INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000003e3b, Incorrect checksum
Arg4: 000000000000a12b, Previous disk read's checksum
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3546
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3601
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a0
BUGCHECK_P1: 10e
BUGCHECK_P2: a
BUGCHECK_P3: 3e3b
BUGCHECK_P4: a12b
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff940c`28fe9778 fffff802`51da51d6 : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00003e3b : nt!KeBugCheckEx
ffff940c`28fe9780 fffff802`51dad1b4 : 00000000`00000001 ffffd889`096425f0 00000001`5c595000 ffffd889`15795000 : nt!PopHiberChecksumHiberFileData+0xac16
ffff940c`28fe97e0 fffff802`51da46d1 : 00000000`8578e000 ffffc881`a4091220 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x78
ffff940c`28fe9850 fffff802`51d98fde : 000068dc`35211688 ffffc881`a4091220 00000000`00000000 fffff802`522b68f8 : nt!PopRestoreHiberContext+0xb351
ffff940c`28fe98e0 fffff802`51d98d26 : fffff802`51c68050 ffff940c`28fe9a60 fffff802`51c68050 ffffd889`096425f0 : nt!PopHandleNextState+0x20e
ffff940c`28fe9930 fffff802`51d98a9b : 00000000`00000100 00000000`00989680 ffffd889`096425f0 ffffd889`096425f0 : nt!PopIssueNextState+0x1a
ffff940c`28fe9960 fffff802`51d9932c : 00000000`0000000c fffff680`000077c0 00000000`00000000 fffff802`518d13c4 : nt!PopInvokeSystemStateHandler+0x35b
ffff940c`28fe9b60 fffff802`51d9c167 : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffff940c`28fe9c20 fffff802`51d9bd45 : 00000000`00000000 00000000`00000000 00000065`00000001 00000000`00000001 : nt!MmDuplicateMemory+0x3cb
ffff940c`28fe9cc0 fffff802`51931a85 : ffffd889`0ea9a000 ffffd889`0ea9a040 fffff802`51d9bc20 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffff940c`28fe9d50 fffff802`519ca2e8 : fffff802`4f422180 ffffd889`0ea9a040 fffff802`51931a30 00700002`000003f6 : nt!PspSystemThreadStartup+0x55
ffff940c`28fe9da0 00000000`00000000 : ffff940c`28fea000 ffff940c`28fe4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+ac16
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ac16
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffabffc8cd028
Arg3: 0001000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5671
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8272
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffffabffc8cd028
BUGCHECK_P3: 1000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffc105`fab5b038 fffff800`04ff7b76 : 00000000`0000001a 00000000`00041792 fffffabf`fc8cd028 00010000`00000000 : nt!KeBugCheckEx
ffffc105`fab5b040 fffff800`04e3ea17 : ffff8c0f`d5058580 fffffabf`fc8cd028 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1b7366
ffffc105`fab5b150 fffff800`04e3eed1 : ffffc105`fab5b5a0 fffffafd`5ffe4668 00000000`00000000 0a000001`21ffe867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffc105`fab5b210 fffff800`04e3eed1 : ffffc105`fab5b5a0 fffffafd`7eafff20 00000000`00000000 0a000000`6d4ed867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc105`fab5b2d0 fffff800`04e3eed1 : ffffc105`fab5b5a0 fffffafd`7ebf57f8 fffffafd`00000000 8a000000`969ce867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc105`fab5b390 fffff800`04e3e65c : ffffc105`fab5b5a0 00000000`00000000 00000000`00000000 fffff800`04f04946 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc105`fab5b450 fffff800`04ee5b78 : ffffc105`fab5b5a0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffc105`fab5b550 fffff800`04e4ac20 : ffffffff`ffffffff ffff8c0f`d50583f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffc105`fab5b8f0 fffff800`0546b0ad : ffff8c0f`d1a57160 00000000`01bb3000 ffff8c0f`d6222560 00000000`00000000 : nt!MiDeleteVad+0x860
ffffc105`fab5bab0 fffff800`0546aea3 : ffff8c0f`d6222560 00007ff9`190f0000 ffff8c0f`d2eb1820 00000000`00000000 : nt!MiUnmapVad+0x49
ffffc105`fab5bae0 fffff800`0546ad39 : ffff8c0f`d5058080 fffff800`00000008 ffff8c0f`ccaa0c40 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffc105`fab5bbc0 fffff800`0546aa2c : ffff8c0f`d60ea080 000001f7`da561fa0 000001f7`da561fa0 ffff8c0f`d5058080 : nt!NtUnmapViewOfSectionEx+0x99
ffffc105`fab5bc10 fffff800`04fd4558 : ffff8c0f`d60ea080 000000af`00000000 00007ff9`3337c8a0 000001f7`d8010028 : nt!NtUnmapViewOfSection+0xc
ffffc105`fab5bc40 00007ff9`3db3c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000af`85dfdc08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3db3c604
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffe600ffc27028
Arg3: 0001000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5937
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7864
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffe600ffc27028
BUGCHECK_P3: 1000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffe38d`27a14038 fffff807`223f7b76 : 00000000`0000001a 00000000`00041792 ffffe600`ffc27028 00010000`00000000 : nt!KeBugCheckEx
ffffe38d`27a14040 fffff807`2223ea17 : ffffbe02`cd69f580 ffffe600`ffc27028 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1b7366
ffffe38d`27a14150 fffff807`2223eed1 : ffffe38d`27a145a0 ffffe673`007fe138 00000000`00000000 0a000001`2cc3e867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffe38d`27a14210 fffff807`2223eed1 : ffffe38d`27a145a0 ffffe673`39803ff0 00000000`00000000 0a000000`847bd867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe38d`27a142d0 fffff807`2223eed1 : ffffe38d`27a145a0 ffffe673`399cc018 ffffe673`00000000 0a000000`1a9bc867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe38d`27a14390 fffff807`2223e65c : ffffe38d`27a145a0 000001ff`84e01000 ffff9500`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe38d`27a14450 fffff807`222e5b78 : ffffe38d`27a145a0 ffffbe02`00000002 00000000`00000001 90000001`00000000 : nt!MiWalkPageTables+0x36c
ffffe38d`27a14550 fffff807`2224ac20 : ffffffff`ffffffff ffffbe02`cd69f3f8 ffffbe02`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffe38d`27a148f0 fffff807`2286b0ad : 00000000`00000000 ffffbe02`cbe50950 ffffbe02`cbe50950 00000000`00000000 : nt!MiDeleteVad+0x860
ffffe38d`27a14ab0 fffff807`2286aea3 : ffffbe02`d087f3a0 00000000`00000000 000001ff`84e00000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe38d`27a14ae0 fffff807`2286ad39 : ffffbe02`cd69f080 00000000`00000008 ffffbe02`c607b980 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffe38d`27a14bc0 fffff807`2286aa2c : ffffbe02`cdd76080 00000069`8957f330 00000069`8957f1b0 ffffbe02`cd69f080 : nt!NtUnmapViewOfSectionEx+0x99
ffffe38d`27a14c10 fffff807`223d4558 : ffffbe02`00000000 00000069`00000001 00000000`00133000 ffffe38d`27a14cc0 : nt!NtUnmapViewOfSection+0xc
ffffe38d`27a14c40 00007ff8`bb69c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000069`8957eeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`bb69c604
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000009a77, Incorrect checksum
Arg4: 000000000000436c, Previous disk read's checksum
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5703
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6516
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a0
BUGCHECK_P1: 10e
BUGCHECK_P2: a
BUGCHECK_P3: 9a77
BUGCHECK_P4: 436c
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff9a00`268ed418 fffff804`54fa3cb2 : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00009a77 : nt!KeBugCheckEx
ffff9a00`268ed420 fffff804`54fad194 : 00000000`00000001 ffffe408`7ea3e050 00000000`00000002 ffffe408`8ae05000 : nt!PopHiberChecksumHiberFileData+0xd3a2
ffff9a00`268ed480 fffff804`54facb66 : ffffd103`8c0910f0 ffffd103`8c091220 ffff9a00`268ed580 fffff804`523624bc : nt!PopRequestRead+0x78
ffff9a00`268ed4f0 fffff804`54b640d4 : 00000000`00000002 ffffe408`85fcaa60 fffff804`523624b0 fffff804`54acc808 : nt!PopDecompressCallback+0x16
ffff9a00`268ed520 fffff804`54d179ab : ffffe408`8ae4bc13 00000000`00000090 ffffe408`8ae45000 ffffae00`75c00000 : nt!RtlpMakeXpressCallback+0x24
ffff9a00`268ed550 fffff804`54d177e4 : ffffae00`75c00000 ffff9a00`268ed730 00000000`00010000 00007d47`f52bb241 : nt!RtlDecompressBufferXpressHuffProgress+0x1b3
ffff9a00`268ed5d0 fffff804`54fa4f39 : 00000000`00000001 ffff9a00`268ed730 00000000`00000000 00000000`00010000 : nt!RtlDecompressBufferProgress+0xac
ffff9a00`268ed630 fffff804`54fa3eca : 00000000`7d66e000 ffffd103`8c091220 00000000`00000001 00000000`00000001 : nt!PopDecompressHiberBlocks+0xb715
ffff9a00`268ed850 fffff804`54f983fe : 00007d46`792b87a9 ffffd103`8c091220 00000000`00000000 fffff804`554b68f8 : nt!PopRestoreHiberContext+0xd18a
ffff9a00`268ed8e0 fffff804`54f9814a : fffff804`54e67f10 ffff9a00`268eda60 fffff804`54e67f10 ffffe408`7ea3e050 : nt!PopHandleNextState+0x20e
ffff9a00`268ed930 fffff804`54f97ebf : 00000000`00000100 00000000`00989680 ffffe408`7ea3e050 ffffe408`7ea3e050 : nt!PopIssueNextState+0x1a
ffff9a00`268ed960 fffff804`54f96cec : 00000000`0000000c ffff9700`000077c0 00000000`00000000 fffff804`54abffa4 : nt!PopInvokeSystemStateHandler+0x35b
ffff9a00`268edb60 fffff804`54f9d7b7 : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffff9a00`268edc20 fffff804`54f9d395 : 00000000`00000000 00000000`00000000 00000065`00000001 00000000`00000001 : nt!MmDuplicateMemory+0x3cb
ffff9a00`268edcc0 fffff804`54b1e235 : ffffe408`8188b000 ffffe408`8188b080 fffff804`54f9d270 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffff9a00`268edd50 fffff804`54bc9f98 : ffffae00`731a9180 ffffe408`8188b080 fffff804`54b1e1e0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff9a00`268edda0 00000000`00000000 : ffff9a00`268ee000 ffff9a00`268e8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+d3a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1082
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d3a2
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff9500038b1ca0
Arg3: 00000000000000fa
Arg4: 00000000000000fb
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9958
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffff9500038b1ca0
BUGCHECK_P3: fa
BUGCHECK_P4: fb
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff686`e1355e88 fffff805`581f7e2a : 00000000`0000001a 00000000`00041790 ffff9500`038b1ca0 00000000`000000fa : nt!KeBugCheckEx
fffff686`e1355e90 fffff805`58077c07 : 00000000`00000003 fffff686`e13565e0 fffff686`e13565e0 fffff686`e1356530 : nt!MiDeletePteRun+0x1b8dca
fffff686`e13560b0 fffff805`58073722 : ffffd403`69e54580 ffffef01`0147c7e0 00000000`00000000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffff686`e13560e0 fffff805`580738b1 : fffff686`e1356530 ffffef77`8080a3e0 00000000`00000000 0a000001`2e5ee867 : nt!MiWalkPageTablesRecursively+0x512
fffff686`e13561a0 fffff805`580738b1 : fffff686`e1356530 ffffef77`bbc04050 00000000`00000000 0a000000`dceff867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff686`e1356260 fffff805`580738b1 : fffff686`e1356530 ffffef77`bbdde020 ffffef77`00000000 8a000000`62afe867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff686`e1356320 fffff805`5807303c : fffff686`e1356530 fffff805`00000000 ffff03d5`00000000 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x6a1
fffff686`e13563e0 fffff805`580714a8 : fffff686`e1356530 ffff9500`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff686`e13564e0 fffff805`5807f600 : ffffffff`ffffffff ffffd403`69e543f8 00000202`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff686`e1356880 fffff805`580c50aa : 00000000`2028f8fb ffffd403`6b6d2080 00000000`00000000 fffff805`5807a5da : nt!MiDeleteVad+0x860
fffff686`e1356a40 fffff805`585e7ce0 : 00000000`00000000 00000000`00000000 fffff686`e1356ba0 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff686`e1356aa0 fffff805`585e791b : 00000000`00000000 000000ad`1b7fca68 ffff03d5`b100a0ab 000000ad`00000004 : nt!MmFreeVirtualMemory+0x390
fffff686`e1356be0 fffff805`581d4258 : ffffd403`6b6d2080 fffff686`00000001 00000000`00000002 fffff686`e1356cc0 : nt!NtFreeVirtualMemory+0x8b
fffff686`e1356c40 00007ffc`667fc434 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ad`1b7fdb38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`667fc434
SYMBOL_NAME: nt!MiDeletePteRun+1b8dca
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.1082
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1b8dca
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------