Arkadaşlar 3600x işlemcim vardı. 3 tane sanal bilgisayar çalıştırıyordum. İşlemcimi söküp 5700x taktım. Şimdi sanalları çalıştırınca mavi ekran alıyorum. Dump kodu aşağıda.
	
	
	
	
	
		
	
		
			
		
		
	
				
			
		Kod:
	
	************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false
   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 43
Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030625-7593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Kernel base = 0xfffff802`60c00000 PsLoadedModuleList = 0xfffff802`61813510
Debug session time: Thu Mar  6 00:07:35.297 2025 (UTC + 3:00)
System Uptime: 0 days 0:14:55.888
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000c7`9c7fd018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`61014c00 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffe400`952eafb0=000000000000003b
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8026101ea73, Address of the instruction which caused the BugCheck
Arg3: ffffe400952eb900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 968
    Key  : Analysis.Elapsed.mSec
    Value: 1109
    Key  : Analysis.IO.Other.Mb
    Value: 24
    Key  : Analysis.IO.Read.Mb
    Value: 1
    Key  : Analysis.IO.Write.Mb
    Value: 30
    Key  : Analysis.Init.CPU.mSec
    Value: 125
    Key  : Analysis.Init.Elapsed.mSec
    Value: 44772
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 97
    Key  : Analysis.Version.DbgEng
    Value: 10.0.27793.1000
    Key  : Analysis.Version.Description
    Value: 10.2410.02.02 amd64fre
    Key  : Analysis.Version.Ext
    Value: 1.2410.2.2
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x3b
    Key  : Bugcheck.Code.TargetModel
    Value: 0x3b
    Key  : Failure.Bucket
    Value: AV_nt!SwapContext
    Key  : Failure.Exception.IP.Address
    Value: 0xfffff8026101ea73
    Key  : Failure.Exception.IP.Module
    Value: nt
    Key  : Failure.Exception.IP.Offset
    Value: 0x41ea73
    Key  : Failure.Hash
    Value: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
    Key  : Stack.Pointer
    Value: PRCBException
    Key  : WER.OS.Branch
    Value: ni_release
    Key  : WER.OS.Version
    Value: 10.0.22621.1
BUGCHECK_CODE:  3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8026101ea73
BUGCHECK_P3: ffffe400952eb900
BUGCHECK_P4: 0
FILE_IN_CAB:  030625-7593-01.dmp
FAULTING_THREAD:  ffff9386701df080
CONTEXT:  ffffe400952eb900 -- (.cxr 0xffffe400952eb900)
rax=0000000000000805 rbx=ffffe400952d1180 rcx=ffffd080c88c7c80
rdx=0000000000000000 rsi=ffff9386701df080 rdi=ffff938660ba0080
rip=fffff8026101ea73 rsp=ffffd080c88c7320 rbp=004fe07fbcbbbdff
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000083
r11=0000000000000000 r12=00000000000000aa r13=ffff9386732d1080
r14=ffff938672129080 r15=ffffe400952e0000
iopl=0         nv up ei pl zr ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050257
nt!SwapContext+0x503:
fffff802`6101ea73 0fc719          xrstors [rcx]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  MsMpEng.exe
STACK_TEXT:
ffffd080`c88c7320 fffff802`6101e506     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext+0x503
ffffd080`c88c7360 fffff802`60e20265     : ffffe400`951a7180 00000000`00000000 ffff9386`60bd3080 00000000`00000000 : nt!KiSwapContext+0x76
ffffd080`c88c74a0 fffff802`60e21687     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xaa5
ffffd080`c88c75f0 fffff802`60e9ae75     : ffffd080`00000000 ffff9386`00000001 ffff9386`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
ffffd080`c88c76a0 fffff802`60e9a1b8     : ffff9386`6fa46780 ffff9386`6fa46780 00000000`00000001 00000000`00000000 : nt!KeRemoveQueueEx+0xa75
ffffd080`c88c7740 fffff802`60e998f9     : ffffd080`c88c793c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IoRemoveIoCompletion+0x98
ffffd080`c88c7860 fffff802`6102a208     : ffff9386`6fa46788 00000000`00000000 ffffd080`c88c7a00 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x389
ffffd080`c88c7a30 00007ffd`58fd4014     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c7`9cb7f7d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`58fd4014
SYMBOL_NAME:  nt!SwapContext+503
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22621.4890
STACK_COMMAND:  .cxr 0xffffe400952eb900 ; kb
BUCKET_ID_FUNC_OFFSET:  503
FAILURE_BUCKET_ID:  AV_nt!SwapContext
OS_VERSION:  10.0.22621.1
BUILDLAB_STR:  ni_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
Followup:     MachineOwner
---------
			
				Son düzenleyen: Moderatör: 
			
		
	
								
								
									
	
		
			
		
		
	
	
	
	
		
			
		
		
	
								
							
							 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		