IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000011, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80512a4248f, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 2.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 2.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 82.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: a.
BUGCHECK_P1: 11.
BUGCHECK_P2: 2.
BUGCHECK_P3: 0.
BUGCHECK_P4: fffff80512a4248f.
READ_ADDRESS: fffff80512f733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000011.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: chrome.exe.
TRAP_FRAME: fffff40c5af57480 -- (.trap 0xfffff40c5af57480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000c0 rbx=0000000000000000 rcx=fffff78000000274.
rdx=00000000000e4000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8052ce8cbde rsp=fffff40c5af57610 rbp=00000000000e4000.
r8=ffffaa0cda4a9d00 r9=fffff40c5af57910 r10=fffff80512b25240.
r11=fffff40c5af57808 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po cy.
dxgmms2!FastZeroMemory+0x5e:
fffff805`2ce8cbde 660fe703 movntdq xmmword ptr [rbx],xmm0 ds:00000000`00000000=????????????????????????????????
Resetting default scope.
STACK_TEXT:
fffff40c`5af565b8 fffff805`12bd41e9 : 00000000`0000000a 00000000`00000011 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff40c`5af565c0 fffff805`12bd0529 : fffff40c`5af567c0 00000000`00000020 00000000`00000020 fffff805`2e4d50ea : nt!KiBugCheckDispatch+0x69.
fffff40c`5af56700 fffff805`12a4248f : ffff858b`45dde080 fffff805`00054009 000000d2`a5709130 000000d3`10ba6330 : nt!KiPageFault+0x469.
fffff40c`5af56890 fffff805`12a3ece2 : 00000000`00303238 ffffbd00`09096a98 fffff40c`00000000 ff030000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f.
fffff40c`5af56970 fffff805`12a69b69 : fffffae1`00000010 000646c8`00000002 00000000`00000000 000646c8`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372.
fffff40c`5af56b90 fffff805`12a6995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199.
fffff40c`5af56c70 fffff805`12a5dde6 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000001 : nt!MiGetFreeOrZeroPageAnyColor+0x62.
fffff40c`5af56cb0 fffff805`12a5d4e1 : fffff805`12e6a440 ffff858b`00000093 00000000`00000093 00000000`00000000 : nt!MiGetPage+0x346.
fffff40c`5af56d90 fffff805`12a5b20a : fffff40c`5af57100 00000000`00000000 00000000`00000001 00000000`00000011 : nt!MiGetPageChain+0x181.
fffff40c`5af56f80 fffff805`12a5ace8 : ffffaa0c`da19cb30 fffff40c`00000000 ffff858b`4596fb10 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x14a.
fffff40c`5af570a0 fffff805`12a5a5b2 : fffffafd`40558db0 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218.
fffff40c`5af57190 fffff805`12a58579 : 00000000`00000111 00000000`00000004 00000000`c0000016 ffffc280`62ac6101 : nt!MiDispatchFault+0x982.
fffff40c`5af572e0 fffff805`12bd041e : ffff858b`45dde460 fffff805`12acebf8 fffff40c`5af57910 fffff805`12aa19c9 : nt!MmAccessFault+0x169.
fffff40c`5af57480 fffff805`2ce8cbde : fffff40c`5af579b0 00000000`00000000 00000000`04000000 00000000`00000000 : nt!KiPageFault+0x35e.
fffff40c`5af57610 fffff805`2ce8cb28 : ffffaa0c`d9de6910 ffffaa0c`d4331560 ffff858b`4596fb10 fffff40c`5af57650 : dxgmms2!FastZeroMemory+0x5e.
fffff40c`5af57660 fffff805`2ce79b5c : ffff858b`45edec00 00000000`00000000 00000000`00000000 ffff858b`45edec90 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::ZeroMultirangeMemory+0x88.
fffff40c`5af576d0 fffff805`2ce86979 : ffffaa0c`da19cb30 fffff805`00000000 ffffaa0c`da19cb30 ffff858b`4596fb10 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ZeroIfNeeded+0x17c.
fffff40c`5af57750 fffff805`2ce133f9 : ffffaa0c`d54c3010 ffffaa0c`d425bf30 fffff40c`5af57900 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::Lock+0x1a9.
fffff40c`5af57810 fffff805`2bdb8397 : ffffffff`ffffffff fffff40c`5af57a80 00000000`00000001 ffffaa0c`d54c3010 : dxgmms2!VidMmLock+0x9.
fffff40c`5af57840 fffff805`12bd3c15 : 00000000`00001400 ffff858b`45dde080 00000042`a65fcd30 fffff40c`5af57a80 : dxgkrnl!DxgkLock2+0x7f7.
fffff40c`5af57a00 00007ff9`68104f64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000042`a65fcc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`68104f64.
SYMBOL_NAME: dxgmms2!FastZeroMemory+5e.
MODULE_NAME: dxgmms2.
IMAGE_NAME: dxgmms2.sys.
IMAGE_VERSION: 10.0.18362.1061.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 5e.
FAILURE_BUCKET_ID: AV_dxgmms2!FastZeroMemory.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {959047b1-e0a3-f6f1-368c-9f58687231a6}
Followup: MachineOwner.
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80717c125b7, Address of the instruction which caused the bugcheck.
Arg3: fffffd8e5f3f6030, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 2.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 2.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: 3b.
BUGCHECK_P1: c0000005.
BUGCHECK_P2: fffff80717c125b7.
BUGCHECK_P3: fffffd8e5f3f6030.
BUGCHECK_P4: 0.
CONTEXT: fffffd8e5f3f6030 -- (.cxr 0xfffffd8e5f3f6030)
rax=ffffdd07c8657000 rbx=0000000000010000 rcx=ffff5d07cf543e3a.
rdx=0000000000000000 rsi=ffffdd07cf543dc0 rdi=0000000000000000.
rip=fffff80717c125b7 rsp=fffffd8e5f3f6a20 rbp=0000000000000000.
r8=ffffdd07cf543dc0 r9=0000000000000045 r10=0000000000000000.
r11=000000000000000b r12=0000000000000016 r13=0000000000000000.
r14=fffffd8e5f3f6b90 r15=0000000000000018.
iopl=0 nv up ei ng nz ac po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297.
Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67:
fffff807`17c125b7 440fb70c0a movzx r9d,word ptr [rdx+rcx] ds:002b:ffff5d07`cf543e3a=????
Resetting default scope.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: chrome.exe.
STACK_TEXT:
fffffd8e`5f3f6a20 fffff807`17c05a26 : ffffdd07`cf543dc0 fffffd8e`5f3f6b90 ffffdd07`d2c6ca58 fffff807`11ca1d3d : Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67.
fffffd8e`5f3f6a70 fffff807`17cff0fb : ffffdd07`d2c6c7c0 ffffdd07`d2c6c7c0 fffffd8e`5f3f6db0 ffffdd07`d2c6c660 : Ntfs!FsLibLookupFirstMatchingElementGenericTableAvl+0x46.
fffffd8e`5f3f6aa0 fffff807`17d03f23 : fffffd8e`5f3f6f80 ffffdd07`d2c6c660 fffffd8e`5f3f6d98 fffffd8e`5f3f7001 : Ntfs!NtfsFindPrefix+0x17b.
fffffd8e`5f3f6c00 fffff807`17d04ae8 : ffffcc8a`1a091058 ffffcc8a`1a96eb10 ffffcc8a`1a96eb10 fffffd8e`5f3f6e08 : Ntfs!NtfsFindStartingNode+0x4b3.
fffffd8e`5f3f6cc0 fffff807`17d07ebe : ffffcc8a`1a091058 fffffd8e`5f3f6f80 ffffcc8a`1a091058 ffffcc8a`1a96eb10 : Ntfs!NtfsCommonCreate+0x478.
fffffd8e`5f3f6eb0 fffff807`11c99ed9 : ffffcc8a`1406e030 ffffcc8a`1a96eb10 ffffcc8a`0be07700 ffffcc8a`1405b090 : Ntfs!NtfsFsdCreate+0x1fe.
fffffd8e`5f3f70e0 fffff807`165355de : ffffcc8a`1a96eb10 ffffcc8a`1a96ef00 ffffcc8a`1a96eb10 ffffcc8a`1c461670 : nt!IofCallDriver+0x59.
fffffd8e`5f3f7120 fffff807`1656cd27 : fffffd8e`5f3f71e0 fffff807`00000000 00000020`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e.
fffffd8e`5f3f71a0 fffff807`11c99ed9 : ffffcc8a`1c461600 fffff807`12204345 00000000`00000000 00000000`00000030 : FLTMGR!FltpCreate+0x307.
fffffd8e`5f3f7250 fffff807`11c98f94 : 00000000`00000000 00000000`00000000 ffffcc8a`1a96ef40 ffffcc8a`1a96eb10 : nt!IofCallDriver+0x59.
fffffd8e`5f3f7290 fffff807`12204a1b : fffffd8e`5f3f7550 fffff807`12204345 fffffd8e`5f3f74c0 fffffd8e`5f3f77a0 : nt!IoCallDriverWithTracing+0x34.
fffffd8e`5f3f72e0 fffff807`1220b9ef : ffffcc8a`13e0d8f0 ffffcc8a`13e0d845 ffffcc8a`1a8294b0 00000000`00000001 : nt!IopParseDevice+0x62b.
fffffd8e`5f3f7450 fffff807`12209e51 : ffffcc8a`1a829400 fffffd8e`5f3f7698 00000000`00000040 ffffcc8a`0a8f8560 : nt!ObpLookupObjectName+0x78f.
fffffd8e`5f3f7610 fffff807`12250ac4 : ffffcc8a`00000001 00000058`4b7fed20 00000000`00000028 00000058`4b7fecf0 : nt!ObOpenObjectByNameEx+0x201.
fffffd8e`5f3f7750 fffff807`11dd3c15 : ffffcc8a`00000000 00000058`00000001 ffffcc8a`1b1f4080 fffffd8e`5f3f7a80 : nt!NtQueryFullAttributesFile+0x1b4.
fffffd8e`5f3f7a00 00007ffd`aeabe864 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000058`4b7fec98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`aeabe864.
SYMBOL_NAME: Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+67.
MODULE_NAME: Ntfs.
IMAGE_NAME: Ntfs.sys.
IMAGE_VERSION: 10.0.18362.719.
STACK_COMMAND: .cxr 0xfffffd8e5f3f6030 ; kb.
BUCKET_ID_FUNC_OFFSET: 67.
FAILURE_BUCKET_ID: 0x3B_c0000005_Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {643b1572-10af-990e-3668-d5620c6d9754}
Followup: MachineOwner.
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb6467b8d7960, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80786482140, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name.
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 3.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 3.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: 50.
BUGCHECK_P1: ffffb6467b8d7960.
BUGCHECK_P2: 2.
BUGCHECK_P3: fffff80786482140.
BUGCHECK_P4: 2.
READ_ADDRESS: fffff807819733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffb6467b8d7960.
MM_INTERNAL_CODE: 2.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: sppsvc.exe.
TRAP_FRAME: fffff60a49496f50 -- (.trap 0xfffff60a49496f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff807864880e0 rbx=0000000000000000 rcx=0000000000000023.
rdx=0000000000000034 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80786482140 rsp=fffff60a494970e8 rbp=0000000009733c1f.
r8=00000000aeee2865 r9=0000000066653d16 r10=00000000061a9eeb.
r11=0000000000bad64d r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
CI!Gv52a045+0x80:
fffff807`86482140 488904c7 mov qword ptr [rdi+rax*8],rax ds:ffffc03c`32440700=????????????????
Resetting default scope.
STACK_TEXT:
fffff60a`49496ca8 fffff807`815ecf0a : 00000000`00000050 ffffb646`7b8d7960 00000000`00000002 fffff60a`49496f50 : nt!KeBugCheckEx.
fffff60a`49496cb0 fffff807`8145875f : 00000000`00000000 00000000`00000002 00000000`00000000 ffffb646`7b8d7960 : nt!MiSystemFault+0x1c5aaa.
fffff60a`49496db0 fffff807`815d041e : 00000000`00000000 00000000`00000000 00000000`00000001 ffff9e82`dd5cb7b0 : nt!MmAccessFault+0x34f.
fffff60a`49496f50 fffff807`86482140 : fffff807`864846bc fffff60a`49497110 fffff60a`49497250 00000000`00000000 : nt!KiPageFault+0x35e.
fffff60a`494970e8 fffff807`864846bc : fffff60a`49497110 fffff60a`49497250 00000000`00000000 e845998b`9733c1f0 : CI!Gv52a045+0x80.
fffff60a`494970f0 fffff807`864704b9 : 00000000`00000000 00000000`000027bb 00000000`00000005 00000000`00000000 : CI!Gvb3afc4+0x138.
fffff60a`49497450 fffff807`863d903f : c11b999c`187b4d0e 00000000`00000005 00000000`00000000 00000000`000027bb : CI!peauthvbn_StoreParameter+0x3d.
fffff60a`494974a0 fffff807`8644523b : 00000000`00000000 00000000`00000000 ffff808e`000112f0 ffff808e`000112f0 : CI!PEAuthStoreParameter+0x5f.
fffff60a`494974d0 fffff807`86445504 : 00000000`00001658 fffff60a`494975a9 ffff9e82`dd59bec0 ffff9e82`eb756080 : CI!I_PEUpdatePEHashBucket+0x157.
fffff60a`49497510 fffff807`819d1f48 : 00000000`00000000 00000000`00000000 00000000`0000ff00 ffff9e82`e9c4ac80 : CI!I_PEProcessNotify+0x34.
fffff60a`49497540 fffff807`81a30308 : ffff9e82`eb756000 ffff9e82`eb756080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x254.
fffff60a`49497610 fffff807`81a2662f : ffff9e82`eb753688 00000000`00000000 fffff60a`494977e9 00000000`00000000 : nt!PspExitProcess+0x70.
fffff60a`49497640 fffff807`81a23f23 : 00000000`00000000 a76c3505`612fbb01 0000007f`c2b54000 ffffc881`2a240180 : nt!PspExitThread+0x5c7.
fffff60a`49497750 fffff807`814a6441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33.
fffff60a`49497790 fffff807`815c6920 : ffffc881`2a240101 fffff60a`49497850 00000000`40b7fc89 00000000`00000000 : nt!KiDeliverApc+0x481.
fffff60a`49497850 fffff807`815d3cbf : 00000000`00000000 ffff9e82`da87d6c0 ffff9e82`eb753080 0000007f`c2eff578 : nt!KiInitiateUserApc+0x70.
fffff60a`49497990 00007ffe`8347cbc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
0000007f`c2eff558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8347cbc4.
CHKIMG_EXTENSION: !chkimg -lo 50 -d !CI.
fffff80786482143 - CI!Gv52a045+83.
[ cf:c7 ]
1 error : !CI (fffff80786482143)
MODULE_NAME: memory_corruption.
IMAGE_NAME: memory_corruption.
MEMORY_CORRUPTOR: ONE_BIT.
STACK_COMMAND: .thread ; .cxr ; kb.
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption.
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8077724248f, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 2.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 2.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: a.
BUGCHECK_P1: 10.
BUGCHECK_P2: 2.
BUGCHECK_P3: 0.
BUGCHECK_P4: fffff8077724248f.
READ_ADDRESS: fffff807777733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000010.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: explorer.exe.
TRAP_FRAME: ffff8d8b9331e8d0 -- (.trap 0xffff8d8b9331e8d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8077724248f rsp=ffff8d8b9331ea60 rbp=ffff8d8b9331ead9.
r8=00000000000000ab r9=00000000000000ab r10=0000000000000001.
r11=ffff8d8b9331eb38 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!MiInsertPageInFreeOrZeroedList+0x19f:
fffff807`7724248f 49034710 add rax,qword ptr [r15+10h] ds:00000000`00000010=????????????????
Resetting default scope.
STACK_TEXT:
ffff8d8b`9331e788 fffff807`773d41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
ffff8d8b`9331e790 fffff807`773d0529 : 00000000`00000000 00000000`000000ff fffff807`77668c07 ffffef00`004a1cf0 : nt!KiBugCheckDispatch+0x69.
ffff8d8b`9331e8d0 fffff807`7724248f : 00000000`00000000 fffff807`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x469.
ffff8d8b`9331ea60 fffff807`7723ece2 : 00000000`00018bab ffffef00`004a3028 ffffef00`00000000 ffffa20b`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f.
ffff8d8b`9331eb40 fffff807`77269b69 : 00000000`00000010 00000000`00000002 00000000`00000000 fffff807`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372.
ffff8d8b`9331ed60 fffff807`7726995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199.
ffff8d8b`9331ee40 fffff807`7725dde6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetFreeOrZeroPageAnyColor+0x62.
ffff8d8b`9331ee80 fffff807`772b549c : fffff807`7766a440 0a000000`000000aa fffff807`7766a440 ffffef00`00000000 : nt!MiGetPage+0x346.
ffff8d8b`9331ef60 fffff807`772b7771 : ffffb789`b9a7c010 ffffb789`c9ce89a0 00000000`00000000 00000000`00000000 : nt!MiMakePageAvoidRead+0x18c.
ffff8d8b`9331f130 fffff807`772b6b2b : ffffa20b`18fa4000 00000000`06b09040 ffff8d8b`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0x281.
ffff8d8b`9331f210 fffff807`772b8905 : ffffb789`c9ce89a0 00000000`06b09040 ffff8d8b`9331f3f0 00000000`00080000 : nt!CcMapAndCopyInToCache+0x5fb.
ffff8d8b`9331f390 fffff807`7a6d9136 : ffffc98c`c8ef1840 00000000`00000000 ffffc98c`c8ef1840 ffffc98c`00100000 : nt!CcCopyWriteEx+0x105.
ffff8d8b`9331f410 fffff807`78f35f78 : 00000000`00000000 00000000`000002c0 ffffb789`cb20c5d0 00000000`00000000 : Ntfs!NtfsCopyWriteA+0x456.
ffff8d8b`9331f720 fffff807`78f32fa3 : ffff8d8b`9331f810 00000000`00000000 00000000`00000000 ffffb789`c9191460 : FLTMGR!FltpPerformFastIoCall+0x198.
ffff8d8b`9331f780 fffff807`78f6c5d5 : b789c8cc`56b0f26f 00000000`001f0003 00000000`00000000 ffffb789`cb20c5d0 : FLTMGR!FltpPassThroughFastIo+0xd3.
ffff8d8b`9331f7e0 fffff807`778c9708 : ffffb789`cb20c5d0 00000000`0ebec460 00000000`0ebec460 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x165.
ffff8d8b`9331f890 fffff807`773d3c15 : 00000000`00000000 00000000`0000156c 00000000`00000000 00000000`145231f0 : nt!NtWriteFile+0x458.
ffff8d8b`9331f990 00007ffe`2475c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000000`0ebec3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2475c174.
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+19f.
MODULE_NAME: nt.
IMAGE_VERSION: 10.0.18362.959.
STACK_COMMAND: .thread ; .cxr ; kb.
IMAGE_NAME: memory_corruption.
BUCKET_ID_FUNC_OFFSET: 19f.
FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a}
Followup: MachineOwner.
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff9bffcac1590.
Arg3: 0200000000000000.
Arg4: 0000000000000000.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 2.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 2.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: 1a.
BUGCHECK_P1: 41792.
BUGCHECK_P2: fffff9bffcac1590.
BUGCHECK_P3: 200000000000000.
BUGCHECK_P4: 0.
MEMORY_CORRUPTOR: ONE_BIT.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: chrome.exe.
STACK_TEXT:
fffffd89`24bb9a68 fffff806`5460f55a : 00000000`0000001a 00000000`00041792 fffff9bf`fcac1590 02000000`00000000 : nt!KeBugCheckEx.
fffffd89`24bb9a70 fffff806`544732b7 : 00000000`00000000 fffff9bf`fcac1590 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a4aa.
fffffd89`24bb9b80 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`dffe5608 00000000`00000000 0a000002`549a2867 : nt!MiWalkPageTablesRecursively+0x1e7.
fffffd89`24bb9c40 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe6fff28 00000000`00000000 0a000002`544de867 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9d00 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe7f37f8 fffff9fc`00000000 8a000002`54578867 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9dc0 fffff806`54472efc : fffffd89`24bb9fd0 fffff9fc`fe7f3f98 fffffd89`00000000 fffffd89`24bb9f49 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9e80 fffff806`54471368 : fffffd89`24bb9fd0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c.
fffffd89`24bb9f80 fffff806`5447f4c0 : ffffffff`ffffffff ffff8306`c73443f8 fffffd89`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268.
fffffd89`24bba320 fffff806`549ce76d : ffff8306`c7839080 ffff8306`c7839080 ffff8306`c7038da0 ffff8306`c73443f0 : nt!MiDeleteVad+0x860.
fffffd89`24bba4e0 fffff806`549dd4a0 : ffff8306`c7038da0 ffff8306`c470ed60 ffff8306`c7839080 00000000`00000000 : nt!MiUnmapVad+0x49.
fffffd89`24bba510 fffff806`549dca0f : ffff8306`c8abcca0 ffff8306`c8abcca0 ffff8306`c7344080 fffff806`5486a440 : nt!MiCleanVad+0x30.
fffffd89`24bba540 fffff806`54a6d6b9 : ffffffff`00000000 ffffffff`ffffffff fffffd89`24bba701 ffff8306`c7344080 : nt!MmCleanProcessAddressSpace+0x137.
fffffd89`24bba5c0 fffff806`54a26673 : ffff8306`c7344080 ffffdb85`0ed9c060 fffffd89`24bba7e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139.
fffffd89`24bba640 fffff806`54a23f23 : ffff8306`00000000 00000000`00000001 00000050`8e7ba000 00000050`90fff920 : nt!PspExitThread+0x60b.
fffffd89`24bba750 fffff806`544a6441 : fffffd89`24bba940 00000050`90fff868 fffffd89`24bba968 fffff806`544a7000 : nt!KiSchedulerApcTerminate+0x33.
fffffd89`24bba790 fffff806`545c6920 : 00000050`90fff901 fffffd89`24bba850 00000000`000001f8 fffffd89`00000000 : nt!KiDeliverApc+0x481.
fffffd89`24bba850 fffff806`545d3cbf : ffff8306`c7839080 00000050`90fff848 fffffd89`24bba9a8 ffffdb85`0f114c40 : nt!KiInitiateUserApc+0x70.
fffffd89`24bba990 00007ff9`95efc194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
00000050`90fff828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`95efc194.
SYMBOL_NAME: ONE_BIT.
MODULE_NAME: hardware.
IMAGE_NAME: memory_corruption.
STACK_COMMAND: .thread ; .cxr ; kb.
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner.
---------