Format sonrası mavi ekran

İşletim sistemi
Windows 10

ismailcann

Centipat
Katılım
25 Şubat 2020
Mesajlar
39
Arkadaşlar bilgisayarıma format attım ve driver dahi yükleyemiyorum mavi ekran almaktan, neredeyse 2 dakikaya bir mavi ekran veriyor, minidump dosyalarını zorda olsa almayı başardım.
sdf.rar kontrol edebilirseniz sevinirim.
Sistem özellikleri:
İşlemci: Ryzen 5 3500X.
Anakart: Gigabyte B450 Aorus Pro 3600 MHz.
Ekran kartı: Gigabyte RX 5600XT Gaming OC.
RAM: Corsair Vengeance RGB Pro 2x8 GB 3200 MHz.
SSD: James Donkey 256 GB 2000/1000 MS NVMe SSD.
PSU: Corsair MWE 600W 80+ Bronze PSU.
Kasa: Sharkoon rev 200.
 
DDU rehberini uygulayarak ekran kartı sürücüsünü kaldırıp yeniden kurun.

Aşağıdaki rehberi uygulayın.

BİOS sürümünü F60e'ye yükseltin ya da F51 sürümüne düşün. F60c kaldırılmış kullanmayın.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Desktop\sdf\122620-3343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`20800000 PsLoadedModuleList = 0xfffff803`2142a3b0
Debug session time: Sat Dec 26 20:57:49.470 2020 (UTC + 3:00)
System Uptime: 0 days 0:01:49.111
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`20bf5210 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffb00`545d9650=000000000000003b
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8032fd3f940, Address of the instruction which caused the bugcheck
Arg3: fffffb00545d9f50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7841

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 100

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8032fd3f940

BUGCHECK_P3: fffffb00545d9f50

BUGCHECK_P4: 0

CONTEXT:  fffffb00545d9f50 -- (.cxr 0xfffffb00545d9f50)
rax=ffffa982fee89280 rbx=0000000000000000 rcx=ffffa98302479000
rdx=ffffa982fefa3bb0 rsi=0000000000000000 rdi=ffffa982fed32520
rip=fffff8032fd3f940 rsp=fffffb00545da950 rbp=fffffb00545da9d0
 r8=ffffa982fee89280  r9=7fffa982fefa3e88 r10=fffff8032ffb1010
r11=ffffa3fea69ca0ff r12=ffb4b4b4ffb4b4b4 r13=ffb4b4b4ffb4b4b4
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
dxgkrnl!ADAPTER_DISPLAY::DdiSetPointerPosition+0x114:
fffff803`2fd3f940 418b4d0c        mov     ecx,dword ptr [r13+0Ch] ds:002b:ffb4b4b4`ffb4b4c0=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
fffffb00`545da950 fffff803`2fd3f49f     : 00000000`00000000 ffffa983`0247b018 00000000`00000000 ffffa983`0247b018 : dxgkrnl!ADAPTER_DISPLAY::DdiSetPointerPosition+0x114
fffffb00`545daa00 fffff803`2fd3ef3c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSetPointerPosition+0x543
fffffb00`545dabc0 ffff82e4`19aafe6c     : ffff8281`44e3f480 00000000`0000020b 00000000`0000020b 00000000`00000000 : dxgkrnl!DxgkCddSetPointerPosition+0x3c
fffffb00`545dabf0 ffff82e4`19aafde4     : ffff8281`4060f010 00000000`00000000 00000000`0000020b ffff8281`40911000 : cdd!MovePointerInternal+0x74
fffffb00`545dac40 ffff82e4`197b29f4     : ffff8281`4060f010 ffff82e4`1941ffb3 00000000`00000000 fffffb00`545dace0 : cdd!DrvMovePointerEx+0x14
fffffb00`545dac70 ffff82e4`197b118a     : 00000000`00000000 fffffb00`545dace0 ffff8281`40911000 ffff8281`4060f010 : win32kfull!vMovePointer+0x68
fffffb00`545dacb0 ffff82e4`197b5bfa     : ffff8281`40911000 00000000`0000020b 00000000`000000d5 00000000`00000000 : win32kfull!GreMovePointer+0x13a
fffffb00`545dad20 ffff82e4`197b63e1     : fffffb00`545db110 00000000`00000000 ffffa982`fef16410 fffff803`20adbc43 : win32kfull!xxxMoveEventAbsolute+0x20a
fffffb00`545dae20 ffff82e4`194aeecb     : 00000000`00000000 00000000`00000000 fffffb00`545db000 00000000`00000000 : win32kfull!EditionCommitMousePosAndMove+0x91
fffffb00`545dae90 ffff82e4`194aee00     : 00000000`00000000 fffffb00`545db050 fffff803`20adbb10 ffff82e4`194b1f7a : win32kbase!EditionCommitMousePosAndMove+0x83
fffffb00`545daf00 ffff82e4`194aec6a     : 00000000`00000001 fffffb00`545db009 00000000`00000000 00000000`00000001 : win32kbase!ApiSetEditionCommitMousePosAndMove+0xd4
fffffb00`545daf80 ffff82e4`1945b16d     : 000000d2`0000020a fffffb00`545db0b0 ffff8281`4063e000 fffffb00`545db280 : win32kbase!CMouseProcessor::CommitMousePosAndMoveCursor+0x126
fffffb00`545db070 ffff82e4`195c9675     : 000000d5`0000020b 000000d2`0000020a ffff8281`406067e8 00000000`00000000 : win32kbase!CMouseProcessor::ProcessMouseInputData+0x169
fffffb00`545db0f0 ffff82e4`195ba89a     : ffff8281`406067d0 ffff82e4`195ba985 ffffa983`025bc0c8 ffff8281`406062d0 : win32kbase!CMouseProcessor::ProcessInput+0x549
fffffb00`545db330 ffff82e4`195bac03     : ffff8281`406062d0 00000000`412ae138 ffff8281`406067d0 ffffa983`025bc0c8 : win32kbase!CMouseSensor::FlushMouseReports+0x42
fffffb00`545db370 ffff82e4`195bab34     : ffff8281`40606320 00000000`00000018 ffff8281`40606200 ffff8281`406062d0 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0xb3
fffffb00`545db3c0 ffff82e4`195ac3fa     : ffff82e4`196104c0 fffffb00`545db500 ffff8281`406062d0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x54
fffffb00`545db400 ffff82e4`1941956d     : 00000000`00000040 ffff82e4`196104c0 00000000`00000001 ffffa983`025ae8a0 : win32kbase!CBaseInput::OnReadNotification+0x52a
fffffb00`545db540 ffff82e4`19419242     : ffffa983`025bb080 ffff8281`40660830 00000000`00000006 ffff5d73`862dce45 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
fffffb00`545db680 ffff82e4`194101be     : ffff82e4`196582b0 ffff8281`40660830 ffff82e4`19651970 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
fffffb00`545db6b0 ffff82e4`1940ff10     : 00000000`00000006 ffff82e4`196582b0 00000000`00000006 ffff8281`40660830 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
fffffb00`545db6e0 ffff82e4`197a0748     : ffff8281`4060f010 ffff8281`4060f010 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
fffffb00`545db810 ffff82e4`197a0314     : 00000000`00000004 00000000`00000004 00000000`0000000d ffff82e4`19659a80 : win32kfull!xxxDesktopThreadWaiter+0x130
fffffb00`545db890 ffff82e4`1948ae33     : ffffa983`025bb080 ffffa983`025bb080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
fffffb00`545db970 ffff82e4`19738d20     : ffffa983`025bb080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffffb00`545dbaa0 ffff82e4`19e0474d     : ffffa983`025bb080 ffffa983`025bb080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffffb00`545dbad0 fffff803`20c06bb8     : ffffa983`00000005 00000000`00000005 000001bb`54604070 00000000`000002fc : win32k!NtUserCallNoParam+0x15
fffffb00`545dbb00 00007ff9`f1fc10e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000078`b8c7fd18 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f1fc10e4


SYMBOL_NAME:  dxgkrnl!ADAPTER_DISPLAY::DdiSetPointerPosition+114

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .cxr 0xfffffb00545d9f50 ; kb

BUCKET_ID_FUNC_OFFSET:  114

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgkrnl!ADAPTER_DISPLAY::DdiSetPointerPosition

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a8097140-3fce-4150-646e-6d192cb1a04a}

Followup:     MachineOwner
---------
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…