CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffb00faf0e0080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 AORUS ELITE
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F41
BIOS_DATE: 07/22/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 AORUS ELITE
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffb00faf0e0080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_CODE: (HRESULT) 0xaf168080 (2937487488) - <Unable to get error code text>
ERROR_CODE: (NTSTATUS) 0xaf168080 - <Unable to get error code text>
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-31-2020 00:08:18.0498
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8016e6cae89 to fffff8016dfc14e0
STACK_TEXT:
ffff8307`60948938 fffff801`6e6cae89 : 00000000`000000ef ffffb00f`af0e0080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8307`60948940 fffff801`6e5c75c1 : ffffb00f`af0e0080 fffff801`6de9c769 ffffb00f`af0e0080 fffff801`6de9c8c0 : nt!PspCatchCriticalBreak+0x115
ffff8307`609489e0 fffff801`6e439fc0 : ffffb00f`00000000 00000000`00000000 ffffb00f`af0e0080 ffffb00f`af0e0080 : nt!PspTerminateAllThreads+0x175e3d
ffff8307`60948a50 fffff801`6e439da9 : ffffffff`ffffffff ffff8307`60948b80 ffffb00f`af0e0080 fffff801`6e3c7601 : nt!PspTerminateProcess+0xe0
ffff8307`60948a90 fffff801`6dfd2d18 : ffffb00f`00000cf4 ffffb00f`af168080 ffffb00f`af0e0080 0000008e`9e97fbac : nt!NtTerminateProcess+0xa9
ffff8307`60948b00 00007ff9`26c7c644 : 00007ff9`26cefc5f 00007ff9`26d1f980 0000008e`9e97fb70 000001d6`4d500040 : nt!KiSystemServiceCopyEnd+0x28
0000008e`9e97d7a8 00007ff9`26cefc5f : 00007ff9`26d1f980 0000008e`9e97fb70 000001d6`4d500040 00007ff9`26c20474 : 0x00007ff9`26c7c644
0000008e`9e97d7b0 00007ff9`26d1f980 : 0000008e`9e97fb70 000001d6`4d500040 00007ff9`26c20474 00000000`00000004 : 0x00007ff9`26cefc5f
0000008e`9e97d7b8 0000008e`9e97fb70 : 000001d6`4d500040 00007ff9`26c20474 00000000`00000004 00007ff9`26c83cdd : 0x00007ff9`26d1f980
0000008e`9e97d7c0 000001d6`4d500040 : 00007ff9`26c20474 00000000`00000004 00007ff9`26c83cdd 00007ff9`26d1f980 : 0x0000008e`9e97fb70
0000008e`9e97d7c8 00007ff9`26c20474 : 00000000`00000004 00007ff9`26c83cdd 00007ff9`26d1f980 00000000`00000008 : 0x000001d6`4d500040
0000008e`9e97d7d0 00000000`00000004 : 00007ff9`26c83cdd 00007ff9`26d1f980 00000000`00000008 0000eae8`620ea40f : 0x00007ff9`26c20474
0000008e`9e97d7d8 00007ff9`26c83cdd : 00007ff9`26d1f980 00000000`00000008 0000eae8`620ea40f 00000000`00000000 : 0x4
0000008e`9e97d7e0 00007ff9`26d1f980 : 00000000`00000008 0000eae8`620ea40f 00000000`00000000 0000008e`9e97e4f0 : 0x00007ff9`26c83cdd
0000008e`9e97d7e8 00000000`00000008 : 0000eae8`620ea40f 00000000`00000000 0000008e`9e97e4f0 00007ff9`265b3d4a : 0x00007ff9`26d1f980
0000008e`9e97d7f0 0000eae8`620ea40f : 00000000`00000000 0000008e`9e97e4f0 00007ff9`265b3d4a 00000000`000341c2 : 0x8
0000008e`9e97d7f8 00000000`00000000 : 0000008e`9e97e4f0 00007ff9`265b3d4a 00000000`000341c2 00007ff9`26c6c6d6 : 0x0000eae8`620ea40f
THREAD_SHA1_HASH_MOD_FUNC: 042a2b51772309c39e12d732cc93cacf0af3064e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 579718d2ac9cadd09055086e52eaaf605eedcd78
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!PspCatchCriticalBreak+115
fffff801`6e6cae89 cc int 3
FAULT_INSTR_CODE: ed8440cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PspCatchCriticalBreak+115
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 29371fe3
IMAGE_VERSION: 10.0.18362.628
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 115
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_af168080_nt!PspCatchCriticalBreak
BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_af168080_nt!PspCatchCriticalBreak
PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_af168080_nt!PspCatchCriticalBreak
TARGET_TIME: 2020-01-30T19:04:03.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1d3c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_af168080_nt!pspcatchcriticalbreak
FAILURE_ID_HASH: {5b6ba6ec-9d60-7643-f9e9-c21c96b04a3f}
Followup: MachineOwner
---------