*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffb98a47ec00c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
ETW minidump data unavailable
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7671
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14867
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffb98a47ec00c0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1)
Cannot read Exception record @ 0000000000000001
ERROR_CODE: (NTSTATUS) 0x4b737080 - <Unable to get error code text>
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff8005`b0af3638 fffff807`79106fe2 : 00000000`000000ef ffffb98a`47ec00c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8005`b0af3640 fffff807`78fd7d83 : 00000000`00000001 fffff807`78a60ea5 00000000`00000002 fffff807`78a60dcf : nt!PspCatchCriticalBreak+0x10e
ffff8005`b0af36e0 fffff807`78e4a9b0 : ffffb98a`00000000 00000000`00000000 ffffb98a`47ec00c0 ffffb98a`47ec04f8 : nt!PspTerminateAllThreads+0x1ee377
ffff8005`b0af3750 fffff807`78e4a7ac : ffffb98a`47ec00c0 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffff8005`b0af3790 fffff807`78c05fb8 : ffffb98a`47ec00c0 ffffb98a`4b737080 ffff8005`b0af3880 fffff807`78f16372 : nt!NtTerminateProcess+0x9c
ffff8005`b0af3800 fffff807`78bf8400 : fffff807`78c3017f ffff8005`b0af48c0 ffff8005`b0af48c0 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffff8005`b0af3998 fffff807`78c3017f : ffff8005`b0af48c0 ffff8005`b0af48c0 ffffffff`ffffffff ffffffff`ffffffff : nt!KiServiceLinkage
ffff8005`b0af39a0 fffff807`78d1bc72 : 00000000`00000001 ffff8005`b0af4200 00000000`00000000 00000000`00000003 : nt!KiDispatchException+0x1de95f
ffff8005`b0af41d0 fffff807`78bf501b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseException+0x2b2
ffff8005`b0af49c0 fffff807`78c05fb8 : ffffb98a`4b730000 ffffb98a`4a174cd0 ffff8005`b0af4b80 ffffb98a`00001f8c : nt!NtRaiseException+0x7b
ffff8005`b0af4b00 00007ffd`848cc206 : 000000e7`beffd2d0 000000e7`beffd258 00000000`00000002 000001fc`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e7`beffd240 000000e7`beffd2d0 : 000000e7`beffd258 00000000`00000002 000001fc`00000000 00000000`00000000 : 0x00007ffd`848cc206
000000e7`beffd248 000000e7`beffd258 : 00000000`00000002 000001fc`00000000 00000000`00000000 00000000`00000000 : 0x000000e7`beffd2d0
000000e7`beffd250 00000000`00000002 : 000001fc`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000000e7`beffd258
000000e7`beffd258 000001fc`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00280026 : 0x2
000000e7`beffd260 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00280026 00000000`028a4170 : 0x000001fc`00000000
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_4b737080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b9ec745d-3096-bdec-8641-53387bcfa8dd}
Followup: MachineOwner
---------