Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Desktop\Minidump\121520-56687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`3e200000 PsLoadedModuleList = 0xfffff801`3ee2a2b0
Debug session time: Tue Dec 15 10:40:24.663 2020 (UTC + 3:00)
System Uptime: 4 days 15:04:31.218
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`3e5f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff970d`7b2a7840=00000000000000ef
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffa18e0e003080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7514
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 31813
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffa18e0e003080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: system32.exe
CRITICAL_PROCESS: system32.exe
ERROR_CODE: (NTSTATUS) 0x19121080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff970d`7b2a7838 fffff801`3eb068e2 : 00000000`000000ef ffffa18e`0e003080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff970d`7b2a7840 fffff801`3ea49b39 : 00000000`00000000 fffff801`3e55971d 00000000`00000002 fffff801`3e558d37 : nt!PspCatchCriticalBreak+0x10e
ffff970d`7b2a78e0 fffff801`3e909724 : ffffa18e`00000000 00000000`00000000 ffffa18e`0e003080 ffffa18e`0e0034b8 : nt!PspTerminateAllThreads+0x140b4d
ffff970d`7b2a7950 fffff801`3e909a4c : ffffa18e`0e003080 00000000`00000000 00000000`76f74d23 fffff801`3e8358fa : nt!PspTerminateProcess+0xe0
ffff970d`7b2a7990 fffff801`3e6071b5 : ffffa18e`0e003080 ffffa18e`19121080 ffff970d`7b2a7a80 ffffa18e`0e003080 : nt!NtTerminateProcess+0x9c
ffff970d`7b2a7a00 00000000`76ec1cfc : 00000000`76ec1cbb 00000000`76f45c69 00000000`00000023 00000000`00000282 : nt!KiSystemServiceCopyEnd+0x25
00000000`0385ecc8 00000000`76ec1cbb : 00000000`76f45c69 00000000`00000023 00000000`00000282 00000000`0761ef74 : 0x76ec1cfc
00000000`0385ecd0 00000000`76f45c69 : 00000000`00000023 00000000`00000282 00000000`0761ef74 00000000`0000002b : 0x76ec1cbb
00000000`0385ecd8 00000000`00000023 : 00000000`00000282 00000000`0761ef74 00000000`0000002b 00000000`0a353340 : 0x76f45c69
00000000`0385ece0 00000000`00000282 : 00000000`0761ef74 00000000`0000002b 00000000`0a353340 00000000`0000002c : 0x23
00000000`0385ece8 00000000`0761ef74 : 00000000`0000002b 00000000`0a353340 00000000`0000002c 00000000`00000000 : 0x282
00000000`0385ecf0 00000000`0000002b : 00000000`0a353340 00000000`0000002c 00000000`00000000 00000000`00000000 : 0x761ef74
00000000`0385ecf8 00000000`0a353340 : 00000000`0000002c 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
00000000`0385ed00 00000000`0000002c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000002c : 0xa353340
00000000`0385ed08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`0000002c 00000000`0761d7ec : 0x2c
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_19121080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {87b333d3-8bc1-5541-1da4-b4fd7fce4e42}
Followup: MachineOwner
---------