Hi, I've been having this issue since I installed a Samsung Evo 950 SSD I've tried removing it and reinstalling the drivers it asked for with no success. The issue being is that every time I boot my pc up it gets a BSOD stating memory management issues however when I reboot it it boots back normally into windows. I've already ran windows memory diagnostics, found no errors, the pc ran chkdsk on startup did some attempted fixes but the problem still persists. I am on Windows 7 x64, ASUS P8B75-V motherboard, 8 Gb 1600 hz kingmax RAM, I have a 1 Tb Hdd , a Samsung 850 and a Samsung 950 Evo SSD (this one is connected to a Sata 3Gb port cuz my Mobo only has 1 6Gb port and the 850 one is connected to it). I managed to open up the dmp file although I have no clue how to read it. Any help is appreciated, the problem isn't really big of a deal because I just have to reboot it and it works fine, but I have some freetime now and wanted to look more into it.
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRVC:\Symbols Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800
Machine Name:
Kernel base = 0xfffff800
Debug session time: Fri Apr 3 09:25:37.340 2020 (UTC + 2:00)
System Uptime: 0 days 0:00:14.276
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+93d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5c6e1cbd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!MiDeleteVirtualAddresses+93d
BUCKET_ID: X64_0x1a_41790_nt!MiDeleteVirtualAddresses+93d
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRVC:\Symbols Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800
Machine Name:
Kernel base = 0xfffff800
03049000 PsLoadedModuleList = 0xfffff800
03282c90Debug session time: Fri Apr 3 09:25:37.340 2020 (UTC + 2:00)
System Uptime: 0 days 0:00:14.276
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff
fffd3018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
[LIST]
[*]*
[*]Bugcheck Analysis *
[*]*
[/LIST]
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa8004da2730, ffff, 0}
Probably caused by : memory_corruption ( nt!MiDeleteVirtualAddresses+93d )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
[LIST]
[*]*
[*]Bugcheck Analysis *
[*]*
[/LIST]
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8004da2730
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800031a0dfd to fffff800030dcba0
STACK_TEXT:
fffff880
038b0718 fffff800031a0dfd : 00000000
0000001a 0000000000041790 fffffa80
04da2730 000000000000ffff : nt!KeBugCheckEx
fffff880
038b0720 fffff800031be3e5 : 000007fe
00000000 000007feee929fff 000007fe
00000000 0000000800000000 : nt!MiDeleteVirtualAddresses+0x93d
fffff880
038b0890 fffff80003335971 : fffffa80
0878c290 0000000000000000 00000000
00000000 000007feee929fff : nt!MiRemoveMappedView+0x485
fffff880
038b09d0 fffff8000332606b : 00000000
00000000 000007feec1b0000 fffffa80
00000001 fffffa8008854980 : nt!MiUnmapViewOfSection+0x1b1
fffff880
038b0a90 fffff800030eabd3 : 00000000
00000000 000007feec1b200c fffffa80
0878c290 000007feec1b0000 : nt!NtUnmapViewOfSection+0x5f
fffff880
038b0ae0 0000000076da9b2a : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x13
00000000
011aeaa8 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : 0x76da9b2a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeleteVirtualAddresses+93d
fffff800
031a0dfd cc int 3SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+93d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5c6e1cbd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!MiDeleteVirtualAddresses+93d
BUCKET_ID: X64_0x1a_41790_nt!MiDeleteVirtualAddresses+93d
Followup: MachineOwner
---------
Last edited by a moderator: