Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\090922-6875-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22000 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 22000.1.amd64fre.co_release.210604-1628 Machine Name: Kernel base = 0xfffff803`3f400000 PsLoadedModuleList = 0xfffff803`400296b0 Debug session time: Fri Sep 9 08:41:59.883 2022 (UTC 8:00) System Uptime: 0 days 0:01:51.730 Loading Kernel Symbols ............................................................... ................................................................ ................................................. Loading User Symbols Loading unloaded module list ....... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff803`3f817d40 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:fffff20f`6a5defe0=000000000000001a 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffffaebfff8f4060 Arg3: 0001000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2890 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 50992 Key : Analysis.Init.CPU.mSec Value: 905 Key : Analysis.Init.Elapsed.mSec Value: 252865 Key : Analysis.Memory.CommitPeak.Mb Value: 96 Key : Bugcheck.Code.DumpHeader Value: 0x1a Key : Bugcheck.Code.Register Value: 0x1a Key : MemoryManagement.PFN Value: 0 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: 090922-6875-01.dmp BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: ffffaebfff8f4060 BUGCHECK_P3: 1000000000000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: AppHostRegistrationVerifier.exe STACK_TEXT: fffff20f`6a5defd8 fffff803`3f8791bf : 00000000`0000001a 00000000`00041792 ffffaebf`ff8f4060 00010000`00000000 : nt!KeBugCheckEx fffff20f`6a5defe0 fffff803`3f67369a : 00000000`00000000 ffffaebf`ff8f4060 00000000`00000000 00000000`00000000 : nt!MiDeleteVa 0x215aef fffff20f`6a5df0e0 fffff803`3f6739b9 : 00000000`00000000 ffff9003`58b87740 ffffaed7`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively 0x30a fffff20f`6a5df170 fffff803`3f6739b9 : 00000000`00000000 ffff9003`58b87740 ffffaed7`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively 0x629 fffff20f`6a5df200 fffff803`3f6739b9 : fffff20f`6a5df4d0 ffff9003`58b87740 fffff20f`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively 0x629 fffff20f`6a5df290 fffff803`3f6cdaf1 : 00007fff`26c0f000 ffff9003`58b87740 ffff9003`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively 0x629 fffff20f`6a5df320 fffff803`3f6635f0 : fffff20f`6a5df4d0 ffff9003`00000001 ffffa200`00000002 fffff803`00000000 : nt!MiWalkPageTables 0x381 fffff20f`6a5df420 fffff803`3f6666f2 : ffff9003`56e5fc60 fffff803`3f666531 fffff20f`6a5df7c8 fffff803`00000000 : nt!MiDeletePagablePteRange 0x5d0 fffff20f`6a5df730 fffff803`3fa98a89 : 00000000`00000000 00007fff`1e7f0000 ffff9003`58b870c0 ffff9003`56e5fc60 : nt!MiDeleteVirtualAddresses 0x52 fffff20f`6a5df780 fffff803`3fa7f589 : ffff9003`58b870c0 ffff9003`56e5fc60 00000000`00000000 00000000`00000000 : nt!MiDeleteVad 0x199 fffff20f`6a5df840 fffff803`3fa7f365 : ffff9003`56e5fc60 00007fff`1e7f0000 ffff9003`5346c2c0 00000000`00000000 : nt!MiUnmapVad 0x49 fffff20f`6a5df870 fffff803`3fa7f1df : ffff9003`58b870c0 fffff803`00000008 ffff9003`4a130140 00000000`00000000 : nt!MiUnmapViewOfSection 0x155 fffff20f`6a5df960 fffff803`3fa7f0dc : ffff9003`542fc080 00000212`490ac750 00000212`490ac750 ffff9003`58b870c0 : nt!NtUnmapViewOfSectionEx 0x9f fffff20f`6a5df9b0 fffff803`3f82a375 : ffff9003`542fc080 00000000`00000001 000000d3`8167e308 00000000`00000000 : nt!NtUnmapViewOfSection 0xc fffff20f`6a5df9e0 00007fff`26b24574 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x25 000000d3`8167dd88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`26b24574 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------
Hello,I'mA&K,heretohelp.Yourdumpfileshowsthatthereisahardwarefailureinmemory.Itmaybecausedbyadriverfailureoramemoryfailure.TryrunningtheWindowsMemoryDiagnosticTooltotestphysicalmemory.SelecttheStartbutton,andthenselectControlPanel.Inthesearchbox,typememory,andthenselectDiagnosecomputermemoryproblems.
