XMP desteklenmiyor. BIOS son sürüm güncel değil. Minidump dosyasını birisi okuyabilse çok güzel olur benim açımdan.
@Recep Baltaş
@claus
@Lindorie Miriel
@283156
@KojiroHyuga04
Loading unloaded module list:
....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`111f92d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff940a`07476080=00000000000000ef
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff8286c549f280, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3171
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10993
Key : Analysis.IO.Other.Mb
Value: 20
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 26
Key : Analysis.Init.CPU.mSec
Value: 468
Key : Analysis.Init.Elapsed.mSec
Value: 17626
Key : Analysis.Memory.CommitPeak.Mb
Value: 107
Key : Bugcheck.Code.DumpHeader
Value: 0xef
Key : Bugcheck.Code.Register
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: be7df600
Key : CriticalProcessDied.ImageName
Value: ntdll.dll
Key : CriticalProcessDied.ImageOffset
Value: 74c10
Key : CriticalProcessDied.ImageSize
Value: 1f8000
Key : CriticalProcessDied.ImageTimestamp
Value: b5ced1c6
Key : CriticalProcessDied.Process
Value: services.exe
Key : CriticalProcessDied.Symbol
Value: ntdll.dll!LdrInitializeThunk
Key : CriticalProcessDied.WERReportId
Value: 4d44874e-aa1b-468e-a9e4-d36924fdfa62
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 112422-8062-01.dmp
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff8286c549f280
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: services.exe
CRITICAL_PROCESS: services.exe
ERROR_CODE: (NTSTATUS) 0xbe7df600 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {4d44874e-aa1b-468e-a9e4-d36924fdfa62}
IMAGE_NAME: ntdll.dll
MODULE_NAME: ntdll
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff940a`07476078 fffff802`1170b122 : 00000000`000000ef ffff8286`c549f280 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff940a`07476080 fffff802`115f7fb3 : 00000000`00000001 fffff802`110062c5 00000000`00000002 fffff802`110061ef : nt!PspCatchCriticalBreak+0x10e
ffff940a`07476120 fffff802`113d9290 : ffff8286`00000000 00000000`00000000 ffff8286`c549f280 ffff8286`c549f6b8 : nt!PspTerminateAllThreads+0x1abcc7
ffff940a`07476190 fffff802`113d908c : ffff8286`c549f280 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffff940a`074761d0 fffff802`1120caf8 : ffff8286`c549f280 ffff8286`be7df600 ffff940a`074762c0 fffff802`11528ed2 : nt!NtTerminateProcess+0x9c
ffff940a`07476240 fffff802`111fdeb0 : fffff802`1123f50f ffff940a`074772f0 ffff940a`074772f0 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffff940a`074763d8 fffff802`1123f50f : ffff940a`074772f0 ffff940a`074772f0 ffffffff`ffffffff ffff9800`577aa440 : nt!KiServiceLinkage
ffff940a`074763e0 fffff802`115f540e : 00000000`00000000 ffff940a`074772d0 00000000`0000067f 42494881`00000003 : nt!KiDispatchException+0x1c901f
ffff940a`07476c20 fffff802`11438d61 : ffff9800`5779f180 ffff8286`be7df600 00000000`000000be 00000000`00000000 : nt!PspInitializeThunkContext+0x1b4cd6
ffff940a`07477890 fffff802`11202268 : ffff9800`5779f180 ffff8286`be7df600 ffff9800`577aa440 00000000`00000000 : nt!PspUserThreadStartup+0x101
ffff940a`07477980 fffff802`112021d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x28
ffff940a`07477ac0 00007ffb`305c2680 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
000000ae`5047fd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`305c2680
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_be7df600_ntdll.dll!LdrInitializeThunk_IMAGE_ntdll.dll
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {503128df-6e05-0762-d4ca-c68ca46bd1e4}
Followup: MachineOwner