Microsoft (R) Windows Debugger Version 10.0.22415.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803
Debug session time: Mon Sep 6 15:32:23.658 2021 (UTC + 5:00)
System Uptime: 1 days 0:02:00.415
Loading Kernel Symbols
...............................................................
................................................................
.............................................................Page 25c977 not present in the dump file. Type ".hh dbgerr004" for details
...
...........
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
...............................
Loading User Symbols
......................................................
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803
2: kd> !analyze -v
***
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffd80c26237080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14147
Key : Analysis.Init.CPU.mSec
Value: 890
Key : Analysis.Init.Elapsed.mSec
Value: 20477
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : CriticalProcessDied.ExceptionCode
Value: 2c6a1080
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffd80c26237080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x2c6a1080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
STACK_TEXT:
ffffc285
ffffc285
ffffc285
ffffc285
ffffc285
ffffc285
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
00000004
SYMBOL_NAME: ntdll!NtTerminateProcess+14
MODULE_NAME: ntdll
IMAGE_NAME: ntdll.dll
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_2c6a1080_ntdll!NtTerminateProcess
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {519117b4-963b-63e4-5133-ca3df0180428}
Followup: MachineOwner
---------
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803
71000000 PsLoadedModuleList = 0xfffff803
71c2a230Debug session time: Mon Sep 6 15:32:23.658 2021 (UTC + 5:00)
System Uptime: 1 days 0:02:00.415
Loading Kernel Symbols
...............................................................
................................................................
.............................................................Page 25c977 not present in the dump file. Type ".hh dbgerr004" for details
...
...........
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
...............................
Loading User Symbols
......................................................
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803
713f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc285
da0ef840=00000000000000ef2: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffd80c26237080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14147
Key : Analysis.Init.CPU.mSec
Value: 890
Key : Analysis.Init.Elapsed.mSec
Value: 20477
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : CriticalProcessDied.ExceptionCode
Value: 2c6a1080
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffd80c26237080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x2c6a1080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
STACK_TEXT:
ffffc285
da0ef838 fffff803
71908432 : 00000000000000ef ffffd80c
26237080 0000000000000000 00000000
00000000 : nt!KeBugCheckExffffc285
da0ef840 fffff803
717fa62b : 0000000000000000 fffff803
7129de5d 0000000000000002 fffff803
7129d477 : nt!PspCatchCriticalBreak+0x10effffc285
da0ef8e0 fffff803
7165ea44 : ffffd80c00000000 00000000
00000000 ffffd80c26237080 ffffd80c
262374b8 : nt!PspTerminateAllThreads+0x19c31fffffc285
da0ef950 fffff803
7165ed6c : ffffd80c26237080 00000000
00000000 00000004408ff77c fffff803
716007aa : nt!PspTerminateProcess+0xe0ffffc285
da0ef990 fffff803
714085b5 : ffffd80c26237080 ffffd80c
2c6a1080 ffffc285da0efa80 ffffc285
da0efa80 : nt!NtTerminateProcess+0x9cffffc285
da0efa00 00007ffb
2aead3a4 : 00007ffb2af22b53 00007ffb
2af566f8 00000004408ff740 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x2500000004
408fe5a8 00007ffb
2af22b53 : 00007ffb2af566f8 00000004
408ff740 0000000000000000 00007ffb
2ae10000 : ntdll!NtTerminateProcess+0x1400000004
408fe5b0 00007ffb
2aeb53ce : 00007ffb2af566f8 00000000
0000000c 00007ffb2ae10000 00007ffb
2ae6315a : ntdll!TppWorkerpInnerExceptionFilter+0x5b00000004
408fe5e0 00007ffb
2ae9c776 : 00000004408fe688 00000004
408fe6c8 00007ffb2ae6315a 00000000
00000001 : ntdll!TppWorkerThread$filt$5+0x1900000004
408fe620 00007ffb
2aeaca0e : 00007ffb2af567b8 00000004
408ff2f0 00000004408ff740 00000004
408fec40 : ntdll!_C_specific_handler+0x9600000004
408fe690 00007ffb
2aeb217f : 0000000000000000 00000004
408fec30 00000004408ff2f0 00000000
00000000 : ntdll!_GSHandlerCheck_SEH+0x6a00000004
408fe6c0 00007ffb
2ae61454 : 0000000000000000 00000004
408fec30 00000004408ff2f0 00000000
00000000 : ntdll!RtlpExecuteHandlerForException+0xf00000004
408fe6f0 00007ffb
2aeb0cae : 000001312bbe0000 00007ffb
2ae12278 000001312c9ee560 00007ffb
2ae12278 : ntdll!RtlDispatchException+0x24400000004
408fee00 00007ffb
2ae48317 : 000001312d09f9c8 00007ffb
287de619 0000d43ff47e2cb4 00000000
00000000 : ntdll!KiUserExceptionDispatch+0x2e00000004
408ff580 00007ffb
2880b59b : 0000000000000000 00007ffb
2ae776ea 0000000000000000 00000000
00000000 : ntdll!RtlEqualSid+0x700000004
408ff5b0 00007ffb
0ffd985d : 000001312d0f2db0 00007ffb
2ae7752d 00007ffb10044850 00000000
ffffffff : KERNELBASE!EqualSid+0x2b00000004
408ff5e0 00007ffb
27191ebc : 00007ffb10044818 00000000
00000074 00007ffb10044850 00000004
408ff708 : mpssvc!FwMoneisDiagPackageIdStatsEntrySqmAndFree+0x2d00000004
408ff640 00007ffb
0ffd9c79 : 000001312c9ee150 00000131
2bc94810 00000004408ff8b8 00000131
2bc948d8 : fwbase!FwHashtableEmpty+0xc9ac00000004
408ff6a0 00007ffb
2ae81619 : 000001312bc94810 00000000
7ffe0386 00000004408ff8b8 00000131
0000006e : mpssvc!FwMoneisDiagTimerCallback+0x10900000004
408ff6f0 00007ffb
2ae6315a : 000001312bc02458 00000131
2cfdcf40 0000000000000000 00000131
2bc02358 : ntdll!TppTimerpExecuteCallback+0xa900000004
408ff740 00007ffb
2a2e7034 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!TppWorkerThread+0x68a00000004
408ffa40 00007ffb
2ae62651 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : KERNEL32!BaseThreadInitThunk+0x1400000004
408ffa70 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21SYMBOL_NAME: ntdll!NtTerminateProcess+14
MODULE_NAME: ntdll
IMAGE_NAME: ntdll.dll
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_2c6a1080_ntdll!NtTerminateProcess
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {519117b4-963b-63e4-5133-ca3df0180428}
Followup: MachineOwner
---------
Last edited by a moderator: