SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffd90ee19dab22, Address of the instruction which caused the bugcheck
Arg3: ffffd18d63e98920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 13
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffd90ee19dab22
BUGCHECK_P3: ffffd18d63e98920
BUGCHECK_P4: 0
CONTEXT: ffffd18d63e98920 -- (.cxr 0xffffd18d63e98920)
rax=ffffd95640a12168 rbx=00000000110a0c0f rcx=000000000000184d
rdx=ffffd95640a12168 rsi=ffffd95641a12168 rdi=0000000000000000
rip=ffffd90ee19dab22 rsp=ffffd18d63e99310 rbp=000000000000000a
r8=ffffd18d63e99288 r9=0000000000000000 r10=fffff80148312460
r11=ffffd18d63e992e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kbase!HmgShareLock+0x62:
ffffd90e`e19dab22 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffffd956`41a12176=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ts3client_win64.exe
STACK_TEXT:
ffffd18d`63e99310 ffffd90e`e16d9e8d : 00000000`110a0c0f ffffd18d`63e99618 ffffdd8f`5ecb2c60 ffffd18d`63e99418 : win32kbase!HmgShareLock+0x62
ffffd18d`63e99380 ffffd90e`e16be38f : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000228 : win32kfull!NtGdiGetRealizationInfo+0x48d
ffffd18d`63e995e0 ffffd90e`e16be26d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0x1ff
ffffd18d`63e99a00 fffff801`483d3c18 : ffffffff`a4010be9 ffffd90e`0000001d ffffdd8f`00000001 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0xdd
ffffd18d`63e99a90 00007ffe`7ae36564 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e7`d84f6818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7ae36564
SYMBOL_NAME: win32kbase!HmgShareLock+62
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .cxr 0xffffd18d63e98920 ; kb
BUCKET_ID_FUNC_OFFSET: 62
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80710455a1c, Address of the instruction which caused the bugcheck
Arg3: fffff10e236c2d40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80710455a1c
BUGCHECK_P3: fffff10e236c2d40
BUGCHECK_P4: 0
CONTEXT: fffff10e236c2d40 -- (.cxr 0xfffff10e236c2d40)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc00010bb9180
rdx=0000000000000000 rsi=0000000001000000 rdi=0000000001000000
rip=fffff80710455a1c rsp=fffff10e236c3730 rbp=ffffd48d7c09f7a0
r8=0000000001000000 r9=00000000ffffffff r10=7ffffffffffffffc
r11=fffff10e236c3710 r12=ffffd48d7c09f7d8 r13=0000000001000000
r14=ffffd48d7bb5d840 r15=ffffffffffffffff
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!MiFinishVadDeletion+0x16484c:
fffff807`10455a1c 488b1f mov rbx,qword ptr [rdi] ds:002b:00000000`01000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffff10e`236c3730 fffff807`102f1059 : ffffffff`00000000 00000000`00000001 ffffd48d`00000000 00000000`00000000 : nt!MiFinishVadDeletion+0x16484c
fffff10e`236c37e0 fffff807`1087979d : 00000000`00000000 ffffd48d`7ba5eb70 ffffd48d`7ba5eb70 00000000`00000000 : nt!MiDeleteVad+0x19a9
fffff10e`236c39a0 fffff807`10879593 : ffffd48d`7c09f7a0 00000000`00000000 000001bc`9cad0000 00000000`00000000 : nt!MiUnmapVad+0x49
fffff10e`236c39d0 fffff807`10879429 : ffffd48d`7bb5d340 000001bc`00000008 ffffd48d`712a64e0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
fffff10e`236c3ab0 fffff807`103d3c18 : ffffd48d`79793080 000001bc`9cad0000 00000000`0000fefb ffffd48d`7bb5d340 : nt!NtUnmapViewOfSectionEx+0x99
fffff10e`236c3b00 00007ffb`93fdf924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000079`2387d488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`93fdf924
SYMBOL_NAME: nt!MiFinishVadDeletion+16484c
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .cxr 0xfffff10e236c2d40 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16484c
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MiFinishVadDeletion
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2657f179-9eb8-9bfb-ae5c-b5b05e603b62}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff930d6f3dab22, Address of the instruction which caused the bugcheck
Arg3: fffff98b3381a920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 27
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff930d6f3dab22
BUGCHECK_P3: fffff98b3381a920
BUGCHECK_P4: 0
CONTEXT: fffff98b3381a920 -- (.cxr 0xfffff98b3381a920)
rax=ffff934a00a1b1b0 rbx=00000000220a1212 rcx=00000000000028c9
rdx=ffff934a00a1b1b0 rsi=ffff934a01a1b1b0 rdi=0000000000000000
rip=ffff930d6f3dab22 rsp=fffff98b3381b310 rbp=000000000000000a
r8=fffff98b3381b288 r9=0000000000000000 r10=fffff80029112460
r11=fffff98b3381b2e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kbase!HmgShareLock+0x62:
ffff930d`6f3dab22 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffff934a`01a1b1be=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ts3client_win64.exe
STACK_TEXT:
fffff98b`3381b310 ffff930d`6f0d9e8d : 00000000`220a1212 fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 : win32kbase!HmgShareLock+0x62
fffff98b`3381b380 00000000`220a1212 : fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 : win32kfull+0xd9e8d
fffff98b`3381b388 fffff98b`3381b618 : ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 : 0x220a1212
fffff98b`3381b390 ffffbd07`79aae680 : fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 00000000`00000000 : 0xfffff98b`3381b618
fffff98b`3381b398 fffff98b`3381b418 : fffff98b`00000000 fffff98b`3381b418 00000000`00000000 00000000`00000000 : 0xffffbd07`79aae680
fffff98b`3381b3a0 fffff98b`00000000 : fffff98b`3381b418 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff98b`3381b418
fffff98b`3381b3a8 fffff98b`3381b418 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff98b`00000000
fffff98b`3381b3b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : 0xfffff98b`3381b418
SYMBOL_NAME: win32kbase!HmgShareLock+62
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .cxr 0xfffff98b3381a920 ; kb
BUCKET_ID_FUNC_OFFSET: 62
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffac8aeabf3300, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffac8aeabf3300
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0xf05c4080 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {45119e30-277b-48e3-a025-83d2e8dc2ad8}
IMAGE_NAME: unknown
MODULE_NAME: unknown
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffffd86`04026938 fffff804`676cb8a9 : 00000000`000000ef ffffac8a`eabf3300 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd86`04026940 fffff804`675ecbdf : ffffac8a`eabf3300 fffff804`66e88065 ffffac8a`eabf3300 fffff804`66e880e0 : nt!PspCatchCriticalBreak+0x115
fffffd86`040269e0 fffff804`674700c0 : ffffac8a`00000000 00000000`00000000 ffffac8a`eabf3300 ffffac8a`eabf3300 : nt!PspTerminateAllThreads+0x17b193
fffffd86`04026a50 fffff804`6746fce9 : ffffffff`ffffffff fffffd86`04026b80 ffffac8a`eabf3300 fffff804`67479401 : nt!PspTerminateProcess+0xe0
fffffd86`04026a90 fffff804`66fd3c18 : ffffac8a`000003ec ffffac8a`f05c4080 ffffac8a`eabf3300 00000090`c17ff8cc : nt!NtTerminateProcess+0xa9
fffffd86`04026b00 00007ffd`78d3c5f4 : 00007ffd`78dafc1f 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 : nt!KiSystemServiceCopyEnd+0x28
00000090`c17fda28 00007ffd`78dafc1f : 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 00000000`00002e00 : 0x00007ffd`78d3c5f4
00000090`c17fda30 00007ffd`78ddf980 : 00000090`c17ff890 00000000`00002970 00000000`00002e00 00000000`00000004 : 0x00007ffd`78dafc1f
00000090`c17fda38 00000090`c17ff890 : 00000000`00002970 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d : 0x00007ffd`78ddf980
00000090`c17fda40 00000000`00002970 : 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 : 0x00000090`c17ff890
00000090`c17fda48 00000000`00002e00 : 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 : 0x2970
00000090`c17fda50 00000000`00000004 : 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 : 0x2e00
00000090`c17fda58 00007ffd`78d43c9d : 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 00000000`00f800f6 : 0x4
00000090`c17fda60 00007ffd`78ddf980 : 00000000`00000008 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 : 0x00007ffd`78d43c9d
00000090`c17fda68 00000000`00000008 : 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 00000000`010000fe : 0x00007ffd`78ddf980
00000090`c17fda70 00000000`00000ea0 : 00000000`00f800f6 000001fc`7c720790 00000000`010000fe 00000000`00034142 : 0x8
00000090`c17fda78 00000000`00f800f6 : 000001fc`7c720790 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 : 0xea0
00000090`c17fda80 000001fc`7c720790 : 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 00000000`00000000 : 0xf800f6
00000090`c17fda88 00000000`010000fe : 00000000`00034142 00007ffd`78d2c656 00000000`00000000 00000000`00000000 : 0x000001fc`7c720790
00000090`c17fda90 00000000`00034142 : 00007ffd`78d2c656 00000000`00000000 00000000`00000000 00000000`00000000 : 0x10000fe
00000090`c17fda98 00007ffd`78d2c656 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x34142
00000090`c17fdaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000548c8 : 0x00007ffd`78d2c656
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_f05c4080_unknown!_IMAGE_unknown
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {35ebf339-bc0d-079a-7e9c-e93c394acd32}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffc08f65de3340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 12
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffc08f65de3340
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x65f95080 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {4ebc216d-9ff9-425c-8715-b9c0839cbe1c}
IMAGE_NAME: RPCRT4.dll
MODULE_NAME: RPCRT4
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff8400`41364938 fffff806`154cb8a9 : 00000000`000000ef ffffc08f`65de3340 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8400`41364940 fffff806`153ecbdf : ffffc08f`65de3340 fffff806`14c88065 ffffc08f`65de3340 fffff806`14c880e0 : nt!PspCatchCriticalBreak+0x115
ffff8400`413649e0 fffff806`152700c0 : ffffc08f`00000000 00000000`00000000 ffffc08f`65de3340 ffffc08f`65de3340 : nt!PspTerminateAllThreads+0x17b193
ffff8400`41364a50 fffff806`1526fce9 : ffffffff`ffffffff ffff8400`41364b80 ffffc08f`65de3340 fffff806`15279401 : nt!PspTerminateProcess+0xe0
ffff8400`41364a90 fffff806`14dd3c18 : ffffc08f`000003dc ffffc08f`65f95080 ffffc08f`65de3340 0000007b`4287fb9c : nt!NtTerminateProcess+0xa9
ffff8400`41364b00 00007ffe`98dbc5f4 : 00007ffe`98e2fc1f 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 : nt!KiSystemServiceCopyEnd+0x28
0000007b`4287dc68 00007ffe`98e2fc1f : 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 : 0x00007ffe`98dbc5f4
0000007b`4287dc70 00007ffe`98e5f980 : 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 : 0x00007ffe`98e2fc1f
0000007b`4287dc78 0000007b`4287fb60 : 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d : 0x00007ffe`98e5f980
0000007b`4287dc80 0000007b`4287dce8 : 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 : 0x0000007b`4287fb60
0000007b`4287dc88 00007ffe`96277751 : 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 : 0x0000007b`4287dce8
0000007b`4287dc90 00000000`00000004 : 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 00000000`00000000 : 0x00007ffe`96277751
0000007b`4287dc98 00007ffe`98dc3c9d : 00007ffe`98e5f980 00000000`00000008 00000000`00000000 00000000`00000000 : 0x4
0000007b`4287dca0 00007ffe`98e5f980 : 00000000`00000008 00000000`00000000 00000000`00000000 00000002`01500128 : 0x00007ffe`98dc3c9d
0000007b`4287dca8 00000000`00000008 : 00000000`00000000 00000000`00000000 00000002`01500128 00000000`0000024c : 0x00007ffe`98e5f980
0000007b`4287dcb0 00000000`00000000 : 00000000`00000000 00000002`01500128 00000000`0000024c 00000000`00034142 : 0x8
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_65f95080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9b07d51-52b3-8e99-79df-e09c154c955b}
Followup: MachineOwner
---------