MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffc20007febe50
Arg3: 00000000000001fe
Arg4: 0000000000000200
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M DS3H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F41
BIOS_DATE: 07/22/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M DS3H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffc20007febe50
BUGCHECK_P3: 1fe
BUGCHECK_P4: 200
BUGCHECK_STR: 0x1a_41790
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: updater.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 17:12:30.0966
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8006ec38538 to fffff8006ebc2380
STACK_TEXT:
ffffbf0d`380f2d48 fffff800`6ec38538 : 00000000`0000001a 00000000`00041790 ffffc200`07febe50 00000000`000001fe : nt!KeBugCheckEx
ffffbf0d`380f2d50 fffff800`6eae8527 : 00000000`00000003 ffffbf0d`380f34a0 ffffbf0d`380f34a0 ffffbf0d`380f33f0 : nt!MiDeletePteRun+0x188a78
ffffbf0d`380f2f70 fffff800`6eae4042 : ffff8289`52ad29c0 fffff700`aa551000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffffbf0d`380f2fa0 fffff800`6eae41d1 : ffffbf0d`380f33f0 fffff77b`80552a80 00000000`00000000 0a000002`aa3f7867 : nt!MiWalkPageTablesRecursively+0x512
ffffbf0d`380f3060 fffff800`6eae41d1 : ffffbf0d`380f33f0 fffff77b`bdc02a90 00000000`00000000 0a000002`717c0867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf0d`380f3120 fffff800`6eae41d1 : ffffbf0d`380f33f0 fffff77b`bddee010 fffff77b`00000000 0a000003`f5ebf867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf0d`380f31e0 fffff800`6eae395c : ffffbf0d`380f33f0 00000000`00000000 ffff8289`00000000 00000000`00000002 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf0d`380f32a0 fffff800`6eae1dc8 : ffffbf0d`380f33f0 ffff8289`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffbf0d`380f33a0 fffff800`6eaeff20 : ffffffff`ffffffff ffff8289`52ad2838 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffbf0d`380f3740 fffff800`6eb35b8a : 00000000`154abc8e ffff8289`4cfb7080 00000000`00000000 fffff800`6eaeaefa : nt!MiDeleteVad+0x860
ffffbf0d`380f3900 fffff800`6f0948f0 : 00000000`00000000 00000000`00000000 ffffbf0d`380f3a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffffbf0d`380f3960 fffff800`6f09452b : 00000000`00000000 00000000`00000000 00000012`79bfe800 00000154`9f0ae1c0 : nt!MmFreeVirtualMemory+0x390
ffffbf0d`380f3aa0 fffff800`6ebd3c18 : ffff8289`4cfb7080 ffffbf0d`380f3b80 ffff8289`42aa3000 ffff8289`4c6a5e60 : nt!NtFreeVirtualMemory+0x8b
ffffbf0d`380f3b00 00007ffc`e5c1c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000012`79bfe7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e5c1c484
THREAD_SHA1_HASH_MOD_FUNC: ae96f317ca5c80fc782dc8dfe0b700681be3f611
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7e7b734d8a98aa4690827ebbd6f50997e6291f7d
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
FOLLOWUP_IP:
nt!MiDeletePteRun+188a78
fffff800`6ec38538 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeletePteRun+188a78
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 188a78
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
PRIMARY_PROBLEM_CLASS: 0x1a_41790_nt!MiDeletePteRun
TARGET_TIME: 2020-04-13T10:34:00.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 28d5
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41790_nt!mideletepterun
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802786f90d2, The address that the exception occurred at
Arg3: ffffd189079255b8, Exception Record Address
Arg4: ffffd78121edf930, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M DS3H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F41
BIOS_DATE: 07/22/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M DS3H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff802786f90d2
BUGCHECK_P3: ffffd189079255b8
BUGCHECK_P4: ffffd78121edf930
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MmSetAddressRangeModifiedEx+112
fffff802`786f90d2 488b5018 mov rdx,qword ptr [rax+18h]
EXCEPTION_RECORD: ffffd189079255b8 -- (.exr 0xffffd189079255b8)
ExceptionAddress: fffff802786f90d2 (nt!MmSetAddressRangeModifiedEx+0x0000000000000112)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd78121edf930 -- (.cxr 0xffffd78121edf930)
rax=ff0fa48c0900c200 rbx=0000000000001000 rcx=ff0fa48c0900c1b0
rdx=ffffd168b45a27f8 rsi=0000000000000000 rdi=0000000000000004
rip=fffff802786f90d2 rsp=ffffd189079257f0 rbp=8000000000000000
r8=ffffd168b0019f98 r9=ffff8d8000000000 r10=0000000fffffffff
r11=0000000000000002 r12=ffffd160033f3428 r13=0000000000001000
r14=ffffd160033f3428 r15=ffffc0067e685000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!MmSetAddressRangeModifiedEx+0x112:
fffff802`786f90d2 488b5018 mov rdx,qword ptr [rax+18h] ds:002b:ff0fa48c`0900c218=????????????????
Resetting default scope
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
FOLLOWUP_IP:
nt!MmSetAddressRangeModifiedEx+112
fffff802`786f90d2 488b5018 mov rdx,qword ptr [rax+18h]
BUGCHECK_STR: AV
READ_ADDRESS: fffff80278b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 17:12:27.0666
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: ffffd78121edf0c8
LAST_CONTROL_TRANSFER: from fffff8027868df3b to fffff802786f90d2
STACK_TEXT:
ffffd189`079257f0 fffff802`7868df3b : 00000000`00001000 00000000`00001000 00000000`00001000 ffffd189`07925a40 : nt!MmSetAddressRangeModifiedEx+0x112
ffffd189`07925940 fffff802`78624309 : ffffa48b`fd79d970 00000000`00000000 ffffa48c`00000001 ffffd189`07925ac8 : nt!CcFlushCachePriv+0x3ab
ffffd189`07925a90 fffff802`786f43c5 : ffffa48b`f9c66c00 ffffa48b`00000000 fffff802`78d78200 ffffd189`09938a90 : nt!CcWriteBehindInternal+0x209
ffffd189`07925b70 fffff802`7866bce5 : ffffa48b`fdf24080 00000000`00000080 ffffa48b`f9c6f040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffd189`07925c10 fffff802`787c99ca : ffffd781`21f24180 ffffa48b`fdf24080 fffff802`7866bc90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd189`07925c60 00000000`00000000 : ffffd189`07926000 ffffd189`07920000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: b6a79d8cba7df40336dfcd516b3091479e6c107c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5d43599543837ab0a76e4cd6185c342f1ff82e28
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FAULT_INSTR_CODE: 18508b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmSetAddressRangeModifiedEx+112
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .cxr 0xffffd78121edf930 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 112
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!MmSetAddressRangeModifiedEx
BUCKET_ID: AV_STACKPTR_ERROR_nt!MmSetAddressRangeModifiedEx
PRIMARY_PROBLEM_CLASS: AV_STACKPTR_ERROR_nt!MmSetAddressRangeModifiedEx
TARGET_TIME: 2020-04-13T09:09:03.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 199d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_stackptr_error_nt!mmsetaddressrangemodifiedex
FAILURE_ID_HASH: {62ac4542-6ec0-5cd2-4c8a-60607a4f11e7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffff28003919320
Arg3: 00000000000001fe
Arg4: 0000000000000200
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M DS3H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F41
BIOS_DATE: 07/22/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M DS3H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 41790
BUGCHECK_P2: fffff28003919320
BUGCHECK_P3: 1fe
BUGCHECK_P4: 200
BUGCHECK_STR: 0x1a_41790
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Matriks.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 17:12:24.0487
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8054e038538 to fffff8054dfc2380
STACK_TEXT:
ffff9c8b`28ed0d48 fffff805`4e038538 : 00000000`0000001a 00000000`00041790 fffff280`03919320 00000000`000001fe : nt!KeBugCheckEx
ffff9c8b`28ed0d50 fffff805`4dee8527 : 00000000`00000003 ffff9c8b`28ed14a0 ffff9c8b`28ed14a0 ffff9c8b`28ed13f0 : nt!MiDeletePteRun+0x188a78
ffff9c8b`28ed0f70 fffff805`4dee4042 : ffff8c8f`dbfc58c0 ffffc680`000e0000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffff9c8b`28ed0fa0 fffff805`4dee41d1 : ffff9c8b`28ed13f0 ffffc6e3`400006f8 00000000`00000000 0a000001`30866867 : nt!MiWalkPageTablesRecursively+0x512
ffff9c8b`28ed1060 fffff805`4dee41d1 : ffff9c8b`28ed13f0 ffffc6e3`71a00000 00000000`00000000 0a000001`4f0eb867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9c8b`28ed1120 fffff805`4dee41d1 : ffff9c8b`28ed13f0 ffffc6e3`71b8d000 ffffc6e3`00000000 0a000001`51bea867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9c8b`28ed11e0 fffff805`4dee395c : ffff9c8b`28ed13f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9c8b`28ed12a0 fffff805`4dee1dc8 : ffff9c8b`28ed13f0 fffff280`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff9c8b`28ed13a0 fffff805`4deeff20 : ffffffff`ffffffff ffff8c8f`dbfc5738 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff9c8b`28ed1740 fffff805`4df35b8a : 00000000`0001ca42 ffff8c8f`d9706080 00000000`00000000 fffff805`4deeaefa : nt!MiDeleteVad+0x860
ffff9c8b`28ed1900 fffff805`4e4948f0 : 00000000`00000000 00000000`00000000 ffff9c8b`28ed1a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffff9c8b`28ed1960 fffff805`4e49452b : 00000000`00000000 00000000`0009e578 ffff76f1`29ed15ac 00000000`00000004 : nt!MmFreeVirtualMemory+0x390
ffff9c8b`28ed1aa0 fffff805`4dfd3c18 : ffff8c8f`d9706080 ffff9c8b`28ed1b80 ffff8c8f`cfaa7100 ffff838e`07662468 : nt!NtFreeVirtualMemory+0x8b
ffff9c8b`28ed1b00 00007ff9`86dfc484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`86dfc484
THREAD_SHA1_HASH_MOD_FUNC: ae96f317ca5c80fc782dc8dfe0b700681be3f611
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7e7b734d8a98aa4690827ebbd6f50997e6291f7d
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
FOLLOWUP_IP:
nt!MiDeletePteRun+188a78
fffff805`4e038538 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeletePteRun+188a78
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 188a78
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
PRIMARY_PROBLEM_CLASS: 0x1a_41790_nt!MiDeletePteRun
TARGET_TIME: 2020-04-13T09:53:25.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 219f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41790_nt!mideletepterun
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80540cb2eef, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M DS3H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M DS3H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 10
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80540cb2eef
READ_ADDRESS: fffff805411733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000010
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiInsertPageInFreeOrZeroedList+19f
fffff805`40cb2eef 49034710 add rax,qword ptr [r15+10h]
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: Matriks.exe
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 17:12:20.0644
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffa7012f1aeae0 -- (.trap 0xffffa7012f1aeae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80540cb2eef rsp=ffffa7012f1aec70 rbp=ffffa7012f1aece9
r8=0000000000000070 r9=0000000000000070 r10=0000000000000000
r11=ffffa7012f1aed48 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr ac po nc
nt!MiInsertPageInFreeOrZeroedList+0x19f:
fffff805`40cb2eef 49034710 add rax,qword ptr [r15+10h] ds:00000000`00000010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80540dd41e9 to fffff80540dc2380
STACK_TEXT:
ffffa701`2f1ae998 fffff805`40dd41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa701`2f1ae9a0 fffff805`40dd052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa701`2f1aeae0 fffff805`40cb2eef : 00000000`00000000 fffff805`00000001 00000000`00000000 fffff805`3f33d180 : nt!KiPageFault+0x46b
ffffa701`2f1aec70 fffff805`40caff14 : 00000000`003e9070 00000000`00000004 ffffa701`00000001 ffff9c80`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f
ffffa701`2f1aed50 fffff805`40ce8527 : 00000000`00000003 ffffa701`2f1af4a0 ffffa701`2f1af4a0 ffffa701`2f1af3f0 : nt!MiDeletePteRun+0x454
ffffa701`2f1aef70 fffff805`40ce4042 : ffffaf81`62426940 ffff9f00`000e7000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffffa701`2f1aefa0 fffff805`40ce41d1 : ffffa701`2f1af3f0 ffff9f4f`80000730 00000000`00000000 0a000001`0ff89867 : nt!MiWalkPageTablesRecursively+0x512
ffffa701`2f1af060 fffff805`40ce41d1 : ffffa701`2f1af3f0 ffff9f4f`a7c00000 00000000`00000000 0a000001`77bfe867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa701`2f1af120 fffff805`40ce41d1 : ffffa701`2f1af3f0 ffff9f4f`a7d3e000 ffff9f4f`00000000 0a000001`234fd867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa701`2f1af1e0 fffff805`40ce395c : ffffa701`2f1af3f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa701`2f1af2a0 fffff805`40ce1dc8 : ffffa701`2f1af3f0 ffff9980`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffa701`2f1af3a0 fffff805`40ceff20 : ffffffff`ffffffff ffffaf81`624267b8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffa701`2f1af740 fffff805`40d35b8a : 00000000`0001d695 ffffaf81`6244f080 00000000`00000000 fffff805`40ceaefa : nt!MiDeleteVad+0x860
ffffa701`2f1af900 fffff805`412948f0 : 00000000`00000000 00000000`00000000 ffffa701`2f1afa60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffffa701`2f1af960 fffff805`4129452b : 00000000`00000000 00000000`0009e578 ffff120f`9b641212 fffff805`40dc917f : nt!MmFreeVirtualMemory+0x390
ffffa701`2f1afaa0 fffff805`40dd3c18 : ffffaf81`6244f080 ffffa701`2f1afb80 fffff805`40bcbfe0 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
ffffa701`2f1afb00 00007ffe`cfe7c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`cfe7c484
THREAD_SHA1_HASH_MOD_FUNC: 113f0a56f690aa8102cc517c209bd05ce012b88e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 46f3d2b3e9ca84b8cd4cee31fc26dc3201b94300
THREAD_SHA1_HASH_MOD: aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c
FOLLOWUP_IP:
nt!MiInsertPageInFreeOrZeroedList+19f
fffff805`40cb2eef 49034710 add rax,qword ptr [r15+10h]
FAULT_INSTR_CODE: 10470349
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+19f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 19f
FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList
BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList
PRIMARY_PROBLEM_CLASS: AV_nt!MiInsertPageInFreeOrZeroedList
TARGET_TIME: 2020-04-13T13:18:29.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1ab2
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!miinsertpageinfreeorzeroedlist
FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffffc980000cf9e0
Arg3: 80000003d77f2867
Arg4: ff0fc980000cf9e0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M DS3H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F41
BIOS_DATE: 07/22/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M DS3H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 403
BUGCHECK_P2: ffffc980000cf9e0
BUGCHECK_P3: 80000003d77f2867
BUGCHECK_P4: ff0fc980000cf9e0
BUGCHECK_STR: 0x1a_403
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Matriks.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 17:12:15.0950
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8013f238520 to fffff8013f1c2380
STACK_TEXT:
fffff602`70fc1d48 fffff801`3f238520 : 00000000`0000001a 00000000`00000403 ffffc980`000cf9e0 80000003`d77f2867 : nt!KeBugCheckEx
fffff602`70fc1d50 fffff801`3f0e8527 : 00000000`00000003 fffff602`70fc24a0 fffff602`70fc24a0 fffff602`70fc23f0 : nt!MiDeletePteRun+0x188a60
fffff602`70fc1f70 fffff801`3f0e4042 : ffffb704`0351c580 ffffc980`000d0000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffff602`70fc1fa0 fffff801`3f0e41d1 : fffff602`70fc23f0 ffffc9e4`c0000678 00000000`00000000 0a000002`774c0867 : nt!MiWalkPageTablesRecursively+0x512
fffff602`70fc2060 fffff801`3f0e41d1 : fffff602`70fc23f0 ffffc9e4`f2600000 00000000`00000000 0a000001`721a5867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff602`70fc2120 fffff801`3f0e41d1 : fffff602`70fc23f0 ffffc9e4`f2793000 ffffc9e4`00000000 0a000001`721a4867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff602`70fc21e0 fffff801`3f0e395c : fffff602`70fc23f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff602`70fc22a0 fffff801`3f0e1dc8 : fffff602`70fc23f0 ffff8580`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff602`70fc23a0 fffff801`3f0eff20 : ffffffff`ffffffff ffffb704`0351c3f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff602`70fc2740 fffff801`3f135b8a : 00000000`0001a056 ffffb704`031a3340 00000000`00000000 fffff801`3f0eaefa : nt!MiDeleteVad+0x860
fffff602`70fc2900 fffff801`3f6948f0 : 00000000`00000000 00000000`00000000 fffff602`70fc2a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff602`70fc2960 fffff801`3f69452b : 00000000`00000000 00000000`0009e578 ffff4030`f8d672b1 00007ffa`00000004 : nt!MmFreeVirtualMemory+0x390
fffff602`70fc2aa0 fffff801`3f1d3c18 : ffffb704`031a3340 fffff602`70fc2b80 ffffb703`f86a2f00 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
fffff602`70fc2b00 00007ffa`7b2bc484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`7b2bc484
THREAD_SHA1_HASH_MOD_FUNC: ae96f317ca5c80fc782dc8dfe0b700681be3f611
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9b8ebe4e1a344a59025150bbf6cbba0ca7c3b554
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
FOLLOWUP_IP:
nt!MiDeletePteRun+188a60
fffff801`3f238520 cc int 3
FAULT_INSTR_CODE: c78b4ccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeletePteRun+188a60
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 188a60
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
PRIMARY_PROBLEM_CLASS: 0x1a_403_nt!MiDeletePteRun
TARGET_TIME: 2020-04-13T09:26:47.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 218e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_403_nt!mideletepterun
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------