MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffbc8000722240
Arg3: 0000000000000010
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P3.70
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: A320M-HDV R4.0
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffbc8000722240
BUGCHECK_P3: 10
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: c80
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: csgo.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-23-2020 18:48:24.0840
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
ffffa681`36059508 fffff800`0ca2548a : 00000000`0000001a 00000000`00041792 ffffbc80`00722240 00000000`00000010 : nt!KeBugCheckEx
ffffa681`36059510 fffff800`0c8ace07 : 00000000`00000000 ffffbc80`00722240 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x17688a
ffffa681`36059620 fffff800`0c8ad2c1 : ffffa681`36059a70 ffffbcde`40003910 00000000`00000000 0a000002`e56ed867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffa681`360596e0 fffff800`0c8ad2c1 : ffffa681`36059a70 ffffbcde`6f200018 00000000`00000000 0a000001`a64b2867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa681`360597a0 fffff800`0c8ad2c1 : ffffa681`36059a70 ffffbcde`6f379000 ffffbcde`00000000 0a000001`24209867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa681`36059860 fffff800`0c8aca4c : ffffa681`36059a70 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa681`36059920 fffff800`0c8aaeb8 : ffffa681`36059a70 00000000`00000002 ffffa901`00000001 fffff800`00000000 : nt!MiWalkPageTables+0x36c
ffffa681`36059a20 fffff800`0c8b9010 : ffffffff`ffffffff ffffa901`8b80e7f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffa681`36059dc0 fffff800`0cdc7a5d : 00000000`00000000 00000000`000e40a0 ffffa901`8b825f00 00000000`003da000 : nt!MiDeleteVad+0x860
ffffa681`36059f80 fffff800`0cdc7853 : ffffa901`8b825f00 00000000`00000000 00000000`e40a0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffa681`36059fb0 fffff800`0cdc76e9 : ffffa901`8b80e480 fffff800`00000008 ffffa901`7f89c0c0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffa681`3605a090 fffff800`0cdc73dc : ffffa901`8c08f540 00000000`00000000 00000000`00000000 ffffa901`8b80e480 : nt!NtUnmapViewOfSectionEx+0x99
ffffa681`3605a0e0 fffff800`0c9d2d18 : 00000000`00000000 fffff800`0cdc73dc ffffa681`3605a190 00000000`00000000 : nt!NtUnmapViewOfSection+0xc
ffffa681`3605a110 fffff800`0c9c5320 : fffff800`1a9e1e75 ffffa681`00000000 ffffd00a`a51ed1c8 ffffa681`3605a548 : nt!KiSystemServiceCopyEnd+0x28
ffffa681`3605a2a8 fffff800`1a9e1e75 : ffffa681`00000000 ffffd00a`a51ed1c8 ffffa681`3605a548 ffffd00a`a5628c10 : nt!KiServiceLinkage
ffffa681`3605a2b0 fffff800`1aa05823 : ffffd00a`a51ecdd0 fffff800`0cb6f0a9 ffffd00a`a4c5eca0 fffff800`1aa09148 : ahcache!RtlFileMapFree+0x65
ffffa681`3605a2e0 fffff800`1aa0a6e0 : 00000000`00000000 ffffd00a`a4c629e0 ffffa681`3605a360 ffffa681`3605a530 : ahcache!AslFileMappingDelete+0x17
ffffa681`3605a310 fffff800`1aa0a5fe : ffffd00a`a4c629e0 fffff800`1a9fed35 ffffa681`3605a548 fffff800`1a9e697c : ahcache!SdbCloseDatabaseRead+0x2c
ffffa681`3605a340 fffff800`1aa0b1e2 : ffffd00a`a54028d0 ffffa681`3605a579 00000000`00000000 fffff800`0c8460ed : ahcache!SdbReleaseDatabase+0x5e
ffffa681`3605a3c0 fffff800`1aa005a7 : 00000000`00000000 00000000`00000001 ffffa681`3605a580 00000000`00000000 : ahcache!AhcSdbQueryLookup+0x212
ffffa681`3605a4c0 fffff800`1aa01bae : ffffa681`3605a628 00000000`00000000 ffffd00a`8886edc0 00000000`00000000 : ahcache!AhcpCacheBuildSdbInfo+0x203
ffffa681`3605a5c0 fffff800`1aa00f40 : ffffa681`3605a701 ffffd00a`88173ed0 ffffd00a`8886edc0 ffffa681`3605a770 : ahcache!AhcCacheLookup+0x8fe
ffffa681`3605a710 fffff800`1aa02d56 : 00000000`0056e550 00000000`0000000b ffffffff`800025ac fffff800`1a9e67e8 : ahcache!AhcApiLookupAndWriteToProcess+0xe0
ffffa681`3605a7e0 fffff800`1aa02a81 : ffffa901`8938a790 00000000`00676000 00000000`0056e3e0 00000000`0022002f : ahcache!AhcDispatch+0x2a6
ffffa681`3605a9d0 fffff800`0c831f79 : ffffa901`8938a790 00000000`00000000 00000000`00000000 ffffa681`3605aac0 : ahcache!AhcDriverDispatchDeviceControl+0x41
ffffa681`3605aa10 fffff800`0ceb1896 : ffffd00a`99c9d040 ffffa901`8b80e480 ffffa901`8b80e480 ffffa901`8c08f540 : nt!IofCallDriver+0x59
ffffa681`3605aa50 fffff800`0c9d2d18 : ffffa901`8c08f540 00000000`0000000b 00000000`00000000 00000000`00000000 : nt!NtApphelpCacheControl+0xf6
ffffa681`3605ab00 00007ffa`6497ca44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0056e3b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`6497ca44
THREAD_SHA1_HASH_MOD_FUNC: 19653ad0cdeff44431af3a3b5c2f712c6319ed96
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 928740eb810e45b949fcea272d12fb93a95782d3
THREAD_SHA1_HASH_MOD: 4a55378c52a4ff1fd4382688508d36072046758c
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-02-22T18:24:35.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 56ad
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff928008a6efd0
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P3.70
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: A320M-HDV R4.0
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: 41790
BUGCHECK_P2: ffff928008a6efd0
BUGCHECK_P3: 0
BUGCHECK_P4: 1
BUGCHECK_STR: 0x1a_41790
CPU_COUNT: c
CPU_MHZ: c80
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: aow_exe.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-23-2020 18:49:00.0642
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80766a255c0 to fffff807669c14e0
STACK_TEXT:
ffffad0a`a9340dd8 fffff807`66a255c0 : 00000000`0000001a 00000000`00041790 ffff9280`08a6efd0 00000000`00000000 : nt!KeBugCheckEx
ffffad0a`a9340de0 fffff807`668ace07 : 00000000`00000000 ffffec80`001fafb8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1769c0
ffffad0a`a9340ef0 fffff807`668ad2c1 : ffffad0a`a9341340 ffffecf6`40000fd0 00000000`00000000 0a000002`e24ff867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffad0a`a9340fb0 fffff807`668ad2c1 : ffffad0a`a9341340 ffffecf6`7b200000 00000000`00000000 0a000003`b9822867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffad0a`a9341070 fffff807`668ad2c1 : ffffad0a`a9341340 ffffecf6`7b3d9000 ffffecf6`00000000 0a000003`b9821867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffad0a`a9341130 fffff807`668aca4c : ffffad0a`a9341340 ffffedb5`c0000000 ffffedb5`00000000 ffffc203`db1955c0 : nt!MiWalkPageTablesRecursively+0x6a1
ffffad0a`a93411f0 fffff807`668aaeb8 : ffffad0a`a9341340 00000000`00000002 00000000`00000001 fffff807`00000000 : nt!MiWalkPageTables+0x36c
ffffad0a`a93412f0 fffff807`668b9010 : ffffffff`ffffffff ffffc203`db195438 ffffc203`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffad0a`a9341690 fffff807`66dd9e31 : ffffc203`d99e8080 00000000`00000000 ffffc203`d646b350 ffffc203`d99e8080 : nt!MiDeleteVad+0x860
ffffad0a`a9341850 fffff807`66dd98cf : ffffc203`d95b1360 ffffc203`d95b1360 ffffc203`db1950c0 fffff807`66c6a400 : nt!MiCleanVad+0x4d
ffffad0a`a9341880 fffff807`66e386a1 : ffffffff`00000000 ffffffff`ffffffff ffffad0a`a9341b01 ffffc203`db1950c0 : nt!MmCleanProcessAddressSpace+0x137
ffffad0a`a9341900 fffff807`66e5ecb3 : ffffc203`db1950c0 ffff9a80`1e7df060 ffffad0a`a9341b80 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffffad0a`a9341980 fffff807`66e39d1b : 00000000`00000000 ffffad0a`a9341b01 00000000`0398b000 ffffc203`d99e8080 : nt!PspExitThread+0x60b
ffffad0a`a9341a90 fffff807`669d2d18 : 00000000`000018e4 ffffc203`d99e8080 ffffc203`db1950c0 00000000`0152d528 : nt!NtTerminateProcess+0xeb
ffffad0a`a9341b00 00000000`76f41cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`42acf288 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f41cbc
THREAD_SHA1_HASH_MOD_FUNC: d109dcb6a33df7492d7ca05092dc40acc1a4ad23
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 57ed15d1d1a32233c8f3ff09ad7791953d171510
THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c
FOLLOWUP_IP:
nt!MiDeleteVa+1769c0
fffff807`66a255c0 cc int 3
FAULT_INSTR_CODE: e0e381cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVa+1769c0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1769c0
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVa
BUCKET_ID: 0x1a_41790_nt!MiDeleteVa
PRIMARY_PROBLEM_CLASS: 0x1a_41790_nt!MiDeleteVa
TARGET_TIME: 2020-02-23T00:50:41.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 28d4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41790_nt!mideleteva
FAILURE_ID_HASH: {9b5ebc95-f4cf-8c11-5593-7f5337165669}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffee0008bf0a10
Arg3: 0000000000000003
Arg4: 0000000000000004
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P3.70
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: A320M-HDV R4.0
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffee0008bf0a10
BUGCHECK_P3: 3
BUGCHECK_P4: 4
BUGCHECK_STR: 0x1a_41790
CPU_COUNT: c
CPU_MHZ: c80
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-23-2020 18:48:33.0816
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8067c7e9748 to fffff8067c7c14e0
STACK_TEXT:
ffffad06`a23efa28 fffff806`7c7e9748 : 00000000`0000001a 00000000`00041790 ffffee00`08bf0a10 00000000`00000003 : nt!KeBugCheckEx
ffffad06`a23efa30 fffff806`7c6b1617 : 00000000`00000003 ffffad06`a23f0180 ffffad06`a23f0180 ffffad06`a23f00d0 : nt!MiDeletePteRun+0x1d34a8
ffffad06`a23efc50 fffff806`7c6ad132 : ffffae0f`5badc580 ffffab80`00011000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffffad06`a23efc80 fffff806`7c6ad2c1 : ffffad06`a23f00d0 ffffabd5`c0000080 00000000`00000000 0a000002`ea58b867 : nt!MiWalkPageTablesRecursively+0x512
ffffad06`a23efd40 fffff806`7c6ad2c1 : ffffad06`a23f00d0 ffffabd5`eae00000 00000000`00000000 0a000001`4c074867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffad06`a23efe00 fffff806`7c6ad2c1 : ffffad06`a23f00d0 ffffabd5`eaf57000 ffffabd5`00000000 0a000002`e8173867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffad06`a23efec0 fffff806`7c6aca4c : ffffad06`a23f00d0 ffffabd5`eaf57ab8 ffffad06`00000000 ffffad06`a23f0049 : nt!MiWalkPageTablesRecursively+0x6a1
ffffad06`a23eff80 fffff806`7c6aaeb8 : ffffad06`a23f00d0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffad06`a23f0080 fffff806`7c6b9010 : ffffffff`ffffffff ffffae0f`5badc3f8 ffffad06`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffad06`a23f0420 fffff806`7cbc7a5d : ffffae0f`59ef3080 ffffae0f`59ef3080 ffffae0f`5a7621e0 ffffae0f`5badc3f0 : nt!MiDeleteVad+0x860
ffffad06`a23f05e0 fffff806`7cbd9e14 : ffffae0f`5a7621e0 ffffae0f`5566a9a0 ffffae0f`59ef3080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffad06`a23f0610 fffff806`7cbd98cf : ffffae0f`5b0a3340 ffffae0f`5b0a3340 ffffae0f`5badc080 fffff806`7ca6a400 : nt!MiCleanVad+0x30
ffffad06`a23f0640 fffff806`7cc386a1 : ffffffff`00000000 ffffffff`ffffffff ffffad06`a23f0801 ffffae0f`5badc080 : nt!MmCleanProcessAddressSpace+0x137
ffffad06`a23f06c0 fffff806`7cc5ecb3 : ffffae0f`5badc080 ffff9a86`f7f93830 ffffad06`a23f08e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffffad06`a23f0740 fffff806`7ccccdb3 : ffffae0f`c0000005 00000000`0088eb01 00000000`004e4000 ffffad06`a23f0934 : nt!PspExitThread+0x60b
ffffad06`a23f0850 fffff806`7c63e551 : 00000000`00000000 fffff806`7c63ef3d 00000000`00000010 00000000`00040246 : nt!KiSchedulerApcTerminate+0x33
ffffad06`a23f0890 fffff806`7c7c5a60 : ffffae0f`57d55901 ffffad06`a23f0950 ffffae0f`5ba2ca90 00000000`00000000 : nt!KiDeliverApc+0x481
ffffad06`a23f0950 fffff806`7c7d2dbf : 00000000`00000310 ffffc181`60b20180 ffffad06`a23f0b00 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffad06`a23f0a90 00007ff9`221bfa54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0088e478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`221bfa54
THREAD_SHA1_HASH_MOD_FUNC: cf5c972d8494816023066845de37f86a3bfa7253
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 017204202c55dcdc874341af0c5057e43ce16f6b
THREAD_SHA1_HASH_MOD: a9ca63faa9e43cc61ef524ad38163e6a9ae5c358
FOLLOWUP_IP:
nt!MiDeletePteRun+1d34a8
fffff806`7c7e9748 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeletePteRun+1d34a8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d34a8
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
PRIMARY_PROBLEM_CLASS: 0x1a_41790_nt!MiDeletePteRun
TARGET_TIME: 2020-02-22T18:27:36.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 23b3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41790_nt!mideletepterun
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------