CRITICAL_PROCESS_DIED mavi ekran hatası

  • Konuyu başlatan yeG
  • Başlangıç Tarihi
  • Mesaj 3
  • Görüntüleme 343
Dosyalar neredeyse boştu. Hata kodundan yola çıkalım. DISM komutlarını uygulayıp SFC /scannow komutunu çalıştırır mısın?

Hyper-V kaldırın.


Kod:
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffd88d9d66e2c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8854

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11415

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : CriticalProcessDied.ExceptionCode
    Value: 9d6bd040

    Key  : CriticalProcessDied.Process
    Value: svchost.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffd88d9d66e2c0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_RECORD:  ffffd88d9d66ea00 -- (.exr 0xffffd88d9d66ea00)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x9d6bd040 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT: 
fffffa0c`c2f16d88 fffff806`05d06fb2     : 00000000`000000ef ffffd88d`9d66e2c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffa0c`c2f16d90 fffff806`05bd7e33     : 00000000`00000001 fffff806`05660ec5 00000000`00000002 fffff806`05660def : nt!PspCatchCriticalBreak+0x10e
fffffa0c`c2f16e30 fffff806`05a4a9b0     : ffffd88d`00000000 00000000`00000000 ffffd88d`9d66e2c0 ffffd88d`9d66e6f8 : nt!PspTerminateAllThreads+0x1ee427
fffffa0c`c2f16ea0 fffff806`05a4a7ac     : ffffd88d`9d66e2c0 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffffa0c`c2f16ee0 fffff806`05806bb5     : ffffd88d`9d66e2c0 ffffd88d`9d6bd040 fffffa0c`c2f16fd0 fffff806`05b16372 : nt!NtTerminateProcess+0x9c
fffffa0c`c2f16f50 fffff806`057f9070     : fffff806`05830d7f fffffa0c`c2f17a58 fffffa0c`c2f17a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x25
fffffa0c`c2f170e8 fffff806`05830d7f     : fffffa0c`c2f17a58 fffffa0c`c2f17a58 ffffffff`ffffffff 00007fff`9e176000 : nt!KiServiceLinkage
fffffa0c`c2f170f0 fffff806`058072ac     : ffffd88d`9d66ea00 fffff806`0560d0c6 00000000`00003400 fffffa0c`c2f17b00 : nt!KiDispatchException+0x1df55f
fffffa0c`c2f17920 fffff806`05803443     : ffffd88d`9d6bd040 ffffd88d`9d6be080 ffffd88d`9d66b310 ffffd88d`96ab5880 : nt!KiExceptionDispatch+0x12c
fffffa0c`c2f17b00 00007fff`a38d3ed2     : 00000000`00000000 0000009f`00000000 0000009f`12c81300 0000009f`12c81308 : nt!KiPageFault+0x443
0000009f`12c812e0 00000000`00000000     : 0000009f`00000000 0000009f`12c81300 0000009f`12c81308 00007fff`9e176000 : 0x00007fff`a38d3ed2


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_9d6bd040_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e6e5d474-6788-1677-0049-714698f350a4}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff9f8979022080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4936

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6530

    Key  : Analysis.Init.CPU.mSec
    Value: 655

    Key  : Analysis.Init.Elapsed.mSec
    Value: 17663

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : CriticalProcessDied.ExceptionCode
    Value: 7912a080

    Key  : CriticalProcessDied.Process
    Value: services.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  ef

BUGCHECK_P1: ffff9f8979022080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  services.exe

CRITICAL_PROCESS:  services.exe

EXCEPTION_RECORD:  ffff9f89790227c0 -- (.exr 0xffff9f89790227c0)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x7912a080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT: 
ffffb384`cbd4cd88 fffff800`08b06fb2     : 00000000`000000ef ffff9f89`79022080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffb384`cbd4cd90 fffff800`089d7e33     : 00000000`00000001 fffff800`08460ec5 00000000`00000002 fffff800`08460def : nt!PspCatchCriticalBreak+0x10e
ffffb384`cbd4ce30 fffff800`0884a9b0     : ffff9f89`00000000 00000000`00000000 ffff9f89`79022080 ffff9f89`790224b8 : nt!PspTerminateAllThreads+0x1ee427
ffffb384`cbd4cea0 fffff800`0884a7ac     : ffff9f89`79022080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffb384`cbd4cee0 fffff800`08606bb5     : ffff9f89`79022080 ffff9f89`7912a080 ffffb384`cbd4cfd0 fffff800`08916372 : nt!NtTerminateProcess+0x9c
ffffb384`cbd4cf50 fffff800`085f9070     : fffff800`08630d7f ffffb384`cbd4da58 ffffb384`cbd4da58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x25
ffffb384`cbd4d0e8 fffff800`08630d7f     : ffffb384`cbd4da58 ffffb384`cbd4da58 ffffffff`ffffffff 00007ffe`d033e0c8 : nt!KiServiceLinkage
ffffb384`cbd4d0f0 fffff800`086072ac     : ffff9f89`790227c0 fffff800`0840d0c6 00000000`00006000 ffffb384`cbd4db00 : nt!KiDispatchException+0x1df55f
ffffb384`cbd4d920 fffff800`08603443     : 00000000`00000000 ffff9f89`7915bc50 ffffb384`cbd4db80 ffff9f89`00000000 : nt!KiExceptionDispatch+0x12c
ffffb384`cbd4db00 00007ffe`d02121d4     : 00007ffe`d01f0000 00007ffe`d028fc2e 00007ffe`d028fc2e 00000000`00000000 : nt!KiPageFault+0x443
00000054`89b01670 00007ffe`d01f0000     : 00007ffe`d028fc2e 00007ffe`d028fc2e 00000000`00000000 00000054`89b017b0 : 0x00007ffe`d02121d4
00000054`89b01678 00007ffe`d028fc2e     : 00007ffe`d028fc2e 00000000`00000000 00000054`89b017b0 00000000`00000000 : 0x00007ffe`d01f0000
00000054`89b01680 00007ffe`d028fc2e     : 00000000`00000000 00000054`89b017b0 00000000`00000000 00000054`89b01708 : 0x00007ffe`d028fc2e
00000054`89b01688 00000000`00000000     : 00000054`89b017b0 00000000`00000000 00000054`89b01708 00000054`89b01748 : 0x00007ffe`d028fc2e


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_7912a080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b50b7da7-f33f-3096-81c8-76ab4a2b2cbd}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff9d8f1f23a2c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7634

    Key  : Analysis.Init.CPU.mSec
    Value: 780

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12459

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : CriticalProcessDied.ExceptionCode
    Value: 1f2cb040

    Key  : CriticalProcessDied.Process
    Value: svchost.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  ef

BUGCHECK_P1: ffff9d8f1f23a2c0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_RECORD:  0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000

ERROR_CODE: (NTSTATUS) 0x1f2cb040 - <Unable to get error code text>

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
ffff8683`566a4d88 fffff805`5cd06fb2     : 00000000`000000ef ffff9d8f`1f23a2c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8683`566a4d90 fffff805`5cbd7e33     : 00000000`00000001 fffff805`5c660ec5 00000000`00000002 fffff805`5c660def : nt!PspCatchCriticalBreak+0x10e
ffff8683`566a4e30 fffff805`5ca4a9b0     : ffff9d8f`00000000 00000000`00000000 ffff9d8f`1f23a2c0 ffff9d8f`1f23a6f8 : nt!PspTerminateAllThreads+0x1ee427
ffff8683`566a4ea0 fffff805`5ca4a7ac     : ffff9d8f`1f23a2c0 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffff8683`566a4ee0 fffff805`5c806bb8     : ffff9d8f`1f23a2c0 ffff9d8f`1f2cb040 ffff8683`566a4fd0 fffff805`5cb16372 : nt!NtTerminateProcess+0x9c
ffff8683`566a4f50 fffff805`5c7f9070     : fffff805`5c830d7f ffff8683`566a5a58 ffff8683`566a5a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffff8683`566a50e8 fffff805`5c830d7f     : ffff8683`566a5a58 ffff8683`566a5a58 ffffffff`ffffffff 00007ff9`c0f06000 : nt!KiServiceLinkage
ffff8683`566a50f0 fffff805`5c8072ac     : 00000000`00001000 ffff8683`566a5b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1df55f
ffff8683`566a5920 fffff805`5c803443     : 00007ff9`c58bb38c 00000000`00000000 ffff9d8f`1f202d40 ffff9d8f`1f23a2c0 : nt!KiExceptionDispatch+0x12c
ffff8683`566a5b00 00007ff9`c590fc29     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
00000068`3d981000 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c590fc29


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_1f2cb040_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8d14349c-b934-b766-35ad-3a84b84bface}

Followup:     MachineOwner
---------
 
Diskine HD Tune yazılımı ile "error scan" testi yap ve "health" sekmesini paylaş.

HD Sentinel yazılımı ile "Genel bakış" sekmesini ve SMART verilerini paylaş.
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…