UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffbd010c565000, Pointer to the store context or data manager
Arg2: ffffb98c70316730, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1921
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14572
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 1443
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Bugcheck.Code.DumpHeader
Value: 0x154
Key : Bugcheck.Code.Register
Value: 0x154
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 100422-4390-01.dmp
BUGCHECK_CODE: 154
BUGCHECK_P1: ffffbd010c565000
BUGCHECK_P2: ffffb98c70316730
BUGCHECK_P3: 1
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffffb98c703176b8 -- (.exr 0xffffb98c703176b8)
ExceptionAddress: fffff805193371de (nt!MetroHash64::Hash+0x0000000000000066)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000200000010
Attempt to read from address 0000000200000010
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000200000010
CONTEXT: ffffb98c70316ef0 -- (.cxr 0xffffb98c70316ef0)
rax=ffffb98c70317928 rbx=52bc33fedbe4cbb5 rcx=0000000200000000
rdx=52bc33fedbe4cbb5 rsi=ffffb98c70317990 rdi=52bc33fedbe4cbb5
rip=fffff805193371de rsp=ffffb98c703178f0 rbp=0000000200000fe0
r8=52bc33fedbe4cbb5 r9=52bc33fedbe4cbb5 r10=0000000200000000
r11=0000000200001000 r12=0000000000000000 r13=0000000000000001
r14=00000000a2aa033b r15=00000000d6d018f5
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!MetroHash64::Hash+0x66:
fffff805`193371de 49694a10c12f9962 imul rcx,qword ptr [r10+10h],62992FC1h ds:002b:00000002`00000010=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
READ_ADDRESS: fffff80519cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000200000010
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffb98c`703178f0 fffff805`1930057a : 00000000`00000001 00000000`00000000 00000000`00001000 fffff805`1921b838 : nt!MetroHash64::Hash+0x66
ffffb98c`70317930 fffff805`19339eb4 : 00000000`00000000 00000000`00000000 00000000`00000da3 00000000`00000000 : nt!SmHpBufferProtectEx+0xde
ffffb98c`70317990 fffff805`192fc1be : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb98c`70317a30 : nt!SmHpChunkHeapProtect+0x6c
ffffb98c`703179c0 fffff805`1935f41d : ffffbd01`0c566670 ffffb98c`70317ad8 ffffb98c`70317a31 fffff805`1933b033 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0x1be
ffffb98c`70317a10 fffff805`192fba85 : ffffffff`fffdb610 ffffbd01`0c565000 ffffb98c`70317ad8 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StLazyWorkMgrRunExpiredWork+0xa1
ffffb98c`70317a60 fffff805`19361af1 : 00000000`00000102 ffffbd01`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x5c1
ffffb98c`70317b20 fffff805`19271d25 : ffffbd01`0c565000 fffff805`19361ae0 ffffb98c`701372e8 000fe47f`bd9bbfff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffb98c`70317b50 fffff805`19400628 : ffffa680`68d8d180 ffffbd01`0c599240 fffff805`19271cd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb98c`70317ba0 00000000`00000000 : ffffb98c`70318000 ffffb98c`70311000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MetroHash64::Hash+66
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr 0xffffb98c70316ef0 ; kb
BUCKET_ID_FUNC_OFFSET: 66
FAILURE_BUCKET_ID: 0x154_c0000005_nt!MetroHash64::Hash
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c82d5b0e-8a27-200d-2b32-8c0b0db5570c}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd99f8f1e39d0, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8016e17af28, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 2140
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15446
Key : Analysis.IO.Other.Mb
Value: 3
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 23
Key : Analysis.Init.CPU.mSec
Value: 421
Key : Analysis.Init.Elapsed.mSec
Value: 10768
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 111322-12718-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd99f8f1e39d0
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8016e17af28
BUGCHECK_P4: 2
READ_ADDRESS: fffff8016a4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd99f8f1e39d0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffa81061372a0 -- (.trap 0xfffffa81061372a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd98f8f1e35a0 rbx=0000000000000000 rcx=ffffd99f8f1e3978
rdx=ffffc2888b6b3010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016e17af28 rsp=fffffa8106137430 rbp=0000000000000000
r8=0000000000000002 r9=ffffc2887fe33030 r10=fffff8016e17ae80
r11=fffffa8106137568 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
Ntfs!NtfsFsdClose+0xa8:
fffff801`6e17af28 0fb64158 movzx eax,byte ptr [rcx+58h] ds:ffffd99f`8f1e39d0=??
Resetting default scope
STACK_TEXT:
fffffa81`06136ff8 fffff801`69c31b9d : 00000000`00000050 ffffd99f`8f1e39d0 00000000`00000000 fffffa81`061372a0 : nt!KeBugCheckEx
fffffa81`06137000 fffff801`69a399e0 : 00000000`00000000 00000000`00000000 fffffa81`06137320 00000000`00000000 : nt!MiSystemFault+0x1da18d
fffffa81`06137100 fffff801`69c0725e : 00000000`00000000 fffff801`00000000 00000000`00000103 00000000`00000000 : nt!MmAccessFault+0x400
fffffa81`061372a0 fffff801`6e17af28 : fffffa81`061374d9 00000000`00000000 ffffc288`00000001 00000000`00000000 : nt!KiPageFault+0x35e
fffffa81`06137430 fffff801`69a2a6b5 : ffffc288`8b6b3010 ffffc288`8b6b3010 ffffc288`8b6b3010 fffff801`67e84fe1 : Ntfs!NtfsFsdClose+0xa8
fffffa81`06137570 fffff801`67e870cf : 00000000`74530007 fffffa81`06137620 00000000`00000000 ffffd98f`3ca00100 : nt!IofCallDriver+0x55
fffffa81`061375b0 fffff801`67e84a03 : fffffa81`06137640 00000000`00000000 00000000`00000000 ffffc288`7f3aca80 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffffa81`06137620 fffff801`69a2a6b5 : ffffc288`9a443cd0 fffff801`69a2cec8 ffffc288`7fdf39d0 ffffc288`00000000 : FLTMGR!FltpDispatch+0xa3
fffffa81`06137680 fffff801`69e19b4f : ffffc288`9a443cd0 ffffc288`7fdf39d0 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
fffffa81`061376c0 fffff801`69e13d50 : ffffc288`7ccf8220 ffffc288`9a18f490 ffffc288`9a443ca0 fffff801`6a1b2019 : nt!IopDeleteFile+0x14f
fffffa81`06137740 fffff801`69a0ec07 : 00000000`00000000 00000000`00000000 ffffd98f`8f0b1ad0 ffffc288`9a443cd0 : nt!ObpRemoveObjectRoutine+0x80
fffffa81`061377a0 fffff801`69a0eb2e : 00000000`00000000 ffffc288`9a18f450 ffffc288`9a18f450 ffffc288`9a18f450 : nt!ObfDereferenceObjectWithTag+0xc7
fffffa81`061377e0 fffff801`69e90721 : 00000000`00088081 ffffc288`9a18f450 fffff801`6a450b40 00000000`00088081 : nt!HalPutDmaAdapter+0xe
fffffa81`06137810 fffff801`69b86025 : 00000000`00000001 00000000`00000000 fffffa81`061378e0 ffffc288`9a18f458 : nt!MiSegmentDelete+0x155
fffffa81`06137860 fffff801`69bbbf89 : 00000000`00000000 fffff801`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1
fffffa81`06137920 fffff801`69a71d25 : ffffc288`7fdb4080 ffffc288`7fdb4080 00000000`00000080 fffff801`69bbbe60 : nt!MiDereferenceSegmentThread+0x129
fffffa81`06137b50 fffff801`69c00778 : ffff9900`a7700180 ffffc288`7fdb4080 fffff801`69a71cd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffa81`06137ba0 00000000`00000000 : fffffa81`06138000 fffffa81`06131000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Ntfs!NtfsFsdClose+a8
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.2132
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: a8
FAILURE_BUCKET_ID: AV_R_(null)_Ntfs!NtfsFsdClose
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f04e2a2a-35a9-b8bf-fffc-7b077fd28d79}
Followup: MachineOwner
---------
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000c9b, physical page number
Arg3: 000001d887691990, zero
Arg4: ffff920229560000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2483
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10056
Key : Analysis.IO.Other.Mb
Value: 3
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 22
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 10202
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0xc9b
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0x7199b6dc
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x11990
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x255fb7
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0x365ab6
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x1a4e5f
Key : Bugcheck.Code.DumpHeader
Value: 0x12b
Key : Bugcheck.Code.Register
Value: 0x12b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 102522-6062-01.dmp
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: c9b
BUGCHECK_P3: 1d887691990
BUGCHECK_P4: ffff920229560000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
fffffa85`ed6e7138 fffff801`57997232 : 00000000`0000012b ffffffff`c00002c4 00000000`00000c9b 000001d8`87691990 : nt!KeBugCheckEx
fffffa85`ed6e7140 fffff801`5783a751 : 00000000`00000001 00000000`c00002c4 ffff9202`29560000 00000000`00040000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
fffffa85`ed6e71a0 fffff801`57670c31 : 00000000`00000004 fffff801`5767079a 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1c9afd
fffffa85`ed6e7260 fffff801`57670500 : 00000000`00000001 00000000`00011990 00000000`00000000 ffffbd0a`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
fffffa85`ed6e72b0 fffff801`576710fc : 00000000`ffffffff ffffbd0a`3816f000 fffffa85`ed6e7390 ffffbd0a`3c824410 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
fffffa85`ed6e7350 fffff801`57671371 : ffff9201`e8348730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
fffffa85`ed6e7400 fffff801`57671431 : ffffbd0a`31828000 ffffbd0a`3c824410 ffffbd0a`3816f000 ffffbd0a`318299c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffffa85`ed6e7480 fffff801`57689cb8 : ffffbd0a`4318b080 ffffbd0a`31828000 00000000`00000000 ffffbd0a`3f6cb730 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffffa85`ed6e74b0 fffff801`57747c07 : fffff801`57671410 fffffa85`ed6e7550 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffa85`ed6e7520 fffff801`576fb3d4 : fffffa85`ed6e7620 00000000`31526d73 00000000`000003ff fffff801`581239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
fffffa85`ed6e75f0 fffff801`576fae08 : 00000000`0000000c 00000000`000003ff fffffa85`ed6e76a0 fffff801`581239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
fffffa85`ed6e7640 fffff801`57746e67 : 00000000`0000000c 00000000`00000010 ffffbd0a`3c824410 ffffbd0a`3f6cb730 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
fffffa85`ed6e76d0 fffff801`5775cbeb : ffffbd0a`00000010 ffffbd0a`3f6cb7f0 00000000`00000000 ffffbd0a`31828000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
fffffa85`ed6e7740 fffff801`576f1da0 : 0000007f`00000100 00000000`00000000 fffffa85`ed6e7998 fffff801`576ef870 : nt!SmPageRead+0x33
fffffa85`ed6e7790 fffff801`576ef3cd : 00000000`00000002 fffffa85`ed6e7820 fffffa85`ed6e7998 ffffbd0a`3f6cb6e0 : nt!MiIssueHardFaultIo+0x10c
fffffa85`ed6e77e0 fffff801`57639a48 : 00000000`c0033333 00000000`00000001 00000000`02be9230 00000000`00000000 : nt!MiIssueHardFault+0x29d
fffffa85`ed6e78a0 fffff801`5780725e : 00000000`00000006 00000000`00000000 00000000`00000000 ffffbd0a`00000000 : nt!MmAccessFault+0x468
fffffa85`ed6e7a40 00000000`72a5b21d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0520dd4c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x72a5b21d
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+10a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2130
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10a
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
CRITICAL_STRUCTURE_CORRUPTION (109)
This BugCheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fdedc5a78d70c, Reserved
Arg2: 0000000000000000, Reserved
Arg3: 2e699f5784380144, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
8 : Object type
9 : A processor IVT
a : Modification of a system service function
b : A generic session data region
c : Modification of a session function or .pdata
d : Modification of an import table
e : Modification of a session import table
f : Ps Win32 callout modification
10 : Debug switch routine modification
11 : IRP allocator modification
12 : Driver call dispatcher modification
13 : IRP completion dispatcher modification
14 : IRP deallocator modification
15 : A processor control register
16 : Critical floating point control register modification
17 : Local APIC modification
18 : Kernel notification callout modification
19 : Loaded module list modification
1a : Type 3 process list corruption
1b : Type 4 process list corruption
1c : Driver object corruption
1d : Executive callback object modification
1e : Modification of module padding
1f : Modification of a protected process
20 : A generic data region
21 : A page hash mismatch
22 : A session page hash mismatch
23 : Load config directory modification
24 : Inverted function table modification
25 : Session configuration modification
26 : An extended processor control register
27 : Type 1 pool corruption
28 : Type 2 pool corruption
29 : Type 3 pool corruption
2a : Type 4 pool corruption
2b : Modification of a function or .pdata
2c : Image integrity corruption
2d : Processor misconfiguration
2e : Type 5 process list corruption
2f : Process shadow corruption
30 : Retpoline code page corruption
101 : General pool corruption
102 : Modification of win32k.sys
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2561
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16074
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 2
Key : Analysis.Init.CPU.mSec
Value: 249
Key : Analysis.Init.Elapsed.mSec
Value: 1712
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Bugcheck.Code.DumpHeader
Value: 0x109
Key : Bugcheck.Code.Register
Value: 0x109
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 012923-8500-01.dmp
BUGCHECK_CODE: 109
BUGCHECK_P1: a39fdedc5a78d70c
BUGCHECK_P2: 0
BUGCHECK_P3: 2e699f5784380144
BUGCHECK_P4: 101
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
fffffe8e`a5ad6d68 00000000`00000000 : 00000000`00000109 a39fdedc`5a78d70c 00000000`00000000 2e699f57`84380144 : nt!KeBugCheckEx
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: BAD_STACK_0x109
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b4d7023a-05c3-49b2-3ea4-6240fe57d90e}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff9906a700400c, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80675bc27e8, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 2281
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16132
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 280
Key : Analysis.Init.Elapsed.mSec
Value: 1603
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 012923-20140-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff9906a700400c
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80675bc27e8
BUGCHECK_P4: 2
READ_ADDRESS: fffff806708fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9906a700400c
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffbe8b81a87210 -- (.trap 0xffffbe8b81a87210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9986a7004040 rbx=0000000000000000 rcx=0000000000000001
rdx=fffff80675b23000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80675bc27e8 rsp=ffffbe8b81a873a0 rbp=ffff9986a7004170
r8=ffff9906a7004040 r9=7fffd604c0458500 r10=7ffffffffffffffc
r11=000000000000026e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
Ntfs!NtfsDeleteScb+0x388:
fffff806`75bc27e8 418b4704 mov eax,dword ptr [r15+4] ds:00000000`00000004=????????
Resetting default scope
STACK_TEXT:
ffffbe8b`81a86f68 fffff806`70036e57 : 00000000`00000050 ffff9906`a700400c 00000000`00000000 ffffbe8b`81a87210 : nt!KeBugCheckEx
ffffbe8b`81a86f70 fffff806`6fe42250 : ffff9986`951019a0 00000000`00000000 ffffbe8b`81a87290 00000000`00000000 : nt!MiSystemFault+0x1d6bd7
ffffbe8b`81a87070 fffff806`70009cd8 : ffff9986`00000000 00000000`00000000 ffff9986`00000000 01b00030`00000640 : nt!MmAccessFault+0x400
ffffbe8b`81a87210 fffff806`75bc27e8 : ffffbe8b`81a87830 ffff9986`00000001 ffffbe8b`00000000 ffffbe8b`81a87830 : nt!KiPageFault+0x358
ffffbe8b`81a873a0 fffff806`75bc2366 : ffff9986`a7004170 ffff9986`20244508 ffff9986`00000000 ffffd604`c0458590 : Ntfs!NtfsDeleteScb+0x388
ffffbe8b`81a87440 fffff806`75aa97b5 : ffff9986`a7004010 ffff9986`a7004170 ffff9986`a7004170 ffff9986`a7004170 : Ntfs!NtfsRemoveScb+0x66
ffffbe8b`81a874a0 fffff806`75bc20fc : ffffbe8b`81a87830 00000000`00000001 ffff9986`a7004010 ffffd604`c0457100 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffbe8b`81a874e0 fffff806`75aa8f76 : ffffbe8b`81a87830 ffff9986`a7004170 00000000`00000000 ffff9986`a7004010 : Ntfs!NtfsTeardownStructures+0x9c
ffffbe8b`81a87560 fffff806`75b84532 : ffffbe8b`81a87830 fffff806`75b98fc0 00000000`00000000 ffff9986`a7004000 : Ntfs!NtfsDecrementCloseCounts+0xf6
ffffbe8b`81a875c0 fffff806`75b9a364 : ffffbe8b`81a87830 ffff9986`a7004170 ffff9986`a7004010 ffffd604`c0457180 : Ntfs!NtfsCommonClose+0xac2
ffffbe8b`81a87690 fffff806`75b99048 : 00000000`0000001c fffff806`70925440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x244
ffffbe8b`81a877f0 fffff806`6fe5b3d5 : ffffd604`c65f5040 fffff806`75b98fc0 ffffd604`bb29b6a0 00000000`00000000 : Ntfs!NtfsFspClose+0x88
ffffbe8b`81a87ab0 fffff806`6ff030e5 : ffffd604`c65f5040 00000000`00000080 ffffd604`bb2ac200 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffbe8b`81a87b50 fffff806`70002e08 : ffffc581`aefd9180 ffffd604`c65f5040 fffff806`6ff03090 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffbe8b`81a87ba0 00000000`00000000 : ffffbe8b`81a88000 ffffbe8b`81a81000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Ntfs!NtfsDeleteScb+388
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.2311
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 388
FAILURE_BUCKET_ID: AV_R_(null)_Ntfs!NtfsDeleteScb
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a85b28bd-d8ef-2aaa-1d51-2345ecccca25}
Followup: MachineOwner
---------
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000d59, physical page number
Arg3: 0000025db53d0ec0, zero
Arg4: ffff9401ff033000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1968
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13032
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 22
Key : Analysis.Init.CPU.mSec
Value: 405
Key : Analysis.Init.Elapsed.mSec
Value: 9253
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0xd59
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0xf0321517
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x10ec0
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x330987
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0x340086
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x23e68f
Key : Bugcheck.Code.DumpHeader
Value: 0x12b
Key : Bugcheck.Code.Register
Value: 0x12b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 102222-5187-01.dmp
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: d59
BUGCHECK_P3: 25db53d0ec0
BUGCHECK_P4: ffff9401ff033000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
ffffa904`502af138 fffff807`6a997232 : 00000000`0000012b ffffffff`c00002c4 00000000`00000d59 0000025d`b53d0ec0 : nt!KeBugCheckEx
ffffa904`502af140 fffff807`6a83a751 : 00000000`00000001 00000000`c00002c4 ffff9401`ff033000 00000000`001ff02f : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
ffffa904`502af1a0 fffff807`6a670c31 : 00000000`00000004 fffff807`6a67079a 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1c9afd
ffffa904`502af260 fffff807`6a670500 : 00000000`00000001 00000000`00010ec0 00000000`00000000 ffffab05`00004000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffa904`502af2b0 fffff807`6a6710fc : fffff807`ffffffff ffffab05`b0bd5000 ffffa904`502af390 ffffab05`b0796d10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffa904`502af350 fffff807`6a671371 : ffff9401`fa1df730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffa904`502af400 fffff807`6a671431 : ffffab05`a5ba0000 ffffab05`b0796d10 ffffab05`b0bd5000 ffffab05`a5ba19c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffa904`502af480 fffff807`6a689cb8 : ffffab05`ae87b3c0 ffffab05`a5ba0000 00000000`00000000 ffffab05`acd568c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffa904`502af4b0 fffff807`6a747c07 : fffff807`6a671410 ffffa904`502af550 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa904`502af520 fffff807`6a6fb3d4 : ffffa904`502af620 00000000`31526d73 00000000`000003ff fffff807`6b1239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffa904`502af5f0 fffff807`6a6fae08 : 00000000`0000000c 00000000`000003ff ffffa904`502af6a0 fffff807`6b1239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffa904`502af640 fffff807`6a746e67 : 00000000`0000000c 00000000`00000004 ffffab05`b0796d10 ffffab05`acd568c0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffa904`502af6d0 fffff807`6a75cbeb : ffffab05`00000004 ffffab05`acd56980 00000000`00000000 ffffab05`a5ba0000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffa904`502af740 fffff807`6a6f1da0 : 0000007f`00000100 00000000`00000000 ffffa904`502af998 fffff807`6a6ef870 : nt!SmPageRead+0x33
ffffa904`502af790 fffff807`6a6ef3cd : 00000000`00000002 ffffa904`502af820 ffffa904`502af998 ffffab05`acd56870 : nt!MiIssueHardFaultIo+0x10c
ffffa904`502af7e0 fffff807`6a639a48 : 00000000`c0033333 00000000`00000001 00000219`33f29c66 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffa904`502af8a0 fffff807`6a80725e : ffffab05`ae87b300 000000c7`e0b7a270 ffffa904`502afac0 ffffab05`00000000 : nt!MmAccessFault+0x468
ffffa904`502afa40 00007ffa`25ab0b7e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000c7`e0b7aa40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`25ab0b7e
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+10a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2130
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10a
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000394, physical page number
Arg3: 000001df3dc4ea60, zero
Arg4: ffffcd80925ad000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1827
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16946
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 640
Key : Analysis.Init.Elapsed.mSec
Value: 1993
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x394
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0x11f2e5f1
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0xea60
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x190ed3
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0xffffffffffffffff
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x13ba54
Key : Bugcheck.Code.DumpHeader
Value: 0x12b
Key : Bugcheck.Code.Register
Value: 0x12b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 032623-7703-01.dmp
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 394
BUGCHECK_P3: 1df3dc4ea60
BUGCHECK_P4: ffffcd80925ad000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
ffffa286`ade97138 fffff807`3a399572 : 00000000`0000012b ffffffff`c00002c4 00000000`00000394 000001df`3dc4ea60 : nt!KeBugCheckEx
ffffa286`ade97140 fffff807`3a248a85 : 00000000`00000001 00000000`c00002c4 ffffcd80`925ad000 00000000`00092590 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
ffffa286`ade971a0 fffff807`3a060819 : 00000000`00000004 fffff807`3a060bd2 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1e8249
ffffa286`ade97260 fffff807`3a061144 : 00000000`00000001 00000000`0000ea60 00000000`00000000 ffff928f`0000d000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffa286`ade972b0 fffff807`3a060564 : 00000000`ffffffff ffff928f`5c620000 ffffa286`ade97390 ffff928f`5b19b0d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffa286`ade97350 fffff807`3a060279 : ffffcd80`8a7eb730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffa286`ade97400 fffff807`3a060131 : ffff928f`51e48000 ffff928f`5b19b0d0 ffff928f`5c620000 ffff928f`51e499c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffa286`ade97480 fffff807`3a0f9a48 : ffff928f`527eb080 ffff928f`51e48000 00000000`00000000 ffff928f`52aff0f0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffa286`ade974b0 fffff807`3a05dbab : fffff807`3a060110 ffffa286`ade97550 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa286`ade97520 fffff807`3a150d34 : ffffa286`ade97620 00000000`31526d73 00000000`000003ff fffff807`3ab239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffa286`ade975f0 fffff807`3a150768 : 00000000`0000000c 00000000`000003ff ffffa286`ade976a0 fffff807`3ab239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffa286`ade97640 fffff807`3a05ebd7 : 00000000`0000000c 00000000`0000000d ffff928f`5b19b0d0 ffff928f`52aff0f0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffa286`ade976d0 fffff807`3a04ee0b : ffff928f`0000000d ffff928f`52aff1b0 00000000`00000000 ffff928f`51e48000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffa286`ade97740 fffff807`3a147700 : 0000007f`00000100 00000000`00000000 ffffa286`ade97998 fffff807`3a1451f0 : nt!SmPageRead+0x33
ffffa286`ade97790 fffff807`3a144d4d : 00000000`00000002 ffffa286`ade97820 ffffa286`ade97998 ffff928f`52aff0a0 : nt!MiIssueHardFaultIo+0x10c
ffffa286`ade977e0 fffff807`3a0a4dd8 : 00000000`c0033333 00000000`00000001 000002c4`3edb201f 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffa286`ade978a0 fffff807`3a209bd8 : 00000000`ffffffff 00000000`00000000 ffffa286`ade97ac0 00000000`00000000 : nt!MmAccessFault+0x468
ffffa286`ade97a40 00007ffc`3f75b8a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
000000f2`19bfc340 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`3f75b8a0
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+10a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2728
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10a
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff9c8da1fc3420, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff807494838d4, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for klif.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1859
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 33837
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 3632
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 040823-7343-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff9c8da1fc3420
BUGCHECK_P2: 0
BUGCHECK_P3: fffff807494838d4
BUGCHECK_P4: 2
READ_ADDRESS: fffff80749afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9c8da1fc3420
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe70e1bd9d750 -- (.trap 0xffffe70e1bd9d750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000007f rbx=0000000000000000 rcx=000000000000005c
rdx=ffff9c8f97668760 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807494838d4 rsp=ffffe70e1bd9d8e0 rbp=000000000000007f
r8=ffff9c8f97668701 r9=ffff9c8fa6f64d60 r10=fffff80749483870
r11=fffffffdfb05e6c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!RtlCompareUnicodeString+0x64:
fffff807`494838d4 470fb7140b movzx r10d,word ptr [r11+r9] ds:ffff9c8d`a1fc3420=????
Resetting default scope
STACK_TEXT:
ffffe70e`1bd9d4a8 fffff807`492744bf : 00000000`00000050 ffff9c8d`a1fc3420 00000000`00000000 ffffe70e`1bd9d750 : nt!KeBugCheckEx
ffffe70e`1bd9d4b0 fffff807`490a4d70 : 00000000`00000000 00000000`00000000 ffffe70e`1bd9d7d0 00000000`00000000 : nt!MiSystemFault+0x1b171f
ffffe70e`1bd9d5b0 fffff807`49209bd8 : ffffc180`1769d180 fffff807`492027d2 ffffc180`1769d180 00000000`00000000 : nt!MmAccessFault+0x400
ffffe70e`1bd9d750 fffff807`494838d4 : fffff807`49b25440 00000000`00001700 fffff807`5fa84000 00000000`00000200 : nt!KiPageFault+0x358
ffffe70e`1bd9d8e0 fffff807`5fa059d7 : ffff9c8f`97668720 ffffe70e`1bd9d9a0 00000000`00000000 fffff807`5ff7c686 : nt!RtlCompareUnicodeString+0x64
ffffe70e`1bd9d920 ffff9c8f`97668720 : ffffe70e`1bd9d9a0 00000000`00000000 fffff807`5ff7c686 00000000`00000015 : klif+0x59d7
ffffe70e`1bd9d928 ffffe70e`1bd9d9a0 : 00000000`00000000 fffff807`5ff7c686 00000000`00000015 fffff807`4900f4e3 : 0xffff9c8f`97668720
ffffe70e`1bd9d930 00000000`00000000 : fffff807`5ff7c686 00000000`00000015 fffff807`4900f4e3 ffffe70e`00000031 : 0xffffe70e`1bd9d9a0
SYMBOL_NAME: klif+59d7
MODULE_NAME: klif
IMAGE_NAME: klif.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 59d7
FAILURE_BUCKET_ID: AV_R_(null)_klif!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fe2655c9-ba90-0b76-1bfe-235a6a52f9f2}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff9bffee32260
Arg3: 0000000400000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9288
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 640
Key : Analysis.Init.Elapsed.mSec
Value: 1856
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : MemoryManagement.PFN
Value: 400000
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 040323-8421-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff9bffee32260
BUGCHECK_P3: 400000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RuntimeBroker.exe
STACK_TEXT:
fffff088`b2bdf068 fffff803`1991ba3a : 00000000`0000001a 00000000`00041792 fffff9bf`fee32260 00000004`00000000 : nt!KeBugCheckEx
fffff088`b2bdf070 fffff803`198a3df6 : 00000000`00000000 fffff088`b2bdf640 00000000`0000007f fffff9bf`fee32260 : nt!MiDeleteVa+0x153a
fffff088`b2bdf170 fffff803`198a3f0b : fffff9fc`00000000 ffffd90a`beed0700 fffff088`00000000 fffff088`b2bdf5e0 : nt!MiWalkPageTablesRecursively+0x776
fffff088`b2bdf210 fffff803`198a3f0b : fffff9fc`fe6fffb8 ffffd90a`beed0700 fffff088`00000001 fffff088`b2bdf5f0 : nt!MiWalkPageTablesRecursively+0x88b
fffff088`b2bdf2b0 fffff803`198a3f0b : fffff9fc`fe6ff000 ffffd90a`beed0700 fffff088`00000002 fffff088`b2bdf600 : nt!MiWalkPageTablesRecursively+0x88b
fffff088`b2bdf350 fffff803`19876b3b : 00000000`00000000 ffffd90a`beed0700 00000000`00000003 fffff088`b2bdf610 : nt!MiWalkPageTablesRecursively+0x88b
fffff088`b2bdf3f0 fffff803`1991a2d1 : fffff088`b2bdf590 ffffd90a`00000000 fffff9bf`00000002 fffff9fc`00000000 : nt!MiWalkPageTables+0x36b
fffff088`b2bdf4f0 fffff803`19924480 : 00000000`00000001 fffff088`00000000 ffffd90a`beed0550 ffffd90a`b3822040 : nt!MiDeletePagablePteRange+0x4f1
fffff088`b2bdf800 fffff803`19cfe339 : ffffd90a`c62a20f0 00000000`00000000 ffffd90a`00000000 ffffd90a`00000000 : nt!MiDeleteVad+0x360
fffff088`b2bdf910 fffff803`19cfdce4 : ffffd90a`c62a20f0 ffffd90a`b520ca20 ffffd90a`b3822040 00000000`00000000 : nt!MiUnmapVad+0x49
fffff088`b2bdf940 fffff803`19cfd783 : ffffd90a`c62a1bf0 ffffd90a`c62a1bf0 ffffd90a`c62a20f0 ffffd90a`beed0080 : nt!MiCleanVad+0x30
fffff088`b2bdf970 fffff803`19c6a3c8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd90a`beed0080 : nt!MmCleanProcessAddressSpace+0x137
fffff088`b2bdf9f0 fffff803`19f0b322 : fffff803`1a325440 ffffd90a`beed0080 fffff803`19f0b2f0 00000000`00000200 : nt!PspRundownSingleProcess+0x20c
fffff088`b2bdfa80 fffff803`198bdef5 : ffffd90a`b3822040 fffff803`198ccb60 ffffd90a`a5c94a20 ffffd90a`00000000 : nt!PspProcessRundownWorkerSingle+0x32
fffff088`b2bdfab0 fffff803`19855485 : ffffd90a`b3822040 00000000`00000080 ffffd90a`a5d02080 00000000`00000000 : nt!ExpWorkerThread+0x105
fffff088`b2bdfb50 fffff803`19a02d48 : ffff9e81`5a929180 ffffd90a`b3822040 fffff803`19855430 00000000`001e0000 : nt!PspSystemThreadStartup+0x55
fffff088`b2bdfba0 00000000`00000000 : fffff088`b2be0000 fffff088`b2bd9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff100c086bd58, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff8b88a6547790, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1749
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13539
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 593
Key : Analysis.Init.Elapsed.mSec
Value: 2037
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Bugcheck.Code.DumpHeader
Value: 0xbe
Key : Bugcheck.Code.Register
Value: 0xbe
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 040423-7359-01.dmp
BUGCHECK_CODE: be
BUGCHECK_P1: fffff100c086bd58
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffff8b88a6547790
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
TRAP_FRAME: ffff8b88a6547790 -- (.trap 0xffff8b88a6547790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff10000000000 rbx=0000000000000000 rcx=000000000402ce9c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802820d44c8 rsp=ffff8b88a6547920 rbp=ffff8b88a65479c9
r8=8000000000000000 r9=ffff8b88a6547920 r10=0000000000000001
r11=ffff8b88a65478e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MmStoreProbeAndLockPages+0xcc:
fffff802`820d44c8 f0480fba6b183f lock bts qword ptr [rbx+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope
STACK_TEXT:
ffff8b88`a6547598 fffff802`82227534 : 00000000`000000be fffff100`c086bd58 8a000000`00200121 ffff8b88`a6547790 : nt!KeBugCheckEx
ffff8b88`a65475a0 fffff802`820a4e5f : 8a000000`00200121 00000000`00000003 ffff8b88`a6547810 00000000`00000000 : nt!MiRaisedIrqlFault+0x20170c
ffff8b88`a65475f0 fffff802`82209bd8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
ffff8b88`a6547790 fffff802`820d44c8 : fffff100`00000000 fffff100`04a02d70 ffffdf8e`dfb20050 00000000`00000000 : nt!KiPageFault+0x358
ffff8b88`a6547920 fffff802`8205e769 : 00000000`00040000 fffff802`00000000 ffffdf8e`d9e0f8d8 00000000`00000000 : nt!MmStoreProbeAndLockPages+0xcc
ffff8b88`a6547a30 fffff802`8205e97c : 00000000`00040000 ffff8b88`a6547aa0 ffff8b88`a6547aa0 ffffdf8e`d9e0f918 : nt!SmKmProbeAndLockAddress+0x5d
ffff8b88`a6547a60 fffff802`8205e851 : 00000000`00040000 00000000`00000004 000002b3`d5e50000 00000000`00020000 : nt!SmKmStoreHelperCommandProcess+0xac
ffff8b88`a6547ad0 fffff802`82055485 : ffffdf8e`d9e68080 00000000`00000080 fffff802`8205e7f0 000fe47f`bd9bbfff : nt!SmKmStoreHelperWorker+0x61
ffff8b88`a6547b50 fffff802`82202d48 : ffff9800`7288b180 ffffdf8e`d9e68080 fffff802`82055430 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8b88`a6547ba0 00000000`00000000 : ffff8b88`a6548000 ffff8b88`a6541000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiRaisedIrqlFault+20170c
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.2728
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 20170c
FAILURE_BUCKET_ID: AV_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd3fb09a803e0
Arg3: 0000002000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7113
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 765
Key : Analysis.Init.Elapsed.mSec
Value: 1984
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : MemoryManagement.PFN
Value: 2000000
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 112122-7593-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffd3fb09a803e0
BUGCHECK_P3: 2000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WmiPrvSE.exe
STACK_TEXT:
fffffa0b`b052efe8 fffff803`4f8c5f2a : 00000000`0000001a 00000000`00041792 ffffd3fb`09a803e0 00000020`00000000 : nt!KeBugCheckEx
fffffa0b`b052eff0 fffff803`4f838a66 : 00000000`00000000 00000000`00000000 00000000`00000092 ffffd3fb`09a803e0 : nt!MiDeleteVa+0x153a
fffffa0b`b052f0f0 fffff803`4f838b7b : ffffd3e9`00000000 ffff8104`9a1a5700 fffffa0b`00000000 fffffa0b`b052f560 : nt!MiWalkPageTablesRecursively+0x776
fffffa0b`b052f190 fffff803`4f838b7b : ffffd3e9`00000000 ffff8104`9a1a5700 fffffa0b`00000001 fffffa0b`b052f570 : nt!MiWalkPageTablesRecursively+0x88b
fffffa0b`b052f230 fffff803`4f838b7b : ffffd3e9`f4fec000 ffff8104`9a1a5700 fffffa0b`00000002 fffffa0b`b052f580 : nt!MiWalkPageTablesRecursively+0x88b
fffffa0b`b052f2d0 fffff803`4f80b7db : 00000000`00000000 ffff8104`9a1a5700 00000000`00000003 fffffa0b`b052f590 : nt!MiWalkPageTablesRecursively+0x88b
fffffa0b`b052f370 fffff803`4f8c47c1 : fffffa0b`b052f510 ffff8104`00000001 00000048`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffffa0b`b052f470 fffff803`4fcad124 : 00000000`00000000 fffff803`4f923000 00000000`00000000 ffff8104`8bee11c0 : nt!MiDeletePagablePteRange+0x4f1
fffffa0b`b052f780 fffff803`4f90b1f4 : ffff8104`9a1a5080 00000000`0aabfc50 00000000`00000002 fffff803`00000000 : nt!MiDeleteVadBitmap+0x8c
fffffa0b`b052f810 fffff803`4fcacfa0 : ffff8104`9a1a5080 ffff8104`9a1a57c0 ffff8104`9a1a5700 ffff8104`9af985c0 : nt!MiDeleteFinalPageTables+0xc8
fffffa0b`b052f8d0 fffff803`4fcaa42f : ffff8104`9a1a5080 fffffa0b`b052f990 ffff8104`9af985c0 ffff8104`9a1a54c8 : nt!MmDeleteProcessAddressSpace+0x64
fffffa0b`b052f920 fffff803`4fc16d50 : ffff8104`9a1a5050 ffff8104`9a1a5050 00000000`00000001 ffff8104`8bebbd20 : nt!PspProcessDelete+0x13f
fffffa0b`b052f9b0 fffff803`4fce42a4 : 00000000`00000000 ffff8104`9a1a5050 fffff803`4fce40a0 ffff8104`8beaacb0 : nt!ObpRemoveObjectRoutine+0x80
fffffa0b`b052fa10 fffff803`4f852b65 : ffff8104`9af985c0 fffff803`4fce40a0 ffff8104`8beaacb0 00000000`00000000 : nt!ObpProcessRemoveObjectQueue+0x204
fffffa0b`b052fab0 fffff803`4f871d25 : ffff8104`9af985c0 00000000`00000080 ffff8104`8bee11c0 00000000`00000000 : nt!ExpWorkerThread+0x105
fffffa0b`b052fb50 fffff803`4fa01f08 : ffffc180`ee54b180 ffff8104`9af985c0 fffff803`4f871cd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
fffffa0b`b052fba0 00000000`00000000 : fffffa0b`b0530000 fffffa0b`b0529000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------