Merhaba, bu aralar mavi ekran hatalarıyla başım dertte. Açılan diğer konuları da inceledim ve yapılabilecek genel şeyleri yaptım. Minidumpları incelemeyi bilen arkadaşlar bakabilirse sevinirim. BIOS 1.11 (1.12. 1 en son sürümüne güncellemedim çünkü önerilmiyor ve undervolt yapılmasını engelliyor. Undervolt yapılmadığında işlemcisi çok fazla ısınıyor maalesef bilgisayarın.
Yaptıklarım:
-Sfc/scannow (temiz).
-Memtest86 ile RAM kontrolü (6 saat sürdü temiz).
-DDU ile ekran kartı sürücülerini silip tekrar yükledim (birçok kez).
Sistemim:
-Dell 7567 laptop, GTX 1050 Ti, i7 7700HQ.
Minidump:
22 ve 25 Kasım tarihli üç mavi ekranı, bilgisayar ekranı kapanmışken uyandırdığımda aldım.
27 Kasım tarihli olanı da masaüstünde görev yöneticisini açtım hiçbir şey görünmüyordu, bira sonra mavi ekran verdi.
112520-8093-01.dmp
112520-7859-01.dmp
112220-7921-01.dmp
112720-8484-01.dmp
Yaptıklarım:
-Sfc/scannow (temiz).
-Memtest86 ile RAM kontrolü (6 saat sürdü temiz).
-DDU ile ekran kartı sürücülerini silip tekrar yükledim (birçok kez).
Sistemim:
-Dell 7567 laptop, GTX 1050 Ti, i7 7700HQ.
Minidump:
22 ve 25 Kasım tarihli üç mavi ekranı, bilgisayar ekranı kapanmışken uyandırdığımda aldım.
27 Kasım tarihli olanı da masaüstünde görev yöneticisini açtım hiçbir şey görünmüyordu, bira sonra mavi ekran verdi.
112520-8093-01.dmp
112520-7859-01.dmp
112220-7921-01.dmp
112720-8484-01.dmp
Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ogulcan\Desktop\112220-7921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff806`56000000 PsLoadedModuleList = 0xfffff806`56c2a3b0.
Debug session time: Sun Nov 22 23:07:28.875 2020 (UTC + 3:00)
System Uptime: 0 days 1:20:45.606.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
.............
Loading User Symbols.
Loading unloaded module list.
..............
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff806`563f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffca09`dc867390=000000000000001a.
2: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc980a68ebba0.
Arg3: 0000001004100000.
Arg4: 0000000000000000.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 5140.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-5IDGV71.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 45022.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 78.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 1a.
BUGCHECK_P1: 41792.
BUGCHECK_P2: ffffc980a68ebba0.
BUGCHECK_P3: 1004100000.
BUGCHECK_P4: 0.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: dllhost.exe.
STACK_TEXT:
ffffca09`dc867388 fffff806`5634ccaa : 00000000`0000001a 00000000`00041792 ffffc980`a68ebba0 00000010`04100000 : nt!KeBugCheckEx.
ffffca09`dc867390 fffff806`562e9526 : 00000000`00000000 ffffcf8a`0f5f5c10 00000000`00000006 ffffc980`a68ebba0 : nt!MiDeleteVa+0x153a.
ffffca09`dc867490 fffff806`562e963b : ffffc9e4`c0534758 ffffcf8a`10107700 ffffca09`00000000 ffffca09`dc867900 : nt!MiWalkPageTablesRecursively+0x776.
ffffca09`dc867530 fffff806`562e963b : ffffc9e4`f26029a0 ffffcf8a`10107700 ffffca09`00000001 ffffca09`dc867910 : nt!MiWalkPageTablesRecursively+0x88b.
ffffca09`dc8675d0 fffff806`562e963b : ffffc9e4`f2602000 ffffcf8a`10107700 ffffca09`00000002 ffffca09`dc867920 : nt!MiWalkPageTablesRecursively+0x88b.
ffffca09`dc867670 fffff806`562d859b : 00000000`00000000 ffffcf8a`10107700 ffffcf8a`00000003 ffffca09`dc867930 : nt!MiWalkPageTablesRecursively+0x88b.
ffffca09`dc867710 fffff806`5634b541 : ffffca09`dc8678b0 ffffcf8a`00000000 00000000`00000002 fffff806`00000000 : nt!MiWalkPageTables+0x36b.
ffffca09`dc867810 fffff806`563229a0 : 00000000`00000001 ffffca09`00000000 ffffcf8a`10107550 ffffcf8a`0e149080 : nt!MiDeletePagablePteRange+0x4f1.
ffffca09`dc867b20 fffff806`5631ae6f : 00000000`14d1d820 00000000`00000000 ffffcf8a`00000000 fffff806`00000000 : nt!MiDeleteVad+0x360.
ffffca09`dc867c30 fffff806`566fadfc : ffffca09`00000000 00000000`00000000 ffffca09`dc867d90 0000014d`1d720000 : nt!MiFreeVadRange+0xa3.
ffffca09`dc867c90 fffff806`566fa8d5 : 00000000`00000000 00000000`00000000 00000022`66cfdad0 0000014d`1d720000 : nt!MmFreeVirtualMemory+0x4ec.
ffffca09`dc867de0 fffff806`56406bb5 : ffffcf8a`0e149080 00000000`00000001 ffffca09`dc867ec0 ffffca09`dc867ec0 : nt!NtFreeVirtualMemory+0x95.
ffffca09`dc867e40 00007ffb`377ec164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000022`66cfdae8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`377ec164.
SYMBOL_NAME: nt!MiDeleteVa+153a.
MODULE_NAME: nt.
IMAGE_VERSION: 10.0.19041.630.
STACK_COMMAND: .thread ; .cxr ; kb.
IMAGE_NAME: ntkrnlmp.exe.
BUCKET_ID_FUNC_OFFSET: 153a.
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner.
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ogulcan\Desktop\112520-7859-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff803`41800000 PsLoadedModuleList = 0xfffff803`4242a3b0.
Debug session time: Wed Nov 25 15:14:16.780 2020 (UTC + 3:00)
System Uptime: 0 days 0:24:52.512.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
...............
Loading User Symbols.
Loading unloaded module list.
.............
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff803`41bf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffde85`4c00ee00=000000000000001a.
2: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061948, The subtype of the bugcheck.
Arg2: 0000000001000000.
Arg3: 0000000000000001.
Arg4: 0000000001000000.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 3968.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-5IDGV71.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 14930.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 79.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 1a.
BUGCHECK_P1: 61948.
BUGCHECK_P2: 1000000.
BUGCHECK_P3: 1.
BUGCHECK_P4: 1000000.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: chrome.exe.
STACK_TEXT:
ffffde85`4c00edf8 fffff803`41c4308c : 00000000`0000001a 00000000`00061948 00000000`01000000 00000000`00000001 : nt!KeBugCheckEx.
ffffde85`4c00ee00 fffff803`41b49d60 : 0000013e`00000002 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x1bd114.
ffffde85`4c00ee90 fffff803`41b4a91e : 00000000`00000000 ffffde85`4c00f5a0 ffffe600`9f012000 ffffde85`4c00f4f0 : nt!MiDeletePteRun+0x13b0.
ffffde85`4c00f0a0 fffff803`41ae9a1d : 00000000`00000000 ffffcb09`53bb2700 ffffde85`4c00f4f0 ffffe600`9f011880 : nt!MiDeleteVaTail+0x6e.
ffffde85`4c00f0d0 fffff803`41ae963b : ffffe673`004f8088 ffffcb09`53bb2700 ffffde85`00000000 ffffde85`4c00f540 : nt!MiWalkPageTablesRecursively+0xc6d.
ffffde85`4c00f170 fffff803`41ae963b : ffffe673`398027c0 ffffcb09`53bb2700 ffffde85`00000001 ffffde85`4c00f550 : nt!MiWalkPageTablesRecursively+0x88b.
ffffde85`4c00f210 fffff803`41ae963b : ffffe673`39802000 ffffcb09`53bb2700 ffffde85`00000002 ffffde85`4c00f560 : nt!MiWalkPageTablesRecursively+0x88b.
ffffde85`4c00f2b0 fffff803`41ad859b : 00000000`00000000 ffffcb09`53bb2700 00000000`00000003 ffffde85`4c00f570 : nt!MiWalkPageTablesRecursively+0x88b.
ffffde85`4c00f350 fffff803`41b4b541 : ffffde85`4c00f4f0 ffffcb09`00000000 ffffe600`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b.
ffffde85`4c00f450 fffff803`41b229a0 : 00000000`00000001 ffffde85`00000000 ffffcb09`53bb2550 ffffcb09`5356a080 : nt!MiDeletePagablePteRange+0x4f1.
ffffde85`4c00f760 fffff803`41f04aa9 : 00000000`00000000 00000000`00000000 00000007`00000000 00000000`00000000 : nt!MiDeleteVad+0x360.
ffffde85`4c00f870 fffff803`41f04882 : ffffcb09`51a63320 00000000`00000000 ffffcb09`53bb2080 00000000`00000000 : nt!MiUnmapVad+0x49.
ffffde85`4c00f8a0 fffff803`41f046f9 : ffff8502`e529bb40 fffff803`41ef138c 00000000`00000310 00000000`00000000 : nt!MiUnmapViewOfSection+0x152.
ffffde85`4c00f980 fffff803`41e81f4c : ffffcb09`5356a080 0000013e`02240000 00000000`00000000 ffffcb09`53bb2080 : nt!NtUnmapViewOfSectionEx+0x99.
ffffde85`4c00f9d0 fffff803`41c06bb5 : ffffcb09`00000000 ffffcb09`00000001 ffffde85`4c00fa80 ffffde85`4c00fa80 : nt!NtUnmapViewOfSection+0xc.
ffffde85`4c00fa00 0000013e`0054bbb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000007`29ffe908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0000013e`0054bbb4.
SYMBOL_NAME: nt!MiDereferenceIoPages+1bd114.
MODULE_NAME: nt.
IMAGE_VERSION: 10.0.19041.630.
STACK_COMMAND: .thread ; .cxr ; kb.
IMAGE_NAME: ntkrnlmp.exe.
BUCKET_ID_FUNC_OFFSET: 1bd114.
FAILURE_BUCKET_ID: 0x1a_61948_nt!MiDereferenceIoPages.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {16899f95-043e-78ea-0aba-e664d76c4fc5}
Followup: MachineOwner.
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ogulcan\Desktop\112520-8093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff800`06200000 PsLoadedModuleList = 0xfffff800`06e2a3b0.
Debug session time: Wed Nov 25 18:29:42.399 2020 (UTC + 3:00)
System Uptime: 0 days 3:15:02.131.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
............
Loading User Symbols.
Loading unloaded module list.
..............
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff800`065f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff88c`288ff000=000000000000001a.
7: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffdb800002be30.
Arg3: 0000001004100000.
Arg4: 0000000000000000.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 5061.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-5IDGV71.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 16046.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 78.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 1a.
BUGCHECK_P1: 41792.
BUGCHECK_P2: ffffdb800002be30.
BUGCHECK_P3: 1004100000.
BUGCHECK_P4: 0.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: MSIAfterburner.exe.
STACK_TEXT:
fffff88c`288feff8 fffff800`0654ccaa : 00000000`0000001a 00000000`00041792 ffffdb80`0002be30 00000010`04100000 : nt!KeBugCheckEx.
fffff88c`288ff000 fffff800`064e9526 : 00000000`00000000 ffffb906`d1e6e700 00000000`0000015d ffffdb80`0002be30 : nt!MiDeleteVa+0x153a.
fffff88c`288ff100 fffff800`064e963b : ffffdbed`00000000 ffffb906`d1e6e700 fffff88c`00000000 fffff88c`288ff570 : nt!MiWalkPageTablesRecursively+0x776.
fffff88c`288ff1a0 fffff800`064e963b : ffffdbed`f6e00000 ffffb906`d1e6e700 fffff88c`00000001 fffff88c`288ff580 : nt!MiWalkPageTablesRecursively+0x88b.
fffff88c`288ff240 fffff800`064e963b : ffffdbed`f6e00000 ffffb906`d1e6e700 fffff88c`00000002 fffff88c`288ff590 : nt!MiWalkPageTablesRecursively+0x88b.
fffff88c`288ff2e0 fffff800`064d859b : 00000001`05f8f007 ffffb906`d1e6e700 00000000`00000003 fffff88c`288ff5a0 : nt!MiWalkPageTablesRecursively+0x88b.
fffff88c`288ff380 fffff800`0654b541 : fffff88c`288ff520 ffffb906`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b.
fffff88c`288ff480 fffff800`065229a0 : 00000000`00000001 fffff88c`00000000 ffffb906`d1e6e550 ffffb906`d1c4e080 : nt!MiDeletePagablePteRange+0x4f1.
fffff88c`288ff790 fffff800`06904aa9 : ffffb906`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360.
fffff88c`288ff8a0 fffff800`06904882 : ffffb906`d7608520 00000000`00000000 ffffb906`d1e6e080 00000000`00000000 : nt!MiUnmapVad+0x49.
fffff88c`288ff8d0 fffff800`069046f9 : ffff20f0`700a7783 00000000`0019f9a0 00000000`77ae4660 00000000`00000000 : nt!MiUnmapViewOfSection+0x152.
fffff88c`288ff9b0 fffff800`06606bb5 : ffffb906`d1c4e080 00007ff8`ccd17f01 fffff88c`288ffa80 ffffb906`d1e6e080 : nt!NtUnmapViewOfSectionEx+0x99.
fffff88c`288ffa00 00007ff8`cec8f714 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000000`0009e5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`cec8f714.
SYMBOL_NAME: nt!MiDeleteVa+153a.
MODULE_NAME: nt.
IMAGE_VERSION: 10.0.19041.630.
STACK_COMMAND: .thread ; .cxr ; kb.
IMAGE_NAME: ntkrnlmp.exe.
BUCKET_ID_FUNC_OFFSET: 153a.
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner.
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ogulcan\Desktop\112720-8484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff803`59600000 PsLoadedModuleList = 0xfffff803`5a22a3b0.
Debug session time: Fri Nov 27 02:03:25.565 2020 (UTC + 3:00)
System Uptime: 0 days 12:59:44.297.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
...................
Loading User Symbols.
Loading unloaded module list.
............................
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff803`599f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa81`1c3b6e20=0000000000000133.
2: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at.
DISPATCH_LEVEL or above. The offending component can usually be.
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8035a2fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains.
additional information regarding the cumulative timeout.
Arg4: 0000000000000000.
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 7796.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-5IDGV71.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 36759.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 81.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 133.
BUGCHECK_P1: 1.
BUGCHECK_P2: 1e00.
BUGCHECK_P3: fffff8035a2fb320.
BUGCHECK_P4: 0.
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED.
TRAP_FRAME: ffffa90139786fa0 -- (.trap 0xffffa90139786fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe70000000028 rbx=0000000000000000 rcx=0000000000000000.
rdx=0000000006000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80359845d53 rsp=ffffa90139787130 rbp=ffffa901397872b0.
r8=0000000000000023 r9=0000000000000076 r10=0000000000000000.
r11=3fffffffffffffff r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!MmPurgeSection+0x283:
fffff803`59845d53 48b80000000000000400 mov rax,4000000000000h.
Resetting default scope.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: MsMpEng.exe.
STACK_TEXT:
ffffaa81`1c3b6e18 fffff803`59a873f6 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`5a2fb320 : nt!KeBugCheckEx.
ffffaa81`1c3b6e20 fffff803`59926853 : 0000777e`ad40e90a ffffaa81`1c3c0180 00000000`00000000 ffffaa81`1c3c0180 : nt!KeAccumulateTicks+0x15e346.
ffffaa81`1c3b6e80 fffff803`5992633a : ffff8587`670d50e0 ffffa901`39787020 ffffd403`12f10000 00000000`00000001 : nt!KeClockInterruptNotify+0x453.
ffffaa81`1c3b6f30 fffff803`5982ecd5 : ffff8587`670d50e0 00000000`00000000 00000000`00000000 ffff73d2`85fda18d : nt!HalpTimerClockIpiRoutine+0x1a.
ffffaa81`1c3b6f60 fffff803`599f6cba : ffffa901`39787020 ffff8587`670d50e0 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5.
ffffaa81`1c3b6fb0 fffff803`599f7227 : 00000010`00000001 ffffe700`110f8350 ffffa901`3636fae0 ffffa901`3636fae0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa.
ffffa901`39786fa0 fffff803`59845d53 : 00002005`afd678c0 ffffa901`397872b0 ffffd403`12e13500 00000000`00000001 : nt!KiInterruptDispatchNoLockNoEtw+0x37.
ffffa901`39787130 fffff803`59845930 : ffff8587`00000000 ffff8587`673eaa00 ffff8587`75ecc2a0 ffffa901`00000000 : nt!MmPurgeSection+0x283.
ffffa901`39787230 fffff803`59931ffa : ffff8587`7b30d198 ffff8587`7d5a5b40 00000000`00000000 00000000`00000000 : nt!CcPurgeCacheSection+0xe0.
ffffa901`397872f0 fffff803`5981f95c : ffff8587`7d5a5b40 00000000`00000000 0000000f`e01f0000 ffffa901`397873e0 : nt!CcZeroEndOfLastPage+0xde.
ffffa901`39787340 fffff803`5548ef74 : ffffa901`397874b0 ffffa901`397874b8 00000000`00000000 ffffd403`048589f0 : nt!FsRtlCreateSectionForDataScan+0x13c.
ffffa901`397873e0 fffff803`5c1e347e : 00000000`00000000 ffffa901`397874b9 fffff803`5c1c4000 ffffd403`03f98540 : FLTMGR!FltCreateSectionForDataScan+0xf4.
ffffa901`39787440 00000000`00000000 : ffffa901`397874b9 fffff803`5c1c4000 ffffd403`03f98540 00000000`00000000 : WdFilter+0x3347e.
SYMBOL_NAME: WdFilter+3347e.
MODULE_NAME: WdFilter.
IMAGE_NAME: WdFilter.sys.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 3347e.
FAILURE_BUCKET_ID: 0x133_ISR_WdFilter!unknown_function.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {62348c14-2071-9358-2666-f83f3c99caf9}
Followup: MachineOwner.
---------
Son düzenleyen: Moderatör: