Amdkmdag.sys Hatası nedir?

  • Konuyu başlatan Hank
  • Başlangıç Tarihi
  • Mesaj 18
  • Görüntüleme 8B
Teşekkürler dostum.

Ne demek. Sizden bir ricam var. Sorununuz çözülürse çözüldüğünü belirtmeniz yeterli olacaktır. Sorun bitince buraya gelip yazarsınız.
 
Ne demek. Sizden bir ricam var. Sorununuz çözülürse çözüldüğünü belirtmeniz yeterli olacaktır. Sorun bitince buraya gelip yazarsınız.
Dediklerinizi yaptım. Bu sefer bilgisayarı 4-5 saat boyunca sorunsuz kullandım. Daha sonra tekrar hata aldım. Sanırım bu diğerinden farklı bir hata. Yardımcı olabilir misiniz?
91B3231F-E8EB-4B5E-8EC6-BDE4718CC19B.jpeg
 

Sadece yeni dosyaları paylaşın.
 

Sadece yeni dosyaları paylaşın.
 
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8058e1fe20d, Address of the instruction which caused the bugcheck
Arg3: ffff800238969380, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 119636

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8058e1fe20d

BUGCHECK_P3: ffff800238969380

BUGCHECK_P4: 0

CONTEXT:  ffff800238969380 -- (.cxr 0xffff800238969380)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffad8c128d6244
rdx=00ffffad8c128d62 rsi=0000000000000001 rdi=ffff80023896a1b8
rip=fffff8058e1fe20d rsp=ffff800238969d80 rbp=0000000000000001
r8=ffffad8c128d6244  r9=ffffad8c128d6244 r10=ffffad8c128d6244
r11=ffffb2ff85200000 r12=ffff80023896ad90 r13=ffff80023896ae60
r14=ffff80023896ad60 r15=ffffad8c0a5a4660
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
amdkmdag+0x1e5e20d:
fffff805`8e1fe20d f30f598c82401b0000 mulss xmm1,dword ptr [rdx+rax*4+1B40h] ds:002b:00ffffad`8c12a8a2=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  dwm.exe

STACK_TEXT:
ffff8002`38969d80 44a00000`42913eea     : 00000001`41000000 00000000`3f800000 47200000`4699999a 00000000`43c80f2c : amdkmdag+0x1e5e20d
ffff8002`38969d88 00000001`41000000     : 00000000`3f800000 47200000`4699999a 00000000`43c80f2c ffffad8c`00000000 : 0x44a00000`42913eea
ffff8002`38969d90 00000000`3f800000     : 47200000`4699999a 00000000`43c80f2c ffffad8c`00000000 47a80000`00000000 : 0x00000001`41000000
ffff8002`38969d98 47200000`4699999a     : 00000000`43c80f2c ffffad8c`00000000 47a80000`00000000 3f000000`80000000 : 0x3f800000
ffff8002`38969da0 00000000`43c80f2c     : ffffad8c`00000000 47a80000`00000000 3f000000`80000000 00000003`00000000 : 0x47200000`4699999a
ffff8002`38969da8 ffffad8c`00000000     : 47a80000`00000000 3f000000`80000000 00000003`00000000 00000002`00000000 : 0x43c80f2c
ffff8002`38969db0 47a80000`00000000     : 3f000000`80000000 00000003`00000000 00000002`00000000 46960000`46960000 : 0xffffad8c`00000000
ffff8002`38969db8 3f000000`80000000     : 00000003`00000000 00000002`00000000 46960000`46960000 45a00000`44a00000 : 0x47a80000`00000000
ffff8002`38969dc0 00000003`00000000     : 00000002`00000000 46960000`46960000 45a00000`44a00000 00000003`48a00000 : 0x3f000000`80000000
ffff8002`38969dc8 00000002`00000000     : 46960000`46960000 45a00000`44a00000 00000003`48a00000 3e381bab`3f40e737 : 0x00000003`00000000
ffff8002`38969dd0 46960000`46960000     : 45a00000`44a00000 00000003`48a00000 3e381bab`3f40e737 00000003`417d2f78 : 0x00000002`00000000
ffff8002`38969dd8 45a00000`44a00000     : 00000003`48a00000 3e381bab`3f40e737 00000003`417d2f78 00000000`3ece2cac : 0x46960000`46960000
ffff8002`38969de0 00000003`48a00000     : 3e381bab`3f40e737 00000003`417d2f78 00000000`3ece2cac 00000000`32effffe : 0x45a00000`44a00000
ffff8002`38969de8 3e381bab`3f40e737     : 00000003`417d2f78 00000000`3ece2cac 00000000`32effffe fffff805`43ccbd45 : 0x00000003`48a00000
ffff8002`38969df0 00000003`417d2f78     : 00000000`3ece2cac 00000000`32effffe fffff805`43ccbd45 40100000`00000000 : 0x3e381bab`3f40e737
ffff8002`38969df8 00000000`3ece2cac     : 00000000`32effffe fffff805`43ccbd45 40100000`00000000 40940000`00000000 : 0x00000003`417d2f78
ffff8002`38969e00 00000000`32effffe     : fffff805`43ccbd45 40100000`00000000 40940000`00000000 ffff8002`3896ad60 : 0x3ece2cac
ffff8002`38969e08 fffff805`43ccbd45     : 40100000`00000000 40940000`00000000 ffff8002`3896ad60 3fc55555`55555555 : 0x32effffe
ffff8002`38969e10 40100000`00000000     : 40940000`00000000 ffff8002`3896ad60 3fc55555`55555555 00000000`00000000 : 0xfffff805`43ccbd45
ffff8002`38969e18 40940000`00000000     : ffff8002`3896ad60 3fc55555`55555555 00000000`00000000 3fc55555`55555555 : 0x40100000`00000000
ffff8002`38969e20 ffff8002`3896ad60     : 3fc55555`55555555 00000000`00000000 3fc55555`55555555 00000000`00000000 : 0x40940000`00000000
ffff8002`38969e28 3fc55555`55555555     : 00000000`00000000 3fc55555`55555555 00000000`00000000 fffff805`8d51a250 : 0xffff8002`3896ad60
ffff8002`38969e30 00000000`00000000     : 3fc55555`55555555 00000000`00000000 fffff805`8d51a250 00000000`00000000 : 0x3fc55555`55555555


SYMBOL_NAME:  amdkmdag+1e5e20d

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .cxr 0xffff800238969380 ; kb

BUCKET_ID_FUNC_OFFSET:  1e5e20d

FAILURE_BUCKET_ID:  0x3B_c0000005_amdkmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e4accedc-b212-8e29-0a5e-7ca244f457be}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807634d3d40, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4764

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11343

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 38

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807634d3d40

READ_ADDRESS: fffff80763efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80763e0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff80763e0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000038

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  League of Legends.exe

DPC_STACK_BASE:  FFFFC50E81C4CFB0

TRAP_FRAME:  ffffc50e81c4c920 -- (.trap 0xffffc50e81c4c920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=00000009d2823532
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807634d3d40 rsp=ffffc50e81c4cab0 rbp=0000000000000001
r8=ffffc50e81c4cb00  r9=0000000000000000 r10=ffffffffffffffff
r11=ffffbb7b74600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiInsertTimer2WithCollectionLockHeld+0xc0:
fffff807`634d3d40 483b4a30        cmp     rcx,qword ptr [rdx+30h] ds:00000000`00000038=????????????????
Resetting default scope

STACK_TEXT:
ffffc50e`81c4c7d8 fffff807`635efe29     : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc50e`81c4c7e0 fffff807`635ec129     : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc50e`81c4c920 fffff807`634d3d40     : 00000000`00000000 00000000`00000005 00000009`d2823532 fffff807`634d3c5a : nt!KiPageFault+0x469
ffffc50e`81c4cab0 fffff807`634d1af2     : fffff807`63e31c80 00000000`00000001 ffffc50e`81c4cb00 00000000`00000001 : nt!KiInsertTimer2WithCollectionLockHeld+0xc0
ffffc50e`81c4cb00 fffff807`6353faf1     : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeSetTimer2+0x172
ffffc50e`81c4cb70 fffff807`6343a6be     : 00000000`00000001 ffffcb81`f93d5180 00000000`00000000 ffff960d`8a0ed040 : nt!KiTriggerForegroundBoostDpc+0x31
ffffc50e`81c4cbb0 fffff807`634399a4     : ffffcb81`f93d5180 eb08578b`00000000 00000000`00000008 00000000`000274b7 : nt!KiExecuteAllDpcs+0x30e
ffffc50e`81c4cd20 fffff807`635e4f85     : 56415541`54415756 ffffcb81`f93d5180 00000000`00000000 00000000`042bfa34 : nt!KiRetireDpcList+0x1f4
ffffc50e`81c4cfb0 fffff807`635e4d70     : 00000000`00000000 ffff960d`8bed3c60 00000000`d5277460 fffff807`635e4625 : nt!KxRetireDpcList+0x5
ffffc50e`83102ad0 fffff807`635e443e     : 00000000`d5277460 00000000`3c329570 00000000`00000000 ffffffff`ffffd801 : nt!KiDispatchInterruptContinue
ffffc50e`83102b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee


SYMBOL_NAME:  nt!KiInsertTimer2WithCollectionLockHeld+c0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c0

FAILURE_BUCKET_ID:  AV_nt!KiInsertTimer2WithCollectionLockHeld

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {35283413-80f1-82dc-dde8-198f2504df22}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5905

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 52268

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 0

BUGCHECK_P3: 8

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  League of Legends.exe

TRAP_FRAME:  ffffbc87b93c6300 -- (.trap 0xffffbc87b93c6300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8841b621080 rbx=0000000000000000 rcx=ffffc8841b621080
rdx=ffffc884160c8db8 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffbc87b93c6490 rbp=0000000000000000
r8=ffffbc87b93c5bb0  r9=00000000ffffffff r10=fffff8067ec22930
r11=ffff717c11600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

STACK_TEXT:
ffffbc87`b93c5a58 fffff806`7ee2efc5     : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffffbc87`b93c5a60 fffff806`7edeff6c     : ffffbc87`b93c6380 00000000`00001000 ffffbc87`b93c6300 ffff8000`00000000 : nt!KiDispatchException+0x1b4955
ffffbc87`b93c6120 fffff806`7edec103     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffbc87`b93c6300 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443


SYMBOL_NAME:  nt!KiDispatchException+1b4955

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b4955

FAILURE_BUCKET_ID:  0x1E_nt!KiDispatchException

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4c003660-11e1-3fb7-2474-3522eb7ee67b}

Followup:     MachineOwner
---------
 
Son düzenleme:
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8058e1fe20d, Address of the instruction which caused the bugcheck
Arg3: ffff800238969380, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 119636

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8058e1fe20d

BUGCHECK_P3: ffff800238969380

BUGCHECK_P4: 0

CONTEXT:  ffff800238969380 -- (.cxr 0xffff800238969380)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffad8c128d6244
rdx=00ffffad8c128d62 rsi=0000000000000001 rdi=ffff80023896a1b8
rip=fffff8058e1fe20d rsp=ffff800238969d80 rbp=0000000000000001
r8=ffffad8c128d6244  r9=ffffad8c128d6244 r10=ffffad8c128d6244
r11=ffffb2ff85200000 r12=ffff80023896ad90 r13=ffff80023896ae60
r14=ffff80023896ad60 r15=ffffad8c0a5a4660
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
amdkmdag+0x1e5e20d:
fffff805`8e1fe20d f30f598c82401b0000 mulss xmm1,dword ptr [rdx+rax*4+1B40h] ds:002b:00ffffad`8c12a8a2=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  dwm.exe

STACK_TEXT:
ffff8002`38969d80 44a00000`42913eea     : 00000001`41000000 00000000`3f800000 47200000`4699999a 00000000`43c80f2c : amdkmdag+0x1e5e20d
ffff8002`38969d88 00000001`41000000     : 00000000`3f800000 47200000`4699999a 00000000`43c80f2c ffffad8c`00000000 : 0x44a00000`42913eea
ffff8002`38969d90 00000000`3f800000     : 47200000`4699999a 00000000`43c80f2c ffffad8c`00000000 47a80000`00000000 : 0x00000001`41000000
ffff8002`38969d98 47200000`4699999a     : 00000000`43c80f2c ffffad8c`00000000 47a80000`00000000 3f000000`80000000 : 0x3f800000
ffff8002`38969da0 00000000`43c80f2c     : ffffad8c`00000000 47a80000`00000000 3f000000`80000000 00000003`00000000 : 0x47200000`4699999a
ffff8002`38969da8 ffffad8c`00000000     : 47a80000`00000000 3f000000`80000000 00000003`00000000 00000002`00000000 : 0x43c80f2c
ffff8002`38969db0 47a80000`00000000     : 3f000000`80000000 00000003`00000000 00000002`00000000 46960000`46960000 : 0xffffad8c`00000000
ffff8002`38969db8 3f000000`80000000     : 00000003`00000000 00000002`00000000 46960000`46960000 45a00000`44a00000 : 0x47a80000`00000000
ffff8002`38969dc0 00000003`00000000     : 00000002`00000000 46960000`46960000 45a00000`44a00000 00000003`48a00000 : 0x3f000000`80000000
ffff8002`38969dc8 00000002`00000000     : 46960000`46960000 45a00000`44a00000 00000003`48a00000 3e381bab`3f40e737 : 0x00000003`00000000
ffff8002`38969dd0 46960000`46960000     : 45a00000`44a00000 00000003`48a00000 3e381bab`3f40e737 00000003`417d2f78 : 0x00000002`00000000
ffff8002`38969dd8 45a00000`44a00000     : 00000003`48a00000 3e381bab`3f40e737 00000003`417d2f78 00000000`3ece2cac : 0x46960000`46960000
ffff8002`38969de0 00000003`48a00000     : 3e381bab`3f40e737 00000003`417d2f78 00000000`3ece2cac 00000000`32effffe : 0x45a00000`44a00000
ffff8002`38969de8 3e381bab`3f40e737     : 00000003`417d2f78 00000000`3ece2cac 00000000`32effffe fffff805`43ccbd45 : 0x00000003`48a00000
ffff8002`38969df0 00000003`417d2f78     : 00000000`3ece2cac 00000000`32effffe fffff805`43ccbd45 40100000`00000000 : 0x3e381bab`3f40e737
ffff8002`38969df8 00000000`3ece2cac     : 00000000`32effffe fffff805`43ccbd45 40100000`00000000 40940000`00000000 : 0x00000003`417d2f78
ffff8002`38969e00 00000000`32effffe     : fffff805`43ccbd45 40100000`00000000 40940000`00000000 ffff8002`3896ad60 : 0x3ece2cac
ffff8002`38969e08 fffff805`43ccbd45     : 40100000`00000000 40940000`00000000 ffff8002`3896ad60 3fc55555`55555555 : 0x32effffe
ffff8002`38969e10 40100000`00000000     : 40940000`00000000 ffff8002`3896ad60 3fc55555`55555555 00000000`00000000 : 0xfffff805`43ccbd45
ffff8002`38969e18 40940000`00000000     : ffff8002`3896ad60 3fc55555`55555555 00000000`00000000 3fc55555`55555555 : 0x40100000`00000000
ffff8002`38969e20 ffff8002`3896ad60     : 3fc55555`55555555 00000000`00000000 3fc55555`55555555 00000000`00000000 : 0x40940000`00000000
ffff8002`38969e28 3fc55555`55555555     : 00000000`00000000 3fc55555`55555555 00000000`00000000 fffff805`8d51a250 : 0xffff8002`3896ad60
ffff8002`38969e30 00000000`00000000     : 3fc55555`55555555 00000000`00000000 fffff805`8d51a250 00000000`00000000 : 0x3fc55555`55555555


SYMBOL_NAME:  amdkmdag+1e5e20d

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .cxr 0xffff800238969380 ; kb

BUCKET_ID_FUNC_OFFSET:  1e5e20d

FAILURE_BUCKET_ID:  0x3B_c0000005_amdkmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e4accedc-b212-8e29-0a5e-7ca244f457be}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807634d3d40, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4764

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11343

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 38

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807634d3d40

READ_ADDRESS: fffff80763efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80763e0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff80763e0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000038

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  League of Legends.exe

DPC_STACK_BASE:  FFFFC50E81C4CFB0

TRAP_FRAME:  ffffc50e81c4c920 -- (.trap 0xffffc50e81c4c920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=00000009d2823532
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807634d3d40 rsp=ffffc50e81c4cab0 rbp=0000000000000001
r8=ffffc50e81c4cb00  r9=0000000000000000 r10=ffffffffffffffff
r11=ffffbb7b74600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiInsertTimer2WithCollectionLockHeld+0xc0:
fffff807`634d3d40 483b4a30        cmp     rcx,qword ptr [rdx+30h] ds:00000000`00000038=????????????????
Resetting default scope

STACK_TEXT:
ffffc50e`81c4c7d8 fffff807`635efe29     : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc50e`81c4c7e0 fffff807`635ec129     : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc50e`81c4c920 fffff807`634d3d40     : 00000000`00000000 00000000`00000005 00000009`d2823532 fffff807`634d3c5a : nt!KiPageFault+0x469
ffffc50e`81c4cab0 fffff807`634d1af2     : fffff807`63e31c80 00000000`00000001 ffffc50e`81c4cb00 00000000`00000001 : nt!KiInsertTimer2WithCollectionLockHeld+0xc0
ffffc50e`81c4cb00 fffff807`6353faf1     : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeSetTimer2+0x172
ffffc50e`81c4cb70 fffff807`6343a6be     : 00000000`00000001 ffffcb81`f93d5180 00000000`00000000 ffff960d`8a0ed040 : nt!KiTriggerForegroundBoostDpc+0x31
ffffc50e`81c4cbb0 fffff807`634399a4     : ffffcb81`f93d5180 eb08578b`00000000 00000000`00000008 00000000`000274b7 : nt!KiExecuteAllDpcs+0x30e
ffffc50e`81c4cd20 fffff807`635e4f85     : 56415541`54415756 ffffcb81`f93d5180 00000000`00000000 00000000`042bfa34 : nt!KiRetireDpcList+0x1f4
ffffc50e`81c4cfb0 fffff807`635e4d70     : 00000000`00000000 ffff960d`8bed3c60 00000000`d5277460 fffff807`635e4625 : nt!KxRetireDpcList+0x5
ffffc50e`83102ad0 fffff807`635e443e     : 00000000`d5277460 00000000`3c329570 00000000`00000000 ffffffff`ffffd801 : nt!KiDispatchInterruptContinue
ffffc50e`83102b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee


SYMBOL_NAME:  nt!KiInsertTimer2WithCollectionLockHeld+c0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c0

FAILURE_BUCKET_ID:  AV_nt!KiInsertTimer2WithCollectionLockHeld

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {35283413-80f1-82dc-dde8-198f2504df22}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5905

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 52268

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 0

BUGCHECK_P3: 8

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  League of Legends.exe

TRAP_FRAME:  ffffbc87b93c6300 -- (.trap 0xffffbc87b93c6300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8841b621080 rbx=0000000000000000 rcx=ffffc8841b621080
rdx=ffffc884160c8db8 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffbc87b93c6490 rbp=0000000000000000
r8=ffffbc87b93c5bb0  r9=00000000ffffffff r10=fffff8067ec22930
r11=ffff717c11600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

STACK_TEXT:
ffffbc87`b93c5a58 fffff806`7ee2efc5     : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffffbc87`b93c5a60 fffff806`7edeff6c     : ffffbc87`b93c6380 00000000`00001000 ffffbc87`b93c6300 ffff8000`00000000 : nt!KiDispatchException+0x1b4955
ffffbc87`b93c6120 fffff806`7edec103     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffbc87`b93c6300 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443


SYMBOL_NAME:  nt!KiDispatchException+1b4955

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b4955

FAILURE_BUCKET_ID:  0x1E_nt!KiDispatchException

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4c003660-11e1-3fb7-2474-3522eb7ee67b}

Followup:     MachineOwner
---------
Cevabınız için teşekkürler. Driverlar hakkında dedikleriniz dün yapmıştım. Bugün diski komple silip bios güncelliyip format atıcam. Herşeyi baştan kurup buraya ileteceğim.
Ekran Görüntüsü (1).png
Ekran Görüntüsü (5).png

Format attım. Sürücüleri WQHL sürümde sıfırdan indirdim. BIOS güncelledim. Donanımsaldır diye Memtest86 yaptım hiçbir sıkıntı çıkmadı. HDD testinden de bir sıkıntı çıkmadı. Ama yine mavi ekran yine mavi ekran. Yine diğerlerinden farklı bir kodla verdi mavi ekranı. Artık ağlamak üzereyim. Sinirlerim bozuldu cidden. Neden geçmiyor bu sorun arkadaş. Şu problemimi çözebilecek kişiye ömür boyu dua edeceğim. Lütfen yardımcı olur musunuz? @Murat5038

Minidump:
 
Son düzenleme:
Aşağıdaki rehberi uygulayın ve sonuçları paylaşın.

Ayrıca yine yönetici olarak açacağınız bir CMD penceresine chkdsk /f /r yazın be işlem bitince Y yazıp bilgisayarı yeniden başlatın.
 
Arkadaşlar merhaba. Oyunlara girerken sürekli mavi ekran hatası alıyorum. Harici bir ekran kartım yok. Açıkcası diğer yazılardan bir çözüm bulamadım. Lütfen yardım edin. Yardımcı olursanız çok sevinirim.
Sistemim:
Ryzen 3200G
B450M-S2H
8 GB G.Skill RAM 3600MHz

Eki Görüntüle 691917

Aynı hatayı bende alıyorum benim de gskill 16 GB 3600 MHz ne kadar ekran kartı sildim yüklediysem çözüm bulamadım bir kaç tane tanıdık bilgisayarcıya sordum anakart chipsetin arızalı dediler. Bir çözüm yolu bulduysan bana da yardımcı olur musun?
Arkadaşlar merhaba. Oyunlara girerken sürekli mavi ekran hatası alıyorum. Harici bir ekran kartım yok. Açıkçası diğer yazılardan bir çözüm bulamadım. Yardımcı olursanız çok sevinirim.
Sistemim:
Ryzen 3200G.
B450M-S2H
8 GB G.Skill RAM 3600MHz.

Eki Görüntüle 691917

Aynı sorunu bende alıyorum hatta çözüm yolu bulamadım birkaç tanıdık bilgisayarcıya sordum anakart chipsetin arızalı dediler bir çözüm yolu bulduysan bu soruna bana da söyler misin?
 

Geri
Yukarı