*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff948ff777c080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 27750
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff948ff777c080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: services.exe
CRITICAL_PROCESS: services.exe
EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1)
Cannot read Exception record @ 0000000000000001
ERROR_CODE: (NTSTATUS) 0xf936f080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffbe83`1a576438 fffff801`84506fe2 : 00000000`000000ef ffff948f`f777c080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffbe83`1a576440 fffff801`843d7d83 : 00000000`00000001 fffff801`83e60ea5 00000000`00000002 fffff801`83e60dcf : nt!PspCatchCriticalBreak+0x10e
ffffbe83`1a5764e0 fffff801`8424a9b0 : ffff948f`00000000 00000000`00000000 ffff948f`f777c080 ffff948f`f777c4b8 : nt!PspTerminateAllThreads+0x1ee377
ffffbe83`1a576550 fffff801`8424a7ac : ffff948f`f777c080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffbe83`1a576590 fffff801`84005fb5 : ffff948f`f777c080 ffff948f`f936f080 ffffbe83`1a576680 fffff801`84316372 : nt!NtTerminateProcess+0x9c
ffffbe83`1a576600 fffff801`83ff8400 : fffff801`8403017f ffffbe83`1a5777c0 ffffbe83`1a5777c0 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x25
ffffbe83`1a576798 fffff801`8403017f : ffffbe83`1a5777c0 ffffbe83`1a5777c0 ffffffff`ffffffff ffffffff`ffffffff : nt!KiServiceLinkage
ffffbe83`1a5767a0 fffff801`8411bc72 : 00000000`00000001 ffffbe83`1a577080 00000097`abc95000 00000000`00000003 : nt!KiDispatchException+0x1de95f
ffffbe83`1a577050 fffff801`83ff501b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseException+0x2b2
ffffbe83`1a5778c0 fffff801`84005fb5 : 00007ffd`2d6c47b3 ffffbe83`1a577a80 00000097`abe7f130 00000000`00000000 : nt!NtRaiseException+0x7b
ffffbe83`1a577a00 00007ffd`2d68590c : 00000000`00000000 00000097`abc95000 00000097`abc95000 00000000`0000000f : nt!KiSystemServiceCopyEnd+0x25
00000097`abe7f3d0 00000000`00000000 : 00000097`abc95000 00000097`abc95000 00000000`0000000f 000001d6`d14045a0 : 0x00007ffd`2d68590c
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_f936f080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bf76032c-f733-b2c5-2908-ea4b161d4efe}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80378adb4f8, Address of the instruction which caused the bugcheck
Arg3: ffffd60f4314e460, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8405
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22559
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80378adb4f8
BUGCHECK_P3: ffffd60f4314e460
BUGCHECK_P4: 0
CONTEXT: ffffd60f4314e460 -- (.cxr 0xffffd60f4314e460)
rax=0000000000000000 rbx=ffffda0b8fae7158 rcx=0000000000000011
rdx=0000000fbc869bf0 rsi=0000000fbc869bf0 rdi=ffffda0b8fae7710
rip=fffff80378adb4f8 rsp=ffffd60f4314ee60 rbp=0000000000000000
r8=ffffd60f4314eec0 r9=0000000000000005 r10=7ffffffffffffffc
r11=ffffd60f4314ef38 r12=ffffc48ca581e000 r13=0000000000000001
r14=0000000000000001 r15=ffffd60f4314f1a0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ExAcquirePushLockSharedEx+0x108:
fffff803`78adb4f8 f0480fb10e lock cmpxchg qword ptr [rsi],rcx ds:002b:0000000f`bc869bf0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
STACK_TEXT:
ffffd60f`4314ee60 fffff803`78eeb022 : ffffda0b`8fae7710 fffff803`00000000 ffffda0b`00000000 ffffc48c`a297ee40 : nt!ExAcquirePushLockSharedEx+0x108
ffffd60f`4314eeb0 fffff803`78ee9047 : ffffc48c`a2550be0 ffffc48c`a2550be0 ffffd60f`4314f0d0 fffff803`00000005 : nt!CmpPerformSingleKcbCacheLookup+0xe2
ffffd60f`4314ef40 fffff803`78ee948a : 00000000`94ef0001 ffffd60f`4314f000 ffffd60f`00000005 00000000`00000000 : nt!CmpPerformCompleteKcbCacheLookup+0x77
ffffd60f`4314efd0 fffff803`78ee82e3 : 00000001`0000001c ffffd60f`4314f320 ffffd60f`4314f2d8 ffffda0b`8ac31010 : nt!CmpDoParseKey+0x2da
ffffd60f`4314f270 fffff803`78eec3ae : fffff803`78ee8001 00000000`00000000 ffffda0b`8ac31010 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffd60f`4314f410 fffff803`78ef566a : ffffda0b`8ac31000 ffffd60f`4314f678 00000026`00000040 ffffda0b`7fad5c40 : nt!ObpLookupObjectName+0x3fe
ffffd60f`4314f5e0 fffff803`78ef544c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffda0b`7fad5c40 : nt!ObOpenObjectByNameEx+0x1fa
ffffd60f`4314f710 fffff803`78ef4f71 : 00000026`2fe7d998 ffffd60f`4314fa80 00000000`00000001 fffff803`78a9ccce : nt!ObOpenObjectByName+0x5c
ffffd60f`4314f760 fffff803`78ef4c9f : 00000000`00000000 00000163`e793c530 00000000`00000000 00000000`00000103 : nt!CmOpenKey+0x2c1
ffffd60f`4314f9c0 fffff803`78c05fb5 : ffffda0b`8fae7000 ffffd60f`00000000 ffffd60f`4314fa80 ffffda0b`90a113f0 : nt!NtOpenKeyEx+0xf
ffffd60f`4314fa00 00007ff8`07d6e184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000026`2fe7d8b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`07d6e184
SYMBOL_NAME: nt!ExAcquirePushLockSharedEx+108
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffd60f4314e460 ; kb
BUCKET_ID_FUNC_OFFSET: 108
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExAcquirePushLockSharedEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0a07b27c-d6fc-450f-cce4-99edf8dde3d7}
Followup: MachineOwner
---------