R5 3500X-GTX 1660 sistemde oyun oynarken mavi ekran hatası

İşletim sistemi
Windows 10

Batuhan SIRAY

Femtopat
Katılım
10 Ocak 2021
Mesajlar
2
Daha fazla  
Cinsiyet
Erkek
Oyun oynarken birden oyunlar kapanıyor. 2-3 kapanmadan sonra mavi ekran hatası alıyorum çözüm aradım bulamadım bir türlü.

MSI B450M-A PRO Max M.2.
AMD Ryzen 5 3500X 6-core Processor 4.20 GHz.
MSI GeForce GTX 1660 Gaming X.
Corsair Vengeance LPX 8 GB 3000MHz.
Adata swordfish 500 GB SSD M.2.
 
Birçok sebebi olabilir PSU'da sorun çıkmış olabilir ekran kartı yanmış olabilir hata kodunu paylaşırsan nedenini öğrenebiliriz.
 
 
 
Vanguard ve Easy Anti Cheat'ı bir süreliğine kaldırın.

Aşağıdaki rehberi uygulayın.

Chipset sürücüsünü güncelleyin.

BİOS'u 7B84vAB sürümüne yükseltin.

Ekran kartı sürücünüzün güncellemesi varsa yapın.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\011021-10421-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`77400000 PsLoadedModuleList = 0xfffff802`7802a2b0
Debug session time: Sun Jan 10 22:13:35.296 2021 (UTC + 3:00)
System Uptime: 0 days 19:00:17.939
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`777f5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa403`9df696c0=000000000000001a
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000009696, The subtype of the bugcheck.
Arg2: ffffe680025bad40
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8812

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 38389

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 9696

BUGCHECK_P2: ffffe680025bad40

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffa403`9df696b8 fffff802`7774d668     : 00000000`0000001a 00000000`00009696 ffffe680`025bad40 00000000`00000000 : nt!KeBugCheckEx
ffffa403`9df696c0 fffff802`7774f939     : ffff9309`6a3c0018 20000000`002299a9 ffffa403`9df69780 ffff9309`6a3c0008 : nt!MiGetTopLevelPfn+0x148
ffffa403`9df69750 fffff802`7774de25     : fffff802`00000000 ffff9309`6a010028 00000000`002299a9 00000000`00000000 : nt!MiStoreCheckCandidatePage+0x149
ffffa403`9df697b0 fffff802`7774fe8d     : ffff9309`6723f260 ffffa403`00000001 ffffe680`002299a9 fffff802`00000000 : nt!MiStoreWriteModifiedPages+0x259
ffffa403`9df698e0 fffff802`777baf59     : ffff9309`6723f260 fffff802`00000100 fffff802`00000100 ffff8080`00000100 : nt!MiGatherPagefilePages+0x455
ffffa403`9df699e0 fffff802`77717e25     : ffff9309`6872e080 ffff9309`6872e080 00000000`00000080 fffff802`777bacc0 : nt!MiModifiedPageWriter+0x299
ffffa403`9df69c10 fffff802`777fcdd8     : ffff8080`260d5180 ffff9309`6872e080 fffff802`77717dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa403`9df69c60 00000000`00000000     : ffffa403`9df6a000 ffffa403`9df64000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiGetTopLevelPfn+148

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  148

FAILURE_BUCKET_ID:  0x1a_9696_nt!MiGetTopLevelPfn

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d4280011-e8e7-b961-d005-2ab957e4b051}

Followup:     MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\010821-10343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`59e00000 PsLoadedModuleList = 0xfffff802`5aa2a2b0
Debug session time: Fri Jan  8 19:31:58.247 2021 (UTC + 3:00)
System Uptime: 2 days 0:05:33.562
Loading Kernel Symbols
...............................................................
................................................................
..........................................................
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`5a1f5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffffc388`339c50f0=000000000000000a
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8025a0ea5b0, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5999

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10386

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 18

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8025a0ea5b0

WRITE_ADDRESS: fffff8025aafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8025aa0f330: Unable to get Flags value from nt!KdVersionBlock
fffff8025aa0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000018

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

TRAP_FRAME:  ffffc388339c5230 -- (.trap 0xffffc388339c5230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffffe00001080
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025a0ea5b0 rsp=ffffc388339c53c0 rbp=fffff8025aa50b40
 r8=0000000fffffffff  r9=ffffa48000000000 r10=2aaaaaaaaaaaaaab
r11=0000000000000192 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!MiReplenishPageSlist+0x200:
fffff802`5a0ea5b0 f0480fba6b183f  lock bts qword ptr [rbx+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope

STACK_TEXT: 
ffffc388`339c50e8 fffff802`5a207769     : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffc388`339c50f0 fffff802`5a203a69     : 00000000`00000000 00000000`00002000 00000000`00000000 ffffffff`fa0a1f00 : nt!KiBugCheckDispatch+0x69
ffffc388`339c5230 fffff802`5a0ea5b0     : 00000000`00000000 00000000`00000010 fffff802`5aa50b40 ffffa780`00003840 : nt!KiPageFault+0x469
ffffc388`339c53c0 fffff802`5a0135bc     : 00000000`00000000 ffffa780`00003840 00000000`00000000 00000000`00000000 : nt!MiReplenishPageSlist+0x200
ffffc388`339c5510 fffff802`5a0b76aa     : fffff802`5aa50b40 ffffc388`00000068 ffffae0f`b7fe6868 ae0fb7fe`00000001 : nt!MiGetPage+0x61c
ffffc388`339c55f0 fffff802`5a015f65     : ffffc388`339c5880 ffff800d`c730de08 ffffa480`03c84570 ffffc388`339c5860 : nt!MiResolveMappedFileFault+0x32a
ffffc388`339c5720 fffff802`5a00e7a5     : ffffc388`339c5880 00000000`00000000 ffffc388`339c5860 ffffc388`339c5a20 : nt!MiResolveProtoPteFault+0x1205
ffffc388`339c5820 fffff802`5a00c6e9     : 00000000`00000100 00000000`00000100 00000000`c0000016 ffff800d`c730de08 : nt!MiDispatchFault+0x3d5
ffffc388`339c5960 fffff802`5a20395e     : 00000000`7ffe0385 ffffc388`339c5b80 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x189
ffffc388`339c5b00 00007ff8`4d995710     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`110ad058 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`4d995710


SYMBOL_NAME:  nt!MiReplenishPageSlist+200

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  200

FAILURE_BUCKET_ID:  AV_nt!MiReplenishPageSlist

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e1780c1b-c7ae-f629-f6fa-ba2f8fe42756}

Followup:     MachineOwner
---------
 

Yeni konular

Geri
Yukarı