MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041202, The subtype of the bugcheck.
Arg2: ffffae3ffb8d8170
Arg3: fff7ffff00000710
Arg4: ffffc30bbde5f1c0
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for vgk.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5062
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 49533
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41202
BUGCHECK_P2: ffffae3ffb8d8170
BUGCHECK_P3: fff7ffff00000710
BUGCHECK_P4: ffffc30bbde5f1c0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
STACK_TEXT:
ffff8408`e6956118 fffff803`27a2b079 : 00000000`0000001a 00000000`00041202 ffffae3f`fb8d8170 fff7ffff`00000710 : nt!KeBugCheckEx
ffff8408`e6956120 fffff803`278c6991 : ffffc30b`b9c56580 fff7ffff`00000710 ffffc30b`b94c8490 ffffae57`1ffdc6c0 : nt!MiGetPageProtection+0x165129
ffff8408`e6956190 fffff803`278b7da0 : 00000000`00000010 00000000`00000246 00000000`00000246 fffff803`2783a5b4 : nt!MiQueryAddressState+0x5c1
ffff8408`e69563b0 fffff803`27e04eb7 : ffff8408`e6956750 00007ff7`1b02d000 ffff8408`00000000 ffff8408`00000001 : nt!MiQueryAddressSpan+0x140
ffff8408`e6956470 fffff803`27e04955 : ffffc30b`b6d6a040 ffffc30b`b6d6a0d8 00000000`00000000 00000000`00000000 : nt!MmQueryVirtualMemory+0x557
ffff8408`e6956610 fffff803`279d5355 : 00000000`00000000 fffff803`282b837b 00000000`00000000 00001f80`000400f8 : nt!NtQueryVirtualMemory+0x25
ffff8408`e6956660 fffff803`279c7940 : fffff804`25b3193e ffff8408`e6956b10 fffff804`25600000 fffff803`00000000 : nt!KiSystemServiceCopyEnd+0x25
ffff8408`e6956868 fffff804`25b3193e : ffff8408`e6956b10 fffff804`25600000 fffff803`00000000 ffffc30b`b9c56080 : nt!KiServiceLinkage
ffff8408`e6956870 ffff8408`e6956b10 : fffff804`25600000 fffff803`00000000 ffffc30b`b9c56080 00000000`00000030 : vgk+0x53193e
ffff8408`e6956878 fffff804`25600000 : fffff803`00000000 ffffc30b`b9c56080 00000000`00000030 ffff8408`e69568c0 : 0xffff8408`e6956b10
ffff8408`e6956880 fffff803`00000000 : ffffc30b`b9c56080 00000000`00000030 ffff8408`e69568c0 ffff8408`e69568d0 : vgk
ffff8408`e6956888 ffffc30b`b9c56080 : 00000000`00000030 ffff8408`e69568c0 ffff8408`e69568d0 ffffc30b`b9c56080 : 0xfffff803`00000000
ffff8408`e6956890 00000000`00000030 : ffff8408`e69568c0 ffff8408`e69568d0 ffffc30b`b9c56080 fffff803`279c0530 : 0xffffc30b`b9c56080
ffff8408`e6956898 ffff8408`e69568c0 : ffff8408`e69568d0 ffffc30b`b9c56080 fffff803`279c0530 00000000`00000000 : 0x30
ffff8408`e69568a0 ffff8408`e69568d0 : ffffc30b`b9c56080 fffff803`279c0530 00000000`00000000 00000000`00000000 : 0xffff8408`e69568c0
ffff8408`e69568a8 ffffc30b`b9c56080 : fffff803`279c0530 00000000`00000000 00000000`00000000 ffffc30b`b9c56080 : 0xffff8408`e69568d0
ffff8408`e69568b0 fffff803`279c052f : 00000000`00000000 00000000`00000000 ffffc30b`b9c56080 ffffffff`80001ee4 : 0xffffc30b`b9c56080
ffff8408`e69568b8 00000000`00000000 : 00000000`00000000 ffffc30b`b9c56080 ffffffff`80001ee4 fffff803`279286b0 : nt!ZwRequestWaitReplyPort+0x1f
SYMBOL_NAME: vgk+53193e
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 53193e
FAILURE_BUCKET_ID: 0x1a_41202_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c8b0ddef-f85c-151d-ca0b-e07e528f772b}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041202, The subtype of the bugcheck.
Arg2: ffff9a3ffbd1dc38
Arg3: fffdffff00000710
Arg4: ffffe307036a8dc0
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for vgk.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 39330
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41202
BUGCHECK_P2: ffff9a3ffbd1dc38
BUGCHECK_P3: fffdffff00000710
BUGCHECK_P4: ffffe307036a8dc0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
STACK_TEXT:
fffff482`74948118 fffff803`41e2b079 : 00000000`0000001a 00000000`00041202 ffff9a3f`fbd1dc38 fffdffff`00000710 : nt!KeBugCheckEx
fffff482`74948120 fffff803`41cc6991 : ffffe307`015a1580 fffdffff`00000710 ffffe306`f9e2fde0 ffff9a4d`1ffde8e8 : nt!MiGetPageProtection+0x165129
fffff482`74948190 fffff803`41cb7da0 : ffffe307`015a1580 00007ff7`a3a04000 00000000`00000246 fffff803`41c3a5b4 : nt!MiQueryAddressState+0x5c1
fffff482`749483b0 fffff803`42204eb7 : fffff482`74948750 00007ff7`a3b83000 fffff482`00000000 fffff482`00000001 : nt!MiQueryAddressSpan+0x140
fffff482`74948470 fffff803`42204955 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmQueryVirtualMemory+0x557
fffff482`74948610 fffff803`41dd5355 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000406f8 : nt!NtQueryVirtualMemory+0x25
fffff482`74948660 fffff803`41dc7940 : fffff80e`f573193e fffff482`74948b10 fffff80e`f5200000 fffff803`00000000 : nt!KiSystemServiceCopyEnd+0x25
fffff482`74948868 fffff80e`f573193e : fffff482`74948b10 fffff80e`f5200000 fffff803`00000000 ffffe307`015a1080 : nt!KiServiceLinkage
fffff482`74948870 fffff482`74948b10 : fffff80e`f5200000 fffff803`00000000 ffffe307`015a1080 00000000`00000030 : vgk+0x53193e
fffff482`74948878 fffff80e`f5200000 : fffff803`00000000 ffffe307`015a1080 00000000`00000030 fffff482`749488c0 : 0xfffff482`74948b10
fffff482`74948880 fffff803`00000000 : ffffe307`015a1080 00000000`00000030 fffff482`749488c0 fffff482`749488d0 : vgk
fffff482`74948888 ffffe307`015a1080 : 00000000`00000030 fffff482`749488c0 fffff482`749488d0 ffffe307`015a1080 : 0xfffff803`00000000
fffff482`74948890 00000000`00000030 : fffff482`749488c0 fffff482`749488d0 ffffe307`015a1080 fffff803`41dc0530 : 0xffffe307`015a1080
fffff482`74948898 fffff482`749488c0 : fffff482`749488d0 ffffe307`015a1080 fffff803`41dc0530 00000000`00000000 : 0x30
fffff482`749488a0 fffff482`749488d0 : ffffe307`015a1080 fffff803`41dc0530 00000000`00000000 00000000`00000000 : 0xfffff482`749488c0
fffff482`749488a8 ffffe307`015a1080 : fffff803`41dc0530 00000000`00000000 00000000`00000000 ffffe307`015a1080 : 0xfffff482`749488d0
fffff482`749488b0 fffff803`41dc052f : 00000000`00000000 00000000`00000000 ffffe307`015a1080 ffffffff`80003300 : 0xffffe307`015a1080
fffff482`749488b8 00000000`00000000 : 00000000`00000000 ffffe307`015a1080 ffffffff`80003300 fffff803`41d286b0 : nt!ZwRequestWaitReplyPort+0x1f
SYMBOL_NAME: vgk+53193e
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 53193e
FAILURE_BUCKET_ID: 0x1a_41202_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c8b0ddef-f85c-151d-ca0b-e07e528f772b}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff6248a3ad968
Arg3: 80000001ef53b967
Arg4: ffffc4075a06c6f0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17876
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41201
BUGCHECK_P2: fffff6248a3ad968
BUGCHECK_P3: 80000001ef53b967
BUGCHECK_P4: ffffc4075a06c6f0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffffc28e`c1ca7648 fffff800`2ee2ae66 : 00000000`0000001a 00000000`00041201 fffff624`8a3ad968 80000001`ef53b967 : nt!KeBugCheckEx
ffffc28e`c1ca7650 fffff800`2ecc6991 : fffff624`8a3ad970 80000001`ef53b967 fffff800`00000002 fffff67b`12451d68 : nt!MiGetPageProtection+0x164f16
ffffc28e`c1ca76c0 fffff800`2ecb7da0 : 00000000`00000000 00000000`00000000 00000000`00000246 fffff800`2ec3a5b4 : nt!MiQueryAddressState+0x5c1
ffffc28e`c1ca78e0 fffff800`2f204eb7 : ffffc28e`c1ca7c80 00004914`75b2c000 ffffc28e`00000000 000000b8`00000001 : nt!MiQueryAddressSpan+0x140
ffffc28e`c1ca79a0 fffff800`2f204955 : fffff67b`007ed5a0 fffff67b`3d803f68 fffff67b`3d9ec018 ffffc407`59f0a9c0 : nt!MmQueryVirtualMemory+0x557
ffffc28e`c1ca7b40 fffff800`2edd5355 : 00000000`00000000 00000000`00000000 00000000`00000000 000000b8`1e7fe198 : nt!NtQueryVirtualMemory+0x25
ffffc28e`c1ca7b90 00007ffb`c2bfcb54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000b8`1e7fe5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`c2bfcb54
SYMBOL_NAME: nt!MiGetPageProtection+164f16
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.1316
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 164f16
FAILURE_BUCKET_ID: 0x1a_41201_nt!MiGetPageProtection
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c1fe3b27-3ba8-d99e-656f-85f3d58dc669}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041202, The subtype of the bugcheck.
Arg2: ffffbabffbb42918
Arg3: ffdfffff00000710
Arg4: ffffe68af0344a80
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for vgk.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 60735
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41202
BUGCHECK_P2: ffffbabffbb42918
BUGCHECK_P3: ffdfffff00000710
BUGCHECK_P4: ffffe68af0344a80
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
STACK_TEXT:
ffffe509`bbf56118 fffff804`3ce2b079 : 00000000`0000001a 00000000`00041202 ffffbabf`fbb42918 ffdfffff`00000710 : nt!KeBugCheckEx
ffffe509`bbf56120 fffff804`3ccc6991 : ffffe68a`f4eda580 ffdfffff`00000710 ffffe68a`f3bfb2c0 ffffbadd`5ffdda10 : nt!MiGetPageProtection+0x165129
ffffe509`bbf56190 fffff804`3ccb7da0 : 00000000`00000010 fffff804`3cc3a910 00000000`00000246 fffff804`3cc3a5b4 : nt!MiQueryAddressState+0x5c1
ffffe509`bbf563b0 fffff804`3d204eb7 : ffffe509`bbf56750 00007ff7`6851f000 ffffe509`00000000 ffffe509`00000001 : nt!MiQueryAddressSpan+0x140
ffffe509`bbf56470 fffff804`3d204955 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmQueryVirtualMemory+0x557
ffffe509`bbf56610 fffff804`3cdd5355 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000406f8 : nt!NtQueryVirtualMemory+0x25
ffffe509`bbf56660 fffff804`3cdc7940 : fffff80b`05d3193e ffffe509`bbf56b10 fffff80b`05800000 fffff804`00000000 : nt!KiSystemServiceCopyEnd+0x25
ffffe509`bbf56868 fffff80b`05d3193e : ffffe509`bbf56b10 fffff80b`05800000 fffff804`00000000 ffffe68a`f4eda080 : nt!KiServiceLinkage
ffffe509`bbf56870 ffffe509`bbf56b10 : fffff80b`05800000 fffff804`00000000 ffffe68a`f4eda080 00000000`00000030 : vgk+0x53193e
ffffe509`bbf56878 fffff80b`05800000 : fffff804`00000000 ffffe68a`f4eda080 00000000`00000030 ffffe509`bbf568c0 : 0xffffe509`bbf56b10
ffffe509`bbf56880 fffff804`00000000 : ffffe68a`f4eda080 00000000`00000030 ffffe509`bbf568c0 ffffe509`bbf568d0 : vgk
ffffe509`bbf56888 ffffe68a`f4eda080 : 00000000`00000030 ffffe509`bbf568c0 ffffe509`bbf568d0 ffffe68a`f4eda080 : 0xfffff804`00000000
ffffe509`bbf56890 00000000`00000030 : ffffe509`bbf568c0 ffffe509`bbf568d0 ffffe68a`f4eda080 fffff804`3cdc0530 : 0xffffe68a`f4eda080
ffffe509`bbf56898 ffffe509`bbf568c0 : ffffe509`bbf568d0 ffffe68a`f4eda080 fffff804`3cdc0530 00000000`00000000 : 0x30
ffffe509`bbf568a0 ffffe509`bbf568d0 : ffffe68a`f4eda080 fffff804`3cdc0530 00000000`00000000 00000000`00000000 : 0xffffe509`bbf568c0
ffffe509`bbf568a8 ffffe68a`f4eda080 : fffff804`3cdc0530 00000000`00000000 00000000`00000000 ffffe68a`f4eda080 : 0xffffe509`bbf568d0
ffffe509`bbf568b0 fffff804`3cdc052f : 00000000`00000000 00000000`00000000 ffffe68a`f4eda080 ffffffff`80000e28 : 0xffffe68a`f4eda080
ffffe509`bbf568b8 00000000`00000000 : 00000000`00000000 ffffe68a`f4eda080 ffffffff`80000e28 fffff804`3cd286b0 : nt!ZwRequestWaitReplyPort+0x1f
SYMBOL_NAME: vgk+53193e
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 53193e
FAILURE_BUCKET_ID: 0x1a_41202_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c8b0ddef-f85c-151d-ca0b-e07e528f772b}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa884ecbd4730, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa884ecbd4688, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 36763
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffa884ecbd4730
BUGCHECK_P3: ffffa884ecbd4688
BUGCHECK_P4: 0
TRAP_FRAME: ffffa884ecbd4730 -- (.trap 0xffffa884ecbd4730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9782ca894a20 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9782ca851310 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80132807492 rsp=ffffa884ecbd48c0 rbp=ffffa884ecbd4c80
r8=ffff9782ca28a4c0 r9=0000000000000002 r10=00000000ffffffff
r11=000000000000004d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!IopCompleteRequest+0x1a1de2:
fffff801`32807492 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffa884ecbd4688 -- (.exr 0xffffa884ecbd4688)
ExceptionAddress: fffff80132807492 (nt!IopCompleteRequest+0x00000000001a1de2)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
IRP_ADDRESS: ffff9782ca068388
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffa884`ecbd4408 fffff801`327d5929 : 00000000`00000139 00000000`00000003 ffffa884`ecbd4730 ffffa884`ecbd4688 : nt!KeBugCheckEx
ffffa884`ecbd4410 fffff801`327d5d50 : 00000000`00000000 fffff801`3255f37b 00000000`00000000 fffff801`3255f37b : nt!KiBugCheckDispatch+0x69
ffffa884`ecbd4550 fffff801`327d40e3 : 00000000`00000150 00000000`00000001 00000000`00000214 ffff9782`c9dbd5a0 : nt!KiFastFailDispatch+0xd0
ffffa884`ecbd4730 fffff801`32807492 : 00000000`00000001 00000000`00000001 00000000`00000000 ffff9782`ca068400 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa884`ecbd48c0 fffff801`32644aad : ffff9782`ca068400 fffff801`32637101 ffff9782`ca8bd500 000001b8`d225c030 : nt!IopCompleteRequest+0x1a1de2
ffffa884`ecbd49b0 fffff801`32c02f00 : ffffa884`ecbd4b20 00000003`96fff508 ffff9782`c9c1d168 ffff9782`c9c1d168 : nt!IoRemoveIoCompletion+0x26d
ffffa884`ecbd4ad0 fffff801`327d5355 : ffff9782`ca248080 00000003`96fff4e8 ffffa884`ecbd4ba8 000001b8`d225c030 : nt!NtRemoveIoCompletion+0x140
ffffa884`ecbd4b90 00007ffe`ddebc814 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000003`96fff4c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ddebc814
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1316
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------