SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80512af318a, The address that the exception occurred at
Arg3: ffffb1882cf15698, Exception Record Address
Arg4: ffffb1882cf14ed0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 4546
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 37468
Key : Analysis.Init.CPU.mSec
Value: 515
Key : Analysis.Init.Elapsed.mSec
Value: 1770
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80512af318a
BUGCHECK_P3: ffffb1882cf15698
BUGCHECK_P4: ffffb1882cf14ed0
EXCEPTION_RECORD: ffffb1882cf15698 -- (.exr 0xffffb1882cf15698)
ExceptionAddress: fffff80512af318a (bcmwl63a+0x000000000015318a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000deadbf05
Attempt to read from address 00000000deadbf05
CONTEXT: ffffb1882cf14ed0 -- (.cxr 0xffffb1882cf14ed0)
rax=00000000deadbeef rbx=ffffe504fa793420 rcx=ffffe504fab5d4e0
rdx=ffffe50500c03010 rsi=ffffe504fc02ef80 rdi=ffffe504fabf4010
rip=fffff80512af318a rsp=ffffb1882cf158d0 rbp=0000000000000020
r8=0000000000000000 r9=0000000000006e9e r10=0000000000002280
r11=0000000000006a5c r12=ffffe50501092170 r13=0000000000000000
r14=ffffe50500c03010 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010246
bcmwl63a+0x15318a:
fffff805`12af318a 0fb74816 movzx ecx,word ptr [rax+16h] ds:002b:00000000`deadbf05=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8050defa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000deadbf05
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000deadbf05
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffb188`2cf158d0 00000000`00000001 : 00000000`0000001f ffffe504`fac5e8c0 00000000`00000001 ffffe504`fc050000 : bcmwl63a+0x15318a
ffffb188`2cf158d8 00000000`0000001f : ffffe504`fac5e8c0 00000000`00000001 ffffe504`fc050000 00000000`00000000 : 0x1
ffffb188`2cf158e0 ffffe504`fac5e8c0 : 00000000`00000001 ffffe504`fc050000 00000000`00000000 00006e9e`22806a5c : 0x1f
ffffb188`2cf158e8 00000000`00000001 : ffffe504`fc050000 00000000`00000000 00006e9e`22806a5c 00000000`00000000 : 0xffffe504`fac5e8c0
ffffb188`2cf158f0 ffffe504`fc050000 : 00000000`00000000 00006e9e`22806a5c 00000000`00000000 ffffe504`fc05002e : 0x1
ffffb188`2cf158f8 00000000`00000000 : 00006e9e`22806a5c 00000000`00000000 ffffe504`fc05002e ffffe504`fc050048 : 0xffffe504`fc050000
SYMBOL_NAME: bcmwl63a+15318a
MODULE_NAME: bcmwl63a
IMAGE_NAME: bcmwl63a.sys
STACK_COMMAND: .cxr 0xffffb1882cf14ed0 ; kb
BUCKET_ID_FUNC_OFFSET: 15318a
FAILURE_BUCKET_ID: AV_bcmwl63a!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {923870c9-9263-9e30-c5a3-4f73aa64fade}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8034116318a, The address that the exception occurred at
Arg3: ffffdf87843f8698, Exception Record Address
Arg4: ffffdf87843f7ed0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 3906
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15674
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 1767
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8034116318a
BUGCHECK_P3: ffffdf87843f8698
BUGCHECK_P4: ffffdf87843f7ed0
EXCEPTION_RECORD: ffffdf87843f8698 -- (.exr 0xffffdf87843f8698)
ExceptionAddress: fffff8034116318a (bcmwl63a+0x000000000015318a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000deadbf05
Attempt to read from address 00000000deadbf05
CONTEXT: ffffdf87843f7ed0 -- (.cxr 0xffffdf87843f7ed0)
rax=00000000deadbeef rbx=ffffcc88144e1520 rcx=ffffcc881231e260
rdx=ffffcc8812776010 rsi=ffffcc8812d11f80 rdi=ffffcc8812965010
rip=fffff8034116318a rsp=ffffdf87843f88d0 rbp=000000000000001f
r8=0000000000000000 r9=0000000000006e9e r10=0000000000002280
r11=0000000000006a5c r12=ffffcc88163084d0 r13=0000000000000000
r14=ffffcc8812776010 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
bcmwl63a+0x15318a:
fffff803`4116318a 0fb74816 movzx ecx,word ptr [rax+16h] ds:002b:00000000`deadbf05=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8033b6fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000deadbf05
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000deadbf05
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffdf87`843f88d0 00000000`00000001 : 00000000`0000001e ffffcc88`129cf500 00000000`00000001 ffffcc88`12d21000 : bcmwl63a+0x15318a
ffffdf87`843f88d8 00000000`0000001e : ffffcc88`129cf500 00000000`00000001 ffffcc88`12d21000 00000000`00000000 : 0x1
ffffdf87`843f88e0 ffffcc88`129cf500 : 00000000`00000001 ffffcc88`12d21000 00000000`00000000 00006e9e`22806a5c : 0x1e
ffffdf87`843f88e8 00000000`00000001 : ffffcc88`12d21000 00000000`00000000 00006e9e`22806a5c 00000000`00000000 : 0xffffcc88`129cf500
ffffdf87`843f88f0 ffffcc88`12d21000 : 00000000`00000000 00006e9e`22806a5c 00000000`00000000 ffffcc88`12d2102e : 0x1
ffffdf87`843f88f8 00000000`00000000 : 00006e9e`22806a5c 00000000`00000000 ffffcc88`12d2102e ffffcc88`12d21048 : 0xffffcc88`12d21000
SYMBOL_NAME: bcmwl63a+15318a
MODULE_NAME: bcmwl63a
IMAGE_NAME: bcmwl63a.sys
STACK_COMMAND: .cxr 0xffffdf87843f7ed0 ; kb
BUCKET_ID_FUNC_OFFSET: 15318a
FAILURE_BUCKET_ID: AV_bcmwl63a!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {923870c9-9263-9e30-c5a3-4f73aa64fade}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8004b0c318a, The address that the exception occurred at
Arg3: ffffc5820c099698, Exception Record Address
Arg4: ffffc5820c098ed0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 4890
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 36549
Key : Analysis.Init.CPU.mSec
Value: 515
Key : Analysis.Init.Elapsed.mSec
Value: 1766
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8004b0c318a
BUGCHECK_P3: ffffc5820c099698
BUGCHECK_P4: ffffc5820c098ed0
EXCEPTION_RECORD: ffffc5820c099698 -- (.exr 0xffffc5820c099698)
ExceptionAddress: fffff8004b0c318a (bcmwl63a+0x000000000015318a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000deadbf05
Attempt to read from address 00000000deadbf05
CONTEXT: ffffc5820c098ed0 -- (.cxr 0xffffc5820c098ed0)
rax=00000000deadbeef rbx=ffff870a92b8bba0 rcx=ffff870a96cd7d80
rdx=ffff870a9f6c1010 rsi=ffff870a8e1c3f80 rdi=ffff870a93ebd360
rip=fffff8004b0c318a rsp=ffffc5820c0998d0 rbp=0000000000000005
r8=0000000000000000 r9=0000000000006e9e r10=0000000000002280
r11=0000000000006a5c r12=ffff870a8ead1d00 r13=0000000000000000
r14=ffff870a9f6c1010 r15=0000000000000002
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202
bcmwl63a+0x15318a:
fffff800`4b0c318a 0fb74816 movzx ecx,word ptr [rax+16h] ds:002b:00000000`deadbf05=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff800430fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000deadbf05
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000deadbf05
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffc582`0c0998d0 00000000`00000001 : 00000000`00000004 ffff870a`943869a0 00000000`00000001 ffff870a`8e1a6800 : bcmwl63a+0x15318a
ffffc582`0c0998d8 00000000`00000004 : ffff870a`943869a0 00000000`00000001 ffff870a`8e1a6800 00000000`00000000 : 0x1
ffffc582`0c0998e0 ffff870a`943869a0 : 00000000`00000001 ffff870a`8e1a6800 00000000`00000000 00006e9e`22806a5c : 0x4
ffffc582`0c0998e8 00000000`00000001 : ffff870a`8e1a6800 00000000`00000000 00006e9e`22806a5c 00000000`00000000 : 0xffff870a`943869a0
ffffc582`0c0998f0 ffff870a`8e1a6800 : 00000000`00000000 00006e9e`22806a5c 00000000`00000000 ffff870a`8e1a682e : 0x1
ffffc582`0c0998f8 00000000`00000000 : 00006e9e`22806a5c 00000000`00000000 ffff870a`8e1a682e ffff870a`8e1a6848 : 0xffff870a`8e1a6800
SYMBOL_NAME: bcmwl63a+15318a
MODULE_NAME: bcmwl63a
IMAGE_NAME: bcmwl63a.sys
STACK_COMMAND: .cxr 0xffffc5820c098ed0 ; kb
BUCKET_ID_FUNC_OFFSET: 15318a
FAILURE_BUCKET_ID: AV_bcmwl63a!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {923870c9-9263-9e30-c5a3-4f73aa64fade}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
user space of the system process. Parameter 2 contains the
address of the attempted write.
Arg2: 00000000deadbf07
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3343
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 26915
Key : Analysis.Init.CPU.mSec
Value: 514
Key : Analysis.Init.Elapsed.mSec
Value: 1787
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 4477
BUGCHECK_P2: deadbf07
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffef871dcd8800 -- (.trap 0xffffef871dcd8800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdc0db25ebf88 rbx=0000000000000000 rcx=ae3ecbd693710000
rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000
rip=fffff8047d929502 rsp=ffffef871dcd8990 rbp=0000000000000000
r8=ffffdc0db25cef80 r9=0000000000006edf r10=0000000000000014
r11=ffffdc0db21fcec0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
bcmwl63a+0x179502:
fffff804`7d929502 44896f18 mov dword ptr [rdi+18h],r13d ds:00000000`00000018=????????
Resetting default scope
STACK_TEXT:
ffffef87`1dcd8478 fffff804`7482cb2b : 00000000`0000001a 00000000`00004477 00000000`deadbf07 00000000`00000000 : nt!KeBugCheckEx
ffffef87`1dcd8480 fffff804`7469fdc7 : 00000000`00000000 fffff279`00000000 ffffef87`1dcd8800 fffff279`000037a8 : nt!MiInPagePageTable+0x1d3c0b
ffffef87`1dcd85d0 fffff804`7469f26a : 00000000`00000000 ffffdc0d`00000000 ffffdc0d`b25ce850 00000000`00000000 : nt!MiUserFault+0x5e7
ffffef87`1dcd8660 fffff804`7480535e : ffffdc0d`b2213010 00000000`00000000 ffffdc0d`b25ce826 fffff804`00000000 : nt!MmAccessFault+0x16a
ffffef87`1dcd8800 fffff804`7d929502 : 00000000`00000000 00000000`00000000 00000000`0000c000 ffffdc0d`b20a12b0 : nt!KiPageFault+0x35e
ffffef87`1dcd8990 00000000`00000000 : 00000000`00000000 00000000`0000c000 ffffdc0d`b20a12b0 ffffdc0d`08759bab : bcmwl63a+0x179502
SYMBOL_NAME: bcmwl63a+179502
MODULE_NAME: bcmwl63a
IMAGE_NAME: bcmwl63a.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 179502
FAILURE_BUCKET_ID: 0x1a_4477_bcmwl63a!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c3aafd5b-1ec9-55de-8478-e7f1065927fa}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
user space of the system process. Parameter 2 contains the
address of the attempted write.
Arg2: 00000000deadbf07
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3093
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 31987
Key : Analysis.Init.CPU.mSec
Value: 499
Key : Analysis.Init.Elapsed.mSec
Value: 1770
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 4477
BUGCHECK_P2: deadbf07
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffac895188b800 -- (.trap 0xffffac895188b800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdf01b2bd7788 rbx=0000000000000000 rcx=70cc8ec3ec4d0000
rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000
rip=fffff807563e9502 rsp=ffffac895188b990 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=fffff8074ab65ac0
r11=ffffac895188b6d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
bcmwl63a+0x179502:
fffff807`563e9502 44896f18 mov dword ptr [rdi+18h],r13d ds:00000000`00000018=????????
Resetting default scope
STACK_TEXT:
ffffac89`5188b478 fffff807`4c82cb2b : 00000000`0000001a 00000000`00004477 00000000`deadbf07 00000000`00000000 : nt!KeBugCheckEx
ffffac89`5188b480 fffff807`4c69fdc7 : 00000000`00000000 fffffcfe`00000000 ffffac89`5188b800 fffffcfe`400037a8 : nt!MiInPagePageTable+0x1d3c0b
ffffac89`5188b5d0 fffff807`4c69f26a : 00000000`00000000 ffffdf01`00000000 ffffdf01`b23fbc60 00000000`00000000 : nt!MiUserFault+0x5e7
ffffac89`5188b660 fffff807`4c80535e : ffffdf01`b2be002e ffffdf01`b2be0048 0000060e`000005f4 fffff807`000005f4 : nt!MmAccessFault+0x16a
ffffac89`5188b800 fffff807`563e9502 : 00000000`00000000 00000000`00000002 00000000`0000c000 ffffdf01`b2784de0 : nt!KiPageFault+0x35e
ffffac89`5188b990 00000000`00000000 : 00000000`00000002 00000000`0000c000 ffffdf01`b2784de0 ffffdf01`0ff76286 : bcmwl63a+0x179502
SYMBOL_NAME: bcmwl63a+179502
MODULE_NAME: bcmwl63a
IMAGE_NAME: bcmwl63a.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 179502
FAILURE_BUCKET_ID: 0x1a_4477_bcmwl63a!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c3aafd5b-1ec9-55de-8478-e7f1065927fa}
Followup: MachineOwner
---------