CRITICAL_PROCESS_DIED mavi ekran hatası

  • Konuyu başlatan yeG
  • Başlangıç Tarihi
  • Mesaj 3
  • Görüntüleme 339
Dosyalar neredeyse boştu. Hata kodundan yola çıkalım. DISM komutlarını uygulayıp SFC /scannow komutunu çalıştırır mısın?

Hyper-V kaldırın.


Kod:
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffd88d9d66e2c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8854

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11415

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : CriticalProcessDied.ExceptionCode
    Value: 9d6bd040

    Key  : CriticalProcessDied.Process
    Value: svchost.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffd88d9d66e2c0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_RECORD:  ffffd88d9d66ea00 -- (.exr 0xffffd88d9d66ea00)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x9d6bd040 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT: 
fffffa0c`c2f16d88 fffff806`05d06fb2     : 00000000`000000ef ffffd88d`9d66e2c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffa0c`c2f16d90 fffff806`05bd7e33     : 00000000`00000001 fffff806`05660ec5 00000000`00000002 fffff806`05660def : nt!PspCatchCriticalBreak+0x10e
fffffa0c`c2f16e30 fffff806`05a4a9b0     : ffffd88d`00000000 00000000`00000000 ffffd88d`9d66e2c0 ffffd88d`9d66e6f8 : nt!PspTerminateAllThreads+0x1ee427
fffffa0c`c2f16ea0 fffff806`05a4a7ac     : ffffd88d`9d66e2c0 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffffa0c`c2f16ee0 fffff806`05806bb5     : ffffd88d`9d66e2c0 ffffd88d`9d6bd040 fffffa0c`c2f16fd0 fffff806`05b16372 : nt!NtTerminateProcess+0x9c
fffffa0c`c2f16f50 fffff806`057f9070     : fffff806`05830d7f fffffa0c`c2f17a58 fffffa0c`c2f17a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x25
fffffa0c`c2f170e8 fffff806`05830d7f     : fffffa0c`c2f17a58 fffffa0c`c2f17a58 ffffffff`ffffffff 00007fff`9e176000 : nt!KiServiceLinkage
fffffa0c`c2f170f0 fffff806`058072ac     : ffffd88d`9d66ea00 fffff806`0560d0c6 00000000`00003400 fffffa0c`c2f17b00 : nt!KiDispatchException+0x1df55f
fffffa0c`c2f17920 fffff806`05803443     : ffffd88d`9d6bd040 ffffd88d`9d6be080 ffffd88d`9d66b310 ffffd88d`96ab5880 : nt!KiExceptionDispatch+0x12c
fffffa0c`c2f17b00 00007fff`a38d3ed2     : 00000000`00000000 0000009f`00000000 0000009f`12c81300 0000009f`12c81308 : nt!KiPageFault+0x443
0000009f`12c812e0 00000000`00000000     : 0000009f`00000000 0000009f`12c81300 0000009f`12c81308 00007fff`9e176000 : 0x00007fff`a38d3ed2


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_9d6bd040_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e6e5d474-6788-1677-0049-714698f350a4}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff9f8979022080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4936

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6530

    Key  : Analysis.Init.CPU.mSec
    Value: 655

    Key  : Analysis.Init.Elapsed.mSec
    Value: 17663

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : CriticalProcessDied.ExceptionCode
    Value: 7912a080

    Key  : CriticalProcessDied.Process
    Value: services.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  ef

BUGCHECK_P1: ffff9f8979022080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  services.exe

CRITICAL_PROCESS:  services.exe

EXCEPTION_RECORD:  ffff9f89790227c0 -- (.exr 0xffff9f89790227c0)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x7912a080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT: 
ffffb384`cbd4cd88 fffff800`08b06fb2     : 00000000`000000ef ffff9f89`79022080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffb384`cbd4cd90 fffff800`089d7e33     : 00000000`00000001 fffff800`08460ec5 00000000`00000002 fffff800`08460def : nt!PspCatchCriticalBreak+0x10e
ffffb384`cbd4ce30 fffff800`0884a9b0     : ffff9f89`00000000 00000000`00000000 ffff9f89`79022080 ffff9f89`790224b8 : nt!PspTerminateAllThreads+0x1ee427
ffffb384`cbd4cea0 fffff800`0884a7ac     : ffff9f89`79022080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffb384`cbd4cee0 fffff800`08606bb5     : ffff9f89`79022080 ffff9f89`7912a080 ffffb384`cbd4cfd0 fffff800`08916372 : nt!NtTerminateProcess+0x9c
ffffb384`cbd4cf50 fffff800`085f9070     : fffff800`08630d7f ffffb384`cbd4da58 ffffb384`cbd4da58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x25
ffffb384`cbd4d0e8 fffff800`08630d7f     : ffffb384`cbd4da58 ffffb384`cbd4da58 ffffffff`ffffffff 00007ffe`d033e0c8 : nt!KiServiceLinkage
ffffb384`cbd4d0f0 fffff800`086072ac     : ffff9f89`790227c0 fffff800`0840d0c6 00000000`00006000 ffffb384`cbd4db00 : nt!KiDispatchException+0x1df55f
ffffb384`cbd4d920 fffff800`08603443     : 00000000`00000000 ffff9f89`7915bc50 ffffb384`cbd4db80 ffff9f89`00000000 : nt!KiExceptionDispatch+0x12c
ffffb384`cbd4db00 00007ffe`d02121d4     : 00007ffe`d01f0000 00007ffe`d028fc2e 00007ffe`d028fc2e 00000000`00000000 : nt!KiPageFault+0x443
00000054`89b01670 00007ffe`d01f0000     : 00007ffe`d028fc2e 00007ffe`d028fc2e 00000000`00000000 00000054`89b017b0 : 0x00007ffe`d02121d4
00000054`89b01678 00007ffe`d028fc2e     : 00007ffe`d028fc2e 00000000`00000000 00000054`89b017b0 00000000`00000000 : 0x00007ffe`d01f0000
00000054`89b01680 00007ffe`d028fc2e     : 00000000`00000000 00000054`89b017b0 00000000`00000000 00000054`89b01708 : 0x00007ffe`d028fc2e
00000054`89b01688 00000000`00000000     : 00000054`89b017b0 00000000`00000000 00000054`89b01708 00000054`89b01748 : 0x00007ffe`d028fc2e


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_7912a080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b50b7da7-f33f-3096-81c8-76ab4a2b2cbd}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff9d8f1f23a2c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7634

    Key  : Analysis.Init.CPU.mSec
    Value: 780

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12459

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : CriticalProcessDied.ExceptionCode
    Value: 1f2cb040

    Key  : CriticalProcessDied.Process
    Value: svchost.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  ef

BUGCHECK_P1: ffff9d8f1f23a2c0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_RECORD:  0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000

ERROR_CODE: (NTSTATUS) 0x1f2cb040 - <Unable to get error code text>

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
ffff8683`566a4d88 fffff805`5cd06fb2     : 00000000`000000ef ffff9d8f`1f23a2c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8683`566a4d90 fffff805`5cbd7e33     : 00000000`00000001 fffff805`5c660ec5 00000000`00000002 fffff805`5c660def : nt!PspCatchCriticalBreak+0x10e
ffff8683`566a4e30 fffff805`5ca4a9b0     : ffff9d8f`00000000 00000000`00000000 ffff9d8f`1f23a2c0 ffff9d8f`1f23a6f8 : nt!PspTerminateAllThreads+0x1ee427
ffff8683`566a4ea0 fffff805`5ca4a7ac     : ffff9d8f`1f23a2c0 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffff8683`566a4ee0 fffff805`5c806bb8     : ffff9d8f`1f23a2c0 ffff9d8f`1f2cb040 ffff8683`566a4fd0 fffff805`5cb16372 : nt!NtTerminateProcess+0x9c
ffff8683`566a4f50 fffff805`5c7f9070     : fffff805`5c830d7f ffff8683`566a5a58 ffff8683`566a5a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffff8683`566a50e8 fffff805`5c830d7f     : ffff8683`566a5a58 ffff8683`566a5a58 ffffffff`ffffffff 00007ff9`c0f06000 : nt!KiServiceLinkage
ffff8683`566a50f0 fffff805`5c8072ac     : 00000000`00001000 ffff8683`566a5b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1df55f
ffff8683`566a5920 fffff805`5c803443     : 00007ff9`c58bb38c 00000000`00000000 ffff9d8f`1f202d40 ffff9d8f`1f23a2c0 : nt!KiExceptionDispatch+0x12c
ffff8683`566a5b00 00007ff9`c590fc29     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
00000068`3d981000 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c590fc29


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_1f2cb040_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8d14349c-b934-b766-35ad-3a84b84bface}

Followup:     MachineOwner
---------
 
Diskine HD Tune yazılımı ile "error scan" testi yap ve "health" sekmesini paylaş.

HD Sentinel yazılımı ile "Genel bakış" sekmesini ve SMART verilerini paylaş.
 

Geri
Yukarı