MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061948, The subtype of the bugcheck.
Arg2: 0000000001000200
Arg3: 0000000000000001
Arg4: 0000000001000200
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V13.2
SYSTEM_SKU: 0001
SYSTEM_VERSION: Standard
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: N.1.10
BIOS_DATE: 01/23/2019
BASEBOARD_MANUFACTURER: Standard
BASEBOARD_PRODUCT: Standard
BASEBOARD_VERSION: Standard
DUMP_TYPE: 2
BUGCHECK_P1: 61948
BUGCHECK_P2: 1000200
BUGCHECK_P3: 1
BUGCHECK_P4: 1000200
BUGCHECK_STR: 0x1a_61948
CPU_COUNT: c
CPU_MHZ: 8a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: a
CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: 96'00000000 (cache) 96'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: HxT
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-07-2020 16:55:08.0075
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8036fbeb259 to fffff8036fbc9980
STACK_TEXT:
fffff589`21d65a88 fffff803`6fbeb259 : 00000000`0000001a 00000000`00061948 00000000`01000200 00000000`00000001 : nt!KeBugCheckEx
fffff589`21d65a90 fffff803`6fa9c7a0 : fffff803`6fe4fa02 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x1c50e5
fffff589`21d65b20 fffff803`6faea3be : fffff43f`fe7f5b68 fffff589`21d66220 fffff589`21d661e0 00000000`00000004 : nt!MiDeletePteRun+0xb90
fffff589`21d65d00 fffff803`6fae5194 : ffffd409`491e5580 ffffd409`491e5580 fffff589`21d66220 00000000`00000000 : nt!MiDeleteVaTail+0x6e
fffff589`21d65d30 fffff803`6fae4854 : fffff589`21d66220 00000000`00000000 fffff589`00000000 00000000`00000002 : nt!MiWalkPageTablesRecursively+0x1724
fffff589`21d65e10 fffff803`6fae4854 : fffff589`21d66220 00000000`00000000 fffff589`00000001 00000000`00000003 : nt!MiWalkPageTablesRecursively+0xde4
fffff589`21d65ef0 fffff803`6fae4854 : fffff589`21d66220 00000000`00000000 fffff589`00000002 00000000`00000000 : nt!MiWalkPageTablesRecursively+0xde4
fffff589`21d65fd0 fffff803`6fae370a : fffff589`21d66220 00000000`00000000 ffffd409`00000003 fffff803`6fbcb925 : nt!MiWalkPageTablesRecursively+0xde4
fffff589`21d660b0 fffff803`6fadcdad : fffff589`21d66220 fffff803`00000001 ffffd409`00000000 00000000`00000000 : nt!MiWalkPageTables+0x1da
fffff589`21d661b0 fffff803`6fadb1c5 : 00000000`00000000 ffffd409`491e53f0 fffff589`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x1dd
fffff589`21d663f0 fffff803`7007fa75 : fffff803`6fe4ea00 00000000`00000000 ffffd409`40ad7a40 ffffd409`466a29f0 : nt!MiDeleteVad+0x7c5
fffff589`21d66560 fffff803`70005460 : ffffd409`40ad7a40 ffffd409`466a29f0 ffffd409`4925c080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff589`21d66590 fffff803`7007e35f : ffffd409`40ad7b80 ffffd409`40ad7b80 ffffd409`40ad7a40 ffffd409`466a29f0 : nt!MiCleanVad+0x30
fffff589`21d665c0 fffff803`700466f1 : ffffffff`00000000 ffffffff`ffffffff fffff589`21d66801 ffffd409`491e5080 : nt!MmCleanProcessAddressSpace+0x113
fffff589`21d66640 fffff803`7009e758 : ffffd409`491e5080 ffff9c83`1de52060 fffff589`21d66859 00000000`00000000 : nt!PspRundownSingleProcess+0x129
fffff589`21d666c0 fffff803`70050d93 : ffff9c83`00000001 00000000`7e000001 00000095`5547c000 ffff1e11`75a56af9 : nt!PspExitThread+0x5c8
fffff589`21d667c0 fffff803`6fabda80 : ffffd409`4ac84e98 00000000`00000000 ffffd409`4925c080 fffff803`6fabb199 : nt!KiSchedulerApcTerminate+0x33
fffff589`21d66800 fffff803`6fbcddb0 : 00000000`00020001 fffff589`21d668c0 ffffd409`00000000 fffff589`00000000 : nt!KiDeliverApc+0x470
fffff589`21d668c0 fffff803`6fbdacaf : ffffd409`4925c080 00000000`7ffe0301 00000000`00000000 ffffd409`45ea3c30 : nt!KiInitiateUserApc+0x70
fffff589`21d66a00 00007ffd`05c0f7e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000095`559ff6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`05c0f7e4
THREAD_SHA1_HASH_MOD_FUNC: e0b3ea397b28567c1892727cd05f12769e19b6db
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 41f34e3697ad9c364bc459a7a6a1283cbbcd5221
THREAD_SHA1_HASH_MOD: 65e960981daf68eaa3f111ef44aadfdc4bfefe1e
FOLLOWUP_IP:
nt!MiDereferenceIoPages+1c50e5
fffff803`6fbeb259 cc int 3
FAULT_INSTR_CODE: 1bacc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDereferenceIoPages+1c50e5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.914
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1c50e5
FAILURE_BUCKET_ID: 0x1a_61948_nt!MiDereferenceIoPages
BUCKET_ID: 0x1a_61948_nt!MiDereferenceIoPages
PRIMARY_PROBLEM_CLASS: 0x1a_61948_nt!MiDereferenceIoPages
TARGET_TIME: 2020-01-07T10:00:59.000Z
OSBUILD: 17763
OSSERVICEPACK: 914
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 443d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_61948_nt!midereferenceiopages
FAILURE_ID_HASH: {16899f95-043e-78ea-0aba-e664d76c4fc5}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff806232d7e30, The address that the exception occurred at
Arg3: fffff885fbf699a8, Exception Record Address
Arg4: fffff885fbf691f0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V13.2
SYSTEM_SKU: 0001
SYSTEM_VERSION: Standard
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: N.1.10
BIOS_DATE: 01/23/2019
BASEBOARD_MANUFACTURER: Standard
BASEBOARD_PRODUCT: Standard
BASEBOARD_VERSION: Standard
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff806232d7e30
BUGCHECK_P3: fffff885fbf699a8
BUGCHECK_P4: fffff885fbf691f0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiDemoteCombinedPte+40
fffff806`232d7e30 498378f001 cmp qword ptr [r8-10h],1
EXCEPTION_RECORD: fffff885fbf699a8 -- (.exr 0xfffff885fbf699a8)
ExceptionAddress: fffff806232d7e30 (nt!MiDemoteCombinedPte+0x0000000000000040)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff885fbf691f0 -- (.cxr 0xfffff885fbf691f0)
rax=ffffb9dcee773000 rbx=ffffffffffffffff rcx=ffffe683bf6aaa40
rdx=ffffb9bb45775000 rsi=ffffb9bb45775000 rdi=ffff96ffffffffd0
rip=fffff806232d7e30 rsp=fffff885fbf69be0 rbp=0000000000000000
r8=8000000000000000 r9=0000000000000000 r10=ffffb9dcee773000
r11=ffffb98000000000 r12=ffffe683c1ae4490 r13=fffff885fbf6a350
r14=8000000000000000 r15=ffffe683bf6aaa40
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!MiDemoteCombinedPte+0x40:
fffff806`232d7e30 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope
CPU_COUNT: c
CPU_MHZ: 8a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: a
CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: 96'00000000 (cache) 96'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: opera.exe
CURRENT_IRQL: 2
FOLLOWUP_IP:
nt!MiDemoteCombinedPte+40
fffff806`232d7e30 498378f001 cmp qword ptr [r8-10h],1
BUGCHECK_STR: AV
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff806236cf540
fffff8062374a390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-07-2020 16:55:04.0186
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff806232d6d79 to fffff806232d7e30
STACK_TEXT:
fffff885`fbf69be0 fffff806`232d6d79 : ffffe683`c1ae4490 ffffe683`bf6aaa40 fffff885`fbf6a250 fffff885`fbf6a350 : nt!MiDemoteCombinedPte+0x40
fffff885`fbf69cb0 fffff806`232dbcee : 00000000`0000000a 00000000`00000004 ffffb9bb`45775000 fffff806`00000000 : nt!MiAgePte+0x3b9
fffff885`fbf69d40 fffff806`232db854 : fffff885`fbf6a350 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x127e
fffff885`fbf69e20 fffff806`232db854 : fffff885`fbf6a350 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiWalkPageTablesRecursively+0xde4
fffff885`fbf69f00 fffff806`232db854 : fffff885`fbf6a350 00000000`00000000 00000000`00000002 ffffe683`00000000 : nt!MiWalkPageTablesRecursively+0xde4
fffff885`fbf69fe0 fffff806`232da70a : fffff885`fbf6a350 ffffe683`00000000 fffff885`00000003 fffff806`2355206d : nt!MiWalkPageTablesRecursively+0xde4
fffff885`fbf6a0c0 fffff806`232d9dce : fffff885`fbf6a350 ffffe683`00000002 ffffe683`00000000 fffff806`00000000 : nt!MiWalkPageTables+0x1da
fffff885`fbf6a1c0 fffff806`232d98a6 : ffffe683`c6a91540 fffff806`00000000 17ea89d4`fffff3e8 00000000`00000000 : nt!MiAgeWorkingSet+0x38e
fffff885`fbf6a6d0 fffff806`232d8d15 : 00000000`00000000 fffff885`fbf6a980 fffff885`fbf6a8b0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x736
fffff885`fbf6a7b0 fffff806`233192aa : fffff806`00000002 00000000`00000000 fffff806`23645a00 ffffe683`b08430f0 : nt!MiProcessWorkingSets+0x255
fffff885`fbf6a960 fffff806`2338b2d7 : 00000000`00000008 00000000`00000008 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xaa
fffff885`fbf6aa20 fffff806`232629c5 : ffffe683`b0917040 00000000`00000080 fffff806`2338b190 00000000`00000000 : nt!KeBalanceSetManager+0x147
fffff885`fbf6ab10 fffff806`233c7dfc : fffff806`21f45180 ffffe683`b0917040 fffff806`23262970 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff885`fbf6ab60 00000000`00000000 : fffff885`fbf6b000 fffff885`fbf64000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c
THREAD_SHA1_HASH_MOD_FUNC: e3a8964b8ac9f4183e9b225b40d450ed3989dd86
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8d77e948f0cc74d37a2b4e163af80ae35233159d
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
FAULT_INSTR_CODE: f0788349
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiDemoteCombinedPte+40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.914
STACK_COMMAND: .cxr 0xfffff885fbf691f0 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_nt!MiDemoteCombinedPte
BUCKET_ID: AV_nt!MiDemoteCombinedPte
PRIMARY_PROBLEM_CLASS: AV_nt!MiDemoteCombinedPte
TARGET_TIME: 2020-01-05T13:00:34.000Z
OSBUILD: 17763
OSSERVICEPACK: 914
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 30bf
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!midemotecombinedpte
FAILURE_ID_HASH: {c577c73b-79a7-0c44-6c62-58e1d697b6d8}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8075b8e1e40, The address that the exception occurred at
Arg3: fffff6837a3699a8, Exception Record Address
Arg4: fffff6837a3691f0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V13.2
SYSTEM_SKU: 0001
SYSTEM_VERSION: Standard
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: N.1.10
BIOS_DATE: 01/23/2019
BASEBOARD_MANUFACTURER: Standard
BASEBOARD_PRODUCT: Standard
BASEBOARD_VERSION: Standard
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8075b8e1e40
BUGCHECK_P3: fffff6837a3699a8
BUGCHECK_P4: fffff6837a3691f0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiDemoteCombinedPte+40
fffff807`5b8e1e40 498378f001 cmp qword ptr [r8-10h],1
EXCEPTION_RECORD: fffff6837a3699a8 -- (.exr 0xfffff6837a3699a8)
ExceptionAddress: fffff8075b8e1e40 (nt!MiDemoteCombinedPte+0x0000000000000040)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff6837a3691f0 -- (.cxr 0xfffff6837a3691f0)
rax=ffff83c1e0f07000 rbx=0000001000200001 rcx=ffffd786c625c580
rdx=ffff83bfff18dba8 rsi=ffff83bfff18dba8 rdi=ffffed0030006000
rip=fffff8075b8e1e40 rsp=fffff6837a369be0 rbp=0000000000000000
r8=8000000000000000 r9=0000000000000000 r10=ffff83c1e0f07000
r11=ffff838000000000 r12=ffffd786c4535050 r13=fffff6837a36a350
r14=8000000000000000 r15=ffffd786c625c580
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
nt!MiDemoteCombinedPte+0x40:
fffff807`5b8e1e40 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope
CPU_COUNT: c
CPU_MHZ: 8a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: a
CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: 96'00000000 (cache) 96'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: opera.exe
CURRENT_IRQL: 2
FOLLOWUP_IP:
nt!MiDemoteCombinedPte+40
fffff807`5b8e1e40 498378f001 cmp qword ptr [r8-10h],1
BUGCHECK_STR: AV
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff8075bcd9540
fffff8075bd54390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-07-2020 16:56:30.0563
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8075b8e0d89 to fffff8075b8e1e40
STACK_TEXT:
fffff683`7a369be0 fffff807`5b8e0d89 : ffffd786`c4535050 ffffd786`c625c580 fffff683`7a36a250 fffff683`7a36a350 : nt!MiDemoteCombinedPte+0x40
fffff683`7a369cb0 fffff807`5b8e5cfe : 00000000`00000000 00000000`00000004 ffff83bf`ff18dba8 fffff807`00000000 : nt!MiAgePte+0x3b9
fffff683`7a369d40 fffff807`5b8e5864 : fffff683`7a36a350 00000000`00000000 00000000`00000000 00000000`0000012e : nt!MiWalkPageTablesRecursively+0x127e
fffff683`7a369e20 fffff807`5b8e5864 : fffff683`7a36a350 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiWalkPageTablesRecursively+0xde4
fffff683`7a369f00 fffff807`5b8e5864 : fffff683`7a36a350 00000000`00000000 00000000`00000002 ffffd786`adc02000 : nt!MiWalkPageTablesRecursively+0xde4
fffff683`7a369fe0 fffff807`5b8e471a : fffff683`7a36a350 ffffd786`00000000 fffff683`00000003 fffff807`5bb5c06d : nt!MiWalkPageTablesRecursively+0xde4
fffff683`7a36a0c0 fffff807`5b8e3dde : fffff683`7a36a350 ffffd786`00000002 ffffd786`00000000 fffff683`00000000 : nt!MiWalkPageTables+0x1da
fffff683`7a36a1c0 fffff807`5b8e3565 : ffffd786`bb3e1540 fffff807`00000000 17f715fe`fffff300 00000000`00000000 : nt!MiAgeWorkingSet+0x38e
fffff683`7a36a6d0 fffff807`5b8e2d25 : 00000000`00000000 fffff683`7a36a980 fffff683`7a36a8b0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3e5
fffff683`7a36a7b0 fffff807`5b9232ea : fffff807`00000000 fffff807`00000000 fffff807`5bc4fa00 ffffd786`ae2430f0 : nt!MiProcessWorkingSets+0x255
fffff683`7a36a960 fffff807`5b995317 : 00000000`00000004 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xaa
fffff683`7a36aa20 fffff807`5b86c9d5 : ffffd786`ae339140 00000000`00000080 fffff807`5b9951d0 5555945f`fccd36d9 : nt!KeBalanceSetManager+0x147
fffff683`7a36ab10 fffff807`5b9d1e3c : fffff807`5a5c3180 ffffd786`ae339140 fffff807`5b86c980 06113013`31535502 : nt!PspSystemThreadStartup+0x55
fffff683`7a36ab60 00000000`00000000 : fffff683`7a36b000 fffff683`7a364000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c
THREAD_SHA1_HASH_MOD_FUNC: e3a8964b8ac9f4183e9b225b40d450ed3989dd86
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b111c60131345804dbba34472b47a74f8d0ce0ce
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
FAULT_INSTR_CODE: f0788349
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiDemoteCombinedPte+40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.864
STACK_COMMAND: .cxr 0xfffff6837a3691f0 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_nt!MiDemoteCombinedPte
BUCKET_ID: AV_nt!MiDemoteCombinedPte
PRIMARY_PROBLEM_CLASS: AV_nt!MiDemoteCombinedPte
TARGET_TIME: 2019-11-16T23:18:43.000Z
OSBUILD: 17763
OSSERVICEPACK: 864
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 2166
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!midemotecombinedpte
FAILURE_ID_HASH: {c577c73b-79a7-0c44-6c62-58e1d697b6d8}
Followup: MachineOwner
---------