- RAM
- 16 3000Mhz
- SSD veya HDD modeli
- XPG Spectrix S40G
- Ekran kartı
- 6700 XT
- Anakart
- B450 S2H
- İşlemci
- R5 3600
Merhabalar 2 adet minidump dosyasını analiz etmeye çalıştım fakat yorumlayamadım tecrübeli arkadaşlar yardımcı olabilir mi?
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 43
Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040325-11843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff800`72e00000 PsLoadedModuleList = 0xfffff800`73cf47a0
Debug session time: Thu Apr 3 12:17:45.494 2025 (UTC + 3:00)
System Uptime: 0 days 0:01:03.179
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`732b7ce0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9e81`bb65ed30=000000000000007f
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff8d0caf166140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: ffff8d0caf166140, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
ETW minidump data unavailable
*** WARNING: Check Image - Checksum mismatch - Dump: 0xc2ed94, File: 0xc31fe0 - C:\ProgramData\Dbg\sym\ntkrnlmp.exe\783A7A83144f000\ntkrnlmp.exe
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2468
Key : Analysis.Elapsed.mSec
Value: 35471
Key : Analysis.IO.Other.Mb
Value: 32
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 36
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 49089
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.Version.DbgEng
Value: 10.0.27793.1000
Key : Analysis.Version.Description
Value: 10.2410.02.02 amd64fre
Key : Analysis.Version.Ext
Value: 1.2410.2.2
Key : Bugcheck.Code.LegacyAPI
Value: 0xef
Key : Bugcheck.Code.TargetModel
Value: 0xef
Key : CriticalProcessDied.Process
Value: csrss.exe
Key : Dump.Attributes.AsUlong
Value: 0x30008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: 0xEF_csrss.exe_IMAGE_csrss.exe
Key : Failure.Hash
Value: {52d21f5d-7423-c024-462c-4ca2f538aeeb}
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff8d0caf166140
BUGCHECK_P2: 0
BUGCHECK_P3: ffff8d0caf166140
BUGCHECK_P4: 0
FILE_IN_CAB: 040325-11843-01.dmp
DUMP_FILE_ATTRIBUTES: 0x30008
Kernel Generated Triage Dump
FAULTING_THREAD: ffff8d0cb263c0c0
PROCESS_NAME: csrss.exe
CRITICAL_PROCESS: csrss.exe
IMAGE_NAME: csrss.exe
MODULE_NAME: csrss
FAULTING_MODULE: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: ffff9e81bb652150 -- (.trap 0xffff9e81bb652150)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000500 rbx=0000000000000000 rcx=00000000000004ff
rdx=00000000000004f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80073481ee6 rsp=ffff9e81bb6522e8 rbp=ffff9e81bb652360
r8=0000000000000000 r9=000000000010000b r10=ffff9e81bb651000
r11=ffff9e81bb651000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po cy
nt!_chkstk+0x36:
fffff800`73481ee6 45841b test byte ptr [r11],r11b ds:ffff9e81`bb651000=??
Resetting default scope
STACK_TEXT:
ffff9e81`bb65ed28 fffff800`7348cee9 : 00000000`0000007f 00000000`00000008 ffff9e81`bb65ee70 ffff9e81`bb651fd0 : nt!KeBugCheckEx
ffff9e81`bb65ed30 fffff800`73486b11 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9e81`bb65ee70 fffff800`732b7d0a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x351
ffff9e81`bb651fd0 fffff800`7348cee9 : 00000000`0000000a ffff9e81`bb651000 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx+0x2a
ffff9e81`bb652010 fffff800`734881a8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9e81`bb652150 fffff800`73481ee6 : 00000000`00000000 00000000`00100000 fffff800`7319ae1c 00000000`0010000b : nt!KiPageFault+0x468
ffff9e81`bb6522e8 fffff800`7319ae1c : 00000000`0010000b 00000000`00000000 00000000`00000081 ffff9d86`889bc4d0 : nt!_chkstk+0x36
ffff9e81`bb652300 fffff800`73030d0f : 00000000`00000000 00000000`00000000 00000000`c0000001 00000000`00000000 : nt!RtlDispatchException+0x12c
ffff9e81`bb652560 fffff800`73031f32 : 00000000`00000000 fffff800`72e00000 fffff800`73032353 fffff800`72ed90d0 : nt!RtlRaiseStatus+0x4f
ffff9e81`bb652b00 fffff800`732b7b72 : fffff800`72ec330c ffff9e81`00000001 ffff9d86`889bc4d0 ffffffff`ffffffff : nt!RtlUnwindEx+0xe2
ffff9e81`bb653230 fffff800`73482502 : ffff9e81`bb653a50 ffff9e81`bb653830 00000000`00000091 00000000`00000091 : nt!_C_specific_handler+0xe2
ffff9e81`bb6532a0 fffff800`7319afc2 : ffff9e81`bb653330 fffff800`72e00000 fffff800`733700e2 fffff800`72efff44 : nt!RtlpExecuteHandlerForException+0x12
ffff9e81`bb6532d0 fffff800`73030d0f : 00000000`00000000 00000000`00000000 00000000`c0000001 00000000`00000000 : nt!RtlDispatchException+0x2d2
ffff9e81`bb653a30 fffff800`73031f32 : 00000000`00000000 fffff800`72e00000 fffff800`73032353 fffff800`72ed90d0 : nt!RtlRaiseStatus+0x4f
ffff9e81`bb653fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlUnwindEx+0xe2
STACK_COMMAND: .process /r /p 0xffff8d0caf166140; .thread 0xffff8d0cb263c0c0 ; kb
FAILURE_BUCKET_ID: 0xEF_csrss.exe_IMAGE_csrss.exe
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {52d21f5d-7423-c024-462c-4ca2f538aeeb}
Followup: MachineOwner
---------
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 43
Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040425-110843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 26100.1.amd64fre.ge_release.240331-1435
Kernel base = 0xfffff805`e2000000 PsLoadedModuleList = 0xfffff805`e2ef47a0
Debug session time: Fri Apr 4 23:37:26.420 2025 (UTC + 3:00)
System Uptime: 0 days 0:01:26.104
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`e24b7ce0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa309`485b5d00=00000000000000ef
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffc90b452f1140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: ffffc90b452f1140, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0xc2ed94, File: 0xc31fe0 - C:\ProgramData\Dbg\sym\ntkrnlmp.exe\783A7A83144f000\ntkrnlmp.exe
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2500
Key : Analysis.Elapsed.mSec
Value: 29787
Key : Analysis.IO.Other.Mb
Value: 31
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 35
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 46211
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.Version.DbgEng
Value: 10.0.27793.1000
Key : Analysis.Version.Description
Value: 10.2410.02.02 amd64fre
Key : Analysis.Version.Ext
Value: 1.2410.2.2
Key : Bugcheck.Code.LegacyAPI
Value: 0xef
Key : Bugcheck.Code.TargetModel
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: 0x4887e0c0
Key : CriticalProcessDied.Process
Value: csrss.exe
Key : Failure.Bucket
Value: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_4887e0c0_nt!PspCatchCriticalBreak
Key : Failure.Exception.Code
Value: 0x4887e0c0
Key : Failure.Exception.Record
Value: 0xc0000005
Key : Failure.Hash
Value: {aa828cf8-01eb-3170-7c0b-6559856680b4}
Key : WER.OS.Branch
Value: ge_release
Key : WER.OS.Version
Value: 10.0.26100.1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffc90b452f1140
BUGCHECK_P2: 0
BUGCHECK_P3: ffffc90b452f1140
BUGCHECK_P4: 0
FILE_IN_CAB: 040425-110843-01.dmp
FAULTING_THREAD: ffffc90b4887e0c0
PROCESS_NAME: csrss.exe
CRITICAL_PROCESS: csrss.exe
EXCEPTION_RECORD: 00000000c0000005 -- (.exr 0xc0000005)
Cannot read Exception record @ 00000000c0000005
ERROR_CODE: (NTSTATUS) 0x4887e0c0 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffa309`485b5cf8 fffff805`e2753700 : 00000000`000000ef ffffc90b`452f1140 00000000`00000000 ffffc90b`452f1140 : nt!KeBugCheckEx
ffffa309`485b5d00 fffff805`e2954aef : ffffc90b`452f1140 fffff805`e226a414 00000000`00000001 ffffc90b`452f1140 : nt!PspCatchCriticalBreak+0x128
ffffa309`485b5da0 fffff805`e2954487 : ffffc90b`452f1140 ffffc90b`452f1308 ffffc90b`452f1140 00000000`00000000 : nt!PspTerminateAllThreads+0x27b
ffffa309`485b5e20 fffff805`e2952461 : ffffc90b`452f1140 00000000`00000001 ffffc90b`4887e0c0 ffffc90b`452f1140 : nt!PspTerminateProcess+0xf7
ffffa309`485b5e60 fffff805`e268c558 : ffffc90b`452f1140 ffffc90b`4887e0c0 01dba5a1`31952e15 008d0000`00000007 : nt!NtTerminateProcess+0xd1
ffffa309`485b5ee0 fffff805`e267a9b0 : fffff805`e239c324 ffffa309`485b6ae0 000000c4`466c0f90 ffffa309`485b6720 : nt!KiSystemServiceCopyEnd+0x28
ffffa309`485b6078 fffff805`e239c324 : ffffa309`485b6ae0 000000c4`466c0f90 ffffa309`485b6720 ffffa309`485b60b0 : nt!KiServiceLinkage
ffffa309`485b6080 fffff805`e268d045 : 00000000`c0000005 00000000`00000000 ffffa309`485b6b60 000000c4`466c2078 : nt!KiDispatchException+0xcc4
ffffa309`485b6900 fffff805`e2688182 : 00000000`2a860b5c 000000c4`466c2fd0 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x145
ffffa309`485b6ae0 00007ffe`1bda3ec7 : 00000000`0010000b 00000000`00000010 00007ffe`1bc53a18 000000c4`466c2110 : nt!KiPageFault+0x442
000000c4`466c1118 00000000`0010000b : 00000000`00000010 00007ffe`1bc53a18 000000c4`466c2110 00000000`00000000 : 0x00007ffe`1bda3ec7
000000c4`466c1120 00000000`00000010 : 00007ffe`1bc53a18 000000c4`466c2110 00000000`00000000 00000000`00000000 : 0x10000b
000000c4`466c1128 00007ffe`1bc53a18 : 000000c4`466c2110 00000000`00000000 00000000`00000000 00000000`00000000 : 0x10
000000c4`466c1130 000000c4`466c2110 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1bc53a18
000000c4`466c1138 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000000c4`466c2110
SYMBOL_NAME: nt!PspCatchCriticalBreak+128
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.26100.3476
STACK_COMMAND: .process /r /p 0xffffc90b452f1140; .thread 0xffffc90b4887e0c0 ; kb
BUCKET_ID_FUNC_OFFSET: 128
FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_4887e0c0_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.26100.1
BUILDLAB_STR: ge_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {aa828cf8-01eb-3170-7c0b-6559856680b4}
Followup: MachineOwner
---------
Son düzenleyen: Moderatör: