sfc/scannow
komutunu çalıştırın.CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff9a84388b0240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME: MS-7B86
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: A.80
BIOS_DATE: 07/09/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd
BASEBOARD_PRODUCT: B450-A PRO (MS-7B86)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: ffff9a84388b0240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: csrss.exe
CRITICAL_PROCESS: csrss.exe
EXCEPTION_RECORD: ffffeb8aa82d8b80 -- (.exr 0xffffeb8aa82d8b80)
ExceptionAddress: 0000000000000000
ExceptionCode: 00018000
ExceptionFlags: 00000af8
NumberParameters: 0
EXCEPTION_CODE: (Win32) 0x18000 (98304) - <Unable to get error code text>
ERROR_CODE: (NTSTATUS) 0x18000 - <Unable to get error code text>
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
EXCEPTION_CODE_STR: 18000
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 08-20-2020 12:08:37.0364
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8062d1177f2 to fffff8062cbddf40
STACK_TEXT:
ffffeb8a`a82d7d88 fffff806`2d1177f2 : 00000000`000000ef ffff9a84`388b0240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffeb8a`a82d7d90 fffff806`2d00b673 : 00000000`00000001 fffff806`2ca73ed1 00000000`00000002 fffff806`2ca7426b : nt!PspCatchCriticalBreak+0x10e
ffffeb8a`a82d7e30 fffff806`2ce4faa0 : ffff9a84`00000000 00000000`00000000 ffff9a84`388b0240 ffff9a84`388b0678 : nt!PspTerminateAllThreads+0x1bb7c3
ffffeb8a`a82d7ea0 fffff806`2ce4f89c : ffff9a84`388b0240 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffeb8a`a82d7ee0 fffff806`2cbef878 : ffff9a84`388b0240 ffff9a84`3b005080 ffffeb8a`a82d7fd0 fffff806`2cf23dd2 : nt!NtTerminateProcess+0x9c
ffffeb8a`a82d7f50 fffff806`2cbe1da0 : fffff806`2cc2f03f ffffeb8a`a82d8a58 ffffeb8a`a82d8a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffffeb8a`a82d80e8 fffff806`2cc2f03f : ffffeb8a`a82d8a58 ffffeb8a`a82d8a58 ffffffff`ffffffff 00000000`00000000 : nt!KiServiceLinkage
ffffeb8a`a82d80f0 fffff806`2cbeff6c : ffffeb8a`a82d8b80 00000000`00001000 ffffeb8a`a82d8b00 ffff8000`00000000 : nt!KiDispatchException+0x1b49cf
ffffeb8a`a82d8920 fffff806`2cbec103 : 00000024`ceabf5a0 00000000`00000000 ffffeb8a`a82d8b80 ffff9a84`388aeae0 : nt!KiExceptionDispatch+0x12c
ffffeb8a`a82d8b00 00007fff`b0f31037 : 00000000`00000000 00000000`0010000b 00007fff`b0edb31f 00000000`00000000 : nt!KiPageFault+0x443
00000024`cea81118 00000000`00000000 : 00000000`0010000b 00007fff`b0edb31f 00000000`00000000 00000024`cea81340 : 0x00007fff`b0f31037
THREAD_SHA1_HASH_MOD_FUNC: f6b0f7fafbd5253fc3d42ad0a11af14fddabdcf0
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4fbcd1749511895126d04408d4a31a961828c564
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!PspCatchCriticalBreak+10e
fffff806`2d1177f2 cc int 3
FAULT_INSTR_CODE: ed8440cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 7503e39
IMAGE_VERSION: 10.0.19041.450
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_3b005080_nt!PspCatchCriticalBreak
BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_3b005080_nt!PspCatchCriticalBreak
PRIMARY_PROBLEM_CLASS: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_3b005080_nt!PspCatchCriticalBreak
TARGET_TIME: 2020-08-19T17:40:33.000Z
OSBUILD: 19041
OSSERVICEPACK: 450
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1973-11-21 06:08:41
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 8e79
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xef_csrss.exe_bugcheck_critical_process_3b005080_nt!pspcatchcriticalbreak
FAILURE_ID_HASH: {8e3aa853-37bb-76ab-7fda-296f6fa2efcf}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff807586d5f12, Address of the instruction which caused the bugcheck
Arg3: fffffd0c658c2570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME: MS-7B86
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: A.80
BIOS_DATE: 07/09/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd
BASEBOARD_PRODUCT: B450-A PRO (MS-7B86)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff807586d5f12
BUGCHECK_P3: fffffd0c658c2570
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000006 - <Unable to get error code text>
FAULTING_IP:
nt!HvpGetCellPaged+a2
fffff807`586d5f12 418b02 mov eax,dword ptr [r10]
CONTEXT: fffffd0c658c2570 -- (.cxr 0xfffffd0c658c2570)
rax=0000000000000000 rbx=fffffd0c658c2fd0 rcx=0000000000000007
rdx=0000000003e2a020 rsi=000000000000036e rdi=ffffbe8aa4be1000
rip=fffff807586d5f12 rsp=fffffd0c658c2f78 rbp=ffffbe8aa4be1000
r8=000000000000001c r9=ffffa902d91bf080 r10=000001f23f06b020
r11=0000000000000020 r12=00000000ce4cf905 r13=fffffd0c658c3230
r14=000000000000036e r15=000001f23ef82024
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff807`586d5f12 418b02 mov eax,dword ptr [r10] ds:002b:000001f2`3f06b020=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000006
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Registry
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 08-20-2020 12:08:28.0257
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8075862612f to fffff807586d5f12
STACK_TEXT:
fffffd0c`658c2f78 fffff807`5862612f : 00000000`7f147a21 fffffd0c`658c32f0 00000000`00000000 ffffbe8a`acb764f0 : nt!HvpGetCellPaged+0xa2
fffffd0c`658c2f80 fffff807`585edab5 : 00000001`ffffffff 00000000`ce4cf905 fffffd0c`658c39e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
fffffd0c`658c2fd0 fffff807`585f9f99 : ffffbe8a`acb764f0 00000000`00000006 fffffd0c`658c31d0 fffffd0c`658c3250 : nt!CmpWalkOneLevel+0x6f5
fffffd0c`658c30d0 fffff807`585f1e63 : 00010101`0000001c fffffd0c`658c3420 fffffd0c`658c33d8 ffffa902`de7d2520 : nt!CmpDoParseKey+0x849
fffffd0c`658c3370 fffff807`585f554e : fffff807`585f1b01 00000000`00000000 ffffa902`de7d2520 00000000`00000001 : nt!CmpParseKey+0x2c3
fffffd0c`658c3510 fffff807`585f0faa : ffffa902`de7d2500 fffffd0c`658c3778 00000000`00000040 ffffa902`cf8b1da0 : nt!ObpLookupObjectName+0x3fe
fffffd0c`658c36e0 fffff807`585f0d8c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa902`cf8b1da0 : nt!ObOpenObjectByNameEx+0x1fa
fffffd0c`658c3810 fffff807`585f08b1 : 00000061`c217eac8 fffffd0c`658c3b80 00000000`00000001 fffff807`5820198e : nt!ObOpenObjectByName+0x5c
fffffd0c`658c3860 fffff807`585efe9f : fffff807`583d9c50 fffff807`582d4f1e 0000018b`7d2aa1e0 fffffd0c`658c3a88 : nt!CmOpenKey+0x2c1
fffffd0c`658c3ac0 fffff807`583ef478 : 00000000`00000000 ffffa902`d91be080 fffffd0c`658c3b80 0000018b`7b6caf50 : nt!NtOpenKeyEx+0xf
fffffd0c`658c3b00 00007ffe`1948d184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000061`c217e9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1948d184
THREAD_SHA1_HASH_MOD_FUNC: c60f19c144f9d7dd390ce35adb8e8dcc06aff971
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b7e1a7f2ff458eee6f1296c104c9731ec584d210
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!HvpGetCellPaged+a2
fffff807`586d5f12 418b02 mov eax,dword ptr [r10]
FAULT_INSTR_CODE: 41028b41
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!HvpGetCellPaged+a2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .cxr 0xfffffd0c658c2570 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
PRIMARY_PROBLEM_CLASS: 0x3B_c0000006_nt!HvpGetCellPaged
TARGET_TIME: 2020-08-03T15:28:49.000Z
OSBUILD: 19041
OSSERVICEPACK: 388
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 4a20
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000006_nt!hvpgetcellpaged
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.