CoD: Warzone'dan Alt Tab yaparken mavi ekran hatası

İşletim sistemi
Windows 11

kayisikent

Megapat
Katılım
17 Ağustos 2014
Mesajlar
144
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Ekran kartı
GTX 1660S
Anakart
B450M S2H v1
İşlemci
Ryzen 1600 AF
CoD: Warzone açıkken yeşil ekran vermeye başladı, oyun sırasında değil de Firefox'a geçiş için Alt Tab yaptığım sırada alıyorum genelde.
************* Preparing the environment for debugger extensions gallery repositories **************
Extensionrepository : Implicit.
Useexperimentalfeaturefornugetshare : True.
Allownugetexeupdate : True.
Nonınteractivenuget : True.
Allownugetmscredentialproviderınstall : True.
Allowparallelınitializationoflocalrepositories : True.
Enableredirecttov8jsprovider : False.
-- Configuring repositories.
----> Repository : Localınstalled, enabled: True.
----> Repository : Userextensions, enabled: True.

>>>>>>>>>>> Preparing the environment for debugger extensions gallery repositories completed, duration 0.000 seconds.

************* Waiting for debugger extensions gallery to ınitialize **************

>>>>>>>>>>> Waiting for debugger extensions gallery to ınitialize completed, duration 0.125 seconds.

----> Repository : Userextensions, enabled: True, packages count: 0
----> Repository : Localınstalled, enabled: True, packages count: 41.

Microsoft (r) Windows debugger version 10.0.27553.1004 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.

Loading dump file [C:\Users\kayis\Desktop\033124-12578-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.

Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 22621 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts personal.
Edition Build lab: 22621.1.AMD64fre.ni_release.220506-1250
Kernel base = 0xfffff805`5f000000 psloadedmodulelist = 0xfffff805`5fc13130
Debug session time: Sun mar 31 01:11:58.418 2024 (utc + 3:00)
System uptime: 0 days 0:09:33.099
Loading kernel symbols.
...............................................................
................................................................
................................................................
.........
Loading user symbols.

Loading unloaded module list.
...........
For analysis of this file, run !analyze -v
NT!kebugcheckex:
Fffff805'5F418090 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff9901'C475AD30 = 000000000000007F.
6: Kd> !analyze -v
*******************************************************************************
  • *
  • Bugcheck analysis *
  • *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7F)
This means a trap occurred in kernel mode, and it's a trap of a kind.
That the kernel isn't allowed to have/catch (bound trap) or that.
İs always instant death (double fault). The first number in the.
Bugcheck params is the number of the trap (8 = double fault, ETC)
Consult an Intel X86 family manual to learn more about what these.
Traps are. Here is a portion of those codes:
If kv shows a taskgate.
Use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
Use .trap on that Value.
Else.
.Trap on the appropriate frame will show where the trap was taken.
(On X86, this will be the ebp that goes with the procedure kitrap)
Endif.
KB will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, exceptıon_double_fault
Arg2: FfFF9901C475AE70.
Arg3: FfFF830F05EA1CD0.
Arg4: FffFF8055F2dd71b.

Debugging details:
------------------

Key_values_strıng: 1

Key : Analysis.CPU.msec
Value: 2562.

Key : Analysis.elapsed.msec
Value: 4099.

Key : Analysis.Io_Other.MB
Value: 0

Key : Analysis.IO.read.MB
Value: 0

Key : Analysis.IO.write.MB
Value: 0

Key : Analysis.ınit.CPU.msec
Value: 390.

Key : Analysis.ınit.elapsed.msec
Value: 23916.

Key : Analysis.Memory.commitpeak.MB
Value: 97.

Key : Bugcheck.code.legacyapı
Value: 0x7f.

Key : Bugcheck.code.targetmodel
Value: 0x7f.

Key : Failure.bucket
Value: 0x7f_8_nt!kidoublefaultabort

Key : Failure.hash
Value: {D1F8395A-8C58-45da-6EBF-E8bb4aad2FC5}

Key : Wer.OS.branch
Value: Ni_release.

Key : Wer.OS.version
Value: 10.0.22621.1

Bugcheck_code: 7F.

Bugcheck_p1: 8

Bugcheck_p2: FfFF9901C475AE70.

Bugcheck_p3: FfFF830F05EA1CD0.

Bugcheck_p4: FffFF8055F2dd71b.

Fıle_ın_cab: 033124-12578-01.dmp

Trap_frame: FfFF9901C475AE70 -- (.trap 0xffff9901c475ae70)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = fffFF9841EE469A9 rbx = 0000000000000000 rcx = fffFD686610D3820.
Rdx = 0000000000000007 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8055F2dd71b rsp = ffFF830F05EA1CD0 rbp = ffFF830F05EA1D30.
R8 = 0000000000000000 R9 = ffFF830F05EA2220 R10 = 0000000000000007.
R11 = fffFD686610D3820 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up di ng nzna po nc.
NT!etwpeventwritefull+0x3b:
Fffff805'5F2dd71b 4C898D78010000 mov qword ptr [rbp+178h],R9 SS:0018:ffff830F'05EA1EA8=????????????????
Resetting default scope.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: System.

Stack_text:
Ffff9901'C475AD28 fffff805'5F42DC29 : 00000000'0000007F 00000000'00000008 ffff9901'C475AE70 ffff830F'05EA1CD0 : NT!kebugcheckex
Ffff9901'C475AD30 fffff805'5F427B6F : C3D8a4D6'edbca673 F2FC0255'b4b25153 2254A942'1B05D840 5E758B7A'781493AC : NT!kibugcheckdispatch+0x69
Ffff9901'C475AE70 fffff805'5F2dd71b : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : NT!kidoublefaultabort+0x32F
Ffff830F'05EA1CD0 00000000'00000000 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : NT!etwpeventwritefull+0x3b

Symbol_name: NT!kidoublefaultabort+32F

Module_name: NT.

Image_name: ntkrnlmp.exe

Image_versıon: 10.0.22621.3374

Stack_command: .cxr; .ecxr ; KB.

Bucket_ıd_func_offset: 32F.

Faılure_bucket_ıd: 0x7f_8_nt!kidoublefaultabort

Os_versıon: 10.0.22621.1

Buıldlab_str: Ni_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {D1F8395A-8C58-45da-6EBF-E8bb4aad2FC5}

Followup: Machineowner.
---------
Bu da konuyu açarken yediğim mavi ekran dosyası :)
 
Varsa, Windows güncelleştirmelerinizi yapın.

Ekran kartı sürücünüzü DDU ile kaldırıp güncel bir sürümünü kurun:

sfc /scannow rehberi uygulayın:

DISM rehberini uygulayın:
 
COMODO Firewall Pro Sandbox yazılımını kaldırıp kontrol et ayrıca.

* Free Firewall | Best Comodo Firewall Software Download 2022
Yüklü uygulamalar listesinde Comodo IS ile Comodo Secure Shopping var, sandbox yok. Nasıl kaldırabilirim?
Comodo IS yi komple kaldırasam daha iyi sanki? Neme lazım sonuçta..

edit:
* sfc/scannow sonucu: Windows Resource Protection found corrupt files and successfully repaired them.

* DISM sonucu:
Microsoft Windows [Version 10.0.22631.3374]
(c) Microsoft Corporation. Tüm hakları saklıdır.

C:\Windows\System32>DISM /Online /Cleanup-Image /CheckHealth

Deployment Image Servicing and Management tool
Version: 10.0.22621.2792

Image Version: 10.0.22631.3374

No component store corruption detected.
The operation completed successfully.

C:\Windows\System32>DISM /Online /Cleanup-Image /ScanHealth

Deployment Image Servicing and Management tool
Version: 10.0.22621.2792

Image Version: 10.0.22631.3374

[==========================100.0%==========================] No component store corruption detected.
The operation completed successfully.

C:\Windows\System32>DISM /Online /Cleanup-Image /RestoreHealth

Deployment Image Servicing and Management tool
Version: 10.0.22621.2792

Image Version: 10.0.22631.3374

[==========================100.0%==========================] The restore operation completed successfully.
The operation completed successfully.

C:\Windows\System32>
* DDU ile silip güncel versiyonu tekrar kurdum. Umarım tekrarlamaz. Teşekkürler cevaplarınız için.

@Webcam kullanan insan @181951 yine mavi ekran yedim, yine cod.exe ile firefox.exe açık iken. Tekrar bakar mısınız rica etsem. İlk mesajı komple yapmıştım. Mavi ekrandan sonra Comodo is silindi ve BIOS güncellendi (bu hafta gelmiş yeni sürümü).

Link: 040324-11750-01.7z
 
Son düzenleme:
@Webcam kullanan insan @181951 yine mavi ekran yedim, yine cod.exe ile firefox.exe açık iken. Tekrar bakar mısınız rica etsem. İlk mesajı komple yapmıştım. Mavi ekrandan sonra Comodo is silindi ve BIOS güncellendi (bu hafta gelmiş yeni sürümü).

Link: 040324-11750-01.7z
Memtest86 ile RAM testi yapar mısınız:
 

Technopat Haberler

Yeni konular

Geri
Yukarı