409`258d51c0 ffffe409`258d51c0 : nt!NtTerminateProcess+0xb1
ffffd08f`8da77460 00007ffd`62a4f384     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003b`f8b7d4a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`62a4f384


¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Dec 28 00:02:25.797 2022 (UTC + 3:00)**************************
STACK_TEXT:   
fffff300`0defebf8 fffff804`1003dda9     : 00000000`0000000a ffffa38f`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff300`0defec00 fffff804`10039434     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff300`0deff034 : nt!KiBugCheckDispatch+0x69
fffff300`0defed40 fffff804`0fe4990e     : ffffffff`ffffffff fffffafd`7eafffa8 fffffafd`5fff5c60 ffffd28a`6581b140 : nt!KiPageFault+0x474
fffff300`0defeed0 fffff804`0fe48809     : 00000000`00000000 00000000`00001000 00000000`00000000 fffff300`0deff030 : nt!MiGetPageProtection+0xbe
fffff300`0defef30 fffff804`0fe45c95     : 00000000`00000000 fffff300`0deff199 00000000`00000002 ffffd28a`74e370c0 : nt!MiQueryAddressState+0x4c9
fffff300`0deff140 fffff804`10297227     : fffff300`0deff290 00007ffd`715bc000 ffffd28a`78110000 ffffd28a`7811a9a0 : nt!MiQueryAddressSpan+0x2a5
fffff300`0deff200 fffff804`10296ad5     : fffffafd`5afc0008 fffffafd`7ead7e00 fffffafd`7ebf56b8 ffffd28a`74e37740 : nt!MmQueryVirtualMemory+0x737
fffff300`0deff3a0 fffff804`1003d4e8     : 00000000`00000000 00000000`00000000 00000000`00000000 000000ec`b7ffec58 : nt!NtQueryVirtualMemory+0x25
fffff300`0deff3f0 00007ffd`e6bcf264     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ec`b7ffee68 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e6bcf264


SYMBOL_NAME:  nt!MiGetPageProtection+be

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.963
 
X.M.P açık mı? Açık ve kapalı olarak RAM testi yapabilir misiniz? Konudaki testte nasıldı? Disk ya da RAM kaynaklı kanımca, disk sağlıklarını da paylaşabilir misiniz?
@Enes3078

Hocam siz de bir göz atabilir misiniz?


Kod:
Debug session time: Wed Dec 28 02:35:05.193 2022 (UTC + 3:00)
Loading Dump File [C:\SysnativeBSODApps\122822-10578-01.dmp]
System Uptime: 0 days 0:23:39.932
BugCheck Info: NTFS_FILE_SYSTEM (24)
Bugcheck code 00000024
Arguments:
Arg1: 000000af000c0a1d
Arg2: 0000000004c38348
Arg3: 0000000140000000
Arg4: 0000000140000000
PROCESS_NAME:  AacKingstonDra
Probably caused by: Ntfs.sys ( Ntfs+3bea9 )
FAILURE_BUCKET_ID:  0x24_Ntfs!unknown_function
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Debug session time: Wed Dec 28 02:02:49.791 2022 (UTC + 3:00)
Loading Dump File [C:\SysnativeBSODApps\122822-10437-01.dmp]
System Uptime: 0 days 0:01:28.530
BugCheck Info: MEMORY_MANAGEMENT (1a)
Bugcheck code 0000001A
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffbf80ca80a540
Arg3: 0000001c00000000
Arg4: 0000000000000000
PROCESS_NAME:  chrome.exe
Probably caused by: ntkrnlmp.exe ( nt!MiDeleteVa+1597 )
FAILURE_BUCKET_ID:  0x1a_41792_nt!MiDeleteVa
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Debug session time: Wed Dec 28 01:57:30.842 2022 (UTC + 3:00)
Loading Dump File [C:\SysnativeBSODApps\122822-10531-01.dmp]
System Uptime: 0 days 0:03:33.588
BugCheck Info: CRITICAL_PROCESS_DIED (ef)
Bugcheck code 000000eF
Arguments:
Arg1: ffffe409258d51c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: ffffe409258d51c0, The process object that initiated the termination.
Arg4: 0000000000000000
PROCESS_NAME:  services.exe
Probably caused by: bcryptPrimitives.dll
FAILURE_BUCKET_ID:  0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_25be3080_bcryptPrimitives.dll!_IMAGE_bcryptPrimitives.dll
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Debug session time: Wed Dec 28 00:02:25.797 2022 (UTC + 3:00)
Loading Dump File [C:\SysnativeBSODApps\122822-8937-01.dmp]
System Uptime: 0 days 0:09:11.384
BugCheck Info: IRQL_NOT_LESS_OR_EQUAL (a)
Bugcheck code 0000000A
Arguments:
Arg1: ffffa38f00000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040fe4990e, address which referenced memory
PROCESS_NAME:  chrome.exe
Probably caused by: ntkrnlmp.exe ( nt!MiGetPageProtection+be )
FAILURE_BUCKET_ID:  AV_nt!MiGetPageProtection
BiosVersion = 0821
BiosReleaseDate = 11/15/2022
SystemManufacturer = ASUS
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
SystemProductName = System Product Name
BaseBoardProduct = TUF GAMING X670E-PLUS WIFI
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``

Kod:
STACK_TEXT:  
ffffe680`e733eb18 fffff805`4766bea9     : 00000000`00000024 000000af`000c0a1d 00000000`04c38348 00000001`40000000 : nt!KeBugCheckEx
ffffe680`e733eb20 fffff805`4766a3ce     : ffff9f03`00000000 00000000`00000000 ffff9f02`e4ced1b0 0000004c`38348000 : Ntfs+0x3bea9
ffffe680`e733ec50 fffff805`440cb975     : ffff9f02`f880baa0 ffff9f03`01fc8a10 ffff9f02`e4b31d60 ffff9f03`01fc8e40 : Ntfs+0x3a3ce
ffffe680`e733ed40 fffff805`40d99f5b     : 00000000`00000000 ffff9f02`f880baa0 ffffe5f2`c0000040 fffff805`4411e8c5 : nt!IofCallDriver+0x55
ffffe680`e733ed80 fffff805`40d97ba3     : ffffe680`e733ee10 00000000`00000000 ffffffff`ffffff00 ffffe680`e733ee58 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b
ffffe680`e733edf0 fffff805`440cb975     : ffff9f03`01fc8a10 fffff805`440cb587 00000000`00000001 00000000`00000043 : FLTMGR!FltpDispatch+0xa3
ffffe680`e733ee50 fffff805`440aedac     : ffff9f03`01fc8a10 00000000`00000000 00000000`00000002 ffffffff`ffffffff : nt!IofCallDriver+0x55
ffffe680`e733ee90 fffff805`440d6427     : 00000000`00000000 fffff805`44055966 ffff9f02`f1b1e730 ffff9f02`f1b1e6f0 : nt!IoPageReadEx+0x46c
ffffe680`e733ef10 fffff805`440d59c7     : 00000000`00000002 ffffe680`e733f160 ffff9f02`f1b1e6d0 fffff805`440c19f9 : nt!MiIssueHardFaultIo+0x107
ffffe680`e733ef60 fffff805`4429b5ba     : 04c38348`307502fe ffff9f02`ed188650 ffffe680`e733f380 00000000`00000000 : nt!MiIssueHardFault+0x207
ffffe680`e733f060 fffff805`44054dc2     : 0a000007`c38bf867 00000000`00000000 04c38348`307502fe ffffe5f2`c0000040 : nt!MiInPagePageTable+0x1bfcaa
ffffe680`e733f240 fffff805`44054339     : ffffe680`e733f3a0 00000000`00000000 ffff9f02`ed2f7080 00000000`00000000 : nt!MiResolvePageTablePage+0x1d2
ffffe680`e733f2b0 fffff805`44053b4b     : ffff9f02`ed2ec080 00000000`00000000 00000000`00000000 ffffb000`be111180 : nt!MiUserFault+0x409
ffffe680`e733f340 fffff805`44239329     : 00000000`00000000 00000000`00000000 00000000`010dfda0 ffffffff`ff676980 : nt!MmAccessFault+0x13b
ffffe680`e733f460 00000000`77721cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x369
00000000`010deb38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77721cf3


SYMBOL_NAME:  Ntfs+3bea9

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.22621.1028

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Dec 28 02:02:49.791 2022 (UTC + 3:00)**************************
STACK_TEXT:  
ffff8b89`7d2e6758 fffff806`27668967     : 00000000`0000001a 00000000`00041792 ffffbf80`ca80a540 0000001c`00000000 : nt!KeBugCheckEx
ffff8b89`7d2e6760 fffff806`2765830d     : 00000000`00000000 ffff8b89`7d2e6c60 ffffb876`05f4636e 00000000`00000000 : nt!MiDeleteVa+0x1597
ffff8b89`7d2e6860 fffff806`2765810d     : ffffbf80`00000000 00000000`00000000 00000000`00000000 ffff8d87`42922700 : nt!MiWalkPageTablesRecursively+0xb2d
ffff8b89`7d2e68f0 fffff806`2765810d     : ffffbfdf`00000000 00000000`00000000 00000000`00000001 ffff8d87`42922700 : nt!MiWalkPageTablesRecursively+0x92d
ffff8b89`7d2e6980 fffff806`2765810d     : ffffbfdf`00000000 00000000`00000000 00000000`00000002 ffff8d87`42922700 : nt!MiWalkPageTablesRecursively+0x92d
ffff8b89`7d2e6a10 fffff806`2767b1d1     : ffff8b89`00000000 ffffbfdf`00000000 00000189`00000003 ffff8d87`42922700 : nt!MiWalkPageTablesRecursively+0x92d
ffff8b89`7d2e6aa0 fffff806`276671b7     : ffff8b89`7d2e6c60 00000000`00000001 00000189`00000002 00000000`00000000 : nt!MiWalkPageTables+0x371
ffff8b89`7d2e6ba0 fffff806`276a1e02     : 00000000`00000000 fffff806`276a1fcd ffff8b89`7d2e6f68 ffff8d87`4101a080 : nt!MiDeletePagablePteRange+0x747
ffff8b89`7d2e6ed0 fffff806`27ab13d8     : 00000000`00000000 00000000`00000001 00000000`00000000 ffff8b89`7d2e6fa0 : nt!MiDeleteVirtualAddresses+0x52
ffff8b89`7d2e6f20 fffff806`27af816e     : ffff8d87`42922080 ffff8d87`40c77f30 ffff8d87`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
ffff8b89`7d2e6fe0 fffff806`27af7cd5     : ffff8d87`40c77c10 ffff8d87`40c77c10 ffff8d87`40c77c10 ffff8d87`42922080 : nt!MiCleanVad+0x42
ffff8b89`7d2e7010 fffff806`27b42711     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8d87`42922080 : nt!MmCleanProcessAddressSpace+0x10d
ffff8b89`7d2e7090 fffff806`27a8e4a4     : ffff8d87`42922080 ffffad01`2c6f7060 ffff8b89`7d2e72b9 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffff8b89`7d2e7120 fffff806`27bc9188     : ffff8d87`c0000005 fffff806`276c9e01 ffff8d87`4101a0f4 00000047`3b10d000 : nt!PspExitThread+0x63c
ffff8b89`7d2e7220 fffff806`27617bc7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8b89`7d2e7260 fffff806`2782e8a0     : 00000003`8e803e01 ffff8b89`7d2e7320 00000000`00000000 00000003`8ebfffff : nt!KiDeliverApc+0x4a7
ffff8b89`7d2e7320 fffff806`2783d58f     : ffff8d87`4101a080 ffff8d87`42817960 ffff8b89`7d2e7478 ffffffff`eced3000 : nt!KiInitiateUserApc+0x70
ffff8b89`7d2e7460 00007ffc`09acee84     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000047`3e9ff5d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`09acee84


SYMBOL_NAME:  nt!MiDeleteVa+1597

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.963

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Dec 28 01:57:30.842 2022 (UTC + 3:00)**************************
STACK_TEXT:  
ffffd08f`8da77298 fffff801`6ebaa3ab     : 00000000`000000ef ffffe409`258d51c0 00000000`00000000 ffffe409`258d51c0 : nt!KeBugCheckEx
ffffd08f`8da772a0 fffff801`6eae3c9b     : ffffe409`258d51c0 fffff801`6e5359c9 00000000`00000002 fffff801`6e50734b : nt!PspCatchCriticalBreak+0x11b
ffffd08f`8da77330 fffff801`6e96ee5f     : ffffe409`258d51c0 00000000`c0000005 ffffe409`258d51c0 ffffe409`258d51c0 : nt!PspTerminateAllThreads+0x172fa7
ffffd08f`8da773a0 fffff801`6e96ec31     : ffffffff`ffffffff ffffe409`258d51c0 ffffe409`25be3080 ffffe409`258d51c0 : nt!PspTerminateProcess+0xe3
ffffd08f`8da773e0 fffff801`6e63d4e8     : ffffe409`00000488 ffffe409`25be3080 ffffe409`258d51c0 ffffe409`258d51c0 : nt!NtTerminateProcess+0xb1
ffffd08f`8da77460 00007ffd`62a4f384     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003b`f8b7d4a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`62a4f384


¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Dec 28 00:02:25.797 2022 (UTC + 3:00)**************************
STACK_TEXT:  
fffff300`0defebf8 fffff804`1003dda9     : 00000000`0000000a ffffa38f`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff300`0defec00 fffff804`10039434     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff300`0deff034 : nt!KiBugCheckDispatch+0x69
fffff300`0defed40 fffff804`0fe4990e     : ffffffff`ffffffff fffffafd`7eafffa8 fffffafd`5fff5c60 ffffd28a`6581b140 : nt!KiPageFault+0x474
fffff300`0defeed0 fffff804`0fe48809     : 00000000`00000000 00000000`00001000 00000000`00000000 fffff300`0deff030 : nt!MiGetPageProtection+0xbe
fffff300`0defef30 fffff804`0fe45c95     : 00000000`00000000 fffff300`0deff199 00000000`00000002 ffffd28a`74e370c0 : nt!MiQueryAddressState+0x4c9
fffff300`0deff140 fffff804`10297227     : fffff300`0deff290 00007ffd`715bc000 ffffd28a`78110000 ffffd28a`7811a9a0 : nt!MiQueryAddressSpan+0x2a5
fffff300`0deff200 fffff804`10296ad5     : fffffafd`5afc0008 fffffafd`7ead7e00 fffffafd`7ebf56b8 ffffd28a`74e37740 : nt!MmQueryVirtualMemory+0x737
fffff300`0deff3a0 fffff804`1003d4e8     : 00000000`00000000 00000000`00000000 00000000`00000000 000000ec`b7ffec58 : nt!NtQueryVirtualMemory+0x25
fffff300`0deff3f0 00007ffd`e6bcf264     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ec`b7ffee68 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e6bcf264


SYMBOL_NAME:  nt!MiGetPageProtection+be

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.963

Hocam mem86 test sonucunu tekrar paylaşıyorum, test yaparken expo-2 ayarı açık durumdaydı. 0 hata ile PASS sonucunu aldım. (BIOS'ta yaptığım tek ayar, AI Overclock Tuner => Expo2 ve CPU Core Ratio = AI Optimized. Bu iki değişiklikten başka BIOS'ta bir değişiklik yapmadım.)

Akşam HD TUNE testini yapıp paylaşacağım.

@Dümdüz Hocam HD Tune sonucu aşağıdadır.
Burada da bir hata gözükmüyor...
Hevesim iyice kursağımda kaldı

28.12.2022
OCCT ile 15 dakikalık power testi (SSE) yaptım, herhangi bir hata vermedi, PSU'dan şüphelenmeye başlamıştım. (Sıcaklık değerleri/güç tüketimi)

occ volt.jpg occt - cpu.jpg
 

Dosya Ekleri

  • hddtune.jpg
    hddtune.jpg
    208,8 KB · Görüntüleme: 32
Son düzenleme:

Technopat Haberler

Yeni konular

Geri
Yukarı