Windows 11 Pro 64 Bit.
Gigabayt Kart : BD450M DS3H.
AMD Ryzen 5 3500X 6-Core.
16 GB Ram.
Radeon RX550/550 Series Ekran Kartı.
Konu ile bilgisi olan arkadaşlardan yardım bekliyorum.
Gigabayt Kart : BD450M DS3H.
AMD Ryzen 5 3500X 6-Core.
16 GB Ram.
Radeon RX550/550 Series Ekran Kartı.
Kod:
Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091322-5187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff801`06800000 PsLoadedModuleList = 0xfffff801`07429c10
Debug session time: Tue Sep 13 18:21:50.920 2022 (UTC + 3:00)
System Uptime: 0 days 0:04:24.562
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`06c169a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff928d`72252540=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80106b37bde, Address of the instruction which caused the BugCheck
Arg3: ffff928d72252e80, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3812
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3974
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 2818
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 091322-5187-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80106b37bde
BUGCHECK_P3: ffff928d72252e80
BUGCHECK_P4: 0
CONTEXT: ffff928d72252e80 -- (.cxr 0xffff928d72252e80)
rax=0000000000000102 rbx=0000000000000102 rcx=aaaaaaaaaaaaaaaa
rdx=0000000000000002 rsi=0000000000000000 rdi=ffff928d72253a20
rip=fffff80106b37bde rsp=ffff928d722538a0 rbp=ffff928d72253b60
r8=fffff78000000008 r9=ffff928d72253a10 r10=ffff928d72253a10
r11=0000000000000000 r12=000000c0177ff660 r13=aaaaaaaaaaaaaaaa
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!IoRemoveIoCompletion+0x1ae:
fffff801`06b37bde 448931 mov dword ptr [rcx],r14d ds:002b:aaaaaaaa`aaaaaaaa=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff928d`722538a0 fffff801`06f88a3d : ffff928d`72253a10 00000000`00000001 ffffa881`75c6d390 0000347a`035421e8 : nt!IoRemoveIoCompletion+0x1ae
ffff928d`722539c0 fffff801`06c28f78 : ffffa881`722fb080 000000c0`177ff348 ffff928d`72253a88 ffff928d`72253a88 : nt!NtRemoveIoCompletion+0x13d
ffff928d`72253a70 00007ffb`bc6e3874 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c0`177ff328 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`bc6e3874
SYMBOL_NAME: nt!IoRemoveIoCompletion+1ae
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.613
STACK_COMMAND: .cxr 0xffff928d72252e80 ; kb
BUCKET_ID_FUNC_OFFSET: 1ae
FAILURE_BUCKET_ID: AV_nt!IoRemoveIoCompletion
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4289928b-f607-529b-06b0-7a4a3ca980a7}
Followup: MachineOwner
Konu ile bilgisi olan arkadaşlardan yardım bekliyorum.
Son düzenleyen: Moderatör: