CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff8f0d8d6c5080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
SYSTEM_PRODUCT_NAME: CASPER BILGISAYAR SISTEMLERI A.S
SYSTEM_SKU: D15D
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 702
BIOS_DATE: 06/25/2015
BASEBOARD_MANUFACTURER: CASPER V01
BASEBOARD_PRODUCT: D15D
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: ffff8f0d8d6c5080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: services.exe
CRITICAL_PROCESS: services.exe
EXCEPTION_CODE: (HRESULT) 0x8e4df040 (2387472448) - <Unable to get error code text>
ERROR_CODE: (NTSTATUS) 0x8e4df040 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {f4bb703a-ff98-4f8a-9e8c-5d9fe8d8b355}
IMAGE_NAME: services.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: services
FAULTING_MODULE: 0000000000000000
CPU_COUNT: 4
CPU_MHZ: 82f
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3d
CPU_STEPPING: 4
CPU_MICROCODE: 6,3d,4,0 (F,M,S,R) SIG: 2B'00000000 (cache) 2B'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-22-2020 13:11:41.0264
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8007b6ca089 to fffff8007afc1080
STACK_TEXT:
fffff501`69c8f8f8 fffff800`7b6ca089 : 00000000`000000ef ffff8f0d`8d6c5080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff501`69c8f900 fffff800`7b5c5387 : ffff8f0d`8d6c5080 fffff800`7ae9c8f9 ffff8f0d`8d6c5080 fffff800`7ae9ca50 : nt!PspCatchCriticalBreak+0x115
fffff501`69c8f9a0 fffff800`7b438020 : ffff8f0d`00000000 00000000`00000000 ffff8f0d`8d6c5080 ffff8f0d`8d6c5080 : nt!PspTerminateAllThreads+0x1754f3
fffff501`69c8fa10 fffff800`7b437e09 : ffffffff`ffffffff fffff501`69c8fb40 ffff8f0d`8d6c5080 000001d1`38d90001 : nt!PspTerminateProcess+0xe0
fffff501`69c8fa50 fffff800`7afd2918 : ffff8f0d`00000294 ffff8f0d`8e4df040 ffff8f0d`8d6c5080 00000050`6117f82c : nt!NtTerminateProcess+0xa9
fffff501`69c8fac0 00007ff9`8595c654 : 00007ff9`859cfc5f 00007ff9`859ff980 00000050`6117f7f0 000001d1`393eb830 : nt!KiSystemServiceCopyEnd+0x28
00000050`6117d8a8 00007ff9`859cfc5f : 00007ff9`859ff980 00000050`6117f7f0 000001d1`393eb830 00000000`00000000 : 0x00007ff9`8595c654
00000050`6117d8b0 00007ff9`859ff980 : 00000050`6117f7f0 000001d1`393eb830 00000000`00000000 00000000`00000004 : 0x00007ff9`859cfc5f
00000050`6117d8b8 00000050`6117f7f0 : 000001d1`393eb830 00000000`00000000 00000000`00000004 00007ff9`85963cdd : 0x00007ff9`859ff980
00000050`6117d8c0 000001d1`393eb830 : 00000000`00000000 00000000`00000004 00007ff9`85963cdd 00007ff9`859ff980 : 0x00000050`6117f7f0
00000050`6117d8c8 00000000`00000000 : 00000000`00000004 00007ff9`85963cdd 00007ff9`859ff980 00000000`00000008 : 0x000001d1`393eb830
THREAD_SHA1_HASH_MOD_FUNC: 042a2b51772309c39e12d732cc93cacf0af3064e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a601decfd36b24352688014f2c2dd601b91fe45b
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_NAME: MachineOwner
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_8e4df040_services.exe!memcpy_IMAGE_services.exe
BUCKET_ID: 0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_8e4df040_services.exe!memcpy_IMAGE_services.exe
PRIMARY_PROBLEM_CLASS: 0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_8e4df040_services.exe!memcpy_IMAGE_services.exe
TARGET_TIME: 2020-02-20T11:36:13.000Z
OSBUILD: 18362
OSSERVICEPACK: 327
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2031-02-06 14:47:47
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: df6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xef_services.exe_bugcheck_critical_process_8e4df040_services.exe!memcpy_image_services.exe
FAILURE_ID_HASH: {bb5e69e3-0fac-d472-fe39-732e1904c83c}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe8015543e6a0, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff8015543e6a0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
SYSTEM_PRODUCT_NAME: CASPER BILGISAYAR SISTEMLERI A.S
SYSTEM_SKU: D15D
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 702
BIOS_DATE: 06/25/2015
BASEBOARD_MANUFACTURER: CASPER V01
BASEBOARD_PRODUCT: D15D
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: ffffe8015543e6a0
BUGCHECK_P2: 10
BUGCHECK_P3: fffff8015543e6a0
BUGCHECK_P4: 2
READ_ADDRESS: fffff801559723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffe8015543e6a0
FAULTING_IP:
nt!KeEnterCriticalRegion+0
fffff801`5543e6a0 65488b042588010000 mov rax,qword ptr gs:[188h]
MM_INTERNAL_CODE: 2
CPU_COUNT: 4
CPU_MHZ: 82f
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3d
CPU_STEPPING: 4
CPU_MICROCODE: 6,3d,4,0 (F,M,S,R) SIG: 2B'00000000 (cache) 2B'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-22-2020 13:11:43.0646
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffcc0468c86fb0 -- (.trap 0xffffcc0468c86fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff691ad30662e4 rbx=0000000000000000 rcx=ffff864540610d78
rdx=ffffcc0468c87210 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015543e6a0 rsp=ffffcc0468c87148 rbp=ffffcc0468c871f0
r8=0000000000000000 r9=ffffcc0468c872f0 r10=fffff8015543e6a0
r11=ffffe0022657d0c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KeEnterCriticalRegion:
fffff801`5543e6a0 65488b042588010000 mov rax,qword ptr gs:[188h] gs:00000000`00000188=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801555e31d6 to fffff801555c1080
STACK_TEXT:
ffffcc04`68c86d08 fffff801`555e31d6 : 00000000`00000050 ffffe801`5543e6a0 00000000`00000010 ffffcc04`68c86fb0 : nt!KeBugCheckEx
ffffcc04`68c86d10 fffff801`554730bf : e002266e`4d30fffe 00000000`00000010 00000000`00000000 ffffe801`5543e6a0 : nt!MiSystemFault+0x1d64a6
ffffcc04`68c86e10 fffff801`555cf120 : 00000000`0000001f ffff8629`8cf06ba8 ffff8629`8cf8adf0 00000000`00000001 : nt!MmAccessFault+0x34f
ffffcc04`68c86fb0 fffff801`5543e6a0 : ffff8629`8cf43c39 ffff8629`8cf8de18 00000000`00000000 ffff8629`8cfbd0d0 : nt!KiPageFault+0x360
ffffcc04`68c87148 ffff8629`8cf43c39 : ffff8629`8cf8de18 00000000`00000000 ffff8629`8cfbd0d0 ffff8629`8cc024e9 : nt!KeEnterCriticalRegion
ffffcc04`68c87150 ffff8629`8cf43fd2 : 000001df`0000018e ffff8645`40610000 ffff8629`8cc024e0 ffff8629`8cf4f479 : win32kbase!CMouseProcessor::MouseInterceptState::GetInterceptStateAndBehavior+0x29
ffffcc04`68c87180 ffff8629`8cf44b0a : 000001df`00000000 000001df`0000018e ffff8645`40606440 ffffe002`2657d0c8 : win32kbase!CMouseProcessor::HandleMouseInterceptWorker+0x2e
ffffcc04`68c87210 ffff8629`8cf39816 : ffff8645`406063f0 ffffe002`2657d070 00000000`00000018 ffff8645`406063f0 : win32kbase!CMouseProcessor::ProcessInput+0x3c6
ffffcc04`68c873a0 ffff8629`8cf2bd67 : ffff8629`8cf850d0 ffffcc04`68c874e0 ffff8645`406063f0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x56
ffffcc04`68c873e0 ffff8629`8ce17ce0 : 00000000`00000040 ffff8629`8cf850d0 00000000`00000001 fffff801`5543b604 : win32kbase!CBaseInput::OnReadNotification+0x467
ffffcc04`68c87520 ffff8629`8ce17a42 : 00000000`00000004 ffff8645`40661150 00000000`00000006 ffff53e0`d5c2f168 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x290
ffffcc04`68c87690 ffff8629`8ce16f1e : 00000000`00000003 00000000`00002000 ffff8645`40621700 ffff8629`8cfc1b10 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffffcc04`68c876c0 ffff8629`8ce16d22 : 00000000`00000006 00000000`00002000 00000000`00000006 fffff801`5543869a : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffffcc04`68c876f0 ffff8629`8caac1d8 : ffff8645`40621720 ffff8645`40621720 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x102
ffffcc04`68c87820 ffff8629`8caabe13 : 00000000`00000004 00000000`00000004 00000000`0000000c ffff8629`8cfc91b0 : win32kfull!xxxDesktopThreadWaiter+0x130
ffffcc04`68c878a0 ffff8629`8ce5a22d : ffffe002`2657e080 ffffe002`2657e080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x403
ffffcc04`68c87980 ffff8629`8cabb9cf : ffffe002`2657e080 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x22d
ffffcc04`68c87a90 fffff801`555d2918 : ffffe002`2657e080 00000000`00000005 000002ab`0c204060 00000000`00000300 : win32kfull!NtUserCallNoParam+0x6f
ffffcc04`68c87ac0 00007ffe`c0f31144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e3`184ff818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c0f31144
THREAD_SHA1_HASH_MOD_FUNC: 6a117abae791b2a2e992dc904b801c3c1b33ef9c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f1dfbd68e60f109b01f936074806ce1035ea7821
THREAD_SHA1_HASH_MOD: 06bda514781542f84ece01ee24110d8d3f74ea98
FOLLOWUP_IP:
win32kbase!CMouseProcessor::MouseInterceptState::GetInterceptStateAndBehavior+29
ffff8629`8cf43c39 33d2 xor edx,edx
FAULT_INSTR_CODE: 8b48d233
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32kbase!CMouseProcessor::MouseInterceptState::GetInterceptStateAndBehavior+29
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 7b24bcd8
IMAGE_VERSION: 10.0.18362.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 29
FAILURE_BUCKET_ID: AV_INVALID_win32kbase!CMouseProcessor::MouseInterceptState::GetInterceptStateAndBehavior
BUCKET_ID: AV_INVALID_win32kbase!CMouseProcessor::MouseInterceptState::GetInterceptStateAndBehavior
PRIMARY_PROBLEM_CLASS: AV_INVALID_win32kbase!CMouseProcessor::MouseInterceptState::GetInterceptStateAndBehavior
TARGET_TIME: 2020-02-20T14:46:25.000Z
OSBUILD: 18362
OSSERVICEPACK: 327
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2031-02-06 14:47:47
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 30f5
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_win32kbase!cmouseprocessor::mouseinterceptstate::getinterceptstateandbehavior
FAILURE_ID_HASH: {630790bf-338f-9fe0-efa1-46a66f0b7f30}
Followup: MachineOwner
---------