R5 2400G sistemde mavi ekran hatası

talhapmkc

Femtopat
Katılım
7 Ekim 2020
Mesajlar
14
Daha fazla  
Cinsiyet
Erkek
Sistem özellikleri.
İşlemci: R5 2400G.
Ekran kartı: Sapphire Pulse RX570 8 GB.
RAM: 8 GB(4+4) XPG. 3000mhz
Anakart: ASUS Prime B350M-A.

Oyunlarda(Rust-PUBG-Valorant-GTAV) bir anda donup atıyor bazen donup yeniden başlatıyor bazen de direkt mavi ekran hatası veriyor.
Sebebini araştırdım ama ne denediysem olmadı.
-RAM'leri test ettim bir sorunla karşılaşmadım.(memtest86)
-Format attım sorun çözülmedi.
-ekran kartının sürücüsünü silip, eskisini yükledim yine çözülmedi.

Minidump dosyaları
 
Arkadaşın Bios'u güncel Windows'u da güncel. Dosyalara bakarsanız anlarsınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00000158f36d6d08
Arg3: 000000000000000d
Arg4: ffffa302104e6b00

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_61941

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  VALORANT-Win64

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80545a72c08 to fffff805459f3ea0

STACK_TEXT: 
ffffa302`104e6958 fffff805`45a72c08 : 00000000`0000001a 00000000`00061941 00000158`f36d6d08 00000000`0000000d : nt!KeBugCheckEx
ffffa302`104e6960 fffff805`45a0205e : ffff9206`981d9080 ffff9206`00000000 ffffa302`00000000 ffff9206`9fa8e7d0 : nt!MmAccessFault+0x184488
ffffa302`104e6b00 00007ff7`65291b25 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000053`ffcce7d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`65291b25


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff8054400995c-fffff8054400995d  2 bytes - FLTMGR!FltpDataScanCsqAcquireLock+1c
    [ 48 ff:4c 8b ]
    fffff80544009963-fffff80544009967  5 bytes - FLTMGR!FltpDataScanCsqAcquireLock+23 (+0x07)
    [ 0f 1f 44 00 00:e8 d8 54 8d 01 ]
    fffff80544009a2e-fffff80544009a2f  2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+6e (+0xcb)
    [ 48 ff:4c 8b ]
    fffff80544009a35-fffff80544009a39  5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+75 (+0x07)
    [ 0f 1f 44 00 00:e8 e6 b3 96 01 ]
    fffff80544009a51-fffff80544009a52  2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+91 (+0x1c)
    [ 48 ff:4c 8b ]
    fffff80544009a58-fffff80544009a5c  5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+98 (+0x07)
    [ 0f 1f 44 00 00:e8 43 c1 84 01 ]
    fffff80544009aad-fffff80544009aae  2 bytes - FLTMGR!FltpDataScanCsqReleaseLock+d (+0x55)
    [ 48 ff:4c 8b ]
    fffff80544009ab4-fffff80544009ab8  5 bytes - FLTMGR!FltpDataScanCsqReleaseLock+14 (+0x07)
    [ 0f 1f 44 00 00:e8 c7 43 80 01 ]
    fffff80544009bb8-fffff80544009bb9  2 bytes - FLTMGR!FltpQueueDataScanSynchronization+90 (+0x104)
    [ 48 ff:4c 8b ]
    fffff80544009bbf-fffff80544009bc3  5 bytes - FLTMGR!FltpQueueDataScanSynchronization+97 (+0x07)
    [ 0f 1f 44 00 00:e8 2c fa 89 01 ]
    fffff80544009bde-fffff80544009bdf  2 bytes - FLTMGR!FltpQueueDataScanSynchronization+b6 (+0x1f)
    [ 48 ff:4c 8b ]
    fffff8054402cd05-fffff8054402cd06  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
    [ 48 ff:4c 8b ]
    fffff8054402cd0c-fffff8054402cd10  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
    [ 0f 1f 44 00 00:e8 8f fd 80 01 ]
    fffff8054402cd1a-fffff8054402cd1b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
    [ 48 ff:4c 8b ]
    fffff8054402cd21-fffff8054402cd25  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
    [ 0f 1f 44 00 00:e8 3a 3c 8b 01 ]
    fffff8054402cd6a-fffff8054402cd6b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
    [ 48 ff:4c 8b ]
    fffff8054402cd71-fffff8054402cd77  7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
    [ 0f 1f 44 00 00 48 ff:e8 3a 34 8b 01 4c 8b ]
    fffff8054402cd7d-fffff8054402cd81  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
    [ 0f 1f 44 00 00:e8 0e 0f 7e 01 ]
65 errors : !FLTMGR (fffff8054400995c-fffff8054402cd81)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fd9e80a3f16eb, Reserved
Arg2: b3b6e66e5cbd5f7f, Reserved
Arg3: fffff80407f9796c, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
    0 : A generic data region
    1 : Modification of a function or .pdata
    2 : A processor IDT
    3 : A processor GDT
    4 : Type 1 process list corruption
    5 : Type 2 process list corruption
    6 : Debug routine modification
    7 : Critical MSR modification

Debugging Details:
------------------


PG_MISMATCH:  17AD27DB

FAULTING_IP:
nt!BgpGxConvertRectangleEx+0
fffff804`07f9796c 4c8bdc          mov     r11,rsp

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x109

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

STACK_TEXT: 
ffffac82`adc9fe28 00000000`00000000 : 00000000`00000109 a39fd9e8`0a3f16eb b3b6e66e`5cbd5f7f fffff804`07f9796c : nt!KeBugCheckEx


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80407f963ae-fffff80407f963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:40 a0 40 81 ]
    fffff80407f97980-fffff80407f979a4  37 bytes - nt!BgpGxConvertRectangleEx+14 (+0x15d2)
    [ 41 55 41 56 41 57 48 83:00 00 00 00 00 00 00 00 ]
    fffff80407f979a6-fffff80407f979be  25 bytes - nt!BgpGxConvertRectangleEx+3a (+0x26)
    [ 8b 01 4d 8d 43 b8 89 44:00 00 a0 1b ab e3 65 02 ]
    fffff80407f97f96-fffff80407f97f97  2 bytes - nt!MiUnlinkNumaStandbyPage+52 (+0x5f0)
    [ 80 fa:00 8d ]
68 errors : !nt (fffff80407f963ae-fffff80407f97f97)

FOLLOWUP_IP:
nt!BgpGxConvertRectangleEx+0
fffff804`07f9796c 4c8bdc          mov     r11,rsp

SYMBOL_NAME:  nt!BgpGxConvertRectangleEx+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.19041.508

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x109_1_nt!BgpGxConvertRectangleEx

BUCKET_ID:  0x109_1_nt!BgpGxConvertRectangleEx

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x109_1_nt!bgpgxconvertrectangleex

FAILURE_ID_HASH:  {47467b60-c900-4152-5ccb-f01deb6fc896}

Followup: MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80365e0cea6, The address that the exception occurred at
Arg3: ffff9a06eb499080, Parameter 0 of the exception
Arg4: ffff9a06e94c6830, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM}  Ge ersiz Y nerge  Ge ersiz bir y nerge y r t lmeye  al

FAULTING_IP:
vwififlt!ReleaseSpinLock+2
fffff803`65e0cea6 5c              pop     rsp

EXCEPTION_PARAMETER1:  ffff9a06eb499080

EXCEPTION_PARAMETER2:  ffff9a06e94c6830

BUGCHECK_STR:  0x1E_c000001d

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  Human.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff803586f4d4e to fffff803585f3ea0

FAILED_INSTRUCTION_ADDRESS:
vwififlt!ReleaseSpinLock+2
fffff803`65e0cea6 5c              pop     rsp

STACK_TEXT: 
fffff803`5e280158 fffff803`586f4d4e : 00000000`0000001e ffffffff`c000001d fffff803`65e0cea6 ffff9a06`eb499080 : nt!KeBugCheckEx
fffff803`5e280160 fffff803`585fcd62 : fffff803`586f4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff803`5e2801a0 fffff803`58485027 : fffff803`5e280710 00000000`00000000 fffff803`5e272fb0 fffff803`585faee5 : nt!RtlpExecuteHandlerForException+0x12
fffff803`5e2801d0 fffff803`58483ce6 : fffff803`5e271d88 fffff803`5e280e20 fffff803`5e271d88 00000000`00000001 : nt!RtlDispatchException+0x297
fffff803`5e2808f0 fffff803`585f4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff803`5e280fb0 fffff803`585f4d00 : fffff803`58605fa5 00000000`00000000 ffff9a06`e619b300 ffff9a06`e99186d0 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff803`5e271c48 fffff803`58605fa5 : 00000000`00000000 ffff9a06`e619b300 ffff9a06`e99186d0 ffff9a06`e95e0b94 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff803`5e271c50 fffff803`586004e9 : fffff803`5e272038 00000000`00000000 ffff9a06`e95e0a00 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff803`5e271e30 fffff803`65e0cea6 : fffff803`65e05a6a ffff9a06`e95e1a20 ffff9a06`e960a010 00000000`00000001 : nt!KiInvalidOpcodeFault+0x329
fffff803`5e271fc8 fffff803`65e05a6a : ffff9a06`e95e1a20 ffff9a06`e960a010 00000000`00000001 fffff803`5c9ba976 : vwififlt!ReleaseSpinLock+0x2
fffff803`5e271fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : vwififlt!FilterReceiveNetBufferLists+0xba


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff803585963af-fffff803585963b1  3 bytes - nt!MiFreeUltraMapping+33
    [ 7d fb f6:7b f7 ee ]
    fffff803585fa928-fffff803585fa929  2 bytes - nt!KiIpiInterrupt+388 (+0x64579)
    [ 48 ff:4c 8b ]
    fffff803585fa92f-fffff803585fa932  4 bytes - nt!KiIpiInterrupt+38f (+0x07)
    [ 0f 1f 44 00:e8 ec aa 61 ]
    fffff803585faf53-fffff803585faf54  2 bytes - nt!SwapContext+53 (+0x624)
    [ 48 ff:4c 8b ]
    fffff803585faf5a-fffff803585faf5d  4 bytes - nt!SwapContext+5a (+0x07)
    [ 0f 1f 44 00:e8 c1 a4 61 ]
15 errors : !nt (fffff803585963af-fffff803585faf5d)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 000000000000071b, physical page number
Arg3: 000002172895c650, zero
Arg4: ffffda008019a000, zero

Debugging Details:
------------------


BUGCHECK_STR:  PAGE_NOT_ZERO

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  MemCompression

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

STACK_TEXT: 
ffff840c`5bfb11f8 fffff800`04d96042 : 00000000`0000012b ffffffff`c00002c4 00000000`0000071b 00000217`2895c650 : nt!KeBugCheckEx
ffff840c`5bfb1200 fffff800`04c4b4dd : 0000000a`00000001 00000000`c00002c4 ffffda00`8019a000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
ffff840c`5bfb1260 fffff800`04a7b8c5 : 00000000`00000004 fffff800`04a7b42e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1cfbf5
ffff840c`5bfb1320 fffff800`04a7b0fc : 00000000`00000001 00000000`0001c650 00000000`00000000 ffffc58e`00004000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff840c`5bfb1370 fffff800`04a7af2c : ffffda00`ffffffff ffffc58e`be04b000 ffff840c`5bfb1450 ffffc58e`c1996610 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff840c`5bfb1410 fffff800`04a7ad79 : ffffda00`7df48730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff840c`5bfb14c0 fffff800`04a7ac31 : ffffc58e`bc9c6000 ffffc58e`c1996610 ffffc58e`be04b000 ffffc58e`bc9c79c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff840c`5bfb1540 fffff800`04ab8908 : ffffc58e`b8081080 ffffc58e`bc9c6000 00000000`00000000 ffffc58e`beaffc00 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff840c`5bfb1570 fffff800`04a640b7 : fffff800`04a7ac10 ffff840c`5bfb1610 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff840c`5bfb15e0 fffff800`04a982ac : ffff840c`5bfb16e0 00000000`31526d73 00000000`000003ff fffff800`055229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff840c`5bfb16b0 fffff800`04a97ce0 : 00000000`0000000c 00000000`000003ff ffff840c`5bfb1760 fffff800`055229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff840c`5bfb1700 fffff800`04a79737 : 00000000`0000000c 00000000`00000004 ffffc58e`c1996610 ffffc58e`beaffc00 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff840c`5bfb1790 fffff800`04a6bcbb : ffffc58e`00000004 ffffc58e`beaffcc0 00000000`00000000 ffffc58e`bc9c6000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff840c`5bfb1800 fffff800`04b3cc2c : 0000007f`00000100 00000000`00000000 ffff840c`5bfb1a58 fffff800`04b3caf0 : nt!SmPageRead+0x33
ffff840c`5bfb1850 fffff800`04b3c64d : 00000000`00000002 ffff840c`5bfb18e0 ffff840c`5bfb1a58 ffffc58e`beaffbb0 : nt!MiIssueHardFaultIo+0x10c
ffff840c`5bfb18a0 fffff800`04aeebe8 : 00000000`c0033333 00000000`00000001 00000000`0eb77307 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffff840c`5bfb1960 fffff800`04c0205e : 00000000`09fbe4d0 00000000`00000010 ffff840c`00000000 ffff840c`00000000 : nt!MmAccessFault+0x468
ffff840c`5bfb1b00 00000000`773c5688 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`09fbe444 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773c5688


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff80002fe48fa-fffff80002fe48fb  2 bytes - FLTMGR!FltpDispatch+ca
    [ 48 ff:4c 8b ]
    fffff80002fe4901-fffff80002fe4905  5 bytes - FLTMGR!FltpDispatch+d1 (+0x07)
    [ 0f 1f 44 00 00:e8 da d5 ae 01 ]
    fffff8000301b9a4-fffff8000301b9a5  2 bytes - FLTMGR!FltpCreate+f4
    [ 48 ff:4c 8b ]
    fffff8000301b9ab-fffff8000301b9af  5 bytes - FLTMGR!FltpCreate+fb (+0x07)
    [ 0f 1f 44 00 00:e8 c0 cc ac 01 ]
14 errors : !FLTMGR (fffff80002fe48fa-fffff8000301b9af)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
Kod:
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2288]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5603
BiosReleaseDate = 07/28/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B350M-A
BaseBoardVersion = Rev X.0x
 

Geri
Yukarı