MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffe3000754a2e0
Arg3: 0000000000000007
Arg4: 0000000000000008
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.657 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffe3000754a2e0
BUGCHECK_P3: 7
BUGCHECK_P4: 8
BUGCHECK_STR: 0x1a_41790
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-23-2020 22:08:04.0961
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff807069e9848 to fffff807069c1510
STACK_TEXT:
fffffa0a`6271dc98 fffff807`069e9848 : 00000000`0000001a 00000000`00041790 ffffe300`0754a2e0 00000000`00000007 : nt!KeBugCheckEx
fffffa0a`6271dca0 fffff807`068b1167 : 00000000`00000003 fffffa0a`6271e3f0 fffffa0a`6271e3f0 fffffa0a`6271e340 : nt!MiDeletePteRun+0x1d35a8
fffffa0a`6271dec0 fffff807`068acc82 : ffff8402`4fbdf580 ffffe880`ea71c000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffffa0a`6271def0 fffff807`068ace11 : fffffa0a`6271e340 ffffe8f4`407538d8 00000000`00000000 0a000002`718ba867 : nt!MiWalkPageTablesRecursively+0x512
fffffa0a`6271dfb0 fffff807`068ace11 : fffffa0a`6271e340 ffffe8f4`7a203a98 00000000`00000000 0a000001`36b3e867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffa0a`6271e070 fffff807`068ace11 : fffffa0a`6271e340 ffffe8f4`7a3d1018 ffffe8f4`00000000 0a000002`7b13d867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffa0a`6271e130 fffff807`068ac59c : fffffa0a`6271e340 ffffd01e`c0000000 ffffd01e`00000000 ffff8402`4fbdf580 : nt!MiWalkPageTablesRecursively+0x6a1
fffffa0a`6271e1f0 fffff807`068aaa08 : fffffa0a`6271e340 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffffa0a`6271e2f0 fffff807`068b8b60 : ffffffff`ffffffff ffff8402`4fbdf3f8 ffff8402`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffffa0a`6271e690 fffff807`06dd9fd1 : ffff8402`4a968080 00000000`00000000 ffff8402`4ecdabc0 ffff8402`4a968080 : nt!MiDeleteVad+0x860
fffffa0a`6271e850 fffff807`06dd9a6f : ffff8402`4ecdac10 ffff8402`4ecdac10 ffff8402`4fbdf080 fffff807`06c6a400 : nt!MiCleanVad+0x4d
fffffa0a`6271e880 fffff807`06e38941 : ffffffff`00000000 ffffffff`ffffffff fffffa0a`6271eb01 ffff8402`4fbdf080 : nt!MmCleanProcessAddressSpace+0x137
fffffa0a`6271e900 fffff807`06e5eb23 : ffff8402`4fbdf080 ffffaa8b`23c20920 fffffa0a`6271eb80 00000000`00000000 : nt!PspRundownSingleProcess+0x139
fffffa0a`6271e980 fffff807`06e39fbb : 00000000`00000000 fffffa0a`6271eb01 00000096`d50b6000 ffff8402`4a968080 : nt!PspExitThread+0x60b
fffffa0a`6271ea90 fffff807`069d2e18 : ffff8402`00000d54 ffff8402`4a968080 ffff8402`4fbdf080 000001d4`e00b1250 : nt!NtTerminateProcess+0xeb
fffffa0a`6271eb00 00007ffc`87d9c644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`d4edf798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`87d9c644
THREAD_SHA1_HASH_MOD_FUNC: 8fdeac079ced619cec4394c6f740bb61520d44ac
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a043637007f72f0ea58c2a82de58efbb11c38106
THREAD_SHA1_HASH_MOD: 9eef8c7ca0ce66f8b8b34848179f303828cff762
FOLLOWUP_IP:
nt!MiDeletePteRun+1d35a8
fffff807`069e9848 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeletePteRun+1d35a8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d35a8
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
PRIMARY_PROBLEM_CLASS: 0x1a_41790_nt!MiDeletePteRun
TARGET_TIME: 2020-02-22T23:19:11.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.657
ANALYSIS_SESSION_ELAPSED_TIME: afc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41790_nt!mideletepterun
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8500fd1f7c10
Arg3: 0000001000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff8500fd1f7c10
BUGCHECK_P3: 1000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-23-2020 22:08:14.0353
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
ffff910a`f011df28 fffff800`108253ee : 00000000`0000001a 00000000`00041792 ffff8500`fd1f7c10 00000010`00000000 : nt!KeBugCheckEx
ffff910a`f011df30 fffff800`106ac957 : 00000000`00000000 ffff8500`fd1f7c10 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c9e
ffff910a`f011e040 fffff800`106ace11 : ffff910a`f011e490 ffff8542`807e8fb8 00000000`00000000 0a000002`7769f867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff910a`f011e100 fffff800`106ace11 : ffff910a`f011e490 ffff8542`a1403f40 00000000`00000000 0a000001`91d5f867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff910a`f011e1c0 fffff800`106ace11 : ffff910a`f011e490 ffff8542`a150a018 ffff8542`00000000 0a000001`91c5e867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff910a`f011e280 fffff800`106ac59c : ffff910a`f011e490 00000000`00000000 00000000`00000000 00000000`00000702 : nt!MiWalkPageTablesRecursively+0x6a1
ffff910a`f011e340 fffff800`106aaa08 : ffff910a`f011e490 ffffd484`00000002 ffffe489`00000001 ffff910a`00000000 : nt!MiWalkPageTables+0x36c
ffff910a`f011e440 fffff800`106b8b60 : ffffffff`ffffffff ffffd484`f5be65f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff910a`f011e7e0 fffff800`10bc7bfd : 00000000`00000000 00000000`1fa3eb90 ffffd484`facbecc0 00000000`00000000 : nt!MiDeleteVad+0x860
ffff910a`f011e9a0 fffff800`10bc79f3 : ffffd484`facbecc0 00000000`00000000 000001fa`3eb90000 00000000`00000000 : nt!MiUnmapVad+0x49
ffff910a`f011e9d0 fffff800`10bc7889 : ffffd484`f5be6280 fffff800`00000008 ffffd484`ec89cc40 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffff910a`f011eab0 fffff800`107d2e18 : ffffd484`eceba080 000001fa`3eb90000 00007ffc`8ea00000 ffffd484`f5be6280 : nt!NtUnmapViewOfSectionEx+0x99
ffff910a`f011eb00 00007ffc`9d37f974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009d`f1cf93f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`9d37f974
THREAD_SHA1_HASH_MOD_FUNC: cd17d96308226c0911d4c2e72141f4a08060b33a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3f1e260415cb0e6b5f6ff77776bc245798d2736b
THREAD_SHA1_HASH_MOD: fe34192f63d13620a8987d294372ee74d699cfee
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-02-22T23:51:55.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 30ba
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff853ffd4b5bc8
Arg3: 0000001000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff853ffd4b5bc8
BUGCHECK_P3: 1000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-23-2020 22:08:10.0841
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
fffff183`cabe1ef8 fffff804`05a253ee : 00000000`0000001a 00000000`00041792 ffff853f`fd4b5bc8 00000010`00000000 : nt!KeBugCheckEx
fffff183`cabe1f00 fffff804`058ac957 : 00000000`00000000 ffff853f`fd4b5bc8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c9e
fffff183`cabe2010 fffff804`058ace11 : fffff183`cabe2460 ffff8542`9ffea5a8 00000000`00000000 0a000002`91ab2867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff183`cabe20d0 fffff804`058ace11 : fffff183`cabe2460 ffff8542`a14fff50 00000000`00000000 0a000002`93131867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff183`cabe2190 fffff804`058ace11 : fffff183`cabe2460 ffff8542`a150a7f8 ffff8542`00000000 0a000002`9311c867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff183`cabe2250 fffff804`058ac59c : fffff183`cabe2460 00000000`00000000 00000000`00000000 fffff804`058fb4e6 : nt!MiWalkPageTablesRecursively+0x6a1
fffff183`cabe2310 fffff804`058aaa08 : fffff183`cabe2460 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff183`cabe2410 fffff804`058b8b60 : ffffffff`ffffffff ffff8609`deb6f3f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff183`cabe27b0 fffff804`05dc7bfd : ffff8609`dbc899e0 00000000`0008a000 ffff8609`deeca540 00000000`00000000 : nt!MiDeleteVad+0x860
fffff183`cabe2970 fffff804`05dc79f3 : ffff8609`deeca540 00007ffa`96b20000 ffff8609`dbce14d0 00000000`00000000 : nt!MiUnmapVad+0x49
fffff183`cabe29a0 fffff804`05dc7889 : ffff8609`deb6f080 fffff804`00000008 ffff8609`d3aa0140 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
fffff183`cabe2a80 fffff804`05dc757c : ffff8609`de3a7080 00000274`2862c210 00000274`2862c210 ffff8609`deb6f080 : nt!NtUnmapViewOfSectionEx+0x99
fffff183`cabe2ad0 fffff804`059d2e18 : ffff8609`de3a7080 0000008c`4c17ca60 00007ffa`952757a0 ffff8609`e69d3c60 : nt!NtUnmapViewOfSection+0xc
fffff183`cabe2b00 00007ffa`9d1bc604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008c`4c17cb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9d1bc604
THREAD_SHA1_HASH_MOD_FUNC: e3e3f454f5c5e2fe31f4ba7b6315002a603841a7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e1612500ec4dd89991a61214ff6f1ddc9c25756e
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-02-23T18:43:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2be2
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8073d973358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8073d973358
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: d
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-23-2020 22:08:06.0921
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DEVICE_OBJECT: ffffe78f00000000
LAST_CONTROL_TRANSFER: from fffff8073d5eebc1 to fffff8073d5c1510
STACK_TEXT:
ffffad01`2397bb08 fffff807`3d5eebc1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`3d973358 : nt!KeBugCheckEx
ffffad01`2397bb10 fffff807`3d41f897 : 000003f5`111240b3 ffffad01`23a00180 00000000`00000286 ffff8d8c`b2467ab0 : nt!KeAccumulateTicks+0x1cc161
ffffad01`2397bb70 fffff807`3d3601e1 : ffff8d8c`b2467d70 ffffe78f`6d4a2500 ffff8d8c`b2467b30 ffffe78f`6d4a25b0 : nt!KeClockInterruptNotify+0xc07
ffffad01`2397bf30 fffff807`3d402a25 : ffffe78f`6d4a2500 00000000`00000000 00000000`00000000 ffff594d`f987e056 : hal!HalpTimerClockIpiRoutine+0x21
ffffad01`2397bf60 fffff807`3d5c2faa : ffff8d8c`b2467b30 ffffe78f`6d4a2500 ffff9703`ec842c10 ffffe78f`6d4a2500 : nt!KiCallInterruptServiceRoutine+0xa5
ffffad01`2397bfb0 fffff807`3d5c3517 : 00000012`74d268c0 ffff8d8c`b2467b30 ffffe78f`6d4a2500 ffffe78f`7a39f4f0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8d8c`b2467ab0 fffff807`3d4b4ade : 00000000`00000000 00000000`00000002 ffff8d8c`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8d8c`b2467c40 fffff807`3d4090ae : ffff8d8c`b2467f80 ffff8d8c`b24681a8 ffffe78f`7b66eac0 00000000`00000000 : nt!MiFlushSectionInternal+0x2de
ffff8d8c`b2467f10 fffff807`3d4076cd : 00000000`00000000 ffffe78f`7c0a3380 00000000`00000000 00000000`00000000 : nt!MmFlushSection+0x166
ffff8d8c`b2467fc0 fffff807`3d4d5e73 : ffffe78f`7a39f458 00000000`00000000 ffff8d8c`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x6cd
ffff8d8c`b2468110 fffff807`4289b586 : ffff9703`dccbc170 ffff8d8c`b2468710 ffff9703`dccbc001 ffffe78f`77fc4528 : nt!CcCoherencyFlushAndPurgeCache+0x73
ffff8d8c`b2468160 fffff807`427981da : ffffe78f`77fc4528 ffff9703`dccbc170 ffffe78f`77fc4528 ffff9703`dccbc010 : Ntfs!NtfsFlushUserStream+0xc6
ffff8d8c`b24681f0 fffff807`428bd732 : ffffe78f`77fc4528 ffffe78f`72a07180 ffff9703`dccbc010 ffff8d8c`b2468370 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x2e2
ffff8d8c`b2468340 fffff807`4279a577 : ffff9703`e80b47e0 ffffe78f`773c64e0 ffff9703`e80b47e0 ffffe78f`773c64e0 : Ntfs!NtfsFlushVolume+0x2e2
ffff8d8c`b2468460 fffff807`42788527 : ffffe78f`77fc4528 ffffe78f`773c64e0 ffffe78f`72842c70 00000000`00000001 : Ntfs!NtfsVolumeDasdIo+0x1ef
ffff8d8c`b2468520 fffff807`4278641c : ffff8d8c`b2468720 ffffe78f`773c64e0 ffff8d8c`b2468720 ffffe78f`77fc4528 : Ntfs!NtfsCommonRead+0x1ef7
ffff8d8c`b24686e0 fffff807`3d431f79 : ffffe78f`72a09a30 ffffe78f`773c64e0 ffffe78f`773c6910 00000000`00000000 : Ntfs!NtfsFsdRead+0x20c
ffff8d8c`b24687a0 fffff807`41ce55de : 00000000`00000000 ffff8d8c`b2468880 ffffe78f`773c64e0 ffff8d8c`b2468890 : nt!IofCallDriver+0x59
ffff8d8c`b24687e0 fffff807`41ce3f16 : ffff8d8c`b2468880 00000000`00000001 ffffe78f`77d95501 fffff807`3d9f13c5 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffff8d8c`b2468860 fffff807`3d431f79 : ffffe78f`773c64e0 fffff807`3d5f5c70 ffffe78f`7c0a3ad0 00000000`00000000 : FLTMGR!FltpDispatch+0xb6
ffff8d8c`b24688c0 fffff807`3d9e9785 : 00000000`00000000 ffffe78f`7d01fb50 ffffe78f`7d01fba0 ffffe78f`7d01fb50 : nt!IofCallDriver+0x59
ffff8d8c`b2468900 fffff807`3d9e595f : ffffe78f`00000000 00000000`00000000 00000000`00000000 ffff8d8c`b2468b80 : nt!IopSynchronousServiceTail+0x1a5
ffff8d8c`b24689a0 fffff807`3d5d2e18 : 00000000`00000d38 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x59f
ffff8d8c`b2468a90 00007ffe`7767c184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009a`f74fc7a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7767c184
THREAD_SHA1_HASH_MOD_FUNC: 74132733ef8198b9dd76871a96b92b6689423cbe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4bb6bfd16d3c7580e65485d9ec9ea90751688f2b
THREAD_SHA1_HASH_MOD: 8764cb687a5b7a1604be871561846addc3653d4b
FOLLOWUP_IP:
nt!KeAccumulateTicks+1cc161
fffff807`3d5eebc1 cc int 3
FAULT_INSTR_CODE: ab3944cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeAccumulateTicks+1cc161
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1cc161
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks
TARGET_TIME: 2020-02-22T23:14:13.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7a39
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------