War Thunder oynarken sistem mavi ekran veriyor

Denizgms

Femtopat
Katılım
18 Temmuz 2023
Mesajlar
8
Daha fazla  
Cinsiyet
Erkek
RAM
Kingston 8 GB + Samsung 8 GB dual
SSD veya HDD modeli
Samsung 512 GB SSD M2
Ekran kartı
RTX 3050 ti
Anakart
asus
İşlemci
İntel i5 11. nesil
Giriş

İlk defa Technopat kullanıyorum, hatam varsa affola.
Coğunlukla en çok oynadığım oyunda yaşıyorum mavi ekranı: War Thunder.

Biraz kurcaladım ve bu kodları elde ettim, Easy Anti-Cheat'den kaynaklandığını düşünerek oyun dosyalarından sildim ve tekrar doğrulayarak yükledim. Sorun sık sık yaşanmıyor, 2 günde 1 falan.

Kod:
[CODE]************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : false
   AllowNugetExeUpdate : false
   AllowNugetMSCredentialProviderInstall : false
   AllowParallelInitializationOfLocalRepositories : true

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Deniz\Desktop\dmp\071823-17812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22621.1928.amd64fre.ni_release_svc_prod3.230622-0951
Kernel base = 0xfffff807`08800000 PsLoadedModuleList = 0xfffff807`09413460
Debug session time: Tue Jul 18 23:11:52.671 2023 (UTC + 3:00)
System Uptime: 1 days 1:08:29.834
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............................................................
Loading User Symbols

Loading unloaded module list
......................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`08c2ec80 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffd88`9048ec40=0000000000000050
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe18fbe14c000, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8077a64fb7f, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Write

    Key  : Analysis.CPU.mSec
    Value: 1874

    Key  : Analysis.Elapsed.mSec
    Value: 12739

    Key  : Analysis.IO.Other.Mb
    Value: 26

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 31

    Key  : Analysis.Init.CPU.mSec
    Value: 249

    Key  : Analysis.Init.Elapsed.mSec
    Value: 79035

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 102

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_W_(null)_EasyAntiCheat!unknown_function

    Key  : Failure.Hash
    Value: {db04c4b7-e9e3-dce5-e2d5-041393ee146c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7

    Key  : WER.OS.Branch
    Value: ni_release_svc_prod3

    Key  : WER.OS.Version
    Value: 10.0.22621.1928


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffe18fbe14c000

BUGCHECK_P2: 2

BUGCHECK_P3: fffff8077a64fb7f

BUGCHECK_P4: 2

FILE_IN_CAB:  071823-17812-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


READ_ADDRESS: fffff8070951c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffe18fbe14c000

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffd889048ee60 -- (.trap 0xfffffd889048ee60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=09ffffffffff930c
rdx=000000000000008d rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077a64fb7f rsp=fffffd889048eff0 rbp=fffffd889048f190
 r8=ffffe18fbe13c0dc  r9=0000000000000014 r10=00000000ffffffff
r11=0000000000009380 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
EasyAntiCheat+0x7fb7f:
fffff807`7a64fb7f f3aa            rep stos byte ptr [rdi]
Resetting default scope

STACK_TEXT:
fffffd88`9048ec38 fffff807`08ccc15d     : 00000000`00000050 ffffe18f`be14c000 00000000`00000002 fffffd88`9048ee60 : nt!KeBugCheckEx
fffffd88`9048ec40 fffff807`08a7f71c     : fffffd88`9048eeb0 00000000`00000002 00000000`00000000 ffffe18f`be14c000 : nt!MiSystemFault+0x25047d
fffffd88`9048ed40 fffff807`08c3f829     : ffffe18f`bec7c540 00000000`00000000 ffffe18f`93149010 00000000`00000001 : nt!MmAccessFault+0x29c
fffffd88`9048ee60 fffff807`7a64fb7f     : 00000000`69536350 00000000`69536350 00000000`00000002 00000000`00000070 : nt!KiPageFault+0x369
fffffd88`9048eff0 00000000`69536350     : 00000000`69536350 00000000`00000002 00000000`00000070 00000000`000001b0 : EasyAntiCheat+0x7fb7f
fffffd88`9048eff8 00000000`69536350     : 00000000`00000002 00000000`00000070 00000000`000001b0 fffff807`7a64c837 : 0x69536350
fffffd88`9048f000 00000000`00000002     : 00000000`00000070 00000000`000001b0 fffff807`7a64c837 00000000`00000048 : 0x69536350
fffffd88`9048f008 00000000`00000070     : 00000000`000001b0 fffff807`7a64c837 00000000`00000048 00000000`00000000 : 0x2
fffffd88`9048f010 00000000`000001b0     : fffff807`7a64c837 00000000`00000048 00000000`00000000 ffffe18f`b7459e30 : 0x70
fffffd88`9048f018 fffff807`7a64c837     : 00000000`00000048 00000000`00000000 ffffe18f`b7459e30 00000000`00000000 : 0x1b0
fffffd88`9048f020 00000000`00000048     : 00000000`00000000 ffffe18f`b7459e30 00000000`00000000 ffffe18f`be609ca0 : EasyAntiCheat+0x7c837
fffffd88`9048f028 00000000`00000000     : ffffe18f`b7459e30 00000000`00000000 ffffe18f`be609ca0 fffff807`7b43d32e : 0x48


SYMBOL_NAME:  EasyAntiCheat+7fb7f

MODULE_NAME: EasyAntiCheat

IMAGE_NAME:  EasyAntiCheat.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  7fb7f

FAILURE_BUCKET_ID:  AV_W_(null)_EasyAntiCheat!unknown_function

OS_VERSION:  10.0.22621.1928

BUILDLAB_STR:  ni_release_svc_prod3

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {db04c4b7-e9e3-dce5-e2d5-041393ee146c}

Followup:     MachineOwner
---------

2: kd> lmvm EasyAntiCheat
Browse full module list
start             end                 module name
fffff807`7a5d0000 fffff807`7b51a000   EasyAntiCheat T (no symbols)     
    Loaded symbol image file: EasyAntiCheat.sys
    Image path: \??\C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.sys
    Image name: EasyAntiCheat.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue May 23 15:13:48 2023 (646CADFC)
    CheckSum:         00EF270C
    ImageSize:        00F4A000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
[/CODE]
 
Son düzenleyen: Moderatör:
Hocam, Easy Anti-Cheat'i kapatmayı yada güncellemeyi dener misiniz ve Memtest86 ile test yapın. Sorun belleklerde de olabilir. Sonucu atarsanız sevinirim.
 
Son düzenleyen: Moderatör:
Hocam, Easy Anti-Cheat'i kapatmayı yada güncellemeyi dener misiniz ve Memtest86 ile test yapın. Sorun belleklerde de olabilir. Sonucu atarsanız sevinirim.
Bugün bir tane daha yedim. Easy Anti-Cheat'i silip yükledim, RAM'leri kontrol etmedim henüz ama yeni upgrade yaptım. 2 ay önce Kingston orijinalide Samsung diye hatırlıyorum.

Gaming laptop ASUS F15


SYMBOL_NAME: nt!PspCatchCriticalBreak+11b

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.1992

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 11b

FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_eca705c0_nt!PspCatchCriticalBreak

OS_VERSION: 10.0.22621.1928

BUILDLAB_STR: ni_release_svc_prod3

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6d3ce16f-a748-53a9-2006-11da40d2753b}

Followup: MachineOwner
---------
 
Son düzenleyen: Moderatör:
Tamam zaten belleklerde olup olmadığını testten sonra öğreniz . Bu tam cıkmamış ama sanırsam bu da bellek kaynaklı gözüküyor . Bi dahaki mavi ekran hatasında dosya seklinde tüm minidumpları atmanız daha yararlı olur.
Bugün bir tane daha yedim. Easy Anti-Cheat'i silip yükledim, RAM'leri kontrol etmedim henüz ama yeni upgrade yaptım. 2 ay önce Kingston orijinalide Samsung diye hatırlıyorum.

Gaming laptop ASUS F15


SYMBOL_NAME: nt!PspCatchCriticalBreak+11b

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.1992

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 11b

FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_eca705c0_nt!PspCatchCriticalBreak

OS_VERSION: 10.0.22621.1928

BUILDLAB_STR: ni_release_svc_prod3

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6d3ce16f-a748-53a9-2006-11da40d2753b}

Followup: MachineOwner
---------
 

Technopat Haberler

Yeni konular

Geri
Yukarı