Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\YIIT~1\AppData\Local\Temp\Rar$DIa4080.41709\060121-12921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`57600000 PsLoadedModuleList = 0xfffff805`5822a2b0
Debug session time: Tue Jun 1 18:56:56.047 2021 (UTC + 3:00)
System Uptime: 0 days 16:58:29.700
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`579f6c90 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9c8d`ddc82c80=000000000000001a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1874
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11634
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 44945
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff97bffe06ae08
BUGCHECK_P3: 60000041d308025
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9 : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1 : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10 : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49 : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0 : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916 : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758 : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230 : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1023
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2763
Key : Analysis.Init.CPU.mSec
Value: 2249
Key : Analysis.Init.Elapsed.mSec
Value: 56582
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff97bffe06ae08
BUGCHECK_P3: 60000041d308025
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9 : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1 : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10 : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49 : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0 : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916 : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758 : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230 : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1023
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------
10: kd> lmvm nt
Browse full module list
start end module name
fffff805`57600000 fffff805`58646000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\121F238DD43DA32C1476AC846D4FEA741\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\E304EA6D1046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: E304EA6D (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5BFB2
ImageSize: 01046000
File version: 10.0.19041.1023
Product version: 10.0.19041.1023
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.1023
FileVersion: 10.0.19041.1023 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.