************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\083124-4468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff803`2b400000 PsLoadedModuleList = 0xfffff803`2c013510
Debug session time: Sat Aug 31 11:14:55.672 2024 (UTC + 3:00)
System Uptime: 0 days 2:31:01.265
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000d7`fd24a018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`2b815fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff50a`8ca4ed00=00000000000000ef
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff800f0616a040, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: ffff800f0616a040, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2406
Key : Analysis.Elapsed.mSec
Value: 4498
Key : Analysis.IO.Other.Mb
Value: 11
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 12
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 17188
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.LegacyAPI
Value: 0xef
Key : Bugcheck.Code.TargetModel
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: 9c8c5c0
Key : CriticalProcessDied.Process
Value: smss.exe
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0xEF_smss.exe_BUGCHECK_CRITICAL_PROCESS_9c8c5c0_nt!PspCatchCriticalBreak
Key : Failure.Hash
Value: {18cab759-bc5c-9e3b-2959-8e1a29a94949}
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff800f0616a040
BUGCHECK_P2: 0
BUGCHECK_P3: ffff800f0616a040
BUGCHECK_P4: 0
FILE_IN_CAB: 083124-4468-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
FAULTING_THREAD: ffff800f09c8c5c0
PROCESS_NAME: smss.exe
CRITICAL_PROCESS: smss.exe
EXCEPTION_RECORD: fffff50a8ca4f910 -- (.exr 0xfffff50a8ca4f910)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x9c8c5c0 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
STACK_TEXT:
fffff50a`8ca4ecf8 fffff803`2bdb0bd9 : 00000000`000000ef ffff800f`0616a040 00000000`00000000 ffff800f`0616a040 : nt!KeBugCheckEx
fffff50a`8ca4ed00 fffff803`2bd02f0b : ffff800f`0616a040 fffff803`2b755dbd 00000000`00000000 fffff803`2b7556ff : nt!PspCatchCriticalBreak+0x119
fffff50a`8ca4ed90 fffff803`2bbdc21f : ffff800f`0616a040 00000000`c0000409 ffff800f`0616a040 00000000`00000001 : nt!PspTerminateAllThreads+0x12782f
fffff50a`8ca4ee00 fffff803`2bbdc341 : ffffffff`ffffffff ffff800f`0616a040 ffff800f`09c8c5c0 ffff800f`0616a040 : nt!PspTerminateProcess+0xe7
fffff50a`8ca4ee40 fffff803`2b82b608 : fffff50a`00000278 ffff800f`09c8c5c0 ffff800f`0616a040 fffff803`2bd367b7 : nt!NtTerminateProcess+0xb1
fffff50a`8ca4eec0 fffff803`2b81ba90 : fffff803`2b8d283d ffffffff`ffffffff fffff50a`8ca4faa0 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
fffff50a`8ca4f058 fffff803`2b8d283d : ffffffff`ffffffff fffff50a`8ca4faa0 00000000`00000001 fffff50a`8ca4f090 : nt!KiServiceLinkage
fffff50a`8ca4f060 fffff803`2b82c506 : fffff50a`8ca4f910 fffff803`2b7431eb ffff800f`0616a6c0 ffffcf3f`fc614498 : nt!KiDispatchException+0x1700fd
fffff50a`8ca4f8c0 fffff803`2b82a1db : ffff800f`09c8c5c0 ffff800f`061a3d10 000000d7`fd4ff6c0 ffff800f`00000000 : nt!KiFastFailDispatch+0xc6
fffff50a`8ca4faa0 00007ff8`c27b8a88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x35b
000000d7`fd4fe590 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c27b8a88
SYMBOL_NAME: nt!PspCatchCriticalBreak+119
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.4111
STACK_COMMAND: .process /r /p 0xffff800f0616a040; .thread 0xffff800f09c8c5c0 ; kb
BUCKET_ID_FUNC_OFFSET: 119
FAILURE_BUCKET_ID: 0xEF_smss.exe_BUGCHECK_CRITICAL_PROCESS_9c8c5c0_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {18cab759-bc5c-9e3b-2959-8e1a29a94949}
Followup: MachineOwner
Kusura bakmayın bu hata nedir bilen arkadaşlar yardımcı olabilirmi ?
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\083124-4468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff803`2b400000 PsLoadedModuleList = 0xfffff803`2c013510
Debug session time: Sat Aug 31 11:14:55.672 2024 (UTC + 3:00)
System Uptime: 0 days 2:31:01.265
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000d7`fd24a018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`2b815fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff50a`8ca4ed00=00000000000000ef
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff800f0616a040, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: ffff800f0616a040, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2406
Key : Analysis.Elapsed.mSec
Value: 4498
Key : Analysis.IO.Other.Mb
Value: 11
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 12
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 17188
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.LegacyAPI
Value: 0xef
Key : Bugcheck.Code.TargetModel
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: 9c8c5c0
Key : CriticalProcessDied.Process
Value: smss.exe
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0xEF_smss.exe_BUGCHECK_CRITICAL_PROCESS_9c8c5c0_nt!PspCatchCriticalBreak
Key : Failure.Hash
Value: {18cab759-bc5c-9e3b-2959-8e1a29a94949}
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff800f0616a040
BUGCHECK_P2: 0
BUGCHECK_P3: ffff800f0616a040
BUGCHECK_P4: 0
FILE_IN_CAB: 083124-4468-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
FAULTING_THREAD: ffff800f09c8c5c0
PROCESS_NAME: smss.exe
CRITICAL_PROCESS: smss.exe
EXCEPTION_RECORD: fffff50a8ca4f910 -- (.exr 0xfffff50a8ca4f910)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x9c8c5c0 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
STACK_TEXT:
fffff50a`8ca4ecf8 fffff803`2bdb0bd9 : 00000000`000000ef ffff800f`0616a040 00000000`00000000 ffff800f`0616a040 : nt!KeBugCheckEx
fffff50a`8ca4ed00 fffff803`2bd02f0b : ffff800f`0616a040 fffff803`2b755dbd 00000000`00000000 fffff803`2b7556ff : nt!PspCatchCriticalBreak+0x119
fffff50a`8ca4ed90 fffff803`2bbdc21f : ffff800f`0616a040 00000000`c0000409 ffff800f`0616a040 00000000`00000001 : nt!PspTerminateAllThreads+0x12782f
fffff50a`8ca4ee00 fffff803`2bbdc341 : ffffffff`ffffffff ffff800f`0616a040 ffff800f`09c8c5c0 ffff800f`0616a040 : nt!PspTerminateProcess+0xe7
fffff50a`8ca4ee40 fffff803`2b82b608 : fffff50a`00000278 ffff800f`09c8c5c0 ffff800f`0616a040 fffff803`2bd367b7 : nt!NtTerminateProcess+0xb1
fffff50a`8ca4eec0 fffff803`2b81ba90 : fffff803`2b8d283d ffffffff`ffffffff fffff50a`8ca4faa0 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
fffff50a`8ca4f058 fffff803`2b8d283d : ffffffff`ffffffff fffff50a`8ca4faa0 00000000`00000001 fffff50a`8ca4f090 : nt!KiServiceLinkage
fffff50a`8ca4f060 fffff803`2b82c506 : fffff50a`8ca4f910 fffff803`2b7431eb ffff800f`0616a6c0 ffffcf3f`fc614498 : nt!KiDispatchException+0x1700fd
fffff50a`8ca4f8c0 fffff803`2b82a1db : ffff800f`09c8c5c0 ffff800f`061a3d10 000000d7`fd4ff6c0 ffff800f`00000000 : nt!KiFastFailDispatch+0xc6
fffff50a`8ca4faa0 00007ff8`c27b8a88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x35b
000000d7`fd4fe590 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c27b8a88
SYMBOL_NAME: nt!PspCatchCriticalBreak+119
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.4111
STACK_COMMAND: .process /r /p 0xffff800f0616a040; .thread 0xffff800f09c8c5c0 ; kb
BUCKET_ID_FUNC_OFFSET: 119
FAILURE_BUCKET_ID: 0xEF_smss.exe_BUGCHECK_CRITICAL_PROCESS_9c8c5c0_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {18cab759-bc5c-9e3b-2959-8e1a29a94949}
Followup: MachineOwner
Kusura bakmayın bu hata nedir bilen arkadaşlar yardımcı olabilirmi ?