CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff958fcae11180, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4702
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6476
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff958fcae11180
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: csrss.exe
CRITICAL_PROCESS: csrss.exe
EXCEPTION_RECORD: ffff958fcae118c0 -- (.exr 0xffff958fcae118c0)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0xcc91d080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
fffff585`54f1dd88 fffff803`6cb06fe2 : 00000000`000000ef ffff958f`cae11180 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff585`54f1dd90 fffff803`6c9d7d83 : 00000000`00000001 fffff803`6c460ea5 00000000`00000002 fffff803`6c460dcf : nt!PspCatchCriticalBreak+0x10e
fffff585`54f1de30 fffff803`6c84a9b0 : ffff958f`00000000 00000000`00000000 ffff958f`cae11180 ffff958f`cae115b8 : nt!PspTerminateAllThreads+0x1ee377
fffff585`54f1dea0 fffff803`6c84a7ac : ffff958f`cae11180 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff585`54f1dee0 fffff803`6c605fb8 : ffff958f`cae11180 ffff958f`cc91d080 fffff585`54f1dfd0 fffff803`6c916372 : nt!NtTerminateProcess+0x9c
fffff585`54f1df50 fffff803`6c5f8400 : fffff803`6c63017f fffff585`54f1ea58 fffff585`54f1ea58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
fffff585`54f1e0e8 fffff803`6c63017f : fffff585`54f1ea58 fffff585`54f1ea58 ffffffff`ffffffff 00000000`00000000 : nt!KiServiceLinkage
fffff585`54f1e0f0 fffff803`6c6069a4 : ffff958f`cae118c0 fffff803`6c4ec946 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de95f
fffff585`54f1e920 fffff803`6c604d23 : 0000004a`4ad7f600 00000000`00000488 fffff585`54f1eb80 0000004a`4ad7f6b0 : nt!KiFastFailDispatch+0xe4
fffff585`54f1eb00 00007ffd`b1693608 : 0000004a`4ad7e0b0 00000000`00000000 0000004a`4ad7e008 0000004a`4ad7e048 : nt!KiRaiseSecurityCheckFailure+0x323
0000004a`4ad7df90 0000004a`4ad7e0b0 : 00000000`00000000 0000004a`4ad7e008 0000004a`4ad7e048 00007ffd`b1605e40 : 0x00007ffd`b1693608
0000004a`4ad7df98 00000000`00000000 : 0000004a`4ad7e008 0000004a`4ad7e048 00007ffd`b1605e40 0000004a`4ad7e0b0 : 0x0000004a`4ad7e0b0
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_cc91d080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c3eb06c-d351-ed45-1765-84851fd31ab9}
Followup: MachineOwner
---------