Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 18362 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 18362.1.amd64fre.19h1_release.190318-1202 Machine Name: Kernel base = 0xfffff801`30c00000 PsLoadedModuleList = 0xfffff801`31048130 Debug session time: Sat Oct 5 16:48:41.307 2019 (UTC + 2:00) System Uptime: 0 days 23:37:26.011 Loading Kernel Symbols ............................................................... ................................................................ ....................................................... Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`02ea9018). Type ".hh dbgerr001" for details Loading unloaded module list ................. For analysis of this file, run !analyze -v 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2 contains the address of the PFN for the corrupted page table page. On a 32 bit OS, parameter 2 contains a pointer to the number of used PTEs, and parameter 3 contains the number of used PTEs. Arg2: ffff9900043e91e0 Arg3: 0000000000000038 Arg4: 0000000000000039 Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: SKU SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 0604 BIOS_DATE: 09/24/2013 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: H61M-K BASEBOARD_VERSION: Rev X.0x DUMP_TYPE: 1 BUGCHECK_P1: 41790 BUGCHECK_P2: ffff9900043e91e0 BUGCHECK_P3: 38 BUGCHECK_P4: 39 BUGCHECK_STR: 0x1a_41790 CPU_COUNT: 2 CPU_MHZ: bb1 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3a CPU_STEPPING: 9 CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 20'00000000 (cache) 20'00000000 (init) DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: autoreactivator.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-IMANDA2 ANALYSIS_SESSION_TIME: 10-05-2019 16:51:29.0047 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff80130de9548 to fffff80130dc1220 STACK_TEXT: ffffd30d`a3fcfb28 fffff801`30de9548 : 00000000`0000001a 00000000`00041790 ffff9900`043e91e0 00000000`00000038 : nt!KeBugCheckEx ffffd30d`a3fcfb30 fffff801`30cb17a7 : ffffd487`bb9ed580 ffffd30d`a3fd0280 ffffd30d`a3fd0280 ffffd30d`a3fd01d0 : nt!MiDeletePteRun+0x1d32e8 ffffd30d`a3fcfd50 fffff801`30cad2c2 : ffffd487`bb9ed580 ffff8d00`003b2b78 00000000`00000000 00000000`00000000 : nt!MiDeleteVaTail+0x77 ffffd30d`a3fcfd80 fffff801`30cad451 : ffffd30d`a3fd01d0 ffff8d46`80001d90 00000000`00000000 0a000001`6a30a867 : nt!MiWalkPageTablesRecursively+0x512 ffffd30d`a3fcfe40 fffff801`30cad451 : ffffd30d`a3fd01d0 ffff8d46`a3400008 00000000`00000000 0a000000`0adf4867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffd30d`a3fcff00 fffff801`30cad451 : ffffd30d`a3fd01d0 ffff8d46`a351a000 ffff8d46`00000000 8a000001`213c7867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffd30d`a3fcffc0 fffff801`30cacbdc : ffffd30d`a3fd01d0 00000000`00000000 00000000`00000000 ffffd487`c0a646d0 : nt!MiWalkPageTablesRecursively+0x6a1 ffffd30d`a3fd0080 fffff801`30cab048 : ffffd30d`a3fd01d0 00000000`00000002 ffffd30d`00000001 fffff801`00000000 : nt!MiWalkPageTables+0x36c ffffd30d`a3fd0180 fffff801`30cb91a0 : ffffffff`ffffffff ffffd487`bb9ed3f8 ffffd30d`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 ffffd30d`a3fd0520 fffff801`311c77fd : ffffd487`bd144080 ffffd487`bd144080 ffffd487`c0a649f0 ffffd487`bb9ed3f0 : nt!MiDeleteVad+0x860 ffffd30d`a3fd06e0 fffff801`311d9bb4 : ffffd487`c0a649f0 ffffd487`c206d260 ffffd487`bd144080 00000000`00000000 : nt!MiUnmapVad+0x49 ffffd30d`a3fd0710 fffff801`311d966f : ffffd487`c201a0e0 ffffd487`c201a0e0 ffffd487`bb9ed080 fffff801`3106a380 : nt!MiCleanVad+0x30 ffffd30d`a3fd0740 fffff801`312378e1 : ffffffff`00000000 ffffffff`ffffffff ffffd30d`a3fd0901 ffffd487`bb9ed080 : nt!MmCleanProcessAddressSpace+0x137 ffffd30d`a3fd07c0 fffff801`3125def3 : ffffd487`bb9ed080 ffffe502`1761a060 ffffd30d`a3fd09e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139 ffffd30d`a3fd0840 fffff801`312cb683 : ffffd487`00000000 00000000`04e4f001 00000000`02ebd000 fffff801`3575ce4c : nt!PspExitThread+0x60b ffffd30d`a3fd0950 fffff801`30c3e511 : ffffd487`b45069c0 fffff801`30c6b9e8 ffffd487`b47ab000 ffffd487`b46a2280 : nt!KiSchedulerApcTerminate+0x33 ffffd30d`a3fd0990 fffff801`30dc57a0 : ffffd487`00501801 ffffd30d`a3fd0a50 00501802`00000004 00004991`00000000 : nt!KiDeliverApc+0x481 ffffd30d`a3fd0a50 fffff801`30dd2bbf : ffffd487`bd144080 fffff801`30f30f40 00000000`00000000 ffffd30d`a3fd0c80 : nt!KiInitiateUserApc+0x70 ffffd30d`a3fd0b90 00007fff`7f83fa54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 00000000`04e4e8e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`7f83fa54 THREAD_SHA1_HASH_MOD_FUNC: cf5c972d8494816023066845de37f86a3bfa7253 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: eec6090e381183faf6dcdd458238b8b8d393cfe5 THREAD_SHA1_HASH_MOD: a9ca63faa9e43cc61ef524ad38163e6a9ae5c358 FOLLOWUP_IP: nt!MiDeletePteRun+1d32e8 fffff801`30de9548 cc int 3 FAULT_INSTR_CODE: 4d8d48cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiDeletePteRun+1d32e8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 1d32e8 FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun PRIMARY_PROBLEM_CLASS: 0x1a_41790_nt!MiDeletePteRun TARGET_TIME: 2019-10-05T14:48:41.000Z OSBUILD: 18362 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 630c ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1a_41790_nt!mideletepterun FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56} Followup: MachineOwner ---------