MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffe080012d1340
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffe080012d1340
BUGCHECK_P3: 0
BUGCHECK_P4: 1
BUGCHECK_STR: 0x1a_41790
CPU_COUNT: 10
CPU_MHZ: bb8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-23-2019 22:19:46.0386
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8065e9e9748 to fffff8065e9c14e0
STACK_TEXT:
ffff818b`17ac2ac8 fffff806`5e9e9748 : 00000000`0000001a 00000000`00041790 ffffe080`012d1340 00000000`00000000 : nt!KeBugCheckEx
ffff818b`17ac2ad0 fffff806`5e8b11f7 : 00000000`00000003 ffff818b`17ac3220 ffff818b`17ac3220 ffff818b`17ac3170 : nt!MiDeletePteRun+0x1d34a8
ffff818b`17ac2cf0 fffff806`5e8acd12 : ffffa60f`003db5c0 fffffb80`258f8000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffff818b`17ac2d20 fffff806`5e8acea1 : ffff818b`17ac3170 fffffbfd`c012c7b8 00000000`00000000 0a000000`645bc867 : nt!MiWalkPageTablesRecursively+0x512
ffff818b`17ac2de0 fffff806`5e8acea1 : ffff818b`17ac3170 fffffbfd`fee00960 00000000`00000000 0a000000`63bbb867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff818b`17ac2ea0 fffff806`5e8acea1 : ffff818b`17ac3170 fffffbfd`feff7000 fffffbfd`00000000 0a000000`5e2f3867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff818b`17ac2f60 fffff806`5e8ac62c : ffff818b`17ac3170 fffff806`5e8491b4 00000000`00000000 ffffa60e`fdc84080 : nt!MiWalkPageTablesRecursively+0x6a1
ffff818b`17ac3020 fffff806`5e8aaa98 : ffff818b`17ac3170 ffff818b`00000002 ffffa60e`00000001 ffffa60e`00000000 : nt!MiWalkPageTables+0x36c
ffff818b`17ac3120 fffff806`5e8b8bf0 : ffffffff`ffffffff ffffa60f`003db438 ffffa60f`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff818b`17ac34c0 fffff806`5edd9e31 : ffffa60e`f9dc1080 00000000`00000000 ffffa60e`fe90b870 ffffa60e`f9dc1080 : nt!MiDeleteVad+0x860
ffff818b`17ac3680 fffff806`5edd98cf : ffffa60e`fe90a6f0 ffffa60e`fe90a6f0 ffffa60f`003db0c0 fffff806`5ec6a3c0 : nt!MiCleanVad+0x4d
ffff818b`17ac36b0 fffff806`5ee38771 : ffffffff`00000000 ffffffff`ffffffff ffff818b`17ac3901 ffffa60f`003db0c0 : nt!MmCleanProcessAddressSpace+0x137
ffff818b`17ac3730 fffff806`5ee5e6d3 : ffffa60f`003db0c0 ffffd086`b86fb060 ffff818b`17ac3959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffff818b`17ac37b0 fffff806`5eecd143 : 00000000`c0000005 ffffa60e`f9dc1001 0000006b`c6aae000 00000000`0000ffff : nt!PspExitThread+0x60b
ffff818b`17ac38c0 fffff806`5e83e551 : ffffa60e`f9dc1180 00000000`00000001 00000000`00000000 00000000`00000100 : nt!KiSchedulerApcTerminate+0x33
ffff818b`17ac3900 fffff806`5e9c5a60 : ffffa60e`f9dc1001 ffff818b`17ac39c0 ffffa60e`f9dc1080 ffffa60f`00000000 : nt!KiDeliverApc+0x481
ffff818b`17ac39c0 fffff806`5e9d2dbf : ffffa60e`f9dc1080 00000000`00000000 00000000`00000000 ffffa60f`00a3e9e0 : nt!KiInitiateUserApc+0x70
ffff818b`17ac3b00 00007ff8`29c1f9f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000006b`cd3ff5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`29c1f9f4
THREAD_SHA1_HASH_MOD_FUNC: 12362c45d4d7c42f8f190b16d3b1472a08d5d965
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 973c395eeb07c3c7fc0c22f7d5d9191fa6793bef
THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
FOLLOWUP_IP:
nt!MiDeletePteRun+1d34a8
fffff806`5e9e9748 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeletePteRun+1d34a8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d34a8
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
PRIMARY_PROBLEM_CLASS: 0x1a_41790_nt!MiDeletePteRun
TARGET_TIME: 2019-12-23T17:32:22.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 34e9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41790_nt!mideletepterun
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------