*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffffc20752010100, Address of the heap that reported the corruption
Arg3: ffffc207655b5000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for rt640x64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1343
Key : Analysis.Elapsed.mSec
Value: 9178
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 2
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 4995
Key : Analysis.Memory.CommitPeak.Mb
Value: 148
Key : Bugcheck.Code.LegacyAPI
Value: 0x13a
Key : Failure.Bucket
Value: 0x13a_12_NETIO!NetioDereferenceNetBufferListChain
Key : Failure.Hash
Value: {db3ea39b-ecf4-8636-73c5-3862f1e62e13}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 13a
BUGCHECK_P1: 12
BUGCHECK_P2: ffffc20752010100
BUGCHECK_P3: ffffc207655b5000
BUGCHECK_P4: 0
FILE_IN_CAB: 053023-4734-01.dmp
CORRUPTING_POOL_ADDRESS: fffff80546afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc207655b5000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffad8a`77cae848 fffff805`46391edc : 00000000`0000013a 00000000`00000012 ffffc207`52010100 ffffc207`655b5000 : nt!KeBugCheckEx
ffffad8a`77cae850 fffff805`46391f3c : 00000000`00000012 ffffad8a`77cae960 ffffc207`52010100 ffffc207`65636f60 : nt!RtlpHeapHandleError+0x40
ffffad8a`77cae890 fffff805`46391b69 : ffffc207`655b5000 ffffc207`52010280 ffffc207`52010280 ffffad8a`77cae960 : nt!RtlpHpHeapHandleError+0x58
ffffad8a`77cae8c0 fffff805`46222310 : ffffc207`65648980 ffffad8a`77cae960 ffffc207`52010280 33333333`33333333 : nt!RtlpLogHeapFailure+0x45
ffffad8a`77cae8f0 fffff805`46017bb4 : 00000000`00000000 00000000`0840ecfa 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x20ca00
ffffad8a`77cae990 fffff805`467b70b9 : 00000000`0005f380 00000000`00000000 00000000`00000001 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffad8a`77caea70 fffff805`49793a03 : ffffc207`68bd7f20 00000000`00000001 00000000`00000000 00000000`00000001 : nt!ExFreePool+0x9
ffffad8a`77caeaa0 fffff805`49645b63 : 00000000`00000000 00000000`00000002 00000000`00000001 00000000`00000000 : tcpip!TcpTcbReassemblyFreeNetBufferList+0x63
ffffad8a`77caead0 fffff805`49787ab7 : 00000000`00000000 00000000`00000001 ffffc207`68bd7da0 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x103
ffffad8a`77caeb50 fffff805`497854b5 : ffffad8a`77caecb9 ffffc207`00000001 00000000`00000002 00000000`00000000 : tcpip!TcpReceive+0xd27
ffffad8a`77caec40 fffff805`49760854 : ffffc207`5ba15840 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x25
ffffad8a`77caec80 fffff805`497b8b8e : ffffc207`5ba15840 ffffc207`5ba4d010 fffff805`497ab606 ffffad8a`77caf100 : tcpip!IpFlcReceivePreValidatedPackets+0x6c4
ffffad8a`77caef20 fffff805`460ad478 : ffffc207`581af480 00000000`00000002 ffffc207`54fcc040 ffffad8a`77caf218 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
ffffad8a`77caf070 fffff805`460ad3ed : fffff805`497b8a60 ffffad8a`77caf218 ffffc207`54645130 fffff805`496423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffad8a`77caf0e0 fffff805`4979384d : ffffad8a`77caf130 00000000`00000000 ffffc207`617637b0 fffff805`49a2142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffad8a`77caf120 fffff805`49792f2d : 00000000`00000001 ffffad8a`77caf280 ffffc207`5ba4d010 ffffad8a`77caf290 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffffad8a`77caf180 fffff805`494d1eb0 : ffffc207`587bf7e1 00000000`00000001 ffffc207`5ba1a130 ffffad8a`77caf590 : tcpip!FlReceiveNetBufferListChain+0x46d
ffffad8a`77caf430 fffff805`494d1ccb : ffffc207`5ba5c010 00001f80`00000001 ffffad8a`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffffad8a`77caf510 fffff805`494d7ef0 : ffffc207`58bcd1a0 ffffc207`58f86201 ffffc207`58bcd1a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffffad8a`77caf590 fffff805`4950dfef : ffffc207`58f862a0 ffffad8a`77caf661 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
ffffad8a`77caf5e0 fffff805`494d4a94 : 00000000`0001ef08 00000000`00000001 ffffc207`58bcd1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffffad8a`77caf6b0 fffff805`52426a3e : ffffc207`587d3000 ffffc207`587d3000 00000000`00000001 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffffad8a`77caf740 ffffc207`587d3000 : ffffc207`587d3000 00000000`00000001 00000000`00000000 ffffc207`00000001 : rt640x64+0x26a3e
ffffad8a`77caf748 ffffc207`587d3000 : 00000000`00000001 00000000`00000000 ffffc207`00000001 00000000`00000001 : 0xffffc207`587d3000
ffffad8a`77caf750 00000000`00000001 : 00000000`00000000 ffffc207`00000001 00000000`00000001 00000001`00000001 : 0xffffc207`587d3000
ffffad8a`77caf758 00000000`00000000 : ffffc207`00000001 00000000`00000001 00000001`00000001 80000000`00000001 : 0x1
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+103
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 103
FAILURE_BUCKET_ID: 0x13a_12_NETIO!NetioDereferenceNetBufferListChain
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {db3ea39b-ecf4-8636-73c5-3862f1e62e13}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8d6cec8e8794, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80755167117, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1483
Key : Analysis.Elapsed.mSec
Value: 3469
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 4786
Key : Analysis.Memory.CommitPeak.Mb
Value: 146
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted
Key : Failure.Hash
Value: {a961761d-067f-3c03-f54e-6d149c3fd38c}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff8d6cec8e8794
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80755167117
BUGCHECK_P4: 2
FILE_IN_CAB: 052923-4921-01.dmp
READ_ADDRESS: fffff807584fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8d6cec8e8794
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: ffffb70e2c87edf0 -- (.trap 0xffffb70e2c87edf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8d6cec8e8774
rdx=ffff88825500ca50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80755167117 rsp=ffffb70e2c87ef80 rbp=0000000000000000
r8=ffff88825500ca50 r9=0000000000000550 r10=fffff80757a21480
r11=ffff88825ba55a20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x297:
fffff807`55167117 4883792000 cmp qword ptr [rcx+20h],0 ds:ffff8d6c`ec8e8794=????????????????
Resetting default scope
STACK_TEXT:
ffffb70e`2c87eb48 fffff807`57c4ac53 : 00000000`00000050 ffff8d6c`ec8e8794 00000000`00000000 ffffb70e`2c87edf0 : nt!KeBugCheckEx
ffffb70e`2c87eb50 fffff807`57a6e7b0 : 00000000`00000000 00000000`00000000 ffffb70e`2c87ee70 00000000`00000000 : nt!MiSystemFault+0x1b2273
ffffb70e`2c87ec50 fffff807`57c0b7d8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffb70e`2c87edf0 fffff807`55167117 : ffffb70e`00000005 00000000`00000000 00000600`00000000 00000000`00000000 : nt!KiPageFault+0x358
ffffb70e`2c87ef80 80000000`00000000 : ffff8d6c`ec8e8774 ffffb980`57e5ae30 00000000`00000006 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x297
ffffb70e`2c87eff0 ffff8d6c`ec8e8774 : ffffb980`57e5ae30 00000000`00000006 00000000`00000000 ffff8882`4a61b0a0 : 0x80000000`00000000
ffffb70e`2c87eff8 ffffb980`57e5ae30 : 00000000`00000006 00000000`00000000 ffff8882`4a61b0a0 ffff8882`5ba55a20 : 0xffff8d6c`ec8e8774
ffffb70e`2c87f000 00000000`00000006 : 00000000`00000000 ffff8882`4a61b0a0 ffff8882`5ba55a20 ffff8882`59795010 : 0xffffb980`57e5ae30
ffffb70e`2c87f008 00000000`00000000 : ffff8882`4a61b0a0 ffff8882`5ba55a20 ffff8882`59795010 ffffffff`ffffffff : 0x6
SYMBOL_NAME: FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+297
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
IMAGE_VERSION: 10.0.19041.2905
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 297
FAILURE_BUCKET_ID: AV_R_(null)_FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a961761d-067f-3c03-f54e-6d149c3fd38c}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000051384
Arg2: fffff1010f707158
Arg3: fffff1010f706990
Arg4: fffff80227e052d7
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1343
Key : Analysis.Elapsed.mSec
Value: 4269
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 109
Key : Analysis.Init.Elapsed.mSec
Value: 5062
Key : Analysis.Memory.CommitPeak.Mb
Value: 134
Key : Bugcheck.Code.LegacyAPI
Value: 0x34
Key : Failure.Bucket
Value: 0x34_nt!MiGetPage
Key : Failure.Hash
Value: {1a1a17c5-d4f8-5616-f3cf-6644174cedb0}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 34
BUGCHECK_P1: 51384
BUGCHECK_P2: fffff1010f707158
BUGCHECK_P3: fffff1010f706990
BUGCHECK_P4: fffff80227e052d7
FILE_IN_CAB: 052923-4078-01.dmp
EXCEPTION_RECORD: fffff1010f707158 -- (.exr 0xfffff1010f707158)
ExceptionAddress: fffff80227e052d7 (nt!ExpInterlockedPopEntrySListFault)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff1010f706990 -- (.cxr 0xfffff1010f706990)
rax=00000006146d0001 rbx=0000000000000000 rcx=fffff08000006ff0
rdx=000307e000307ec1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80227e052d7 rsp=fffff1010f707390 rbp=0000000000000000
r8=000307e000307ec0 r9=0000000000000000 r10=fffff08000006ff0
r11=fffff80227a0a468 r12=fffff80227a0a468 r13=0000000000000001
r14=fffff80228650c00 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!ExpInterlockedPopEntrySListFault:
fffff802`27e052d7 498b08 mov rcx,qword ptr [r8] ds:002b:000307e0`00307ec0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff802286fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff101`0f707390 fffff802`27c74eec : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
fffff101`0f7073a0 fffff802`27c744bb : fffff802`28650c00 fffff802`000000ff 00000000`000000ff fffff279`00000000 : nt!MiGetPage+0xfc
fffff101`0f707480 fffff802`28025958 : c60fd7c9`452004c0 00000000`000007ff ffff9c8b`09c2fff8 0a000002`00000000 : nt!MiGetPageChain+0x48b
fffff101`0f7076c0 fffff802`28058311 : 00000000`00000000 ffffc60f`d3d0aa90 ffffc60f`d1602500 00000000`00000000 : nt!MiPfPrepareSequentialReadList+0x598
fffff101`0f7077d0 fffff802`27c4bc4c : 00000000`e3800000 fffff802`27c49690 00000000`00000000 00000000`00000000 : nt!MmPrefetchForCacheManager+0x75
fffff101`0f707830 fffff802`27c4995b : 01d991b2`dfa82c5c fffff802`27c1beef 00000000`00020000 00000000`00000000 : nt!CcPerformReadAhead+0x328
fffff101`0f707a00 fffff802`27c8e5c5 : ffffc60f`d1602500 ffffc60f`d1602500 ffffc60f`bbcc7630 fffff802`00000000 : nt!CcWorkerThread+0x2cb
fffff101`0f707b30 fffff802`27d265f5 : ffffc60f`d1602500 00000000`00000080 ffffc60f`bbcd0180 f06c6d2d`95ddde41 : nt!ExpWorkerThread+0x105
fffff101`0f707bd0 fffff802`27e048d8 : ffff8a80`85f80180 ffffc60f`d1602500 fffff802`27d265a0 cf465bc4`4a8da7b6 : nt!PspSystemThreadStartup+0x55
fffff101`0f707c20 00000000`00000000 : fffff101`0f708000 fffff101`0f701000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiGetPage+fc
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr 0xfffff1010f706990 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: fc
FAILURE_BUCKET_ID: 0x34_nt!MiGetPage
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1a1a17c5-d4f8-5616-f3cf-6644174cedb0}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000001fbd5f, page frame number
Arg3: 0000000000000000, current page state
Arg4: 0600000fffffffff, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1577
Key : Analysis.Elapsed.mSec
Value: 2636
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 124
Key : Analysis.Init.Elapsed.mSec
Value: 5832
Key : Analysis.Memory.CommitPeak.Mb
Value: 137
Key : Bugcheck.Code.LegacyAPI
Value: 0x4e
Key : Failure.Bucket
Value: 0x4E_99_nt!MiBadShareCount
Key : Failure.Hash
Value: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 1fbd5f
BUGCHECK_P3: 0
BUGCHECK_P4: 600000fffffffff
FILE_IN_CAB: 052823-4984-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
ffffc107`d5ed6b98 fffff801`655f3147 : 00000000`0000004e 00000000`00000099 00000000`001fbd5f 00000000`00000000 : nt!KeBugCheckEx
ffffc107`d5ed6ba0 fffff801`654c091b : 00000000`0029d95e 80000000`00000000 00000000`00000001 00000000`0000005e : nt!MiBadShareCount+0x5b
ffffc107`d5ed6be0 fffff801`654b8c8e : ffffc107`d5ed6e90 ffffd98f`ae899080 00000000`00000000 ffffc107`d5ed78d0 : nt!MiDeletePteList+0x8db
ffffc107`d5ed6cc0 fffff801`65825c5d : ffffd98f`b1dcb080 ffffd98f`b9adab88 ffffd98f`00000000 ffffd98f`00000000 : nt!MiDecommitPages+0x121e
ffffc107`d5ed7890 fffff801`658252c3 : ffffc107`d5ed7a10 00000000`00000000 ffffc107`d5ed7a10 ffffd98f`b9adab60 : nt!MiDecommitRegion+0x7d
ffffc107`d5ed7910 fffff801`65824bb5 : 00000000`00000000 ffffd98f`c3caa5e0 00000000`135ffcec fffff801`6581159a : nt!MmFreeVirtualMemory+0x6d3
ffffc107`d5ed7a60 fffff801`6560f4f8 : ffffd98f`b1dcb080 ffffd98f`c3caa5e0 ffffc107`d5ed7ad8 ffffffff`ff676980 : nt!NtFreeVirtualMemory+0x95
ffffc107`d5ed7ac0 00007ffc`41b6d424 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1193e9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`41b6d424
SYMBOL_NAME: nt!MiBadShareCount+5b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5b
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Followup: MachineOwner
---------