CS:GO oynarken mavi ekran hatası

Cufcufcuf

Hectopat
Katılım
18 Ağustos 2017
Mesajlar
80
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar anakarttım bozuldu, tamire gönderdim. Geleli 5 gün oluyor. Geldikten sonra bir CS:GO oynayayım dedim girdim oyuna başladıktan sonra silah sesi, sürekli geliyor, mesela "pampampammmmmmmmm" deyip mavi ekran veriyor. Ben de format atayım dedim, yazılımsal bir program vardır belki diye. Dün format attım. Bugün yeniden aynı sorun oldu, ben ses kartından şüpheleniyorum, ses kartını test edebileceğim bir Benchmark testi falan var mı?
 
Sorun ekran kartınızda gibi. FurMark ile de bir test edin derim. Ayrıca bellekleriniz Kit miydi?

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8013f73430b, Address of the instruction which caused the bugcheck
Arg3: ffffb7016e3860e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5281

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 14108

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8013f73430b

BUGCHECK_P3: ffffb7016e3860e0

BUGCHECK_P4: 0

CONTEXT: ffffb7016e3860e0 -- (.cxr 0xffffb7016e3860e0)
rax=fffff8014001af88 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000100c rsi=ffffe58f4dc72000 rdi=ffffbf08b5fd2cb0
rip=fffff8013f73430b rsp=ffffb7016e386ae0 rbp=ffffb7016e386c10
r8=0000000000000001 r9=0000000000000000 r10=0000000000000004
r11=fffff8014001bc6c r12=ffffe58f4dc72000 r13=ffffe58f5ac5d030
r14=ffffbf08b5fd2cb0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nvlddmkm+0xf430b:
fffff801`3f73430b 488b8b18040000 mov rcx,qword ptr [rbx+418h] ds:002b:00000000`00000418=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csgo.exe

STACK_TEXT:
ffffb701`6e386ae0 ffffe58f`5add7010 : ffffe58f`4dc72000 ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 : nvlddmkm+0xf430b
ffffb701`6e386ae8 ffffe58f`4dc72000 : ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 : 0xffffe58f`5add7010
ffffb701`6e386af0 ffffb701`6e386e08 : ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 : 0xffffe58f`4dc72000
ffffb701`6e386af8 ffffe509`c6f41f70 : ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 : 0xffffb701`6e386e08
ffffb701`6e386b00 ffffb701`6e387288 : fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 00000000`00000000 : 0xffffe509`c6f41f70
ffffb701`6e386b08 fffff801`401ea5d3 : 00000000`00000001 ffffb701`6e387200 00000000`00000000 00000000`00000000 : 0xffffb701`6e387288
ffffb701`6e386b10 00000000`00000001 : ffffb701`6e387200 00000000`00000000 00000000`00000000 ffffe58f`52829000 : nvlddmkm+0xbaa5d3
ffffb701`6e386b18 ffffb701`6e387200 : 00000000`00000000 00000000`00000000 ffffe58f`52829000 00000000`00000000 : 0x1
ffffb701`6e386b20 00000000`00000000 : 00000000`00000000 ffffe58f`52829000 00000000`00000000 00000000`000000c0 : 0xffffb701`6e387200

SYMBOL_NAME: nvlddmkm+f430b

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr 0xffffb7016e3860e0 ; kb

BUCKET_ID_FUNC_OFFSET: f430b

FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe}

Followup: MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000000e, Type of memory safety violation
Arg2: fffff30db6a8b170, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff30db6a8b0c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4156

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5991

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: e

BUGCHECK_P2: fffff30db6a8b170

BUGCHECK_P3: fffff30db6a8b0c8

BUGCHECK_P4: 0

TRAP_FRAME: fffff30db6a8b170 -- (.trap 0xfffff30db6a8b170)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8608270b1848 rbx=0000000000000000 rcx=000000000000000e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030883a184 rsp=fffff30db6a8b300 rbp=fffff30db6a8b420
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffff8608270b14e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObpCreateHandle+0x149f44:
fffff803`0883a184 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffff30db6a8b0c8 -- (.exr 0xfffff30db6a8b0c8)
ExceptionAddress: fffff8030883a184 (nt!ObpCreateHandle+0x0000000000149f44)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000000e
Subcode: 0xe FAST_FAIL_INVALID_REFERENCE_COUNT

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: MRT.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 000000000000000e

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffff30d`b6a8ae48 fffff803`08406569 : 00000000`00000139 00000000`0000000e fffff30d`b6a8b170 fffff30d`b6a8b0c8 : nt!KeBugCheckEx
fffff30d`b6a8ae50 fffff803`08406990 : 00000000`79517350 fffff30d`b6a8b000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff30d`b6a8af90 fffff803`08404d23 : 00000000`00000000 fffff30d`b6a8b408 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff30d`b6a8b170 fffff803`0883a184 : ffff8608`270b14e0 00000000`00000001 00000000`00000000 ffff8608`270b14e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffff30d`b6a8b300 fffff803`086afbf9 : fffff30d`b6a8b820 ffffdb81`02964040 ffffdb81`0e4fa2d8 fffff803`082d8c7a : nt!ObpCreateHandle+0x149f44
fffff30d`b6a8b4f0 fffff803`086ad0d3 : 00000000`00000000 00000000`00000000 00000000`00000000 00007fff`b963b4e0 : nt!ObOpenObjectByPointer+0x1b9
fffff30d`b6a8b770 fffff803`086aceb3 : 00000000`00000066 00000000`00000040 00000000`00000000 00000009`5607db10 : nt!PsOpenThread+0x213
fffff30d`b6a8bac0 fffff803`08405fb8 : 00000000`00000300 000001e5`a50e6160 fffff30d`b6a8bb80 000001e5`a5392300 : nt!NtOpenThread+0x23
fffff30d`b6a8bb00 00007fff`b956e344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000009`5607d798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b956e344

SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.572

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_e_INVALID_REFERENCE_COUNT_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e78067c0-c86e-2475-7d94-d283b49f461b}

Followup: MachineOwner
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffff91000482c220
Arg3: ffff91000a82c1f0
Arg4: 0000000000000400

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3078

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3811

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 8886

BUGCHECK_P2: ffff91000482c220

BUGCHECK_P3: ffff91000a82c1f0

BUGCHECK_P4: 400

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: SearchApp.exe

STACK_TEXT:
ffffe308`4cfb8548 fffff800`15ef5b70 : 00000000`0000001a 00000000`00008886 ffff9100`0482c220 ffff9100`0a82c1f0 : nt!KeBugCheckEx
ffffe308`4cfb8550 fffff800`15ef4be0 : ffffe308`00000002 fffff800`00000000 00000000`00180eb6 ffffe308`4cfb8b80 : nt!MiUnlinkPageFromList+0xcb0
ffffe308`4cfb85e0 fffff800`15ef41c4 : ffffe308`4cfb8880 ffffe308`4cfb8920 0000000f`ffffffff 00000001`80eb6820 : nt!MiHandleTransitionFault+0x180
ffffe308`4cfb8660 fffff800`15ef3c16 : ffffe308`4cfb8880 00000000`00000000 ffff9100`03e22d50 00000000`00000000 : nt!MiResolveTransitionFault+0x424
ffffe308`4cfb8720 fffff800`15eec425 : ffffe308`4cfb8880 00000000`00000000 ffffe308`4cfb8860 ffffe308`4cfb8a20 : nt!MiResolveProtoPteFault+0x1236
ffffe308`4cfb8820 fffff800`15eea369 : 00000000`00000000 00000000`00000100 00000000`c0000016 ffffd28f`4d80e058 : nt!MiDispatchFault+0x3d5
ffffe308`4cfb8960 fffff800`1600275e : ffff8003`6f3a8000 ffff8003`6f3a8080 00000258`c815c8a0 00000000`00000000 : nt!MmAccessFault+0x189
ffffe308`4cfb8b00 00007ff9`4ceb7d66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000b7`729ed6e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4ceb7d66

SYMBOL_NAME: nt!MiUnlinkPageFromList+cb0

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.572

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: cb0

FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromList

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}

Followup: MachineOwner
---------

Recep Bey, bende şimdi sizin bellek testi yaptığınız video izleyip yapıyordum şansıma. Testleri yaptım. Şimdi dediğiniz FurMark hemen yapıp atıyorum efendim. Ayrıca belirtiğiniz şekilde belleklerim aynı model aynı marka, kit o oluyor sanıyorum.
 

Dosya Ekleri

  • belek.png
    belek.png
    18,1 KB · Görüntüleme: 37
  • bellek 1.png
    bellek 1.png
    18,8 KB · Görüntüleme: 38
Siz yine de CPU-Z SPD ekran görüntüsü paylaşın.

Testi de bununla yapsanız daha iyi:

 
Recep Bey, dediğiniz RAM programı ile tarama yaptım bayağı vakit aldı ama değdi sanırsam sonuç vasat, error sayısı acayip fazla çıktı 10000 küsur çıktı Recep Bey. Raporları kayıt et dedim ama nereye gitti bilmiyorum. Ayrıca RAM önerisi yaparsanız sevinirim Recep Bey Gigabyte X470 GAMING 7 Wi-Fi için.

Recep Bey, RAM frekansını 3200'den daha düşük frekansa aldım problem şimdilik gözükmüyor.
 
Son düzenleyen: Moderatör:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı