Salut à tous,
je viens vers vous pour avoir un petit coup de pouce,
Ma config (monté par moi):
Boiter : coolermaster centurion
Alim' : Coolermaster GX650 BRONZE ( année d'achat 2011, elle vient d'une ancienne config )
Disque Dur: OCZ AGILITY 3 + SANDISK SD SSD HII 240G + WDC WD1002 1To
Processeur : intel 7600k (non OC )
Mémoire : Corsair Vengeance LPX Series Low Profile 16 Go (2x 8 Go) DDR4 3000 MHz CL15
Carte Mère : Asus Prime Z270 A
CG : MSI 1070 ti
Mon problème :
Mon ordi plante de manière aléatoire depuis 1 ou 2 mois, cela arrive uniquement en jeux après 10 - 15 minutes de jeux (PUBG, Escape from Tarkov, Far cry 5, BF1)
Quand l'ordi crash, j'entend souvent un son strident, l’écran devient noir, le clavier s’eteint et je dois rester appuyer sur le bouton power pour reboot l'ordi
Je ne sais plus trop de quel coté chercher
Merci beaucoup d'avance pour votre aide )
Pour régler le problème :
J'ai formaté , changé les pilotes graphiques avec DDU, mis à jour le chipset de la CM, les pilotes SATA, pilote audio ...
J'ai également test la CG avec FURMark ( pas de problème)
J'ai aussi testé la mémoire avec memtest86 ( 0 erreurs )
J'ai finalement test l'alimentation avec OCCT ( pas eu de crash, mais je ne sais pas interpréter le résultat)
lien du résultat OCCT :
https://www.catupload.com/filesgroup...12b69baa3.html
Résultat d'analyse crash minidump ci dessous:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 17134 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff800`9221e000 PsLoadedModuleList = 0xfffff800`925db1d0
Debug session time: Fri May 18 18:35:02.732 2018 (UTC - 4:00)
System Uptime: 0 days 0:18:38.438
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8009227a81d, Address of the instruction which caused the bugcheck
Arg3: fffffc821dc56940, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!SepCreateAccessStateFromSubjectContext+3d
fffff800`9227a81d 48 ???
CONTEXT: fffffc821dc56940 -- (.cxr 0xfffffc821dc56940)
rax=ffff830fbece7e8c rbx=fffffc821dc573f0 rcx=000000001dc573d0
rdx=fffffc821dc573f0 rsi=fffffc821dc57490 rdi=00000000001f0003
rip=fffff8009227a81d rsp=fffffc821dc57330 rbp=ffff830fbece7e8c
r8=fffffc821dc57490 r9=00000000001f0003 r10=7fffffffffffff00
r11=ffffd88f28ca6040 r12=00000000001f0003 r13=0000000000000000
r14=fffffc821dc57670 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!SepCreateAccessStateFromSubjectContext+0x3d:
fffff800`9227a81d 48 ???
Resetting default scope
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: 6257
LAST_CONTROL_TRANSFER: from fffff80092701a6c to fffff8009227a81d
STACK_TEXT:
fffffc82`1dc57330 fffff800`92701a6c : 00000000`00000000 00000000`00000200 ffff830f`c0af6210 00000000`001f0003 : nt!SepCreateAccessStateFromSubjectContext+0x3d
fffffc82`1dc57370 ffffd48d`fe0a32d2 : ffff830f`c17ec850 ffffd48d`00000000 ffff830f`00000001 ffffd48d`fdfd500a : nt!ObOpenObjectByPointer+0x15c
fffffc82`1dc575d0 ffffd48d`fe09521a : 00000000`00000000 ffff830f`c0af6210 00000000`00000000 00000004`00000000 : win32kbase!rimConvertUserToKernelEventHandle+0x7e
fffffc82`1dc57620 ffffd48d`fe0d3cfa : ffffd4b6`40006bb0 ffffd4b6`40006bf0 00000000`00000000 00000000`000001e0 : win32kbase!RIMReadInput+0xba
fffffc82`1dc576c0 ffffd48d`fe0d30e0 : ffffd4b6`40006bb0 00000000`00000003 00000000`00000000 fffff800`00000000 : win32kbase!CBaseInput::Read+0x5a
fffffc82`1dc57710 ffffd48d`fdfcf9fd : 00000000`00000040 00000000`00000000 00000000`00000003 ffffd4b6`40006bb0 : win32kbase!CBaseInput:nReadNotification+0xc0
fffffc82`1dc57750 ffffd48d`fdfcf812 : 00000000`00000000 ffffd4b6`400e91c0 ffffd4b6`400e91c0 00000000`00000002 : win32kbase!CBaseInput:nDispatcherObjectSignaled+0x1bd
fffffc82`1dc577a0 ffffd48d`fdff63a4 : ffffd48d`fe158601 00000000`00000000 ffffd48d`fe154b90 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled +0x12
fffffc82`1dc577d0 ffffd48d`fdff65d3 : 00000000`00000004 00000000`00000000 ffffd48d`fe154ba8 00000000`0000000d : win32kbase!LegacyInputDispatcher::Dispatch+0x88
fffffc82`1dc57800 ffffd48d`fdc50a2d : ffffd4b6`400ea010 fffffc82`1dc57929 00000000`00000002 ffffd48d`fe158601 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+ 0x1e3
fffffc82`1dc57850 ffffd48d`fdc507c0 : 00000000`00000000 00000000`00000001 00000000`00000001 ffffd48d`fe158600 : win32kfull!xxxDesktopThreadWaiter+0x11d
fffffc82`1dc578d0 ffffd48d`fe05b332 : ffff830f`c1773080 ffff830f`c1773080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x2c0
fffffc82`1dc57990 ffffd48d`fdc8b57e : ffff830f`00000001 ffffd48d`fe158600 ffff830f`c1773080 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0xb2
fffffc82`1dc579d0 fffff800`923c8223 : ffff830f`c1773080 00000000`00000005 0000019f`d4e04160 00000000`000003c4 : win32kfull!NtUserCallNoParam+0x5e
fffffc82`1dc57a00 00007ff9`d0d31124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000004b`000bfb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ff9`d0d31124
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffffc821dc56940 ; kb
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 25175 instance(s) of page corruption, target is likely to have memory corruption.
This free analysis is provided by OSR Open Systems Resources, Inc.
Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
----- 64 bit Kernel Mini Dump Analysis
DUMP_HEADER64:
MajorVersion 0000000f
MinorVersion 000042ee
KdSecondaryVersion 00000000
DirectoryTableBase 00000004`4d200000
PfnDataBase ffffab80`00000000
PsLoadedModuleList fffff800`925db1d0
PsActiveProcessHead fffff800`925d4360
MachineImageType 00008664
NumberProcessors 00000004
BugCheckCode 0000003b
BugCheckParameter1 00000000`c000001d
BugCheckParameter2 fffff800`9227a81d
BugCheckParameter3 fffffc82`1dc56940
BugCheckParameter4 00000000`00000000
KdDebuggerDataBlock fffff800`925c4520
SecondaryDataState 00000000
ProductType 00000001
SuiteMask 00000110
MiniDumpFields 00000dff
TRIAGE_DUMP64:
ServicePackBuild 00000000
SizeOfDump 0001c800
ValidOffset 0001c7fc
ContextOffset 00000348
ExceptionOffset 00000f00
MmOffset 00002080
UnloadedDriversOffset 0000d2f0
PrcbOffset 000020d0
ProcessOffset 00009f90
ThreadOffset 0000a7d8
CallStackOffset 0000aff0
SizeOfCallStack 00001f98
DriverListOffset 0000dde8
DriverCount 000000b0
StringPoolOffset 000140e8
StringPoolSize 00001978
BrokenDriverOffset 00000000
TriageOptions 00000041
TopOfStack fffffc82`1dc56068
BStoreOffset 00000000
SizeOfBStore 00000000
LimitOfBStore 00000000`00000000
DebuggerDataOffset 0000cf88
DebuggerDataSize 00000368
DataBlocksOffset 00015a60
DataBlocksCount 0000001b
fffff800`925d87b0 - fffff800`925d87bf at offset 00015c10
ffff830f`c4126000 - ffff830f`c41261b7 at offset 00015c20
fffff800`925dbde8 - fffff800`925dbdef at offset 00015dd8
fffff800`925e1e08 - fffff800`925e1e0f at offset 00015de0
fffff800`925fbf90 - fffff800`925fbfef at offset 00015de8
fffff5fa`fd600018 - fffff5fa`fd60001f at offset 00015e48
fffff5fa`fd7eb000 - fffff5fa`fd7eb007 at offset 00015e50
fffff5fa`fe002488 - fffff5fa`fe00248f at offset 00015e58
fffff5fa`fd7f0010 - fffff5fa`fd7f0017 at offset 00015e60
fffff5fa`fd7ebf80 - fffff5fa`fd7ebf87 at offset 00015e68
fffff5fe`410ee2b0 - fffff5fe`410ee2b7 at offset 00015e70
fffff5fa`ff208770 - fffff5fa`ff208777 at offset 00015e78
fffff5fa`fd7f9040 - fffff5fa`fd7f9047 at offset 00015e80
fffff5fa`fd7ebfc8 - fffff5fa`fd7ebfcf at offset 00015e88
fffff5fa`fd600000 - fffff5fa`fd600007 at offset 00015e90
fffff5fe`410ee2b8 - fffff5fe`410ee2bf at offset 00015e98
fffff5fa`fe002498 - fffff5fa`fe00249f at offset 00015ea0
fffff800`925dace0 - fffff800`925dad17 at offset 00015ea8
fffff800`9227a000 - fffff800`9227afff at offset 00015ee0
fffffc82`1dc56000 - fffffc82`1dc56fff at offset 00016ee0
ffff830f`c01fdc10 - ffff830f`c01fdf77 at offset 00017ee0
ffff830f`c0131b70 - ffff830f`c0131ed7 at offset 00018248
fffff800`923b5570 - fffff800`923b576f at offset 000185b0
fffff800`923b5000 - fffff800`923b5fff at offset 000187b0
fffff800`923c7000 - fffff800`923c7fff at offset 000197b0
fffff800`923c8000 - fffff800`923c8fff at offset 0001a7b0
fffff800`92634000 - fffff800`92634fff at offset 0001b7b0
Max offset 1c7b0, 37744 from end of file