Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.22350\102620-7750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`1d800000 PsLoadedModuleList = 0xfffff807`1e42a310
Debug session time: Mon Oct 26 21:03:00.410 2020 (UTC + 3:00)
System Uptime: 0 days 19:49:23.832
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`1dbf45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad07`687df840=00000000000000ef
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff9c0256f54080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4936
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8053
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff9c0256f54080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x39faa080 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {c6459651-82b2-4317-8b01-9e01130e27b0}
IMAGE_NAME: unknown
MODULE_NAME: unknown
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffad07`687df838 fffff807`1e106fe2 : 00000000`000000ef ffff9c02`56f54080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffad07`687df840 fffff807`1dfd7d83 : 00000000`00000000 fffff807`1da60ea5 00000000`00000002 fffff807`1da60dcf : nt!PspCatchCriticalBreak+0x10e
ffffad07`687df8e0 fffff807`1de4a9b0 : ffff9c02`00000000 00000000`00000000 ffff9c02`56f54080 ffff9c02`56f544b8 : nt!PspTerminateAllThreads+0x1ee377
ffffad07`687df950 fffff807`1de4a7ac : ffff9c02`56e16080 00000000`00000000 00007ffd`4a0afd08 00000000`00001764 : nt!PspTerminateProcess+0xe0
ffffad07`687df990 fffff807`1dc05fb5 : ffff9c02`56f54080 ffff9c02`39faa080 ffffad07`687dfa80 ffff9c02`00000000 : nt!NtTerminateProcess+0x9c
ffffad07`687dfa00 00007ffd`5856c314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000011`4d57f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`5856c314
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_39faa080_unknown!_IMAGE_unknown
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a8d9167c-8ee7-8e66-77dc-3f4e8cfbd536}
Followup: MachineOwner
---------
[*]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.19252\102620-10234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`41200000 PsLoadedModuleList = 0xfffff800`41e2a310
Debug session time: Mon Oct 26 01:13:07.129 2020 (UTC + 3:00)
System Uptime: 2 days 8:15:58.105
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
..........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`415f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa04`952a0620=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8004569965f, Address of the instruction which caused the bugcheck
Arg3: ffffaa04952a0f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5983
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14420
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8004569965f
BUGCHECK_P3: ffffaa04952a0f20
BUGCHECK_P4: 0
CONTEXT: ffffaa04952a0f20 -- (.cxr 0xffffaa04952a0f20)
rax=ffffaa04952a1920 rbx=0000000000000000 rcx=00000000000001f9
rdx=0000000000000008 rsi=0000000000000000 rdi=ffffab00d4fc6990
rip=fffff8004569965f rsp=ffffaa04952a1920 rbp=ffffaa04952a19e9
r8=ffffab00dcbf40b2 r9=0000000000000002 r10=00000000ffffffff
r11=000000000000005a r12=ffffce07be26cd80 r13=ffffce07c0df9570
r14=ffffab00d4fe2950 r15=ffffce07c0df94a0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
mountmgr!MountMgrQueryDosVolumePath+0x48f:
fffff800`4569965f 48d1e8 shr rax,1
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
STACK_TEXT:
ffffaa04`952a1920 fffff800`456990c3 : ffffce07`a17241f0 ffffce07`c0df94a0 00000000`00000000 ffffab00`d4fc6990 : mountmgr!MountMgrQueryDosVolumePath+0x48f
ffffaa04`952a1a50 fffff800`414cd805 : ffffaa04`952a1bf0 ffffab00`e536a0f0 ffffab00`dcbf4b50 ffffaa04`952a1b48 : mountmgr!MountMgrDeviceControl+0xb3
ffffaa04`952a1ab0 fffff800`418a99f2 : 00000000`00000010 ffffaa04`952a1bf0 ffffab00`e536a0f0 00000000`00000000 : nt!IofCallDriver+0x55
ffffaa04`952a1af0 fffff800`418a9217 : ce07c2d1`c310fffe 00000000`000000c0 ffffab00`e536a0f0 ffffab00`e536a0f0 : nt!IoVolumeDeviceToDosName+0x232
ffffaa04`952a1dc0 fffff800`418a912e : ffffce07`c44b3190 ffffce07`00000000 ffffaa04`952a1f01 ffffab00`e536a0f0 : nt!IopQueryNameInternal+0xa3
ffffaa04`952a1e70 fffff800`418aa608 : ffffce07`c44b3190 ffffaa04`952a2a80 00000000`000000d0 00000280`d6a61110 : nt!IoQueryFileDosDeviceName+0x5e
ffffaa04`952a1ec0 fffff800`41605fb5 : 00000000`00000001 00000000`00000002 00000000`00000000 00000280`d6d61c4c : nt!NtQueryInformationProcess+0x968
ffffaa04`952a2990 00007ffc`8950c0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f8`847ff1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`8950c0b4
SYMBOL_NAME: mountmgr!MountMgrQueryDosVolumePath+48f
MODULE_NAME: mountmgr
IMAGE_NAME: mountmgr.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr 0xffffaa04952a0f20 ; kb
BUCKET_ID_FUNC_OFFSET: 48f
FAILURE_BUCKET_ID: 0x3B_c0000005_mountmgr!MountMgrQueryDosVolumePath
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {80080096-09f3-1592-4db4-e3e98f2b9ae8}
Followup: MachineOwner
---------