W
Windows Central Question
I'm getting several BSOD's my start button is not responding to mouse clicks, but it shows up when pressing the windows button.
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffcb015fe02b18
Arg3: 0800000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3640
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18691
Key : Analysis.Init.CPU.mSec
Value: 624
Key : Analysis.Init.Elapsed.mSec
Value: 10414
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : MemoryManagement.PFN
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffcb015fe02b18
BUGCHECK_P3: 800000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffc408`43a20888 fffff803`6fa4423a : 00000000`0000001a 00000000`00041792 ffffcb01`5fe02b18 08000000`00000000 : nt!KeBugCheckEx
ffffc408`43a20890 fffff803`6fa42a6f : ffffb40c`1a6c1700 00000000`00000000 ffffc408`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffffc408`43a20990 fffff803`6fa12c10 : 00000000`00000003 ffffc408`00000000 ffffb40c`1a6c1550 ffffb40c`1ce8b480 : nt!MiDeletePagablePteRange+0x48f
ffffc408`43a20ca0 fffff803`6fe00b49 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffc408`43a20db0 fffff803`6fe00922 : ffffb40c`1c3fe920 00000000`00000000 ffffb40c`1a6c1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffc408`43a20de0 fffff803`6fe00799 : ffffe10d`7da158c0 fffff803`6fdf73ac 00000000`00000320 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffc408`43a20ec0 fffff803`6feacddc : ffffb40c`1ce8b480 ffffe10d`7fefa308 ffffe10d`7fefa230 ffffb40c`1a6c1080 : nt!NtUnmapViewOfSectionEx+0x99
ffffc408`43a20f10 fffff803`6fc086b8 : 00000000`00000000 00000000`00000000 ffffc408`43a20fc0 00000000`00000002 : nt!NtUnmapViewOfSection+0xc
ffffc408`43a20f40 fffff803`6fbfab50 : fffff803`70c4ad50 00000000`00000000 00000000`00000108 ffffe10d`7fefa308 : nt!KiSystemServiceCopyEnd+0x28
ffffc408`43a210d8 fffff803`70c4ad50 : 00000000`00000000 00000000`00000108 ffffe10d`7fefa308 00000000`00000000 : nt!KiServiceLinkage
ffffc408`43a210e0 fffff803`70c4ba27 : ffffc408`43a215b8 ffffe10d`7fefa230 00000000`00000000 00000000`00000000 : CI!I_MapCatalog+0x4a0
ffffc408`43a211d0 fffff803`70c496ea : ffffb40c`1a685880 ffffe10d`7f72ae30 ffffc408`43a21350 00000000`00000004 : CI!I_ReloadCatalog+0x263
ffffc408`43a21250 fffff803`70c493f4 : ffffb40c`1cf91010 00000000`00000014 00000000`00000000 00000000`00000204 : CI!I_FindFileOrHeaderHashInCatalogs+0x21a
ffffc408`43a213b0 fffff803`70c551fe : ffffc408`43a2159c ffffc408`43a215a8 ffffc408`43a215b8 ffffb40c`1cf89bd0 : CI!MinCrypK_VerifyHashInCatalog+0x110
ffffc408`43a21460 fffff803`70c50a6f : 00000000`00000000 ffffc408`43a215b8 00000000`c0000401 fffff803`0000002a : CI!CiVerifyFileHashInCatalogs+0x18e
ffffc408`43a21540 fffff803`70c51f79 : 00000000`00000000 ffffc408`43a21871 00000000`00000000 00000000`00000000 : CI!CipFindFileHash+0x2db
ffffc408`43a216a0 fffff803`70c518ab : ffffe10d`7f72a660 ffffb40c`1cf89bd0 ffffb40c`1a6c1080 fffff803`78e00000 : CI!CipValidateFileHash+0x2d9
ffffc408`43a21780 fffff803`70c4fce2 : 00000000`00000088 00000000`00000000 ffffb40c`1cf89bd0 fffff803`78e00000 : CI!CipValidateImageHash+0x10f
ffffc408`43a218c0 fffff803`6fe9c4ad : ffffc408`43a21b00 fffff803`78e00000 00000000`0000000f fffff803`78e00000 : CI!CiValidateImageHeader+0x812
ffffc408`43a21a40 fffff803`6fe9bfb8 : 00000000`00000000 ffffb40c`1f0d5cb0 00000000`00000000 00000000`00289000 : nt!SeValidateImageHeader+0xd9
ffffc408`43a21af0 fffff803`6fe0604f : ffffc408`43a22000 00000000`00000000 00000000`00000000 ffffffff`80000250 : nt!MiValidateSectionCreate+0x438
ffffc408`43a21cd0 fffff803`6fe0e032 : ffffc408`43a22010 ffffc408`43a22010 ffffc408`43a21e30 00000000`00000000 : nt!MiValidateSectionSigningPolicy+0xab
ffffc408`43a21d30 fffff803`6fdfb41b : ffffb40c`1cf89bd0 ffffc408`43a22010 ffffc408`43a22010 fffff803`00000000 : nt!MiCreateNewSection+0x66e
ffffc408`43a21ea0 fffff803`6fdfaa64 : ffffc408`43a21ed0 ffffe10d`7f7d4c10 ffffb40c`1cf89bd0 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
ffffc408`43a21f90 fffff803`6fb6fc68 : 00000000`00000000 00000000`ffffffff ffffffff`80000290 55555555`55555555 : nt!MiCreateSection+0xf4
ffffc408`43a22110 fffff803`6ff48a42 : 00000000`00000000 ffffc408`43a22229 ffffffff`80000290 00000000`00000000 : nt!MiCreateSystemSection+0xa4
ffffc408`43a221b0 fffff803`6ff4631e : fffff803`7042a1b0 ffffffff`80000290 ffffc408`43a22348 00000000`00000000 : nt!MiCreateSectionForDriver+0x126
ffffc408`43a22290 fffff803`6ff45b72 : 00000000`00000000 ffffc408`43a223e0 00000000`00000000 00000000`02339201 : nt!MiObtainSectionForDriver+0xa6
ffffc408`43a222e0 fffff803`6ff45a06 : ffffc408`43a22518 00000000`00000000 00000000`00000000 ffffc408`43a22400 : nt!MmLoadSystemImageEx+0x156
ffffc408`43a22480 fffff803`6ff28f4c : ffffc408`43a225c0 00000000`00000000 fffff803`704457e0 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffc408`43a224c0 fffff803`6ff27e62 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffc408`00000004 : nt!IopLoadDriver+0x23c
ffffc408`43a22690 fffff803`6ff27b72 : 00000000`00000001 00000000`00000000 ffffb40c`1a8e7b60 ffffffff`800002e8 : nt!PipCallDriverAddDeviceQueryRoutine+0x1be
ffffc408`43a22720 fffff803`6ff27530 : 00000000`00000000 ffffc408`43a22830 00000000`6e657050 00000000`0000001a : nt!PnpCallDriverQueryServiceHelper+0xda
ffffc408`43a227d0 fffff803`6ff26cc3 : ffffb40c`1a6d47a0 ffffc408`43a22a11 ffffb40c`1a6d47a0 00000000`00000000 : nt!PipCallDriverAddDevice+0x41c
ffffc408`43a22990 fffff803`6ff37868 : ffffb40c`1cfacb00 fffff803`6fa07b01 ffffc408`43a22ab0 fffff803`00000002 : nt!PipProcessDevNodeTree+0x333
ffffc408`43a22a60 fffff803`6fb6dde6 : 00000001`00000003 ffffb40c`1a8f6cb0 ffffb40c`1cfacbd0 ffffb40c`1cfacbd0 : nt!PiProcessReenumeration+0x88
ffffc408`43a22ab0 fffff803`6fb41225 : ffffb40c`1ce8b480 ffffb40c`1a68d010 fffff803`70443300 ffffb40c`00000000 : nt!PnpDeviceActionWorker+0x206
ffffc408`43a22b70 fffff803`6faf53b5 : ffffb40c`1ce8b480 00000000`00000080 ffffb40c`1a6c1080 000f8067`bcbbbdff : nt!ExpWorkerThread+0x105
ffffc408`43a22c10 fffff803`6fbfe348 : ffffcb81`4b9c0180 ffffb40c`1ce8b480 fffff803`6faf5360 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc408`43a22c60 00000000`00000000 : ffffc408`43a23000 ffffc408`43a1d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Please help.
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffcb015fe02b18
Arg3: 0800000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3640
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18691
Key : Analysis.Init.CPU.mSec
Value: 624
Key : Analysis.Init.Elapsed.mSec
Value: 10414
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : MemoryManagement.PFN
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffcb015fe02b18
BUGCHECK_P3: 800000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffc408`43a20888 fffff803`6fa4423a : 00000000`0000001a 00000000`00041792 ffffcb01`5fe02b18 08000000`00000000 : nt!KeBugCheckEx
ffffc408`43a20890 fffff803`6fa42a6f : ffffb40c`1a6c1700 00000000`00000000 ffffc408`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffffc408`43a20990 fffff803`6fa12c10 : 00000000`00000003 ffffc408`00000000 ffffb40c`1a6c1550 ffffb40c`1ce8b480 : nt!MiDeletePagablePteRange+0x48f
ffffc408`43a20ca0 fffff803`6fe00b49 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffc408`43a20db0 fffff803`6fe00922 : ffffb40c`1c3fe920 00000000`00000000 ffffb40c`1a6c1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffc408`43a20de0 fffff803`6fe00799 : ffffe10d`7da158c0 fffff803`6fdf73ac 00000000`00000320 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffc408`43a20ec0 fffff803`6feacddc : ffffb40c`1ce8b480 ffffe10d`7fefa308 ffffe10d`7fefa230 ffffb40c`1a6c1080 : nt!NtUnmapViewOfSectionEx+0x99
ffffc408`43a20f10 fffff803`6fc086b8 : 00000000`00000000 00000000`00000000 ffffc408`43a20fc0 00000000`00000002 : nt!NtUnmapViewOfSection+0xc
ffffc408`43a20f40 fffff803`6fbfab50 : fffff803`70c4ad50 00000000`00000000 00000000`00000108 ffffe10d`7fefa308 : nt!KiSystemServiceCopyEnd+0x28
ffffc408`43a210d8 fffff803`70c4ad50 : 00000000`00000000 00000000`00000108 ffffe10d`7fefa308 00000000`00000000 : nt!KiServiceLinkage
ffffc408`43a210e0 fffff803`70c4ba27 : ffffc408`43a215b8 ffffe10d`7fefa230 00000000`00000000 00000000`00000000 : CI!I_MapCatalog+0x4a0
ffffc408`43a211d0 fffff803`70c496ea : ffffb40c`1a685880 ffffe10d`7f72ae30 ffffc408`43a21350 00000000`00000004 : CI!I_ReloadCatalog+0x263
ffffc408`43a21250 fffff803`70c493f4 : ffffb40c`1cf91010 00000000`00000014 00000000`00000000 00000000`00000204 : CI!I_FindFileOrHeaderHashInCatalogs+0x21a
ffffc408`43a213b0 fffff803`70c551fe : ffffc408`43a2159c ffffc408`43a215a8 ffffc408`43a215b8 ffffb40c`1cf89bd0 : CI!MinCrypK_VerifyHashInCatalog+0x110
ffffc408`43a21460 fffff803`70c50a6f : 00000000`00000000 ffffc408`43a215b8 00000000`c0000401 fffff803`0000002a : CI!CiVerifyFileHashInCatalogs+0x18e
ffffc408`43a21540 fffff803`70c51f79 : 00000000`00000000 ffffc408`43a21871 00000000`00000000 00000000`00000000 : CI!CipFindFileHash+0x2db
ffffc408`43a216a0 fffff803`70c518ab : ffffe10d`7f72a660 ffffb40c`1cf89bd0 ffffb40c`1a6c1080 fffff803`78e00000 : CI!CipValidateFileHash+0x2d9
ffffc408`43a21780 fffff803`70c4fce2 : 00000000`00000088 00000000`00000000 ffffb40c`1cf89bd0 fffff803`78e00000 : CI!CipValidateImageHash+0x10f
ffffc408`43a218c0 fffff803`6fe9c4ad : ffffc408`43a21b00 fffff803`78e00000 00000000`0000000f fffff803`78e00000 : CI!CiValidateImageHeader+0x812
ffffc408`43a21a40 fffff803`6fe9bfb8 : 00000000`00000000 ffffb40c`1f0d5cb0 00000000`00000000 00000000`00289000 : nt!SeValidateImageHeader+0xd9
ffffc408`43a21af0 fffff803`6fe0604f : ffffc408`43a22000 00000000`00000000 00000000`00000000 ffffffff`80000250 : nt!MiValidateSectionCreate+0x438
ffffc408`43a21cd0 fffff803`6fe0e032 : ffffc408`43a22010 ffffc408`43a22010 ffffc408`43a21e30 00000000`00000000 : nt!MiValidateSectionSigningPolicy+0xab
ffffc408`43a21d30 fffff803`6fdfb41b : ffffb40c`1cf89bd0 ffffc408`43a22010 ffffc408`43a22010 fffff803`00000000 : nt!MiCreateNewSection+0x66e
ffffc408`43a21ea0 fffff803`6fdfaa64 : ffffc408`43a21ed0 ffffe10d`7f7d4c10 ffffb40c`1cf89bd0 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
ffffc408`43a21f90 fffff803`6fb6fc68 : 00000000`00000000 00000000`ffffffff ffffffff`80000290 55555555`55555555 : nt!MiCreateSection+0xf4
ffffc408`43a22110 fffff803`6ff48a42 : 00000000`00000000 ffffc408`43a22229 ffffffff`80000290 00000000`00000000 : nt!MiCreateSystemSection+0xa4
ffffc408`43a221b0 fffff803`6ff4631e : fffff803`7042a1b0 ffffffff`80000290 ffffc408`43a22348 00000000`00000000 : nt!MiCreateSectionForDriver+0x126
ffffc408`43a22290 fffff803`6ff45b72 : 00000000`00000000 ffffc408`43a223e0 00000000`00000000 00000000`02339201 : nt!MiObtainSectionForDriver+0xa6
ffffc408`43a222e0 fffff803`6ff45a06 : ffffc408`43a22518 00000000`00000000 00000000`00000000 ffffc408`43a22400 : nt!MmLoadSystemImageEx+0x156
ffffc408`43a22480 fffff803`6ff28f4c : ffffc408`43a225c0 00000000`00000000 fffff803`704457e0 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffc408`43a224c0 fffff803`6ff27e62 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffc408`00000004 : nt!IopLoadDriver+0x23c
ffffc408`43a22690 fffff803`6ff27b72 : 00000000`00000001 00000000`00000000 ffffb40c`1a8e7b60 ffffffff`800002e8 : nt!PipCallDriverAddDeviceQueryRoutine+0x1be
ffffc408`43a22720 fffff803`6ff27530 : 00000000`00000000 ffffc408`43a22830 00000000`6e657050 00000000`0000001a : nt!PnpCallDriverQueryServiceHelper+0xda
ffffc408`43a227d0 fffff803`6ff26cc3 : ffffb40c`1a6d47a0 ffffc408`43a22a11 ffffb40c`1a6d47a0 00000000`00000000 : nt!PipCallDriverAddDevice+0x41c
ffffc408`43a22990 fffff803`6ff37868 : ffffb40c`1cfacb00 fffff803`6fa07b01 ffffc408`43a22ab0 fffff803`00000002 : nt!PipProcessDevNodeTree+0x333
ffffc408`43a22a60 fffff803`6fb6dde6 : 00000001`00000003 ffffb40c`1a8f6cb0 ffffb40c`1cfacbd0 ffffb40c`1cfacbd0 : nt!PiProcessReenumeration+0x88
ffffc408`43a22ab0 fffff803`6fb41225 : ffffb40c`1ce8b480 ffffb40c`1a68d010 fffff803`70443300 ffffb40c`00000000 : nt!PnpDeviceActionWorker+0x206
ffffc408`43a22b70 fffff803`6faf53b5 : ffffb40c`1ce8b480 00000000`00000080 ffffb40c`1a6c1080 000f8067`bcbbbdff : nt!ExpWorkerThread+0x105
ffffc408`43a22c10 fffff803`6fbfe348 : ffffcb81`4b9c0180 ffffb40c`1ce8b480 fffff803`6faf5360 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc408`43a22c60 00000000`00000000 : ffffc408`43a23000 ffffc408`43a1d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Please help.