Eren Karoğlu yan
Hectopat
- Katılım
- 18 Şubat 2021
- Mesajlar
- 76
- Makaleler
- 1
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
Merhabalar, iyi forumlar. FIFA 23 oynarken bir mavi ekran hatası aldım. Minidump'ı WinDbg ile Technopat YouTube kanalından izlediğim adımlara göre analiz ettim fakat pek bilgili olmadığım için bir sonuca ulaşamadım. Yardımcı olursanız çok sevinirim.
CPU: i9-9900K.
RAM: sıfır (daha bu ay yükselttim Kingston 2x32 GB CL16 3600 MHz'e).
Anakart: ASUS ROG Z390-E.
Ekran kartı: ASUS RTX 2070 OC 8GB.
SSD: Samsung 970 EVO NVMe M.2 500 GB
CPU: i9-9900K.
RAM: sıfır (daha bu ay yükselttim Kingston 2x32 GB CL16 3600 MHz'e).
Anakart: ASUS ROG Z390-E.
Ekran kartı: ASUS RTX 2070 OC 8GB.
SSD: Samsung 970 EVO NVMe M.2 500 GB
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.078 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\erenk\Masaüstü\120423-18703-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff806`3ca00000 PsLoadedModuleList = 0xfffff806`3d6134a0
Debug session time: Mon Dec 4 23:35:44.352 2023 (UTC + 3:00)
System Uptime: 0 days 4:35:55.058
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
................................................................
.......
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`01193018). Type ".hh dbgerr001" for details
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`3ce16980 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff58b`48f0ecb0=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff81, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8063ccd309f, address which referenced memory
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x20397e, File: 0x203a06 - C:\ProgramData\Dbg\sym\BTHport.sys\5249EE07202000\BTHport.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2062
Key : Analysis.Elapsed.mSec
Value: 6932
Key : Analysis.IO.Other.Mb
Value: 17
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 26
Key : Analysis.Init.CPU.mSec
Value: 749
Key : Analysis.Init.Elapsed.mSec
Value: 16621
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: IP_MISALIGNED_GenuineIntel.sys
Key : Failure.Hash
Value: {e930d917-b247-3f7f-23cb-88a0c9f1b274}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417cf94
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 1
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 4853999
Key : Hypervisor.Flags.ValueHex
Value: 4a10ef
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff81
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8063ccd309f
FILE_IN_CAB: 120423-18703-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8063d71d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff81
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: CefSharp.Brows
TRAP_FRAME: fffff58b48f0edf0 -- (.trap 0xfffff58b48f0edf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff58b48f0f050 rbx=0000000000000000 rcx=fffff58b48f0f050
rdx=ffffa7810b118180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8063ccd309f rsp=fffff58b48f0ef88 rbp=fffff58b48f0f090
r8=0000000000000000 r9=0000000000000001 r10=0000000000000004
r11=fffff58b48f0f050 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiAdjustRescheduleContextEntryForThreadRemoval+0x17:
fffff806`3ccd309f 49224180 and al,byte ptr [r9-80h] ds:ffffffff`ffffff81=??
Resetting default scope
MISALIGNED_IP:
nt!KiAdjustRescheduleContextEntryForThreadRemoval+17
fffff806`3ccd309f 49224180 and al,byte ptr [r9-80h]
STACK_TEXT:
fffff58b`48f0eca8 fffff806`3ce2bfa9 : 00000000`0000000a ffffffff`ffffff81 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff58b`48f0ecb0 fffff806`3ce27634 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff58b`48f0edf0 fffff806`3ccd309f : fffff806`3cc6de8f ffffa781`0b651180 ffffa781`0b651180 00000000`0000075a : nt!KiPageFault+0x474
fffff58b`48f0ef88 fffff806`3cc6de8f : ffffa781`0b651180 ffffa781`0b651180 00000000`0000075a 00000000`00000000 : nt!KiAdjustRescheduleContextEntryForThreadRemoval+0x17
fffff58b`48f0ef90 fffff806`3cc6d400 : 00000000`00000020 00000000`00000000 00000000`00000000 fffff806`3cc39913 : nt!KiSearchForNewThread+0x38f
fffff58b`48f0f1e0 fffff806`3cc6f827 : 00000000`00000000 00000000`00000000 ffff910f`f39b5d38 00000000`00000000 : nt!KiSwapThread+0x870
fffff58b`48f0f330 fffff806`3cceb1cd : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
fffff58b`48f0f3e0 fffff806`3cce9e68 : ffff9101`1b69edd0 00000000`00001000 00000000`3b536800 ffff9101`1b69ec70 : nt!KeRemoveQueueEx+0x111d
fffff58b`48f0f7a0 fffff806`3d13f67e : fffff58b`48f0f910 00000000`00000001 00000000`3b440938 fffff806`3d1278c3 : nt!IoRemoveIoCompletion+0x98
fffff58b`48f0f8c0 fffff806`3ce2b6e5 : ffff9101`188f0080 00000000`07dbef98 fffff58b`48f0f988 ffff9101`188d31c0 : nt!NtRemoveIoCompletion+0x13e
fffff58b`48f0f970 00000000`77d51cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`07dbef78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d51cf3
SYMBOL_NAME: nt!KiAdjustRescheduleContextEntryForThreadRemoval+17
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
MODULE_NAME: GenuineIntel
IMAGE_NAME: GenuineIntel.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_GenuineIntel.sys
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e930d917-b247-3f7f-23cb-88a0c9f1b274}
Followup: MachineOwner
---------
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.078 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\erenk\Masaüstü\120423-18703-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff806`3ca00000 PsLoadedModuleList = 0xfffff806`3d6134a0
Debug session time: Mon Dec 4 23:35:44.352 2023 (UTC + 3:00)
System Uptime: 0 days 4:35:55.058
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
................................................................
.......
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`01193018). Type ".hh dbgerr001" for details
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`3ce16980 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff58b`48f0ecb0=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff81, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8063ccd309f, address which referenced memory
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x20397e, File: 0x203a06 - C:\ProgramData\Dbg\sym\BTHport.sys\5249EE07202000\BTHport.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2062
Key : Analysis.Elapsed.mSec
Value: 6932
Key : Analysis.IO.Other.Mb
Value: 17
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 26
Key : Analysis.Init.CPU.mSec
Value: 749
Key : Analysis.Init.Elapsed.mSec
Value: 16621
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: IP_MISALIGNED_GenuineIntel.sys
Key : Failure.Hash
Value: {e930d917-b247-3f7f-23cb-88a0c9f1b274}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417cf94
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 1
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 4853999
Key : Hypervisor.Flags.ValueHex
Value: 4a10ef
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff81
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8063ccd309f
FILE_IN_CAB: 120423-18703-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8063d71d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff81
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: CefSharp.Brows
TRAP_FRAME: fffff58b48f0edf0 -- (.trap 0xfffff58b48f0edf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff58b48f0f050 rbx=0000000000000000 rcx=fffff58b48f0f050
rdx=ffffa7810b118180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8063ccd309f rsp=fffff58b48f0ef88 rbp=fffff58b48f0f090
r8=0000000000000000 r9=0000000000000001 r10=0000000000000004
r11=fffff58b48f0f050 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiAdjustRescheduleContextEntryForThreadRemoval+0x17:
fffff806`3ccd309f 49224180 and al,byte ptr [r9-80h] ds:ffffffff`ffffff81=??
Resetting default scope
MISALIGNED_IP:
nt!KiAdjustRescheduleContextEntryForThreadRemoval+17
fffff806`3ccd309f 49224180 and al,byte ptr [r9-80h]
STACK_TEXT:
fffff58b`48f0eca8 fffff806`3ce2bfa9 : 00000000`0000000a ffffffff`ffffff81 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff58b`48f0ecb0 fffff806`3ce27634 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff58b`48f0edf0 fffff806`3ccd309f : fffff806`3cc6de8f ffffa781`0b651180 ffffa781`0b651180 00000000`0000075a : nt!KiPageFault+0x474
fffff58b`48f0ef88 fffff806`3cc6de8f : ffffa781`0b651180 ffffa781`0b651180 00000000`0000075a 00000000`00000000 : nt!KiAdjustRescheduleContextEntryForThreadRemoval+0x17
fffff58b`48f0ef90 fffff806`3cc6d400 : 00000000`00000020 00000000`00000000 00000000`00000000 fffff806`3cc39913 : nt!KiSearchForNewThread+0x38f
fffff58b`48f0f1e0 fffff806`3cc6f827 : 00000000`00000000 00000000`00000000 ffff910f`f39b5d38 00000000`00000000 : nt!KiSwapThread+0x870
fffff58b`48f0f330 fffff806`3cceb1cd : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
fffff58b`48f0f3e0 fffff806`3cce9e68 : ffff9101`1b69edd0 00000000`00001000 00000000`3b536800 ffff9101`1b69ec70 : nt!KeRemoveQueueEx+0x111d
fffff58b`48f0f7a0 fffff806`3d13f67e : fffff58b`48f0f910 00000000`00000001 00000000`3b440938 fffff806`3d1278c3 : nt!IoRemoveIoCompletion+0x98
fffff58b`48f0f8c0 fffff806`3ce2b6e5 : ffff9101`188f0080 00000000`07dbef98 fffff58b`48f0f988 ffff9101`188d31c0 : nt!NtRemoveIoCompletion+0x13e
fffff58b`48f0f970 00000000`77d51cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`07dbef78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d51cf3
SYMBOL_NAME: nt!KiAdjustRescheduleContextEntryForThreadRemoval+17
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
MODULE_NAME: GenuineIntel
IMAGE_NAME: GenuineIntel.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_GenuineIntel.sys
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e930d917-b247-3f7f-23cb-88a0c9f1b274}
Followup: MachineOwner
---------
Son düzenleyen: Moderatör: