CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffab02de080080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
ETW minidump data unavailable
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 7
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffab02de080080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: ffffab02de080640 -- (.exr 0xffffab02de080640)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0xde0e3080 - <Unable to get error code text>
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
STACK_TEXT:
ffff8182`41b01c18 fffff805`19ec6c59 : 00000000`000000ef ffffab02`de080080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8182`41b01c20 fffff805`19dcc2e7 : ffffab02`de080080 fffff805`1971fa15 ffffab02`de080080 fffff805`1961e030 : nt!PspCatchCriticalBreak+0x115
ffff8182`41b01cc0 fffff805`19c73de4 : ffffab02`00000000 00000000`00000000 ffffab02`de080080 ffffab02`de080080 : nt!PspTerminateAllThreads+0x15685b
ffff8182`41b01d30 fffff805`19ccb4f9 : ffffffff`ffffffff ffff8182`41b01e60 ffffab02`de080080 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffff8182`41b01d70 fffff805`197cde95 : 00007ffc`0000040c ffffab02`de0e3080 ffffab02`de080080 ffff8182`41b01fb0 : nt!NtTerminateProcess+0xa9
ffff8182`41b01de0 fffff805`197c05c0 : fffff805`198224ca ffff8182`41b02958 ffff8182`41b02958 ffff8182`41b01fb0 : nt!KiSystemServiceCopyEnd+0x25
ffff8182`41b01f78 fffff805`198224ca : ffff8182`41b02958 ffff8182`41b02958 ffff8182`41b01fb0 00007ffc`4d4b0b96 : nt!KiServiceLinkage
ffff8182`41b01f80 fffff805`197ce59d : ffffab02`de080640 fffff805`196dcf15 00000000`00004000 ffff8182`41b02a00 : nt!KiDispatchException+0x169fda
ffff8182`41b02820 fffff805`197ca77f : 000000d9`487824b0 ffff8182`41b02a80 00000000`00000000 ffff8182`41b02a80 : nt!KiExceptionDispatch+0x11d
ffff8182`41b02a00 00007ffc`5285cd05 : 000000d9`48781a88 000000d9`48781b10 00007ffc`529b277c 00000000`00000000 : nt!KiPageFault+0x43f
000000d9`487814a0 000000d9`48781a88 : 000000d9`48781b10 00007ffc`529b277c 00000000`00000000 000000d9`48782130 : 0x00007ffc`5285cd05
000000d9`487814a8 000000d9`48781b10 : 00007ffc`529b277c 00000000`00000000 000000d9`48782130 000000d9`48781a70 : 0x000000d9`48781a88
000000d9`487814b0 00007ffc`529b277c : 00000000`00000000 000000d9`48782130 000000d9`48781a70 00007ffc`4d4b0b96 : 0x000000d9`48781b10
000000d9`487814b8 00000000`00000000 : 000000d9`48782130 000000d9`48781a70 00007ffc`4d4b0b96 00007ffc`5285e2e9 : 0x00007ffc`529b277c
SYMBOL_NAME: nt!PspCatchCriticalBreak+115
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 115
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_de0e3080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ad468040-430b-2394-033a-f2525de7725d}
Followup: MachineOwner
---------