Çözüldü Windows 10 mavi ekran hataları

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

quaafy

Decapat
Katılım
8 Ocak 2022
Mesajlar
20
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Ekran kartı
Rx580
Anakart
Msi B450 M Pro m2
İşlemci
Ryzen 5 1600
Son 2-3 gündür durmadan mavi ekran hataları alıyorum çözmem için
Minidump: Minidump.rar
 
Son düzenleyen: Moderatör:
Çözüm
BIOS güncelleyin.


Tüm sürücüleri tek tek güncelleyin.


Ekran kartı sürücülerini DDU ile kaldırın.


En güncel WHQL ekran kartı sürücüsünü AMD sitesinden yükleyin.

CMD yönetici olarak çalıştırıp;

DISM /Online /Cleanup-Image /RestoreHealth komutunu girin %100 olana kadar bekleyin.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8032fdda23d, Address of the instruction which caused the BugCheck
Arg3: ffffad0248b166a0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 39957

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 328

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5717

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051123-9250-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8032fdda23d

BUGCHECK_P3: ffffad0248b166a0

BUGCHECK_P4: 0

CONTEXT:  ffffad0248b166a0 -- (.cxr 0xffffad0248b166a0)
rax=ffc501b22f01c8ff rbx=ffffad0248b171c0 rcx=ffffc501a25a4a20
rdx=ffffc501b22f00f7 rsi=ffffc501a25a4a20 rdi=ffffad0248b17160
rip=fffff8032fdda23d rsp=ffffad0248b170a0 rbp=fffff80335dbfe28
 r8=ffffad0248b17108  r9=ffc501b22f01c8ff r10=fffff8032fdda1e0
r11=ffffcb7a37200000 r12=ffffc501b18ea010 r13=0000000000000000
r14=ffffad0248b171f8 r15=0000000000000040
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
FLTMGR!FltGetEcpListFromCallbackData+0x5d:
fffff803`2fdda23d 410fb64904      movzx   ecx,byte ptr [r9+4] ds:002b:ffc501b2`2f01c903=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

STACK_TEXT: 
ffffad02`48b170a0 fffff803`35e0bea2     : ffffc501`b4f6c220 ffffc501`a2345a50 00000000`00000000 ffffad02`48b17170 : FLTMGR!FltGetEcpListFromCallbackData+0x5d
ffffad02`48b170d0 ffffc501`b4f6c220     : ffffc501`a2345a50 00000000`00000000 ffffad02`48b17170 ffffffff`ffffff8b : WdFilter+0x5bea2
ffffad02`48b170d8 ffffc501`a2345a50     : 00000000`00000000 ffffad02`48b17170 ffffffff`ffffff8b fffff803`35dddf8c : 0xffffc501`b4f6c220
ffffad02`48b170e0 00000000`00000000     : ffffad02`48b17170 ffffffff`ffffff8b fffff803`35dddf8c 00000000`00000000 : 0xffffc501`a2345a50


SYMBOL_NAME:  WdFilter+5bea2

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

STACK_COMMAND:  .cxr 0xffffad0248b166a0 ; kb

BUCKET_ID_FUNC_OFFSET:  5bea2

FAILURE_BUCKET_ID:  AV_WdFilter!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2198f8cc-5049-ce5a-ecb0-bf2157f53e1c}

Followup:     MachineOwner
---------

0: kd> lmvm WdFilter
Browse full module list
start             end                 module name
fffff803`35db0000 fffff803`35e2e000   WdFilter T (no symbols)           
    Loaded symbol image file: WdFilter.sys
    Image path: \SystemRoot\system32\drivers\wd\WdFilter.sys
    Image name: WdFilter.sys
    Browse all global symbols  functions  data
    Timestamp:        ***** Invalid (8B3A404A)
    CheckSum:         00081B85
    ImageSize:        0007E000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
------

12: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff80330482bcd, Virtual address for the attempted write.
Arg2: 890000014d951121, PTE contents.
Arg3: ffffbc841ed0fae0, (reserved)
Arg4: 000000000000000b, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4843

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 63640

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2875

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xbe

    Key  : Bugcheck.Code.Register
    Value: 0xbe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051123-8984-01.dmp

BUGCHECK_CODE:  be

BUGCHECK_P1: fffff80330482bcd

BUGCHECK_P2: 890000014d951121

BUGCHECK_P3: ffffbc841ed0fae0

BUGCHECK_P4: b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffbc841ed0fae0 -- (.trap 0xffffbc841ed0fae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80330482bcd rbx=0000000000000000 rcx=ffffbc841ed0fca0
rdx=000000000000003e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032ff6068d rsp=ffffbc841ed0fc70 rbp=0000000000000001
 r8=0000000000000001  r9=0000000000000000 r10=ffff9486b65892e4
r11=0000000000004000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe nc
amdkmdag+0x3f068d:
fffff803`2ff6068d 0000            add     byte ptr [rax],al ds:fffff803`30482bcd=f8
Resetting default scope

STACK_TEXT: 
ffffbc84`1ed0f838 fffff803`04c4ac89     : 00000000`000000be fffff803`30482bcd 89000001`4d951121 ffffbc84`1ed0fae0 : nt!KeBugCheckEx
ffffbc84`1ed0f840 fffff803`04a6e7b0     : 00000000`00000000 00000000`00000003 ffffbc84`1ed0fb60 00000000`00000000 : nt!MiSystemFault+0x1b22a9
ffffbc84`1ed0f940 fffff803`04c0b6d8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffbc84`1ed0fae0 fffff803`2ff6068d     : 00000000`00000023 00000000`00000013 00000000`c0001000 fffff803`2ffc3037 : nt!KiPageFault+0x358
ffffbc84`1ed0fc70 00000000`00000023     : 00000000`00000013 00000000`c0001000 fffff803`2ffc3037 00000000`00000000 : amdkmdag+0x3f068d
ffffbc84`1ed0fc78 00000000`00000013     : 00000000`c0001000 fffff803`2ffc3037 00000000`00000000 00000000`00000000 : 0x23
ffffbc84`1ed0fc80 00000000`c0001000     : fffff803`2ffc3037 00000000`00000000 00000000`00000000 00000000`00000000 : 0x13
ffffbc84`1ed0fc88 fffff803`2ffc3037     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xc0001000
ffffbc84`1ed0fc90 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9486`b65892d8 : amdkmdag+0x453037


SYMBOL_NAME:  amdkmdag+3f068d

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  3f068d

FAILURE_BUCKET_ID:  AV_amdkmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c753a2f9-94a6-448f-1d0e-e079b3442215}

Followup:     MachineOwner
---------

12: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2295]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 2.E3
BiosReleaseDate = 06/11/2020
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7B84
SystemFamily = To be filled by O.E.M.
SystemVersion = 1.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-M2 (MS-7B84)
BaseBoardVersion = 1.0
12: kd> lmvm amdkmdag
Browse full module list
start             end                 module name
fffff803`2fb70000 fffff803`35b50000   amdkmdag T (no symbols)           
    Loaded symbol image file: amdkmdag.sys
    Image path: \SystemRoot\System32\DriverStore\FileRepository\u0390767.inf_amd64_9b58a6f46b7bac50\B390703\amdkmdag.sys
    Image name: amdkmdag.sys
    Browse all global symbols  functions  data
    Timestamp:        Thu Apr 13 06:29:00 2023 (643776FC)
    CheckSum:         05FA4B21
    ImageSize:        05FE0000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
BIOS güncelleyin.


Tüm sürücüleri tek tek güncelleyin.


Ekran kartı sürücülerini DDU ile kaldırın.


En güncel WHQL ekran kartı sürücüsünü AMD sitesinden yükleyin.

CMD yönetici olarak çalıştırıp;

DISM /Online /Cleanup-Image /RestoreHealth komutunu girin %100 olana kadar bekleyin.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8032fdda23d, Address of the instruction which caused the BugCheck
Arg3: ffffad0248b166a0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 39957

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 328

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5717

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051123-9250-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8032fdda23d

BUGCHECK_P3: ffffad0248b166a0

BUGCHECK_P4: 0

CONTEXT:  ffffad0248b166a0 -- (.cxr 0xffffad0248b166a0)
rax=ffc501b22f01c8ff rbx=ffffad0248b171c0 rcx=ffffc501a25a4a20
rdx=ffffc501b22f00f7 rsi=ffffc501a25a4a20 rdi=ffffad0248b17160
rip=fffff8032fdda23d rsp=ffffad0248b170a0 rbp=fffff80335dbfe28
 r8=ffffad0248b17108  r9=ffc501b22f01c8ff r10=fffff8032fdda1e0
r11=ffffcb7a37200000 r12=ffffc501b18ea010 r13=0000000000000000
r14=ffffad0248b171f8 r15=0000000000000040
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
FLTMGR!FltGetEcpListFromCallbackData+0x5d:
fffff803`2fdda23d 410fb64904      movzx   ecx,byte ptr [r9+4] ds:002b:ffc501b2`2f01c903=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

STACK_TEXT: 
ffffad02`48b170a0 fffff803`35e0bea2     : ffffc501`b4f6c220 ffffc501`a2345a50 00000000`00000000 ffffad02`48b17170 : FLTMGR!FltGetEcpListFromCallbackData+0x5d
ffffad02`48b170d0 ffffc501`b4f6c220     : ffffc501`a2345a50 00000000`00000000 ffffad02`48b17170 ffffffff`ffffff8b : WdFilter+0x5bea2
ffffad02`48b170d8 ffffc501`a2345a50     : 00000000`00000000 ffffad02`48b17170 ffffffff`ffffff8b fffff803`35dddf8c : 0xffffc501`b4f6c220
ffffad02`48b170e0 00000000`00000000     : ffffad02`48b17170 ffffffff`ffffff8b fffff803`35dddf8c 00000000`00000000 : 0xffffc501`a2345a50


SYMBOL_NAME:  WdFilter+5bea2

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

STACK_COMMAND:  .cxr 0xffffad0248b166a0 ; kb

BUCKET_ID_FUNC_OFFSET:  5bea2

FAILURE_BUCKET_ID:  AV_WdFilter!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2198f8cc-5049-ce5a-ecb0-bf2157f53e1c}

Followup:     MachineOwner
---------

0: kd> lmvm WdFilter
Browse full module list
start             end                 module name
fffff803`35db0000 fffff803`35e2e000   WdFilter T (no symbols)           
    Loaded symbol image file: WdFilter.sys
    Image path: \SystemRoot\system32\drivers\wd\WdFilter.sys
    Image name: WdFilter.sys
    Browse all global symbols  functions  data
    Timestamp:        ***** Invalid (8B3A404A)
    CheckSum:         00081B85
    ImageSize:        0007E000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
------

12: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff80330482bcd, Virtual address for the attempted write.
Arg2: 890000014d951121, PTE contents.
Arg3: ffffbc841ed0fae0, (reserved)
Arg4: 000000000000000b, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4843

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 63640

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2875

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xbe

    Key  : Bugcheck.Code.Register
    Value: 0xbe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051123-8984-01.dmp

BUGCHECK_CODE:  be

BUGCHECK_P1: fffff80330482bcd

BUGCHECK_P2: 890000014d951121

BUGCHECK_P3: ffffbc841ed0fae0

BUGCHECK_P4: b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffbc841ed0fae0 -- (.trap 0xffffbc841ed0fae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80330482bcd rbx=0000000000000000 rcx=ffffbc841ed0fca0
rdx=000000000000003e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032ff6068d rsp=ffffbc841ed0fc70 rbp=0000000000000001
 r8=0000000000000001  r9=0000000000000000 r10=ffff9486b65892e4
r11=0000000000004000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe nc
amdkmdag+0x3f068d:
fffff803`2ff6068d 0000            add     byte ptr [rax],al ds:fffff803`30482bcd=f8
Resetting default scope

STACK_TEXT: 
ffffbc84`1ed0f838 fffff803`04c4ac89     : 00000000`000000be fffff803`30482bcd 89000001`4d951121 ffffbc84`1ed0fae0 : nt!KeBugCheckEx
ffffbc84`1ed0f840 fffff803`04a6e7b0     : 00000000`00000000 00000000`00000003 ffffbc84`1ed0fb60 00000000`00000000 : nt!MiSystemFault+0x1b22a9
ffffbc84`1ed0f940 fffff803`04c0b6d8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffbc84`1ed0fae0 fffff803`2ff6068d     : 00000000`00000023 00000000`00000013 00000000`c0001000 fffff803`2ffc3037 : nt!KiPageFault+0x358
ffffbc84`1ed0fc70 00000000`00000023     : 00000000`00000013 00000000`c0001000 fffff803`2ffc3037 00000000`00000000 : amdkmdag+0x3f068d
ffffbc84`1ed0fc78 00000000`00000013     : 00000000`c0001000 fffff803`2ffc3037 00000000`00000000 00000000`00000000 : 0x23
ffffbc84`1ed0fc80 00000000`c0001000     : fffff803`2ffc3037 00000000`00000000 00000000`00000000 00000000`00000000 : 0x13
ffffbc84`1ed0fc88 fffff803`2ffc3037     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xc0001000
ffffbc84`1ed0fc90 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9486`b65892d8 : amdkmdag+0x453037


SYMBOL_NAME:  amdkmdag+3f068d

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  3f068d

FAILURE_BUCKET_ID:  AV_amdkmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c753a2f9-94a6-448f-1d0e-e079b3442215}

Followup:     MachineOwner
---------

12: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2295]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 2.E3
BiosReleaseDate = 06/11/2020
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7B84
SystemFamily = To be filled by O.E.M.
SystemVersion = 1.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-M2 (MS-7B84)
BaseBoardVersion = 1.0
12: kd> lmvm amdkmdag
Browse full module list
start             end                 module name
fffff803`2fb70000 fffff803`35b50000   amdkmdag T (no symbols)           
    Loaded symbol image file: amdkmdag.sys
    Image path: \SystemRoot\System32\DriverStore\FileRepository\u0390767.inf_amd64_9b58a6f46b7bac50\B390703\amdkmdag.sys
    Image name: amdkmdag.sys
    Browse all global symbols  functions  data
    Timestamp:        Thu Apr 13 06:29:00 2023 (643776FC)
    CheckSum:         05FA4B21
    ImageSize:        05FE0000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
 
Çözüm
BIOS güncelleyin.


Tüm sürücüleri tek tek güncelleyin.


Ekran kartı sürücülerini DDU ile kaldırın.


En güncel WHQL ekran kartı sürücüsünü AMD sitesinden yükleyin.

CMD yönetici olarak çalıştırıp;

DISM /Online /Cleanup-Image /RestoreHealth komutunu girin %100 olana kadar bekleyin.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8032fdda23d, Address of the instruction which caused the BugCheck
Arg3: ffffad0248b166a0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 39957

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 328

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5717

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051123-9250-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8032fdda23d

BUGCHECK_P3: ffffad0248b166a0

BUGCHECK_P4: 0

CONTEXT:  ffffad0248b166a0 -- (.cxr 0xffffad0248b166a0)
rax=ffc501b22f01c8ff rbx=ffffad0248b171c0 rcx=ffffc501a25a4a20
rdx=ffffc501b22f00f7 rsi=ffffc501a25a4a20 rdi=ffffad0248b17160
rip=fffff8032fdda23d rsp=ffffad0248b170a0 rbp=fffff80335dbfe28
 r8=ffffad0248b17108  r9=ffc501b22f01c8ff r10=fffff8032fdda1e0
r11=ffffcb7a37200000 r12=ffffc501b18ea010 r13=0000000000000000
r14=ffffad0248b171f8 r15=0000000000000040
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
FLTMGR!FltGetEcpListFromCallbackData+0x5d:
fffff803`2fdda23d 410fb64904      movzx   ecx,byte ptr [r9+4] ds:002b:ffc501b2`2f01c903=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

STACK_TEXT:
ffffad02`48b170a0 fffff803`35e0bea2     : ffffc501`b4f6c220 ffffc501`a2345a50 00000000`00000000 ffffad02`48b17170 : FLTMGR!FltGetEcpListFromCallbackData+0x5d
ffffad02`48b170d0 ffffc501`b4f6c220     : ffffc501`a2345a50 00000000`00000000 ffffad02`48b17170 ffffffff`ffffff8b : WdFilter+0x5bea2
ffffad02`48b170d8 ffffc501`a2345a50     : 00000000`00000000 ffffad02`48b17170 ffffffff`ffffff8b fffff803`35dddf8c : 0xffffc501`b4f6c220
ffffad02`48b170e0 00000000`00000000     : ffffad02`48b17170 ffffffff`ffffff8b fffff803`35dddf8c 00000000`00000000 : 0xffffc501`a2345a50


SYMBOL_NAME:  WdFilter+5bea2

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

STACK_COMMAND:  .cxr 0xffffad0248b166a0 ; kb

BUCKET_ID_FUNC_OFFSET:  5bea2

FAILURE_BUCKET_ID:  AV_WdFilter!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2198f8cc-5049-ce5a-ecb0-bf2157f53e1c}

Followup:     MachineOwner
---------

0: kd> lmvm WdFilter
Browse full module list
start             end                 module name
fffff803`35db0000 fffff803`35e2e000   WdFilter T (no symbols)          
    Loaded symbol image file: WdFilter.sys
    Image path: \SystemRoot\system32\drivers\wd\WdFilter.sys
    Image name: WdFilter.sys
    Browse all global symbols  functions  data
    Timestamp:        ***** Invalid (8B3A404A)
    CheckSum:         00081B85
    ImageSize:        0007E000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
------

12: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff80330482bcd, Virtual address for the attempted write.
Arg2: 890000014d951121, PTE contents.
Arg3: ffffbc841ed0fae0, (reserved)
Arg4: 000000000000000b, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4843

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 63640

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2875

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xbe

    Key  : Bugcheck.Code.Register
    Value: 0xbe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051123-8984-01.dmp

BUGCHECK_CODE:  be

BUGCHECK_P1: fffff80330482bcd

BUGCHECK_P2: 890000014d951121

BUGCHECK_P3: ffffbc841ed0fae0

BUGCHECK_P4: b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffbc841ed0fae0 -- (.trap 0xffffbc841ed0fae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80330482bcd rbx=0000000000000000 rcx=ffffbc841ed0fca0
rdx=000000000000003e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032ff6068d rsp=ffffbc841ed0fc70 rbp=0000000000000001
 r8=0000000000000001  r9=0000000000000000 r10=ffff9486b65892e4
r11=0000000000004000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe nc
amdkmdag+0x3f068d:
fffff803`2ff6068d 0000            add     byte ptr [rax],al ds:fffff803`30482bcd=f8
Resetting default scope

STACK_TEXT:
ffffbc84`1ed0f838 fffff803`04c4ac89     : 00000000`000000be fffff803`30482bcd 89000001`4d951121 ffffbc84`1ed0fae0 : nt!KeBugCheckEx
ffffbc84`1ed0f840 fffff803`04a6e7b0     : 00000000`00000000 00000000`00000003 ffffbc84`1ed0fb60 00000000`00000000 : nt!MiSystemFault+0x1b22a9
ffffbc84`1ed0f940 fffff803`04c0b6d8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffbc84`1ed0fae0 fffff803`2ff6068d     : 00000000`00000023 00000000`00000013 00000000`c0001000 fffff803`2ffc3037 : nt!KiPageFault+0x358
ffffbc84`1ed0fc70 00000000`00000023     : 00000000`00000013 00000000`c0001000 fffff803`2ffc3037 00000000`00000000 : amdkmdag+0x3f068d
ffffbc84`1ed0fc78 00000000`00000013     : 00000000`c0001000 fffff803`2ffc3037 00000000`00000000 00000000`00000000 : 0x23
ffffbc84`1ed0fc80 00000000`c0001000     : fffff803`2ffc3037 00000000`00000000 00000000`00000000 00000000`00000000 : 0x13
ffffbc84`1ed0fc88 fffff803`2ffc3037     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xc0001000
ffffbc84`1ed0fc90 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9486`b65892d8 : amdkmdag+0x453037


SYMBOL_NAME:  amdkmdag+3f068d

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  3f068d

FAILURE_BUCKET_ID:  AV_amdkmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c753a2f9-94a6-448f-1d0e-e079b3442215}

Followup:     MachineOwner
---------

12: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2295]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 2.E3
BiosReleaseDate = 06/11/2020
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7B84
SystemFamily = To be filled by O.E.M.
SystemVersion = 1.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-M2 (MS-7B84)
BaseBoardVersion = 1.0
12: kd> lmvm amdkmdag
Browse full module list
start             end                 module name
fffff803`2fb70000 fffff803`35b50000   amdkmdag T (no symbols)          
    Loaded symbol image file: amdkmdag.sys
    Image path: \SystemRoot\System32\DriverStore\FileRepository\u0390767.inf_amd64_9b58a6f46b7bac50\B390703\amdkmdag.sys
    Image name: amdkmdag.sys
    Browse all global symbols  functions  data
    Timestamp:        Thu Apr 13 06:29:00 2023 (643776FC)
    CheckSum:         05FA4B21
    ImageSize:        05FE0000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Teşekkürler 3-4 gündür herhangi bir hata almıyorum
 

Geri
Yukarı