Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121910-20280-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4a000 PsLoadedModuleList = 0xfffff800`02e87e50
Debug session time: Sun Dec 19 12:19:13.477 2010 (UTC - 5:00)
System Uptime: 0 days 0:05:18.835
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002ce7372, fffff88006bf8ee0, 0}
Probably caused by : memory_corruption ( nt!MiReferenceControlArea+202 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ce7372, Address of the instruction which caused the bugcheck
Arg3: fffff88006bf8ee0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiReferenceControlArea+202
fffff800`02ce7372 48894108 mov qword ptr [rcx+8],rax
CONTEXT: fffff88006bf8ee0 -- (.cxr 0xfffff88006bf8ee0)
rax=fffffa8003bc69d8 rbx=fffffa80042cd980 rcx=f7fffa80049b15a8
rdx=0000000080000000 rsi=0000000000000000 rdi=0000000000000001
rip=fffff80002ce7372 rsp=fffff88006bf98b0 rbp=fffff880009e9180
r8=0000000000000000 r9=fffff880009e9180 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff80002ef4040
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!MiReferenceControlArea+0x202:
fffff800`02ce7372 48894108 mov qword ptr [rcx+8],rax ds:002b:f7fffa80`049b15b0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: mscorsvw.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002ce7372
STACK_TEXT:
fffff880`06bf98b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiReferenceControlArea+0x202
FOLLOWUP_IP:
nt!MiReferenceControlArea+202
fffff800`02ce7372 48894108 mov qword ptr [rcx+8],rax
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiReferenceControlArea+202
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88006bf8ee0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiReferenceControlArea+202
BUCKET_ID: X64_0x3B_nt!MiReferenceControlArea+202
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121710-13072-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c1a000 PsLoadedModuleList = 0xfffff800`02e57e50
Debug session time: Fri Dec 17 21:35:22.558 2010 (UTC - 5:00)
System Uptime: 0 days 21:33:13.057
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002dbf0f3, fffff88006af6b90, 0}
Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+43 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002dbf0f3, Address of the instruction which caused the bugcheck
Arg3: fffff88006af6b90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExFreePoolWithTag+43
fffff800`02dbf0f3 418b45f0 mov eax,dword ptr [r13-10h]
CONTEXT: fffff88006af6b90 -- (.cxr 0xfffff88006af6b90)
rax=0000000000000000 rbx=fffffa8004ace390 rcx=f7fffa80048ac1d0
rdx=0000000000000000 rsi=fffff8a00dce2320 rdi=fffffa8005689000
rip=fffff80002dbf0f3 rsp=fffff88006af7560 rbp=0000000000000001
r8=0000000000000002 r9=0000000000000090 r10=fffff80002c1a000
r11=fffff88003a99a08 r12=0000000000000000 r13=f7fffa80048ac1d0
r14=0000000000000000 r15=fffff8a00bffd390
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExFreePoolWithTag+0x43:
fffff800`02dbf0f3 418b45f0 mov eax,dword ptr [r13-10h] ds:002b:f7fffa80`048ac1c0=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002dbf0f3
STACK_TEXT:
fffff880`06af7560 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x43
FOLLOWUP_IP:
nt!ExFreePoolWithTag+43
fffff800`02dbf0f3 418b45f0 mov eax,dword ptr [r13-10h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExFreePoolWithTag+43
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88006af6b90 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExFreePoolWithTag+43
BUCKET_ID: X64_0x3B_nt!ExFreePoolWithTag+43
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121910-15225-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c18000 PsLoadedModuleList = 0xfffff800`02e55e50
Debug session time: Sun Dec 19 19:35:27.050 2010 (UTC - 5:00)
System Uptime: 0 days 7:15:22.737
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8800421b507, fffff88007aa6c40, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800421b507, Address of the instruction which caused the bugcheck
Arg3: fffff88007aa6c40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
fffff880`0421b507 488908 mov qword ptr [rax],rcx
CONTEXT: fffff88007aa6c40 -- (.cxr 0xfffff88007aa6c40)
rax=f7fff8a00261b468 rbx=fffffa80040d5910 rcx=fffff8a00261b468
rdx=fffffa8005666000 rsi=fffff8a001537b40 rdi=fffffa800566a000
rip=fffff8800421b507 rsp=fffff88007aa7610 rbp=0000000000000001
r8=fffffa800566b3c0 r9=0000000000000001 r10=0000000000000018
r11=fffff88007aa75e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff8a00d5fc690
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x17f:
fffff880`0421b507 488908 mov qword ptr [rax],rcx ds:002b:f7fff8a0`0261b468=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8800421b507
STACK_TEXT:
fffff880`07aa7610 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x17f
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
fffff880`0421b507 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
STACK_COMMAND: .cxr 0xfffff88007aa6c40 ; kb
FAILURE_BUCKET_ID: X64_0x3B_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
BUCKET_ID: X64_0x3B_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\122010-18189-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c55000 PsLoadedModuleList = 0xfffff800`02e92e50
Debug session time: Mon Dec 20 20:48:25.647 2010 (UTC - 5:00)
System Uptime: 1 days 0:56:10.130
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002c8c03e, fffff88008163100, 0}
Probably caused by : memory_corruption ( nt!MiRemoveUnusedSegment+96 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c8c03e, Address of the instruction which caused the bugcheck
Arg3: fffff88008163100, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiRemoveUnusedSegment+96
fffff800`02c8c03e 48894108 mov qword ptr [rcx+8],rax
CONTEXT: fffff88008163100 -- (.cxr 0xfffff88008163100)
rax=fffffa8004075718 rbx=0000000000000000 rcx=f7fffa8004456f18
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000001
rip=fffff80002c8c03e rsp=fffff88008163ad0 rbp=fffff880009e9180
r8=0000000000000001 r9=0000000000000001 r10=0000000000000002
r11=0000000000000001 r12=fffffa80040d59c0 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!MiRemoveUnusedSegment+0x96:
fffff800`02c8c03e 48894108 mov qword ptr [rcx+8],rax ds:002b:f7fffa80`04456f20=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002d85359 to fffff80002c8c03e
STACK_TEXT:
fffff880`08163ad0 fffff800`02d85359 : fffffa80`040d59c0 00000000`00000000 fffffa80`040d59c0 000fffff`ffffffff : nt!MiRemoveUnusedSegment+0x96
fffff880`08163b20 fffff800`02d216cc : fffffa80`040d59c0 00000000`00000000 00000000`00000001 00000000`0003a757 : nt!MiCheckForControlAreaDeletion+0x39
fffff880`08163b70 fffff800`02c88cd8 : 00000000`00000002 00000000`00000000 fffffa80`023ded00 00000000`00000080 : nt! ?? ::FNODOBFM::`string'+0x10c6c
fffff880`08163be0 fffff800`02d8629d : fffffa80`023ded00 fffff880`08163d00 00000000`00000080 00000000`0004c482 : nt!MiRestoreTransitionPte+0xcc
fffff880`08163c40 fffff800`02d34ade : 00000000`00000002 fffff880`08163d00 fffff880`02194c00 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x2ad
fffff880`08163cc0 fffff800`02ce1ca2 : 00000000`00000001 fffff900`c3590000 fffff880`08164020 fffff6fc`8061ac80 : nt! ?? ::FNODOBFM::`string'+0x29bb7
fffff880`08163db0 fffff800`02cdfcf1 : 00000000`0004a2a1 00000000`00000000 fffff880`08164448 fffff960`002b2e7b : nt!MiDispatchFault+0x8c2
fffff880`08163ec0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x8f1
FOLLOWUP_IP:
nt!MiRemoveUnusedSegment+96
fffff800`02c8c03e 48894108 mov qword ptr [rcx+8],rax
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiRemoveUnusedSegment+96
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88008163100 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiRemoveUnusedSegment+96
BUCKET_ID: X64_0x3B_nt!MiRemoveUnusedSegment+96
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\122010-19032-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c64000 PsLoadedModuleList = 0xfffff800`02ea1e50
Debug session time: Mon Dec 20 20:49:56.477 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:39.960
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002cf11b5, 0, ffffffffffffffff}
Probably caused by : memory_corruption ( nt!MiCheckVirtualAddress+155 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cf11b5, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiCheckVirtualAddress+155
fffff800`02cf11b5 483b4118 cmp rax,qword ptr [rcx+18h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0c0e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ATICustomerCar
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88006ca2858 -- (.exr 0xfffff88006ca2858)
ExceptionAddress: fffff80002cf11b5 (nt!MiCheckVirtualAddress+0x0000000000000155)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88006ca2900 -- (.trap 0xfffff88006ca2900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000073644 rbx=0000000000000000 rcx=f7fffa80050da700
rdx=fffffa80057a2b30 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cf11b5 rsp=fffff88006ca2a90 rbp=fffff88006ca2b40
r8=fffff88006ca2ba0 r9=fffff6fb40001cd8 r10=fffff6800039b220
r11=fffff6fb40001cd8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiCheckVirtualAddress+0x155:
fffff800`02cf11b5 483b4118 cmp rax,qword ptr [rcx+18h] ds:6025:f7fffa80`050da718=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d0ea39 to fffff80002cd4740
STACK_TEXT:
fffff880`06ca2088 fffff800`02d0ea39 : 00000000`0000001e ffffffff`c0000005 fffff800`02cf11b5 00000000`00000000 : nt!KeBugCheckEx
fffff880`06ca2090 fffff800`02cd3d82 : fffff880`06ca2858 00000000`00000000 fffff880`06ca2900 fffff880`06ca2ba8 : nt!KiDispatchException+0x1b9
fffff880`06ca2720 fffff800`02cd268a : fffffa80`03125d30 fffff800`02cfab83 29d00001`061f1025 00000001`061f1121 : nt!KiExceptionDispatch+0xc2
fffff880`06ca2900 fffff800`02cf11b5 : fffffa80`054c9b60 ffffffff`ffffffff 00000000`00000000 fffff880`06ca2b40 : nt!KiGeneralProtectionFault+0x10a
fffff880`06ca2a90 fffff800`02cee633 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff680`00000000 : nt!MiCheckVirtualAddress+0x155
fffff880`06ca2ac0 fffff800`02cd282e : 00000000`00000008 00000000`0018fc30 00000000`0008e301 00000000`00008000 : nt!MmAccessFault+0x233
fffff880`06ca2c20 00000000`73644080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0008e338 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73644080
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiCheckVirtualAddress+155
fffff800`02cf11b5 483b4118 cmp rax,qword ptr [rcx+18h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiCheckVirtualAddress+155
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!MiCheckVirtualAddress+155
BUCKET_ID: X64_0x1E_c0000005_nt!MiCheckVirtualAddress+155
Followup: MachineOwner
---------