Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\YIIT~1\AppData\Local\Temp\Rar$DIa4080.41709\060121-12921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`57600000 PsLoadedModuleList = 0xfffff805`5822a2b0
Debug session time: Tue Jun  1 18:56:56.047 2021 (UTC + 3:00)
System Uptime: 0 days 16:58:29.700
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`579f6c90 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9c8d`ddc82c80=000000000000001a
10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1874
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 11634
    Key  : Analysis.Init.CPU.mSec
    Value: 374
    Key  : Analysis.Init.Elapsed.mSec
    Value: 44945
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
BUGCHECK_CODE:  1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff97bffe06ae08
BUGCHECK_P3: 60000041d308025
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  svchost.exe
STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9     : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae     : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d     : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab     : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab     : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab     : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b     : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1     : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10     : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49     : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0     : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af     : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916     : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758     : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230     : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f     : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4
SYMBOL_NAME:  nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION:  10.0.19041.1023
STACK_COMMAND:  .thread ; .cxr ; kb
IMAGE_NAME:  ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET:  17b9
FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup:     MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1593
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 2763
    Key  : Analysis.Init.CPU.mSec
    Value: 2249
    Key  : Analysis.Init.Elapsed.mSec
    Value: 56582
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
BUGCHECK_CODE:  1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff97bffe06ae08
BUGCHECK_P3: 60000041d308025
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  svchost.exe
STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9     : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae     : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d     : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab     : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab     : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab     : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b     : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1     : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10     : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49     : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0     : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af     : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916     : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758     : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230     : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f     : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4
SYMBOL_NAME:  nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION:  10.0.19041.1023
STACK_COMMAND:  .thread ; .cxr ; kb
IMAGE_NAME:  ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET:  17b9
FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup:     MachineOwner
---------
10: kd> lmvm nt
Browse full module list
start             end                 module name
fffff805`57600000 fffff805`58646000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\121F238DD43DA32C1476AC846D4FEA741\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\E304EA6D1046000\ntoskrnl.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        E304EA6D (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00A5BFB2
    ImageSize:        01046000
    File version:     10.0.19041.1023
    Product version:  10.0.19041.1023
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     ntkrnlmp.exe
        OriginalFilename: ntkrnlmp.exe
        ProductVersion:   10.0.19041.1023
        FileVersion:      10.0.19041.1023 (WinBuild.160101.0800)
        FileDescription:  NT Kernel & System
        LegalCopyright:   © Microsoft Corporation. All rights reserved.