Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\100219-10578-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 18362 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 18362.1.amd64fre.19h1_release.190318-1202 Machine Name: Kernel base = 0xfffff803`42000000 PsLoadedModuleList = 0xfffff803`42448130 Debug session time: Wed Oct 2 19:09:08.752 2019 (UTC + 2:00) System Uptime: 3 days 0:57:11.974 Loading Kernel Symbols ............................................................... ................................................................ ...................................................... Loading User Symbols Loading unloaded module list ............................................ For analysis of this file, run !analyze -v 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2 contains the address of the PFN for the corrupted page table page. On a 32 bit OS, parameter 2 contains a pointer to the number of used PTEs, and parameter 3 contains the number of used PTEs. Arg2: ffff8000043e91e0 Arg3: 000000000000001d Arg4: 000000000000001e Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 41790 BUGCHECK_P2: ffff8000043e91e0 BUGCHECK_P3: 1d BUGCHECK_P4: 1e BUGCHECK_STR: 0x1a_41790 CPU_COUNT: 2 CPU_MHZ: bb1 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3a CPU_STEPPING: 9 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: java.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-IMANDA2 ANALYSIS_SESSION_TIME: 10-04-2019 11:46:55.0708 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff803421e9548 to fffff803421c1220 STACK_TEXT: ffffb001`1fcbad68 fffff803`421e9548 : 00000000`0000001a 00000000`00041790 ffff8000`043e91e0 00000000`0000001d : nt!KeBugCheckEx ffffb001`1fcbad70 fffff803`420b17a7 : 00000000`00000003 ffffb001`1fcbb4c0 ffffb001`1fcbb4c0 ffffb001`1fcbb410 : nt!MiDeletePteRun+0x1d32e8 ffffb001`1fcbaf90 fffff803`420ad2c2 : ffff8f0c`4f346580 ffffb6bf`fced9000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77 ffffb001`1fcbafc0 fffff803`420ad451 : ffffb001`1fcbb410 ffffb6db`5ffe76c0 00000000`00000000 0a000001`6a30a867 : nt!MiWalkPageTablesRecursively+0x512 ffffb001`1fcbb080 fffff803`420ad451 : ffffb001`1fcbb410 ffffb6db`6dafff38 00000000`00000000 0a000001`61eb2867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffb001`1fcbb140 fffff803`420ad451 : ffffb001`1fcbb410 ffffb6db`6db6d7f8 ffffb6db`00000000 8a000000`3faaa867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffb001`1fcbb200 fffff803`420acbdc : ffffb001`1fcbb410 00000000`00000000 ffffb001`00000000 ffffb001`1fcbb389 : nt!MiWalkPageTablesRecursively+0x6a1 ffffb001`1fcbb2c0 fffff803`420ab048 : ffffb001`1fcbb410 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c ffffb001`1fcbb3c0 fffff803`420b91a0 : ffffffff`ffffffff ffff8f0c`4f3463f8 ffffb001`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 ffffb001`1fcbb760 fffff803`425c77fd : ffff8f0c`4ea2f080 ffff8f0c`4ea2f080 ffff8f0c`53232100 ffff8f0c`4f3463f0 : nt!MiDeleteVad+0x860 ffffb001`1fcbb920 fffff803`425d9bb4 : ffff8f0c`53232100 ffff8f0c`4f38fc80 ffff8f0c`4ea2f080 00000000`00000000 : nt!MiUnmapVad+0x49 ffffb001`1fcbb950 fffff803`425d966f : ffff8f0c`53e6c060 ffff8f0c`53e6c060 ffff8f0c`4f346080 fffff803`4246a380 : nt!MiCleanVad+0x30 ffffb001`1fcbb980 fffff803`426378e1 : ffffffff`00000000 ffffffff`ffffffff ffffb001`1fcbbc01 ffff8f0c`4f346080 : nt!MmCleanProcessAddressSpace+0x137 ffffb001`1fcbba00 fffff803`4265def3 : ffff8f0c`4f346080 ffffd686`32d3a060 ffffb001`1fcbbc80 00000000`00000000 : nt!PspRundownSingleProcess+0x139 ffffb001`1fcbba80 fffff803`42638f5b : 00000000`00000000 ffffb001`1fcbbc01 00000000`0031f000 ffff8f0c`4ea2f080 : nt!PspExitThread+0x60b ffffb001`1fcbbb90 fffff803`421d3051 : 00000000`00001804 ffff8f0c`4ea2f080 ffff8f0c`4f346080 00000000`00711640 : nt!NtTerminateProcess+0xeb ffffb001`1fcbbc00 00007ff9`dc6fc644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 00000000`0017f6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`dc6fc644 THREAD_SHA1_HASH_MOD_FUNC: b79b463ae9ce57a8c77ea389a67e316ec989b8c2 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fa69e28ce6ab67a29a7f06a553c3c02a21ab7c2c THREAD_SHA1_HASH_MOD: aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c FOLLOWUP_IP: nt!MiDeletePteRun+1d32e8 fffff803`421e9548 cc int 3 FAULT_INSTR_CODE: 4d8d48cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiDeletePteRun+1d32e8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 740e7205 IMAGE_VERSION: 10.0.18362.387 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 1d32e8 FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun PRIMARY_PROBLEM_CLASS: 0x1a_41790_nt!MiDeletePteRun TARGET_TIME: 2019-10-02T17:09:08.000Z OSBUILD: 18362 OSSERVICEPACK: 387 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2031-09-14 00:09:09 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 22aa ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1a_41790_nt!mideletepterun FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56} Followup: MachineOwner ---------