Mavi ekran hatası

İşletim sistemi
Windows 10

okancftci

Femtopat
Katılım
24 Kasım 2020
Mesajlar
15
Daha fazla  
Cinsiyet
Erkek
Termal macun değişimi sonrası mavi ekran almaya başladım. Heavyload ile stres testi yaptım bir problem çıkmadı. Memtest ve HD Tune ile de tarama yaptım onlarda da bir sıkıntı çıkmadı. Yardımcı olabilirseniz sevinirim.
 
DDU ile hem NVIDIA hem de Intel ekran kartı sürücüsünü indirip yeniden kurun.

Wi-Fi'yi bir süre kullanmayın.

Aşağıdaki linkten 'Yonga Kümesi' ve 'Kablosuz Ağ' sürücülerini güncelleyin.

Aşağıdaki rehberi uygulayın.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Desktop\122220-8468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`24200000 PsLoadedModuleList = 0xfffff801`24e2a2b0
Debug session time: Tue Dec 22 12:45:00.194 2020 (UTC + 3:00)
System Uptime: 0 days 0:08:06.946
Loading Kernel Symbols
...............................................................
................................................................
................................................................

Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`245f5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffc484`6b085f40=000000000000003b
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80122d86c76, Address of the instruction which caused the bugcheck
Arg3: ffffc4846b086840, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11246

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80122d86c76

BUGCHECK_P3: ffffc4846b086840

BUGCHECK_P4: 0

CONTEXT:  ffffc4846b086840 -- (.cxr 0xffffc4846b086840)
rax=ffff930215452658 rbx=ffff9302213afb20 rcx=fffff80122d8b9f0
rdx=ffff930215452270 rsi=ffff930215452270 rdi=ffff930211280ba0
rip=fffff80122d86c76 rsp=ffffc4846b087240 rbp=0000000000000008
 r8=0000000000000000  r9=fffff80122d9d440 r10=ffff930215452270
r11=0000000000000010 r12=0000000000000000 r13=ffff9302239dbd01
r14=ffff930215452658 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x236:
fffff801`22d86c76 0f1140b8        movups  xmmword ptr [rax-48h],xmm0 ds:002b:ffff9302`15452610=????????????????????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
ffffc484`6b087240 fffff801`22dbbbd4     : ffffc484`6b0872f0 ffff9302`239dbd28 ffff9302`11280ba0 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x236
ffffc484`6b0872b0 fffff801`24452f55     : 00000000`00000000 ffff9302`113aa860 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffffc484`6b087360 fffff801`24454544     : 00000000`00000003 ffff9302`15452270 ffff9302`6d4e6f49 fffff801`24454173 : nt!IofCallDriver+0x55
ffffc484`6b0873a0 fffff801`247fec2d     : ffffc484`6b087660 ffff9302`113aa860 ffff9302`239dbd68 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
ffffc484`6b0873f0 fffff801`2482751e     : ffff9302`113aa860 00000000`000000a8 ffff9302`25510a90 ffff9302`25510a01 : nt!IopParseDevice+0x117d
ffffc484`6b087560 fffff801`247eb19a     : ffff9302`25510a00 ffffc484`6b0877c8 ffff9302`00000040 ffff9302`0e6f9d20 : nt!ObpLookupObjectName+0x3fe
ffffc484`6b087730 fffff801`2486d14f     : ffffc484`00000000 00000050`fee7eb88 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByNameEx+0x1fa
ffffc484`6b087860 fffff801`2486cd29     : 00000050`fee7eb48 ffff9302`1fc10080 00000050`fee7eb88 00000050`fee7eb50 : nt!IopCreateFile+0x40f
ffffc484`6b087900 fffff801`246071b5     : ffffc484`6b087a80 fffff801`2482dc95 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79
ffffc484`6b087990 00007fff`fabaca54     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000050`fee7eac8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`fabaca54


SYMBOL_NAME:  FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+236

MODULE_NAME: FLTMGR

IMAGE_NAME:  FLTMGR.SYS

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .cxr 0xffffc4846b086840 ; kb

BUCKET_ID_FUNC_OFFSET:  236

FAILURE_BUCKET_ID:  0x3B_c0000005_FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8a3f5f1a-1689-90d8-a9c5-009898eb5898}

Followup:     MachineOwner
---------
 
Ekran kartından kaynaklı. DDU ile sürücüleri kaldırıp temiz bir kurulum yap.

 
Sürprizbozan'dan bakamayanlar için kod:

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\maksu\Desktop\122220-8468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`24200000 PsLoadedModuleList = 0xfffff801`24e2a2b0
Debug session time: Tue Dec 22 12:45:00.194 2020 (UTC + 3:00)
System Uptime: 0 days 0:08:06.946
Loading Kernel Symbols
...............................................................
................................................................
................................................................

Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`245f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc484`6b085f40=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80122d86c76, Address of the instruction which caused the bugcheck
Arg3: ffffc4846b086840, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6015

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 11246

Key : Analysis.Memory.CommitPeak.Mb
Value: 79

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80122d86c76

BUGCHECK_P3: ffffc4846b086840

BUGCHECK_P4: 0

CONTEXT: ffffc4846b086840 -- (.cxr 0xffffc4846b086840)
rax=ffff930215452658 rbx=ffff9302213afb20 rcx=fffff80122d8b9f0
rdx=ffff930215452270 rsi=ffff930215452270 rdi=ffff930211280ba0
rip=fffff80122d86c76 rsp=ffffc4846b087240 rbp=0000000000000008
r8=0000000000000000 r9=fffff80122d9d440 r10=ffff930215452270
r11=0000000000000010 r12=0000000000000000 r13=ffff9302239dbd01
r14=ffff930215452658 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x236:
fffff801`22d86c76 0f1140b8 movups xmmword ptr [rax-48h],xmm0 ds:002b:ffff9302`15452610=????????????????????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffc484`6b087240 fffff801`22dbbbd4 : ffffc484`6b0872f0 ffff9302`239dbd28 ffff9302`11280ba0 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x236
ffffc484`6b0872b0 fffff801`24452f55 : 00000000`00000000 ffff9302`113aa860 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffffc484`6b087360 fffff801`24454544 : 00000000`00000003 ffff9302`15452270 ffff9302`6d4e6f49 fffff801`24454173 : nt!IofCallDriver+0x55
ffffc484`6b0873a0 fffff801`247fec2d : ffffc484`6b087660 ffff9302`113aa860 ffff9302`239dbd68 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
ffffc484`6b0873f0 fffff801`2482751e : ffff9302`113aa860 00000000`000000a8 ffff9302`25510a90 ffff9302`25510a01 : nt!IopParseDevice+0x117d
ffffc484`6b087560 fffff801`247eb19a : ffff9302`25510a00 ffffc484`6b0877c8 ffff9302`00000040 ffff9302`0e6f9d20 : nt!ObpLookupObjectName+0x3fe
ffffc484`6b087730 fffff801`2486d14f : ffffc484`00000000 00000050`fee7eb88 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByNameEx+0x1fa
ffffc484`6b087860 fffff801`2486cd29 : 00000050`fee7eb48 ffff9302`1fc10080 00000050`fee7eb88 00000050`fee7eb50 : nt!IopCreateFile+0x40f
ffffc484`6b087900 fffff801`246071b5 : ffffc484`6b087a80 fffff801`2482dc95 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79
ffffc484`6b087990 00007fff`fabaca54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000050`fee7eac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`fabaca54

SYMBOL_NAME: FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+236

MODULE_NAME: FLTMGR

IMAGE_NAME: FLTMGR.SYS

IMAGE_VERSION: 10.0.19041.264

STACK_COMMAND: .cxr 0xffffc4846b086840 ; kb

BUCKET_ID_FUNC_OFFSET: 236

FAILURE_BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {8a3f5f1a-1689-90d8-a9c5-009898eb5898}

Followup: MachineOwner
---------
 
Sürprizbozan'dan bakamayanlar için kod:

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (C) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\maksu\Desktop\122220-8468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free X64
PROduct: WinNt, Suite: TerminalServer SingleUserTS Personal
Edition Build lab: 19041.1.AMD64fre. VB_RELEASE. 191206-1406
Machine Name:
Kernel base = 0xfffff801`24200000 PsLoadedModuleList = 0xfffff801`24e2a2b0
Debug session time: Tue Dec 22 12:45:00.194 2020 (UTC + 3:00)
System Uptime: 0 days 0:08:06.946
Loading Kernel Symbols




Loading User Symbols
Loading unloaded module list

For analysis of this file, run! Analyze -v
Nt! KeBugCheckEx:
Fffff801'245F5780 48894C2408 mov qword PTR [rsp+8],rcx SS:0018:ffffc484'6B085F40=000000000000003B
1: Kd>! Analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C0000005, Exception code that caused the bugcheck
Arg2: FFFFF80122D86C76, Address of the instruction which caused the bugcheck
Arg3: FFFFC4846B086840, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, Zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key: Analysis. CPU. MSec
Value: 6015

Key: Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007E on DESKTOP-G2EFLS9

Key: Analysis. DebugData
Value: CreateObject

Key: Analysis. DebugModel
Value: CreateObject

Key: Analysis. Elapsed. MSec
Value: 11246

Key: Analysis. Memory. CommitPeak. MB
Value: 79

Key: Analysis. System
Value: CreateObject

Key: WER. OS. Branch
Value: VB_RELEASE

Key: WER. OS. Timestamp
Value: 2019-12-06T14:06:00Z

Key: WER. OS. Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3B

BUGCHECK_P1: C0000005

BUGCHECK_P2: FFFFF80122D86C76

BUGCHECK_P3: FFFFC4846B086840

BUGCHECK_P4: 0

CONTEXT: FFFFC4846B086840 -- (.Cxr 0xffffc4846b086840)
Rax=FFFF930215452658 rbx=FFFF9302213AFB20 rcx=FFFFF80122D8B9F0
Rdx=FFFF930215452270 rsi=FFFF930215452270 rdi=FFFF930211280BA0
Rip=FFFFF80122D86C76 rsp=FFFFC4846B087240 rbp=0000000000000008
R8=0000000000000000 R9=FFFFF80122D9D440 R10=FFFF930215452270
R11=0000000000000010 R12=0000000000000000 R13=FFFF9302239DBD01
R14=FFFF930215452658 R15=0000000000000000
İopl=0 NV up ei PL nz na pe NC
CS=0010 SS=0018 DS=002B es=002B fs=0053 GS=002B efl=00050202
FLTMGR! FltpLegacyProcessingAfterPreCallbacksCompleted+0x236:
Fffff801'22D86C76 0F1140B8 movups xmmword PTR [rax-48h],xmm0 DS:002b:FFFF9302'15452610=?
Resetting default scope

BLACKBOXBSD: 1 (!Blackboxbsd)

BLACKBOXNTFS: 1 (!Blackboxntfs)

BLACKBOXPNP: 1 (!Blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
Ffffc484'6B087240 fffff801'22dbbbd4: Ffffc484'6B0872F0 FFFF9302'239DBD28 FFFF9302'11280BA0 00000000'00000000: FLTMGR! FltpLegacyProcessingAfterPreCallbacksCompleted+0x236
Ffffc484'6B0872B0 fffff801'24452F55: 00000000'00000000 FFFF9302'113AA860 00000000'00000000 00000000'00000000: FLTMGR! FltpCreate+0x324
Ffffc484'6B087360 fffff801'24454544: 00000000'00000003 FFFF9302'15452270 FFFF9302'6D4E6F49 fffff801'24454173: Nt! IofCallDriver+0x55
Ffffc484'6B0873A0 fffff801'247FEC2D: Ffffc484'6B087660 FFFF9302'113AA860 FFFF9302'239DBD68 00000000'00000000: Nt! IoCallDriverWithTracing+0x34
Ffffc484'6B0873F0 fffff801'2482751E: FFFF9302'113AA860 00000000'000000A8 FFFF9302'25510A90 FFFF9302'25510A01: Nt! IopParseDevice+0x117D
Ffffc484'6B087560 fffff801'247EB19A: FFFF9302'25510A00 ffffc484'6B0877C8 FFFF9302'00000040 FFFF9302'0E6F9D20: Nt! ObpLookupObjectName+0x3FE
Ffffc484'6B087730 fffff801'2486D14F: Ffffc484'00000000 00000050'FEE7EB88 00000000'00000000 00000000'00000001: Nt! ObOpenObjectByNameEx+0x1FA
Ffffc484'6B087860 fffff801'2486CD29: 00000050'FEE7EB48 FFFF9302'1FC10080 00000050'FEE7EB88 00000050'FEE7EB50: Nt! IopCreateFile+0x40F
Ffffc484'6B087900 fffff801'246071B5: Ffffc484'6B087A80 fffff801'2482DC95 00000000'00000000 00000000'00000000: Nt! NtCreateFile+0x79
Ffffc484'6B087990 00007FFF'fabaca54: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: Nt! KiSystemServiceCopyEnd+0x25
00000050'fee7eac8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : 0x00007fff`fabaca54

SYMBOL_NAME: FLTMGR! FltpLegacyProcessingAfterPreCallbacksCompleted+236

MODULE_NAME: FLTMGR

IMAGE_NAME: FLTMGR.SYS

IMAGE_VERSION: 10.0.19041.264

STACK_COMMAND:. Cxr 0xffffc4846b086840; KB

BUCKET_ID_FUNC_OFFSET: 236

FAILURE_BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: VB_RELEASE

OSPLATFORM_TYPE: X64

OSNAME: Windows 10

FAILURE_ID_HASH: {8A3F5F1A-1689-90D8-A9C5-009898EB5898}

Followup: MachineOwner
---------

Kod görülebiliyor, sıkıntı yok.
 
Yonga kümesini güncelleme konusunda problem yaşıyorum. Intel Management Engine 11.8 Firmware for Windows 10 (64-bit) - Notebook'u indirirdikten sonra, bilgisayarımda batarya olmamasından dolayı kurulumu yapmıyor bu konuda öneriniz varmıydı? veya bu kurulumu bir şekilde gerçekleştirmek sistem açısından problem yaratır mı?
 
Sorun kısmen düzeldi gibi bilgisayarı kullanırken bir problem yaratmıyor ancak oyunlara girdiğim anda hata vermeye devam ediyor. Yeni minidump dosyası ektedir.
Sorunu şu şekilde çözdüm ancak oyun oynayamıyorum. Aygıt yöneticisinden NVIDIA'yı devre dışı bıraktım aktif kullanımda mavi ekran vermiyor. Oyun oynamadan bilgisayarını kullanmak isteyenler bu çözümü deneyebilir. Problemim bu şekilde devam etmekte en güncel minidump dosyası yukarıda mevcuttur yardımcı olabilecek arkadaşlara şimdiden teşekkür ediyorum.
 

Yeni konular

Geri
Yukarı