Dell 7567 laptopta mavi ekran hataları

Ogulcan07

Hectopat
Katılım
7 Temmuz 2020
Mesajlar
12
Yer
Antalya
Daha fazla  
Cinsiyet
Erkek
Merhaba, bu aralar mavi ekran hatalarıyla başım dertte. Açılan diğer konuları da inceledim ve yapılabilecek genel şeyleri yaptım. Minidumpları incelemeyi bilen arkadaşlar bakabilirse sevinirim. BIOS 1.11 (1.12. 1 en son sürümüne güncellemedim çünkü önerilmiyor ve undervolt yapılmasını engelliyor. Undervolt yapılmadığında işlemcisi çok fazla ısınıyor maalesef bilgisayarın.

Yaptıklarım:

-Sfc/scannow (temiz).
-Memtest86 ile RAM kontrolü (6 saat sürdü temiz).
-DDU ile ekran kartı sürücülerini silip tekrar yükledim (birçok kez).

Sistemim:

-Dell 7567 laptop, GTX 1050 Ti, i7 7700HQ.

Minidump:

22 ve 25 Kasım tarihli üç mavi ekranı, bilgisayar ekranı kapanmışken uyandırdığımda aldım.
27 Kasım tarihli olanı da masaüstünde görev yöneticisini açtım hiçbir şey görünmüyordu, bira sonra mavi ekran verdi.

112520-8093-01.dmp
112520-7859-01.dmp
112220-7921-01.dmp
112720-8484-01.dmp

dxdiag.jpg


Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\ogulcan\Desktop\112220-7921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff806`56000000 PsLoadedModuleList = 0xfffff806`56c2a3b0.
Debug session time: Sun Nov 22 23:07:28.875 2020 (UTC + 3:00)
System Uptime: 0 days 1:20:45.606.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
.............
Loading User Symbols.
Loading unloaded module list.
..............
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff806`563f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffca09`dc867390=000000000000001a.
2: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc980a68ebba0.
Arg3: 0000001004100000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5140.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-5IDGV71.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 45022.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 78.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: ffffc980a68ebba0.

BUGCHECK_P3: 1004100000.

BUGCHECK_P4: 0.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: dllhost.exe.

STACK_TEXT:
ffffca09`dc867388 fffff806`5634ccaa : 00000000`0000001a 00000000`00041792 ffffc980`a68ebba0 00000010`04100000 : nt!KeBugCheckEx.
ffffca09`dc867390 fffff806`562e9526 : 00000000`00000000 ffffcf8a`0f5f5c10 00000000`00000006 ffffc980`a68ebba0 : nt!MiDeleteVa+0x153a.
ffffca09`dc867490 fffff806`562e963b : ffffc9e4`c0534758 ffffcf8a`10107700 ffffca09`00000000 ffffca09`dc867900 : nt!MiWalkPageTablesRecursively+0x776.
ffffca09`dc867530 fffff806`562e963b : ffffc9e4`f26029a0 ffffcf8a`10107700 ffffca09`00000001 ffffca09`dc867910 : nt!MiWalkPageTablesRecursively+0x88b.
ffffca09`dc8675d0 fffff806`562e963b : ffffc9e4`f2602000 ffffcf8a`10107700 ffffca09`00000002 ffffca09`dc867920 : nt!MiWalkPageTablesRecursively+0x88b.
ffffca09`dc867670 fffff806`562d859b : 00000000`00000000 ffffcf8a`10107700 ffffcf8a`00000003 ffffca09`dc867930 : nt!MiWalkPageTablesRecursively+0x88b.
ffffca09`dc867710 fffff806`5634b541 : ffffca09`dc8678b0 ffffcf8a`00000000 00000000`00000002 fffff806`00000000 : nt!MiWalkPageTables+0x36b.
ffffca09`dc867810 fffff806`563229a0 : 00000000`00000001 ffffca09`00000000 ffffcf8a`10107550 ffffcf8a`0e149080 : nt!MiDeletePagablePteRange+0x4f1.
ffffca09`dc867b20 fffff806`5631ae6f : 00000000`14d1d820 00000000`00000000 ffffcf8a`00000000 fffff806`00000000 : nt!MiDeleteVad+0x360.
ffffca09`dc867c30 fffff806`566fadfc : ffffca09`00000000 00000000`00000000 ffffca09`dc867d90 0000014d`1d720000 : nt!MiFreeVadRange+0xa3.
ffffca09`dc867c90 fffff806`566fa8d5 : 00000000`00000000 00000000`00000000 00000022`66cfdad0 0000014d`1d720000 : nt!MmFreeVirtualMemory+0x4ec.
ffffca09`dc867de0 fffff806`56406bb5 : ffffcf8a`0e149080 00000000`00000001 ffffca09`dc867ec0 ffffca09`dc867ec0 : nt!NtFreeVirtualMemory+0x95.
ffffca09`dc867e40 00007ffb`377ec164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000022`66cfdae8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`377ec164.

SYMBOL_NAME: nt!MiDeleteVa+153a.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.630.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe.

BUCKET_ID_FUNC_OFFSET: 153a.

FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup: MachineOwner.
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\ogulcan\Desktop\112520-7859-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff803`41800000 PsLoadedModuleList = 0xfffff803`4242a3b0.
Debug session time: Wed Nov 25 15:14:16.780 2020 (UTC + 3:00)
System Uptime: 0 days 0:24:52.512.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
...............
Loading User Symbols.
Loading unloaded module list.
.............
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff803`41bf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffde85`4c00ee00=000000000000001a.
2: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061948, The subtype of the bugcheck.
Arg2: 0000000001000000.
Arg3: 0000000000000001.
Arg4: 0000000001000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3968.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-5IDGV71.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 14930.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 79.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 61948.

BUGCHECK_P2: 1000000.

BUGCHECK_P3: 1.

BUGCHECK_P4: 1000000.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

STACK_TEXT:
ffffde85`4c00edf8 fffff803`41c4308c : 00000000`0000001a 00000000`00061948 00000000`01000000 00000000`00000001 : nt!KeBugCheckEx.
ffffde85`4c00ee00 fffff803`41b49d60 : 0000013e`00000002 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x1bd114.
ffffde85`4c00ee90 fffff803`41b4a91e : 00000000`00000000 ffffde85`4c00f5a0 ffffe600`9f012000 ffffde85`4c00f4f0 : nt!MiDeletePteRun+0x13b0.
ffffde85`4c00f0a0 fffff803`41ae9a1d : 00000000`00000000 ffffcb09`53bb2700 ffffde85`4c00f4f0 ffffe600`9f011880 : nt!MiDeleteVaTail+0x6e.
ffffde85`4c00f0d0 fffff803`41ae963b : ffffe673`004f8088 ffffcb09`53bb2700 ffffde85`00000000 ffffde85`4c00f540 : nt!MiWalkPageTablesRecursively+0xc6d.
ffffde85`4c00f170 fffff803`41ae963b : ffffe673`398027c0 ffffcb09`53bb2700 ffffde85`00000001 ffffde85`4c00f550 : nt!MiWalkPageTablesRecursively+0x88b.
ffffde85`4c00f210 fffff803`41ae963b : ffffe673`39802000 ffffcb09`53bb2700 ffffde85`00000002 ffffde85`4c00f560 : nt!MiWalkPageTablesRecursively+0x88b.
ffffde85`4c00f2b0 fffff803`41ad859b : 00000000`00000000 ffffcb09`53bb2700 00000000`00000003 ffffde85`4c00f570 : nt!MiWalkPageTablesRecursively+0x88b.
ffffde85`4c00f350 fffff803`41b4b541 : ffffde85`4c00f4f0 ffffcb09`00000000 ffffe600`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b.
ffffde85`4c00f450 fffff803`41b229a0 : 00000000`00000001 ffffde85`00000000 ffffcb09`53bb2550 ffffcb09`5356a080 : nt!MiDeletePagablePteRange+0x4f1.
ffffde85`4c00f760 fffff803`41f04aa9 : 00000000`00000000 00000000`00000000 00000007`00000000 00000000`00000000 : nt!MiDeleteVad+0x360.
ffffde85`4c00f870 fffff803`41f04882 : ffffcb09`51a63320 00000000`00000000 ffffcb09`53bb2080 00000000`00000000 : nt!MiUnmapVad+0x49.
ffffde85`4c00f8a0 fffff803`41f046f9 : ffff8502`e529bb40 fffff803`41ef138c 00000000`00000310 00000000`00000000 : nt!MiUnmapViewOfSection+0x152.
ffffde85`4c00f980 fffff803`41e81f4c : ffffcb09`5356a080 0000013e`02240000 00000000`00000000 ffffcb09`53bb2080 : nt!NtUnmapViewOfSectionEx+0x99.
ffffde85`4c00f9d0 fffff803`41c06bb5 : ffffcb09`00000000 ffffcb09`00000001 ffffde85`4c00fa80 ffffde85`4c00fa80 : nt!NtUnmapViewOfSection+0xc.
ffffde85`4c00fa00 0000013e`0054bbb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000007`29ffe908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0000013e`0054bbb4.

SYMBOL_NAME: nt!MiDereferenceIoPages+1bd114.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.630.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe.

BUCKET_ID_FUNC_OFFSET: 1bd114.

FAILURE_BUCKET_ID: 0x1a_61948_nt!MiDereferenceIoPages.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {16899f95-043e-78ea-0aba-e664d76c4fc5}

Followup: MachineOwner.
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\ogulcan\Desktop\112520-8093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff800`06200000 PsLoadedModuleList = 0xfffff800`06e2a3b0.
Debug session time: Wed Nov 25 18:29:42.399 2020 (UTC + 3:00)
System Uptime: 0 days 3:15:02.131.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
............
Loading User Symbols.
Loading unloaded module list.
..............
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff800`065f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff88c`288ff000=000000000000001a.
7: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffdb800002be30.
Arg3: 0000001004100000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5061.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-5IDGV71.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 16046.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 78.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: ffffdb800002be30.

BUGCHECK_P3: 1004100000.

BUGCHECK_P4: 0.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MSIAfterburner.exe.

STACK_TEXT:
fffff88c`288feff8 fffff800`0654ccaa : 00000000`0000001a 00000000`00041792 ffffdb80`0002be30 00000010`04100000 : nt!KeBugCheckEx.
fffff88c`288ff000 fffff800`064e9526 : 00000000`00000000 ffffb906`d1e6e700 00000000`0000015d ffffdb80`0002be30 : nt!MiDeleteVa+0x153a.
fffff88c`288ff100 fffff800`064e963b : ffffdbed`00000000 ffffb906`d1e6e700 fffff88c`00000000 fffff88c`288ff570 : nt!MiWalkPageTablesRecursively+0x776.
fffff88c`288ff1a0 fffff800`064e963b : ffffdbed`f6e00000 ffffb906`d1e6e700 fffff88c`00000001 fffff88c`288ff580 : nt!MiWalkPageTablesRecursively+0x88b.
fffff88c`288ff240 fffff800`064e963b : ffffdbed`f6e00000 ffffb906`d1e6e700 fffff88c`00000002 fffff88c`288ff590 : nt!MiWalkPageTablesRecursively+0x88b.
fffff88c`288ff2e0 fffff800`064d859b : 00000001`05f8f007 ffffb906`d1e6e700 00000000`00000003 fffff88c`288ff5a0 : nt!MiWalkPageTablesRecursively+0x88b.
fffff88c`288ff380 fffff800`0654b541 : fffff88c`288ff520 ffffb906`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b.
fffff88c`288ff480 fffff800`065229a0 : 00000000`00000001 fffff88c`00000000 ffffb906`d1e6e550 ffffb906`d1c4e080 : nt!MiDeletePagablePteRange+0x4f1.
fffff88c`288ff790 fffff800`06904aa9 : ffffb906`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360.
fffff88c`288ff8a0 fffff800`06904882 : ffffb906`d7608520 00000000`00000000 ffffb906`d1e6e080 00000000`00000000 : nt!MiUnmapVad+0x49.
fffff88c`288ff8d0 fffff800`069046f9 : ffff20f0`700a7783 00000000`0019f9a0 00000000`77ae4660 00000000`00000000 : nt!MiUnmapViewOfSection+0x152.
fffff88c`288ff9b0 fffff800`06606bb5 : ffffb906`d1c4e080 00007ff8`ccd17f01 fffff88c`288ffa80 ffffb906`d1e6e080 : nt!NtUnmapViewOfSectionEx+0x99.
fffff88c`288ffa00 00007ff8`cec8f714 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000000`0009e5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`cec8f714.

SYMBOL_NAME: nt!MiDeleteVa+153a.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.630.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe.

BUCKET_ID_FUNC_OFFSET: 153a.

FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup: MachineOwner.
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\ogulcan\Desktop\112720-8484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff803`59600000 PsLoadedModuleList = 0xfffff803`5a22a3b0.
Debug session time: Fri Nov 27 02:03:25.565 2020 (UTC + 3:00)
System Uptime: 0 days 12:59:44.297.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
...................
Loading User Symbols.
Loading unloaded module list.
............................
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff803`599f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa81`1c3b6e20=0000000000000133.
2: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at.
DISPATCH_LEVEL or above. The offending component can usually be.
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8035a2fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains.
additional information regarding the cumulative timeout.
Arg4: 0000000000000000.

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7796.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-5IDGV71.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 36759.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 81.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 133.

BUGCHECK_P1: 1.

BUGCHECK_P2: 1e00.

BUGCHECK_P3: fffff8035a2fb320.

BUGCHECK_P4: 0.

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED.

TRAP_FRAME: ffffa90139786fa0 -- (.trap 0xffffa90139786fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe70000000028 rbx=0000000000000000 rcx=0000000000000000.
rdx=0000000006000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80359845d53 rsp=ffffa90139787130 rbp=ffffa901397872b0.
r8=0000000000000023 r9=0000000000000076 r10=0000000000000000.
r11=3fffffffffffffff r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!MmPurgeSection+0x283:
fffff803`59845d53 48b80000000000000400 mov rax,4000000000000h.
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MsMpEng.exe.

STACK_TEXT:
ffffaa81`1c3b6e18 fffff803`59a873f6 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`5a2fb320 : nt!KeBugCheckEx.
ffffaa81`1c3b6e20 fffff803`59926853 : 0000777e`ad40e90a ffffaa81`1c3c0180 00000000`00000000 ffffaa81`1c3c0180 : nt!KeAccumulateTicks+0x15e346.
ffffaa81`1c3b6e80 fffff803`5992633a : ffff8587`670d50e0 ffffa901`39787020 ffffd403`12f10000 00000000`00000001 : nt!KeClockInterruptNotify+0x453.
ffffaa81`1c3b6f30 fffff803`5982ecd5 : ffff8587`670d50e0 00000000`00000000 00000000`00000000 ffff73d2`85fda18d : nt!HalpTimerClockIpiRoutine+0x1a.
ffffaa81`1c3b6f60 fffff803`599f6cba : ffffa901`39787020 ffff8587`670d50e0 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5.
ffffaa81`1c3b6fb0 fffff803`599f7227 : 00000010`00000001 ffffe700`110f8350 ffffa901`3636fae0 ffffa901`3636fae0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa.
ffffa901`39786fa0 fffff803`59845d53 : 00002005`afd678c0 ffffa901`397872b0 ffffd403`12e13500 00000000`00000001 : nt!KiInterruptDispatchNoLockNoEtw+0x37.
ffffa901`39787130 fffff803`59845930 : ffff8587`00000000 ffff8587`673eaa00 ffff8587`75ecc2a0 ffffa901`00000000 : nt!MmPurgeSection+0x283.
ffffa901`39787230 fffff803`59931ffa : ffff8587`7b30d198 ffff8587`7d5a5b40 00000000`00000000 00000000`00000000 : nt!CcPurgeCacheSection+0xe0.
ffffa901`397872f0 fffff803`5981f95c : ffff8587`7d5a5b40 00000000`00000000 0000000f`e01f0000 ffffa901`397873e0 : nt!CcZeroEndOfLastPage+0xde.
ffffa901`39787340 fffff803`5548ef74 : ffffa901`397874b0 ffffa901`397874b8 00000000`00000000 ffffd403`048589f0 : nt!FsRtlCreateSectionForDataScan+0x13c.
ffffa901`397873e0 fffff803`5c1e347e : 00000000`00000000 ffffa901`397874b9 fffff803`5c1c4000 ffffd403`03f98540 : FLTMGR!FltCreateSectionForDataScan+0xf4.
ffffa901`39787440 00000000`00000000 : ffffa901`397874b9 fffff803`5c1c4000 ffffd403`03f98540 00000000`00000000 : WdFilter+0x3347e.

SYMBOL_NAME: WdFilter+3347e.

MODULE_NAME: WdFilter.

IMAGE_NAME: WdFilter.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 3347e.

FAILURE_BUCKET_ID: 0x133_ISR_WdFilter!unknown_function.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {62348c14-2071-9358-2666-f83f3c99caf9}

Followup: MachineOwner.
---------
 
Son düzenleyen: Moderatör:
1) Dynamic Platform Thermal Framework Driver kaldırın.

2) Aşağıdaki sürücüyü indirin. Daha sonra eski sürücüyü DDU ile kaldırıp indirdiğiniz sürücüyü kurun. DDU rehberi aşağıda mevcut.

Sürücü: Grafik Sürücüsü - GeForce Game Ready Driver | NVIDIA
Rehber: DDU ile Sürücü Kaldırma Rehberi

3) MSI Afterburner kaldırın.
1) Hali hazırda kaldırılmış durumda birkaç yerde görmüştüm throttle çözümü konuları.
2)Konuyu açmadan önce DDU ile güvenli modda başlatıp kaldırdım ve söylediğiniz sürüm.
3) Evet mavi ekranın bir tanesinde msi afterburner görünüyor. Diğer hatalarda da msi afterburner yasaydı kesin bundan diye silerdim ancak hepsi farklı olunca başka bir sorun vardır diye ellemedim.
Ama yine de kaldırırım denemekten zarar gelmez sonuçta.
Benim korktuğum dört hatanın üçü MEMORY MANAGEMENT hatası olunca kesin ramin bozulduğu düşüncesindeydim. Testte bir şey çıkmayınca konu açayım dedim.
 
Son düzenleme:

Geri
Yukarı