CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffde8a76e70240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8222
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffde8a76e70240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x78b93040 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffd70a`981ee938 fffff800`557177f2 : 00000000`000000ef ffffde8a`76e70240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffd70a`981ee940 fffff800`5560b673 : 00000000`00000000 fffff800`55073ed1 00000000`00000002 fffff800`5507426b : nt!PspCatchCriticalBreak+0x10e
ffffd70a`981ee9e0 fffff800`5544faa0 : ffffde8a`00000000 00000000`00000000 ffffde8a`76e70240 ffffde8a`76e70678 : nt!PspTerminateAllThreads+0x1bb7c3
ffffd70a`981eea50 fffff800`5544f89c : ffffde8a`76e70240 00000000`00000000 000000ff`737ff8bc fffff800`553eab9a : nt!PspTerminateProcess+0xe0
ffffd70a`981eea90 fffff800`551ef878 : ffffde8a`76e70240 ffffde8a`78b93040 ffffd70a`981eeb80 ffffde8a`76e70240 : nt!NtTerminateProcess+0x9c
ffffd70a`981eeb00 00007ffd`70fec344 : 00007ffd`710624f3 00007ffd`71091014 000000ff`737ff880 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ff`737fe2e8 00007ffd`710624f3 : 00007ffd`71091014 000000ff`737ff880 00000000`00000000 00007ffd`70f50000 : 0x00007ffd`70fec344
000000ff`737fe2f0 00007ffd`71091014 : 000000ff`737ff880 00000000`00000000 00007ffd`70f50000 00000000`00000004 : 0x00007ffd`710624f3
000000ff`737fe2f8 000000ff`737ff880 : 00000000`00000000 00007ffd`70f50000 00000000`00000004 00007ffd`70ff335d : 0x00007ffd`71091014
000000ff`737fe300 00000000`00000000 : 00007ffd`70f50000 00000000`00000004 00007ffd`70ff335d 00007ffd`71091014 : 0x000000ff`737ff880
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.450
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_78b93040_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {aa99ec4e-8466-33fb-562a-0960823c6a0b}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff948c26663cb0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80467c8d7c6, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6905
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 67494
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff948c26663cb0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80467c8d7c6
BUGCHECK_P4: 0
READ_ADDRESS: fffff80457cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80457c0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff80457c0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff948c26663cb0
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: ffffa506e7b0e8b0 -- (.trap 0xffffa506e7b0e8b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff948c265e3f40 rbx=0000000000000000 rcx=ffffa506e7b0eac0
rdx=ffffd98da09df000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80467c8d7c6 rsp=ffffa506e7b0ea40 rbp=ffffa506e7b0eb40
r8=0000000000000080 r9=ffffa506e7b0ea78 r10=ffff948c265e3f40
r11=0000000000001001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nvlddmkm+0xabd7c6:
fffff804`67c8d7c6 0f1187e0010800 movups xmmword ptr [rdi+801E0h],xmm0 ds:00000000`000801e0=????????????????????????????????
Resetting default scope
STACK_TEXT:
ffffa506`e7b0e608 fffff804`57436099 : 00000000`00000050 ffff948c`26663cb0 00000000`00000002 ffffa506`e7b0e8b0 : nt!KeBugCheckEx
ffffa506`e7b0e610 fffff804`57212d00 : ffffd98d`9dac5e60 00000000`00000002 ffffa506`e7b0e930 00000000`00000000 : nt!MiSystemFault+0x1ae399
ffffa506`e7b0e710 fffff804`573ec01e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`6799f04f : nt!MmAccessFault+0x400
ffffa506`e7b0e8b0 fffff804`67c8d7c6 : 00000000`00000000 ffff948c`1b200290 ffffd98d`a0a23010 00000000`00000500 : nt!KiPageFault+0x35e
ffffa506`e7b0ea40 00000000`00000000 : ffff948c`1b200290 ffffd98d`a0a23010 00000000`00000500 00000000`00000000 : nvlddmkm+0xabd7c6
SYMBOL_NAME: nvlddmkm+abd7c6
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: abd7c6
FAILURE_BUCKET_ID: AV_INVALID_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {df018c6e-47ce-6234-d97b-e5d8699ade66}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8d3ffdd21eb0
Arg3: 0000000800000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 37419
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff8d3ffdd21eb0
BUGCHECK_P3: 800000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchApp.exe
STACK_TEXT:
ffffd101`2c413108 fffff807`35d2abba : 00000000`0000001a 00000000`00041792 ffff8d3f`fdd21eb0 00000008`00000000 : nt!KeBugCheckEx
ffffd101`2c413110 fffff807`35cedc06 : 00000000`00000000 00000000`00000000 00000000`00000145 ffff8d3f`fdd21eb0 : nt!MiDeleteVa+0x153a
ffffd101`2c413210 fffff807`35cedd1b : ffff8d46`00000000 ffffc00c`451c2700 ffffd101`00000000 ffffd101`2c413680 : nt!MiWalkPageTablesRecursively+0x776
ffffd101`2c4132b0 fffff807`35cedd1b : ffff8d46`a34fff70 ffffc00c`451c2700 ffffd101`00000001 ffffd101`2c413690 : nt!MiWalkPageTablesRecursively+0x88b
ffffd101`2c413350 fffff807`35cedd1b : ffff8d46`a34ff000 ffffc00c`451c2700 ffffd101`00000002 ffffd101`2c4136a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffd101`2c4133f0 fffff807`35cdcbfb : 00000000`00000000 ffffc00c`451c2700 00000000`00000003 ffffd101`2c4136b0 : nt!MiWalkPageTablesRecursively+0x88b
ffffd101`2c413490 fffff807`35d29451 : ffffd101`2c413630 ffffc00c`00000000 ffff8d3f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffd101`2c413590 fffff807`35d01670 : 00000000`00000001 ffffd101`00000000 ffffc00c`451c2550 ffffc00c`451a1080 : nt!MiDeletePagablePteRange+0x4f1
ffffd101`2c4138a0 fffff807`360999e9 : ffffc00c`528be5a0 00000000`00000000 ffffc00c`00000000 ffffc00c`00000000 : nt!MiDeleteVad+0x360
ffffd101`2c4139b0 fffff807`3609938c : ffffc00c`528be5a0 ffffc00c`3eeac010 ffffc00c`451a1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffd101`2c4139e0 fffff807`360e4dd3 : ffffc00c`459c7da0 ffffc00c`459c7da0 ffffc00c`528be5a0 ffffc00c`451c2080 : nt!MiCleanVad+0x30
ffffd101`2c413a10 fffff807`36081f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc00c`451c2080 : nt!MmCleanProcessAddressSpace+0x137
ffffd101`2c413a90 fffff807`3609ea8a : ffffc00c`451c2080 ffffe584`ddfe8060 ffffd101`2c413cd0 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffd101`2c413b10 fffff807`35ff4558 : 00000000`00000001 fffff807`00000001 ffffd101`2c413be0 00000038`3f352000 : nt!PspExitThread+0x5f6
ffffd101`2c413c10 fffff807`35ce6ca7 : ffffd101`2c413d00 ffffd101`2c413e40 ffff6f9a`0185179c ffffd101`2c413c70 : nt!KiSchedulerApcTerminate+0x38
ffffd101`2c413c50 fffff807`35df8440 : 00000000`00000000 ffffd101`2c413d00 00000000`0c25bcb0 00007ffb`00000000 : nt!KiDeliverApc+0x487
ffffd101`2c413d00 fffff807`35e0595f : ffffc00c`451a1080 00000000`00000000 00000000`00000000 ffffc00c`00000000 : nt!KiInitiateUserApc+0x70
ffffd101`2c413e40 00007ffb`b7a0fbd0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`41d0fa00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b7a0fbd0
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffa00002e83a8
Arg3: 0000000200000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3062
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15609
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffffa00002e83a8
BUGCHECK_P3: 200000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVDi
STACK_TEXT:
ffffdf82`f6b5d0c8 fffff801`2b32abba : 00000000`0000001a 00000000`00041792 fffffa00`002e83a8 00000002`00000000 : nt!KeBugCheckEx
ffffdf82`f6b5d0d0 fffff801`2b2edc06 : 00000000`00000000 00000000`00000000 00000000`000000f6 fffffa00`002e83a8 : nt!MiDeleteVa+0x153a
ffffdf82`f6b5d1d0 fffff801`2b2edd1b : fffffa7d`00000000 ffffaa88`93ed8740 ffffdf82`00000000 ffffdf82`f6b5d640 : nt!MiWalkPageTablesRecursively+0x776
ffffdf82`f6b5d270 fffff801`2b2edd1b : fffffa7d`3e800008 ffffaa88`93ed8740 ffffdf82`00000001 ffffdf82`f6b5d650 : nt!MiWalkPageTablesRecursively+0x88b
ffffdf82`f6b5d310 fffff801`2b2edd1b : fffffa7d`3e800000 ffffaa88`93ed8740 ffffdf82`00000002 ffffdf82`f6b5d660 : nt!MiWalkPageTablesRecursively+0x88b
ffffdf82`f6b5d3b0 fffff801`2b2dcbfb : ffff6786`41f9890b ffffaa88`93ed8740 ffffdf82`00000003 ffffdf82`f6b5d670 : nt!MiWalkPageTablesRecursively+0x88b
ffffdf82`f6b5d450 fffff801`2b329451 : ffffdf82`f6b5d5f0 ffffaa88`00000000 fffffa7d`00000002 ffffffff`00000000 : nt!MiWalkPageTables+0x36b
ffffdf82`f6b5d550 fffff801`2b301670 : 00000000`00000001 ffffdf82`00000000 ffffaa88`93ed8590 ffffaa88`929e1080 : nt!MiDeletePagablePteRange+0x4f1
ffffdf82`f6b5d860 fffff801`2b6999e9 : ffffaa88`931880b0 00000000`00000000 00000000`00000000 ffffaa88`00000000 : nt!MiDeleteVad+0x360
ffffdf82`f6b5d970 fffff801`2b6997c2 : ffffaa88`98e03020 00000000`5cf60000 ffffaa88`93ed80c0 00000000`00000000 : nt!MiUnmapVad+0x49
ffffdf82`f6b5d9a0 fffff801`2b699639 : ffffaa88`929e1080 fffff801`2b4058b8 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffdf82`f6b5da80 fffff801`2b69928c : ffffaa88`929e1080 000002ad`43f74ff0 00000000`00000001 ffffaa88`93ed80c0 : nt!NtUnmapViewOfSectionEx+0x99
ffffdf82`f6b5dad0 fffff801`2b4058b8 : 00000000`00000000 ffffdf82`f6b5db80 000002ad`43f74ff0 ffffaa88`00000000 : nt!NtUnmapViewOfSection+0xc
ffffdf82`f6b5db00 00007ffa`2b8ec304 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f4`15aff688 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`2b8ec304
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffcc802073c888, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff930c2118da20, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25250
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: be
BUGCHECK_P1: ffffcc802073c888
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffff930c2118da20
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffff930c2118da20 -- (.trap 0xffff930c2118da20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000100000 rbx=0000000000000000 rcx=0000000000300000
rdx=3fffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037f952aa7 rsp=ffff930c2118dbb0 rbp=ffff930c2118dc99
r8=ffffda8245c8a580 r9=fffff80380050b80 r10=fffff28000000000
r11=ffff930c2118de40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiBuildForkPte+0x5db:
fffff803`7f952aa7 f0490fba6d183f lock bts qword ptr [r13+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope
STACK_TEXT:
ffff930c`2118d828 fffff803`7f82f11a : 00000000`000000be ffffcc80`2073c888 8a000000`00200121 ffff930c`2118da20 : nt!KeBugCheckEx
ffff930c`2118d830 fffff803`7f6eec6f : 8a000000`00200121 00000000`00000003 ffff930c`2118daa0 00000000`00000000 : nt!MiRaisedIrqlFault+0x1e28fe
ffff930c`2118d880 fffff803`7f80205e : 00000000`00000003 ffff930c`2118dbc0 00000000`00000000 ffff930c`2118da58 : nt!MmAccessFault+0x4ef
ffff930c`2118da20 fffff803`7f952aa7 : 8100000a`d142d867 ffff930c`00000000 00000000`00000000 ffffcc80`0600c820 : nt!KiPageFault+0x35e
ffff930c`2118dbb0 fffff803`7f9539b7 : ffffda82`408f5080 ffffda82`461c5300 fffff280`b15df830 ffffcc80`0c07d670 : nt!MiBuildForkPte+0x5db
ffff930c`2118dce0 fffff803`7fcd6191 : ffffda82`408f5080 ffff930c`2118dfe9 ffffda82`461c5300 ffffda82`461c5300 : nt!MiCloneVads+0x4ab
ffff930c`2118df70 fffff803`7fc3d21d : 00000000`00000000 ffff930c`00000000 00000000`00000000 00000000`00000000 : nt!MiCloneProcessAddressSpace+0x261
ffff930c`2118e050 fffff803`7fbe2c09 : 00000000`00002ab1 ffff930c`2118eb80 00000000`00000000 00000000`00000000 : nt!MmInitializeProcessAddressSpace+0x15021d
ffff930c`2118e240 fffff803`7fbb0232 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x1f23dd
ffff930c`2118e760 fffff803`7fd02cd5 : ffff6971`22f0ba2a ffff6971`22f0bb8a 00000000`00000000 00000000`00000000 : nt!PspCreateProcess+0x242
ffff930c`2118ea30 fffff803`7f8058b8 : 00000000`00000000 00000000`00000000 00000000`77566d4d ffff930c`2118eae8 : nt!NtCreateProcessEx+0x85
ffff930c`2118ea90 00007ffb`1ce2c764 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000015`ed75f428 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1ce2c764
SYMBOL_NAME: nt!MiRaisedIrqlFault+1e28fe
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1e28fe
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------