ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff3799ffdd1d8, Virtual address for the attempted write.
Arg2: 1a000003bf927025, PTE contents.
Arg3: fffff387f58de580, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 9
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: be
BUGCHECK_P1: fffff3799ffdd1d8
BUGCHECK_P2: 1a000003bf927025
BUGCHECK_P3: fffff387f58de580
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: fffff387f58deab0 -- (.trap 0xfffff387f58deab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007ff7477bff00 rbx=0000000000000000 rcx=0000000000005a4d
rdx=00007ff7477c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806344c27cd rsp=fffff387f58dec48 rbp=fffff387f58df360
r8=0000000000000000 r9=fffff387f58dec88 r10=0000000000000000
r11=fffff387f58deb70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlImageNtHeaderEx+0x2d:
fffff806`344c27cd 66390a cmp word ptr [rdx],cx ds:00007ff7`477c0000=????
Resetting default scope
STACK_TEXT:
fffff387`f58de398 fffff806`3464f0d5 : 00000000`000000be fffff379`9ffdd1d8 1a000003`bf927025 fffff387`f58de580 : nt!KeBugCheckEx
fffff387`f58de3a0 fffff806`3447302a : 1a000003`bf927025 00000000`00000003 fffff387`f58de4e0 00000000`00000000 : nt!MiRaisedIrqlFault+0x12eb35
fffff387`f58de3e0 fffff806`345cf520 : 00000000`00000001 fffff379`bccffee8 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffff387`f58de580 fffff806`344c10de : ffff9900`0b3eb750 fffff379`802d1d40 00100000`00000000 ffffb80b`29dcd5c0 : nt!KiPageFault+0x360
fffff387`f58de710 fffff806`344739bc : fffff37f`ffffffff fffff300`00000000 fffff300`00000000 fffff379`9ffdd1d8 : nt!MiInPagePageTable+0x1ee
fffff387`f58de860 fffff806`34472cee : 00000000`00000000 00000000`00000000 00000000`00000001 ffffb80b`29dcdde8 : nt!MiUserFault+0x7dc
fffff387`f58de910 fffff806`345cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`349ff348 : nt!MmAccessFault+0x14e
fffff387`f58deab0 fffff806`344c27cd : fffff806`344c258e ffffb80b`00000000 00000000`00001000 fffff387`f58dedc0 : nt!KiPageFault+0x360
fffff387`f58dec48 fffff806`344c258e : ffffb80b`00000000 00000000`00001000 fffff387`f58dedc0 ffffb80b`00000000 : nt!RtlImageNtHeaderEx+0x2d
fffff387`f58dec50 fffff806`34a10da1 : 00007ff7`477c0000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!RtlImageNtHeader+0x1e
fffff387`f58dec80 fffff806`34a356de : 00000000`000022aa fffff387`f58df360 00000000`000022a0 00000000`00000000 : nt!MmCreatePeb+0x325
fffff387`f58dee50 fffff806`34a2f937 : 00000000`2f0e6000 fffff387`f58df360 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x10b6
fffff387`f58df2e0 fffff806`345d2d18 : 00000000`00000002 00000000`00000d4c 00000000`00000000 00000000`00000001 : nt!NtCreateUserProcess+0x6f7
fffff387`f58dfa90 00007ff9`4cd5d934 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d3`2cdfd6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4cd5d934
SYMBOL_NAME: nt!MiRaisedIrqlFault+12eb35
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 12eb35
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffc000b494560
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 6
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: fffffc000b494560
BUGCHECK_P3: 0
BUGCHECK_P4: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
STACK_TEXT:
fffff080`77defe88 fffff802`4fe25424 : 00000000`0000001a 00000000`00041790 fffffc00`0b494560 00000000`00000000 : nt!KeBugCheckEx
fffff080`77defe90 fffff802`4fcac9e7 : 00000000`00000000 ffffed9a`205ba3c0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c44
fffff080`77deffa0 fffff802`4fcacea1 : fffff080`77df03f0 ffffedf6`cd102dd0 00000000`00000000 0a000003`c3172867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff080`77df0060 fffff802`4fcacea1 : fffff080`77df03f0 ffffedf6`fb668810 00000000`00000000 0a000003`c3171867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff080`77df0120 fffff802`4fcacea1 : fffff080`77df03f0 ffffedf6`fb7db340 ffffedf6`00000000 0a000003`c3170867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff080`77df01e0 fffff802`4fcac62c : fffff080`77df03f0 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x6a1
fffff080`77df02a0 fffff802`4fcaaa98 : fffff080`77df03f0 fffffc00`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff080`77df03a0 fffff802`4fcb8bf0 : ffffffff`ffffffff ffff800f`f9ace3f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff080`77df0740 fffff802`4fc591da : 00000003`440b747f ffff800f`fa689080 00000000`00000000 fffff802`4fcb3bca : nt!MiDeleteVad+0x860
fffff080`77df0900 fffff802`5025b820 : 00000000`00000000 00000000`00000000 fffff080`77df0a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff080`77df0960 fffff802`5025b45b : 00000000`00000000 0000003a`c80fc888 0000014d`00001000 00007ff8`00000004 : nt!MmFreeVirtualMemory+0x390
fffff080`77df0aa0 fffff802`4fdd2d18 : ffff800f`fa689080 0000003a`c80fcc00 00007ecf`61fc0000 ffff800f`f9dc3ee0 : nt!NtFreeVirtualMemory+0x8b
fffff080`77df0b00 00007ff8`6631c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003a`c80fc808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6631c484
SYMBOL_NAME: nt!MiDeleteVa+176c44
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 176c44
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVa
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9b5ebc95-f4cf-8c11-5593-7f5337165669}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80159639c37, Address of the instruction which caused the bugcheck
Arg3: ffffc00c4ceffc60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 14
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80159639c37
BUGCHECK_P3: ffffc00c4ceffc60
BUGCHECK_P4: 0
CONTEXT: ffffc00c4ceffc60 -- (.cxr 0xffffc00c4ceffc60)
rax=0000000000000000 rbx=ffff978d050ae158 rcx=ffff978d050ae0c0
rdx=ffbfd3084f052a20 rsi=ffbfd3084f052a20 rdi=ffff978d050ae440
rip=fffff80159639c37 rsp=ffffc00c4cf00650 rbp=0000000000450004
r8=ffffc00c4cf00698 r9=0000000000000000 r10=0000fffff8015956
r11=ffff978d050ae0c0 r12=0000000000000000 r13=00000000000001c0
r14=0000000000450014 r15=ffffc00c4cf00870
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ExAcquirePushLockExclusiveEx+0x107:
fffff801`59639c37 f0480fba2e00 lock bts qword ptr [rsi],0 ds:002b:ffbfd308`4f052a20=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: lsass.exe
STACK_TEXT:
ffffc00c`4cf00650 fffff801`59c09e3c : ffbfd308`4f052a30 00000000`00000000 00000000`00000001 00000000`00000fc0 : nt!ExAcquirePushLockExclusiveEx+0x107
ffffc00c`4cf00690 fffff801`59c0767a : 00000000`ffffffff ffff978d`050ae001 00000000`00000000 00000000`00450014 : nt!AlpcpLockForCachedReferenceBlob+0x14
ffffc00c`4cf006d0 fffff801`59bd2e76 : 00000000`00002002 00000000`00450004 00000000`00000fc0 000001aa`17d77210 : nt!AlpcpReleaseViewAttribute+0x12
ffffc00c`4cf00700 fffff801`5964002e : 00000000`00000000 000001aa`17d77210 00000000`00000000 00000000`000f0001 : nt!AlpcpSendMessage+0x8e6
ffffc00c`4cf00830 fffff801`5963ec9d : ffff978d`056f1d90 ffffc00c`4cf00b80 ffff978d`050ae0c0 0000004c`6fbff578 : nt!ExpWorkerFactoryStartDeferredWork+0x11e
ffffc00c`4cf008f0 fffff801`597d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x22d
ffffc00c`4cf00a90 00007ff8`05cbfa54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004c`6fbff658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`05cbfa54
SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+107
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .cxr 0xffffc00c4ceffc60 ; kb
BUCKET_ID_FUNC_OFFSET: 107
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4fe31d77-fb81-4dc1-5992-c924ac6e709a}
Followup: MachineOwner
---------
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000009b5c, Incorrect checksum
Arg4: 0000000000002e32, Previous disk read's checksum
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a0
BUGCHECK_P1: 10e
BUGCHECK_P2: a
BUGCHECK_P3: 9b5c
BUGCHECK_P4: 2e32
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffe28b`c3b64648 fffff803`2e5a6fa6 : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00009b5c : nt!KeBugCheckEx
ffffe28b`c3b64650 fffff803`2e5af194 : 00000000`00000001 ffffd08a`f7f52230 00000000`43f5e000 ffffd08b`1368b000 : nt!PopHiberChecksumHiberFileData+0xaa26
ffffe28b`c3b646b0 fffff803`2e5a64a1 : 00000001`85bfc000 ffff800c`3a521f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x78
ffffe28b`c3b64720 fffff803`2e59af9e : 00004054`20a8ab9b ffff800c`3a521f38 00000000`00000000 fffff803`2eab7848 : nt!PopRestoreHiberContext+0xb161
ffffe28b`c3b647b0 fffff803`2e59acea : fffff803`2e469f90 ffffe28b`c3b64930 fffff803`2e469f90 ffffd08a`f7f52230 : nt!PopHandleNextState+0x20e
ffffe28b`c3b64800 fffff803`2e59aa5f : 00000000`00000100 00000000`00989680 ffffd08a`f7f52230 ffffd08a`f7f52230 : nt!PopIssueNextState+0x1a
ffffe28b`c3b64830 fffff803`2e59b2ec : 00000000`0000000c ffffca80`000077c0 00000000`00000000 fffff803`2e093474 : nt!PopInvokeSystemStateHandler+0x35b
ffffe28b`c3b64a30 fffff803`2e59f6aa : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffffe28b`c3b64af0 fffff803`2e59f3e5 : 00000000`00000000 00000000`00000000 0000002e`00000001 ffffd08a`00000001 : nt!MmDuplicateMemory+0x26e
ffffe28b`c3b64b80 fffff803`2e12a7a5 : ffffd08b`06e55000 ffffd08b`06e55040 fffff803`2e59f2c0 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffffe28b`c3b64c10 fffff803`2e1c8b2a : ffffaf81`dbd40180 ffffd08b`06e55040 fffff803`2e12a750 00000000`0000029e : nt!PspSystemThreadStartup+0x55
ffffe28b`c3b64c60 00000000`00000000 : ffffe28b`c3b65000 ffffe28b`c3b5f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+aa26
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: aa26
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff92000b493630
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffff92000b493630
BUGCHECK_P3: 0
BUGCHECK_P4: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ForzaHorizon4.exe
STACK_TEXT:
fffff48d`1446ee88 fffff807`41a25424 : 00000000`0000001a 00000000`00041790 ffff9200`0b493630 00000000`00000000 : nt!KeBugCheckEx
fffff48d`1446ee90 fffff807`418ac9e7 : 00000000`00000000 ffffaa80`ac794d28 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c44
fffff48d`1446efa0 fffff807`418acea1 : fffff48d`1446f3f0 ffffaad5`40563ca0 00000000`00000000 0a000003`c3121867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff48d`1446f060 fffff807`418acea1 : fffff48d`1446f3f0 ffffaad5`6aa02b18 00000000`00000000 0a000002`32f3c867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff48d`1446f120 fffff807`418acea1 : fffff48d`1446f3f0 ffffaad5`6ab55010 ffffaad5`00000000 0a000002`f35a4867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff48d`1446f1e0 fffff807`418ac62c : fffff48d`1446f3f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff48d`1446f2a0 fffff807`418aaa98 : fffff48d`1446f3f0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff48d`1446f3a0 fffff807`418b8bf0 : ffffffff`ffffffff ffff8002`e62583f8 00000158`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff48d`1446f740 fffff807`418591da : 00000000`158f89a7 ffff8002`eacb8080 00000000`00000000 fffff807`418b3bca : nt!MiDeleteVad+0x860
fffff48d`1446f900 fffff807`41e5b820 : 00000000`00000000 00000000`00000000 fffff48d`1446fa60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff48d`1446f960 fffff807`41e5b45b : ffff8002`ea382080 ffff9a81`0d4a3180 00000158`6601b300 ffffffff`ffffeb00 : nt!MmFreeVirtualMemory+0x390
fffff48d`1446faa0 fffff807`419d2d18 : ffff8002`eacb8080 ffff8002`ea382080 00000000`00000000 00000000`00000020 : nt!NtFreeVirtualMemory+0x8b
fffff48d`1446fb00 00007ffe`5417c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000c`ea5fdd98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5417c484
SYMBOL_NAME: nt!MiDeleteVa+176c44
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 176c44
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVa
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9b5ebc95-f4cf-8c11-5593-7f5337165669}
Followup: MachineOwner
---------