KafiLee
Zeptopat
- Katılım
- 29 Mart 2024
- Mesajlar
- 3
Daha fazla
- Cinsiyet
- Erkek
- RAM
- Kingston Fury 3600 mhz
- SSD veya HDD modeli
- Corsair MP510
- Ekran kartı
- MSI GTX 1660 Super
- Anakart
- MSI B450 Tomahawk
- İşlemci
- AMD ryzen 5 3600
PUBG ve RDR2 oyunlarını oynarken belli bir aşamadan sonra mavi ekran hatası alıyorum, Windows 11 kullanıyorum, minidump dosyasını ekleyeceğim (not: Memtest sonucu temiz çıkmıştır RAM'larda herhagi bir sorun yok) yardımcı olursanız sevinirim yaklaşık 3-4 aydır bu hatayı sürekli alıyorum bu sebeple daha önce kullandığım RAM'ların bozuk olduğunu düşünerek yeni RAM aldım buna rağmen mavi ekran hatası devam ediyor.
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Erkam\Desktop\012124-6812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff804`07600000 PsLoadedModuleList = 0xfffff804`082134a0
Debug session time: Sun Jan 21 16:19:29.624 2024 (UTC + 3:00)
System Uptime: 3 days 17:19:35.259
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
.............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000001c`72204018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`07a16b00 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff800e`9bf0f010=00000000000000be
11: kd> !analyze -v
*******************************************************************************
*
Bugcheck Analysis *
*
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffa178ff809000, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff800e9bf0f230, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2046
Key : Analysis.Elapsed.mSec
Value: 8557
Key : Analysis.IO.Other.Mb
Value: 23
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 26
Key : Analysis.Init.CPU.mSec
Value: 217
Key : Analysis.Init.Elapsed.mSec
Value: 61639
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.LegacyAPI
Value: 0xbe
Key : Bugcheck.Code.TargetModel
Value: 0xbe
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!MiSystemFault
Key : Failure.Hash
Value: {d80c40a2-5000-439f-696b-1bd8abb14be3}
BUGCHECK_CODE: be
BUGCHECK_P1: ffffa178ff809000
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffff800e9bf0f230
BUGCHECK_P4: b
FILE_IN_CAB: 012124-6812-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: myacsvc.exe
TRAP_FRAME: ffff800e9bf0f230 -- (.trap 0xffff800e9bf0f230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa178ff808fd0 rbx=0000000000000000 rcx=ffffa178ff808fd0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80407a2d265 rsp=ffff800e9bf0f3c8 rbp=ffff800e9bf0f560
r8=0000000000000010 r9=ffffa178ff808ff6 r10=ffffa178ff809000
r11=ffffffffffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!memset+0xa5:
fffff804`07a2d265 410f1101 movups xmmword ptr [r9],xmm0 ds:ffffa178`ff808ff6=????????????????????????????????
Resetting default scope
STACK_TEXT:
ffff800e`9bf0f008 fffff804`07a8c96f : 00000000`000000be ffffa178`ff809000 8a000000`00200121 ffff800e`9bf0f230 : nt!KeBugCheckEx
ffff800e`9bf0f010 fffff804`0786211c : 00000000`00000000 00000000`00000003 00000000`00000000 ffffa178`ff809000 : nt!MiSystemFault+0x1fd55f
ffff800e`9bf0f110 fffff804`07a27929 : ffff800e`9bf0f378 00000000`00000001 00000000`00000000 ffff800e`9bf0f378 : nt!MmAccessFault+0x29c
ffff800e`9bf0f230 fffff804`07a2d265 : fffff804`07849b28 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x369
ffff800e`9bf0f3c8 fffff804`07849b28 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memset+0xa5
ffff800e`9bf0f3d0 fffff804`08032203 : 00000000`000001b8 00000000`78048034 00000000`78047e7c ffff800e`9bf0f430 : nt!RtlClearBitsEx+0x98
ffff800e`9bf0f400 fffff804`08032188 : ffffb588`ec2ec010 00000000`ffffffff 00000000`00000000 fffff804`7e7c0000 : nt!MiMarkRetpolineBits+0x63
ffff800e`9bf0f430 fffff804`07ed2d4d : ffffb588`ec2ec010 ffffb588`ec2ec010 00000000`ffffffff 00000000`00000000 : nt!MiMarkKernelImageRetpolineBits+0x34
ffff800e`9bf0f460 fffff804`07deb0f1 : ffffb588`00000001 00000000`ffffffff 00000000`00001b7e ffff827c`023f3e00 : nt!MiUnloadSystemImage+0x1b2b1d
ffff800e`9bf0f640 fffff804`07e48c20 : ffffb588`e8778e00 ffff800e`9bf0f7e0 00000000`00000000 00000000`00000000 : nt!MmUnloadSystemImage+0x41
ffff800e`9bf0f670 fffff804`07cf352e : ffffb588`e8778e00 ffffb588`e8778e00 ffffd787`08c557e0 ffffb588`e8778e00 : nt!IopDeleteDriver+0x40
ffff800e`9bf0f6c0 fffff804`0787dff3 : 00000000`00000000 00000000`00000000 ffff800e`9bf0f7e0 ffffb588`e8778e30 : nt!ObpRemoveObjectRoutine+0x7e
ffff800e`9bf0f720 fffff804`07a6adba : 00000000`00000000 ffffb588`e8778e30 ffff800e`9bf0f7e0 ffffb588`e8778e30 : nt!ObfDereferenceObject+0x93
ffff800e`9bf0f760 fffff804`078828b5 : ffffb588`e92efbe0 fffff804`078ebe00 ffffb588`ebeb63b0 fffff804`07881e23 : nt!IopCompleteUnloadOrDelete+0x262aea
ffff800e`9bf0f820 fffff804`07cf9c62 : ffffb588`f4d5dc70 00000000`00000000 00000000`00000000 ffffb588`e92efbe0 : nt!IopDecrementDeviceObjectRef+0x165
ffff800e`9bf0f870 fffff804`07cf352e : ffffb588`de6f3980 ffffb588`f4d5dc40 ffffb588`f4d5dc40 ffff800e`9bf0fa49 : nt!IopDeleteFile+0x1c2
ffff800e`9bf0f8f0 fffff804`078ec627 : 00000000`00000000 00000000`00000000 ffff800e`9bf0fa49 ffffb588`f4d5dc70 : nt!ObpRemoveObjectRoutine+0x7e
ffff800e`9bf0f950 fffff804`07d437d4 : 00000000`00000001 00000000`00000001 00000000`00000180 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0xc7
ffff800e`9bf0f990 fffff804`07d403a9 : 00000000`7ffe0380 00000125`5d67b810 00000000`00000180 00000125`5d650000 : nt!ObpCloseHandle+0x2a4
ffff800e`9bf0fab0 fffff804`07a2bbe8 : ffffb588`e43e40c0 ffff800e`9bf0fb60 00000125`5d67c870 ffffffff`94b62e00 : nt!NtClose+0x39
ffff800e`9bf0fae0 00007fff`0404f554 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001c`727ff9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0404f554
SYMBOL_NAME: nt!MiSystemFault+1fd55f
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.3007
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1fd55f
FAILURE_BUCKET_ID: AV_nt!MiSystemFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d80c40a2-5000-439f-696b-1bd8abb14be3}
Followup: MachineOwner
---------