MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffbb5332538
Arg3: 000000000000000d
Arg4: fffff900adf82a00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9103
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 7ffbb5332538
BUGCHECK_P3: d
BUGCHECK_P4: fffff900adf82a00
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffff900`adf82858 fffff807`09e18784 : 00000000`0000001a 00000000`00061941 00007ffb`b5332538 00000000`0000000d : nt!KeBugCheckEx
fffff900`adf82860 fffff807`09e0395e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x20c224
fffff900`adf82a00 00007ffb`f1952d8f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000dd`d47ff468 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f1952d8f
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80367c4ee9d, The address that the exception occurred at
Arg3: ffffca09779b6f28, Exception Record Address
Arg4: ffffca09779b6760, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 10312
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14170
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80367c4ee9d
BUGCHECK_P3: ffffca09779b6f28
BUGCHECK_P4: ffffca09779b6760
EXCEPTION_RECORD: ffffca09779b6f28 -- (.exr 0xffffca09779b6f28)
ExceptionAddress: fffff80367c4ee9d (nt!RtlRbRemoveNode+0x00000000000003cd)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000400000000010
Attempt to read from address 0000400000000010
CONTEXT: ffffca09779b6760 -- (.cxr 0xffffca09779b6760)
rax=ffffe90674dc1888 rbx=ffffa9065f000290 rcx=0000000000000000
rdx=ffffa90674dc1888 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80367c4ee9d rsp=ffffca09779b7168 rbp=ffffa906705a2888
r8=0000400000000000 r9=0000000000000000 r10=0000000000000001
r11=ffffa906705a2888 r12=ffffa90675854030 r13=ffffa90675854000
r14=0000000000000000 r15=ffffa90680c54890
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbRemoveNode+0x3cd:
fffff803`67c4ee9d 41f6401001 test byte ptr [r8+10h],1 ds:002b:00004000`00000010=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff803686fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8036860f330: Unable to get Flags value from nt!KdVersionBlock
fffff8036860f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000400000000010
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000400000000010
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffca09`779b7168 fffff803`67c4e963 : 00000000`00000024 ffffa906`7585a640 00000000`00000000 ffffa906`7585a880 : nt!RtlRbRemoveNode+0x3cd
ffffca09`779b7180 fffff803`67c4e2d8 : ffffa906`5f000280 ffffa906`75854000 ffffa906`5f000280 ffffca09`779b7288 : nt!RtlpHpVsChunkCoalesce+0x183
ffffca09`779b71e0 fffff803`67c4cc64 : 00000000`00000000 fffff803`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
ffffca09`779b7280 fffff803`683b1019 : 00000000`00000590 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffca09`779b7360 fffff803`6beeb8ab : ffffca09`779b7438 00000000`00000000 00000000`000016da ffffb904`e6f45180 : nt!ExFreePool+0x9
ffffca09`779b7390 fffff803`6bdf7812 : ffffca09`00000000 ffffa906`69feca00 ffffa906`00000186 fffff803`00000000 : Ntfs!NtfsDeleteFcb+0x47b
ffffca09`779b7410 fffff803`6beebc7a : ffffca09`779b77f0 ffffb904`e6f45180 ffffa906`68829010 ffffa906`68829468 : Ntfs!NtfsTeardownFromLcb+0x272
ffffca09`779b74b0 fffff803`6bdfbd40 : ffffca09`779b77f0 ffffca09`779b75b2 00000000`00000000 ffffa906`68829010 : Ntfs!NtfsTeardownStructures+0xea
ffffca09`779b7530 fffff803`6bf1b4d7 : ffffca09`779b7600 ffffa906`00000000 00000000`00000000 ffffa906`68829000 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffffca09`779b7570 fffff803`6bf17ff1 : ffffca09`779b77f0 ffffa906`68829170 ffffa906`68829010 ffffb904`e6f45180 : Ntfs!NtfsCommonClose+0x467
ffffca09`779b7650 fffff803`6bf379b8 : 41dfffff`ffc0001c fffff803`68724440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffca09`779b77b0 fffff803`67c25975 : ffffb904`f8cc8040 fffff803`6bf37930 ffffb904`e509bc40 ffffb904`00000000 : Ntfs!NtfsFspClose+0x88
ffffca09`779b7a70 fffff803`67d17e25 : ffffb904`f8cc8040 00000000`00000080 ffffb904`e50b5040 e331687e`586d61a3 : nt!ExpWorkerThread+0x105
ffffca09`779b7b10 fffff803`67dfcdd8 : ffffe700`67360180 ffffb904`f8cc8040 fffff803`67d17dd0 4010ca62`ad08243a : nt!PspSystemThreadStartup+0x55
ffffca09`779b7b60 00000000`00000000 : ffffca09`779b8000 ffffca09`779b1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.685
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xffffca09779b6760 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff8288f8ba8000, Pointer to the store context or data manager
Arg2: ffffef8d19c06650, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 8859
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13251
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 154
BUGCHECK_P1: ffff8288f8ba8000
BUGCHECK_P2: ffffef8d19c06650
BUGCHECK_P3: 1
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffffef8d19c075d8 -- (.exr 0xffffef8d19c075d8)
ExceptionAddress: fffff80755ef489c (nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+0x000000000000006c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000eb0
Attempt to read from address 0000000000000eb0
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000eb0
CONTEXT: ffffef8d19c06e10 -- (.cxr 0xffffef8d19c06e10)
rax=0000000000000a20 rbx=000000000000000c rcx=0000000000000000
rdx=00000000000001d6 rsi=0000000000000144 rdi=0000000000000018
rip=fffff80755ef489c rsp=ffffef8d19c07810 rbp=ffff8288f8ba80d0
r8=00000000000003f0 r9=000000000000000c r10=00000000000010eb
r11=0000000000000009 r12=000000000007e01b r13=0000000000000000
r14=000000000021d6d8 r15=000000000007e01b
iopl=0 nv up ei pl nz ac pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050212
nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+0x6c:
fffff807`55ef489c 480304d1 add rax,qword ptr [rcx+rdx*8] ds:002b:00000000`00000eb0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
READ_ADDRESS: fffff807568fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075680f330: Unable to get Flags value from nt!KdVersionBlock
fffff8075680f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000eb0
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffef8d`19c07810 fffff807`55ec67b1 : 00000000`00000002 00000000`00000211 ffff8288`f8ba80d0 00000000`0000020f : nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+0x6c
ffffef8d`19c07830 fffff807`55ec6697 : 00000000`00000000 00000000`0007e01b 00000000`00000001 00000000`0021d6d8 : nt!B_TREE<unsigned long,ST_STORE<SM_TRAITS>::_ST_HASH_ENTRY,4096,NP_CONTEXT,ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR>::BTreeNodeFindKey+0x51
ffffef8d`19c07870 fffff807`55ec47f4 : ffff8288`f8ba80e8 ffff8288`f8ba80d0 ffff8288`f8ba80d0 ffff8288`f8ba80a8 : nt!B_TREE<unsigned long,ST_STORE<SM_TRAITS>::_ST_HASH_ENTRY,4096,NP_CONTEXT,ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR>::BTreeSearchKey+0x6f
ffffef8d`19c078c0 fffff807`55ec5258 : 00000000`00000000 ffffef8d`19c07969 ffff8288`f8ba8050 ffff8288`0007e01b : nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0xc0
ffffef8d`19c07900 fffff807`55e3eda2 : 00000000`00000000 ffff8289`03213f90 00000000`00000000 fffff807`55e3ec93 : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x1fc
ffffef8d`19c079d0 fffff807`55e3e2ce : ffff8288`f8ba8000 ffffef8d`19c07a98 00000000`00000001 ffff8288`f8b9b0c0 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc2
ffffef8d`19c07a20 fffff807`55f22391 : 00000000`00000000 ffff8288`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12a
ffffef8d`19c07ae0 fffff807`55f17e25 : ffff8288`f8ba8000 fffff807`55f22380 ffffef8d`19b4f2a8 000fa4ef`b59bbfff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffef8d`19c07b10 fffff807`55ffcdd8 : fffff807`519f6180 ffff8288`f8b9b0c0 fffff807`55f17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffef8d`19c07b60 00000000`00000000 : ffffef8d`19c08000 ffffef8d`19c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+6c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xffffef8d19c06e10 ; kb
BUCKET_ID_FUNC_OFFSET: 6c
FAILURE_BUCKET_ID: 0x154_c0000005_nt!ST_STORE_SM_TRAITS_::ST_HASH_ENTRY_COMPARATOR::Compare
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {426d4c7c-c7dd-ba6b-033e-e49b31abf05a}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8031de4e4d0, The address that the exception occurred at
Arg3: ffffec051c70efa8, Exception Record Address
Arg4: ffffec051c70e7e0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 7249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16081
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8031de4e4d0
BUGCHECK_P3: ffffec051c70efa8
BUGCHECK_P4: ffffec051c70e7e0
EXCEPTION_RECORD: ffffec051c70efa8 -- (.exr 0xffffec051c70efa8)
ExceptionAddress: fffff8031de4e4d0 (nt!RtlpHpVsContextFree+0x0000000000000380)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00003ffffffffff8
Attempt to read from address 00003ffffffffff8
CONTEXT: ffffec051c70e7e0 -- (.cxr 0xffffec051c70e7e0)
rax=0000400000000000 rbx=ffff9c02aa349000 rcx=0000000000760000
rdx=0000400000000000 rsi=ffff9c02a2800280 rdi=3333333333333333
rip=fffff8031de4e4d0 rsp=ffffec051c70f1e0 rbp=ffffec051c70f250
r8=0000000000760000 r9=1f991d662d06f11d r10=0000000000000000
r11=ffff9c02a2800290 r12=0000000000000000 r13=ffff9c02b2617ff0
r14=ffff9c02aa34a880 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!RtlpHpVsContextFree+0x380:
fffff803`1de4e4d0 8b4af8 mov ecx,dword ptr [rdx-8] ds:002b:00003fff`fffffff8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8031e8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031e80f330: Unable to get Flags value from nt!KdVersionBlock
fffff8031e80f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00003ffffffffff8
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00003ffffffffff8
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffec05`1c70f1e0 fffff803`1de4cc64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x380
ffffec05`1c70f280 fffff803`1e5b1019 : 00000000`00000580 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffec05`1c70f360 fffff803`200eb8ab : ffffec05`1c70f438 00000000`00000000 00000000`000024f2 ffffb38d`61141180 : nt!ExFreePool+0x9
ffffec05`1c70f390 fffff803`1fff7812 : ffffec05`00000000 ffff9c02`c5764b00 ffff9c02`0000035c fffff803`00000000 : Ntfs!NtfsDeleteFcb+0x47b
ffffec05`1c70f410 fffff803`200ebc7a : ffffec05`1c70f7f0 ffffb38d`61141180 ffff9c02`c50555a0 ffff9c02`c50559f8 : Ntfs!NtfsTeardownFromLcb+0x272
ffffec05`1c70f4b0 fffff803`1fffbd40 : ffffec05`1c70f7f0 ffffec05`1c70f5b2 ffff9c02`c50559f8 ffff9c02`c50555a0 : Ntfs!NtfsTeardownStructures+0xea
ffffec05`1c70f530 fffff803`2011b4d7 : ffffec05`1c70f600 ffff9c02`00000000 00000000`00000000 ffff9c02`c5055500 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffffec05`1c70f570 fffff803`20117ff1 : ffffec05`1c70f7f0 ffff9c02`c5055700 ffff9c02`c50555a0 ffffb38d`61141180 : Ntfs!NtfsCommonClose+0x467
ffffec05`1c70f650 fffff803`201379b8 : 00000000`0000001c fffff803`1e924440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffec05`1c70f7b0 fffff803`1de25975 : ffffb38d`6538c040 fffff803`20137930 ffffb38d`5b2aa340 ffffb38d`00000000 : Ntfs!NtfsFspClose+0x88
ffffec05`1c70fa70 fffff803`1df17e25 : ffffb38d`6538c040 00000000`00000080 ffffb38d`5b2b7040 1d109c5b`1c6b9988 : nt!ExpWorkerThread+0x105
ffffec05`1c70fb10 fffff803`1dffcdd8 : ffff8880`d7bcc180 ffffb38d`6538c040 fffff803`1df17dd0 1cd44188`0f6f71d1 : nt!PspSystemThreadStartup+0x55
ffffec05`1c70fb60 00000000`00000000 : ffffec05`1c710000 ffffec05`1c709000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.685
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xffffec051c70e7e0 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffbd8701dd5240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
ETW minidump data unavailable
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6265
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10003
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffbd8701dd5240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x5472080 - <Unable to get error code text>
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffbb00`d31ef838 fffff805`575068e2 : 00000000`000000ef ffffbd87`01dd5240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffbb00`d31ef840 fffff805`57449b39 : 00000000`00000000 fffff805`56f5971d 00000000`144d2c01 00000000`c0000005 : nt!PspCatchCriticalBreak+0x10e
ffffbb00`d31ef8e0 fffff805`57309724 : ffffbd87`00000000 00000000`00000000 ffffbd87`01dd5240 ffffbd87`01dd5678 : nt!PspTerminateAllThreads+0x140b4d
ffffbb00`d31ef950 fffff805`57309a4c : ffffbd87`01dd5240 00000000`00000000 00000070`839ffafc 000001ea`10d70000 : nt!PspTerminateProcess+0xe0
ffffbb00`d31ef990 fffff805`570071b5 : ffffbd87`01dd5240 ffffbd87`05472080 ffffbb00`d31efa80 ffffbd87`01dd5240 : nt!NtTerminateProcess+0x9c
ffffbb00`d31efa00 00007ff8`dbf8c534 : 00007ff8`dc002a63 00007ff8`dc031354 00000070`839ffac0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000070`839fc728 00007ff8`dc002a63 : 00007ff8`dc031354 00000070`839ffac0 00000000`00000000 00007ff8`dbef0000 : 0x00007ff8`dbf8c534
00000070`839fc730 00007ff8`dc031354 : 00000070`839ffac0 00000000`00000000 00007ff8`dbef0000 00000000`00000004 : 0x00007ff8`dc002a63
00000070`839fc738 00000070`839ffac0 : 00000000`00000000 00007ff8`dbef0000 00000000`00000004 00007ff8`dbf9351d : 0x00007ff8`dc031354
00000070`839fc740 00000000`00000000 : 00007ff8`dbef0000 00000000`00000004 00007ff8`dbf9351d 00007ff8`dc031354 : 0x00000070`839ffac0
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_5472080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {310726af-2b2d-5531-1bf8-7b7a157bc102}
Followup: MachineOwner
---------