MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff910005eaf520
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 41790
BUGCHECK_P2: ffff910005eaf520
BUGCHECK_P3: 0
BUGCHECK_P4: 1
BUGCHECK_STR: 0x1a_41790
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: opera.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 13:16:35.0943
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80772a25424 to fffff807729c14e0
STACK_TEXT:
ffffa906`24d1d228 fffff807`72a25424 : 00000000`0000001a 00000000`00041790 ffff9100`05eaf520 00000000`00000000 : nt!KeBugCheckEx
ffffa906`24d1d230 fffff807`728ac9e7 : 00000000`00000000 fffff681`2bc7aff8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c44
ffffa906`24d1d340 fffff807`728acea1 : ffffa906`24d1d790 fffff6fb`4095e3d0 00000000`00000000 0a000001`f8fc6867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffa906`24d1d400 fffff807`728acea1 : ffffa906`24d1d790 fffff6fb`7da04af0 00000000`00000000 0a000000`bdc86867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa906`24d1d4c0 fffff807`728acea1 : ffffa906`24d1d790 fffff6fb`7dbed020 fffff6fb`00000000 0a000000`28530867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa906`24d1d580 fffff807`728ac62c : ffffa906`24d1d790 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa906`24d1d640 fffff807`728aaa98 : ffffa906`24d1d790 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffa906`24d1d740 fffff807`728b8bf0 : ffffffff`ffffffff ffff800a`504c83f8 ffff800a`00000003 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffa906`24d1dae0 fffff807`728591da : 00000000`2578fecf ffff800a`50e49540 00000000`00000000 fffff807`728b3bca : nt!MiDeleteVad+0x860
ffffa906`24d1dca0 fffff807`72e5b820 : 00000000`00000000 00000000`00000000 ffffa906`24d1de00 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffffa906`24d1dd00 fffff807`72e5b45b : 00000000`00000000 00000000`00000000 ffff5f2d`c166b51b 00000000`00000000 : nt!MmFreeVirtualMemory+0x390
ffffa906`24d1de40 fffff807`729d2d18 : ffff800a`50e49540 fffff807`72868c32 00000000`00000001 fffff807`81335ae6 : nt!NtFreeVirtualMemory+0x8b
ffffa906`24d1dea0 fffff807`729c5320 : fffff807`8138fa12 00000000`00000000 fffff807`81335b4a 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
ffffa906`24d1e038 fffff807`8138fa12 : 00000000`00000000 fffff807`81335b4a 00000000`00000001 00000000`40003740 : nt!KiServiceLinkage
ffffa906`24d1e040 fffff807`813241da : 00000000`02000000 ffffc508`a4f80120 ffffc508`97c67da0 ffffc508`a4f80168 : dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+0x162
ffffa906`24d1e090 fffff807`8138f875 : fffff807`72926050 fffff807`81378b5f 00000000`00000001 ffffc508`97c67da0 : dxgmms2!VIDMM_RECYCLE_BLOCK::`scalar deleting destructor'+0xe
ffffa906`24d1e0c0 fffff807`81377b3b : ffffc508`9516a110 ffffc508`97c67da0 ffffc508`97c67da0 ffffc508`970c43a0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::DestroyRange+0x5d
ffffa906`24d1e100 fffff807`8137574d : ffff800a`4bd4c270 ffffc508`97c752a0 ffff800a`4bd4c880 ffffc508`a15f3e60 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::MergeSubrangesWherePossible+0x123
ffffa906`24d1e130 fffff807`81311e84 : ffffc508`aad488d0 00000000`00000001 ffff800a`4b2656d0 ffff800a`4b265790 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::~VIDMM_RECYCLE_HEAP_MGR+0x351
ffffa906`24d1e200 fffff807`8137b67b : ffffc508`90bb1850 ffff800a`00000b10 ffff800a`4f1ef8d0 01000000`00100000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::`vector deleting destructor'+0x14
ffffa906`24d1e230 fffff807`81324242 : ffffc508`90bb1850 ffffc508`aad488d0 ffff800a`4b2656d0 00000000`00000070 : dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+0x9f
ffffa906`24d1e260 fffff807`7d63aecf : 00000000`00000001 ffffc508`aad489a0 00000000`00000000 ffffc508`aad488d0 : dxgmms2!VidMmTerminateProcess+0x12
ffffa906`24d1e290 fffff807`7d63b0ce : ffff800a`511d4010 ffffa906`24d1e3c0 00000000`00000400 00000000`00000003 : dxgkrnl!VidMmTerminateProcessX+0x63
ffffa906`24d1e2c0 fffff807`7d63cde5 : ffffc508`aad488d0 00000000`00000000 ffffc508`aad488d0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x1be
ffffa906`24d1e530 fffff807`7d548d04 : 00000000`00000005 ffffc508`aad488d0 ffff800a`45708410 ffff800a`504c8080 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffffa906`24d1e670 fffff807`72dcd996 : 00000000`00000000 00000000`00000000 00000000`0000ff00 ffff800a`50f76bd0 : dxgkrnl!DxgkProcessNotify+0xa4
ffffa906`24d1e6b0 fffff807`72e68260 : ffff800a`504c8000 ffff800a`504c8080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x212
ffffa906`24d1e780 fffff807`72e5e68f : ffff800a`50e49b48 00000000`00000000 ffffa906`24d1e959 00000000`00000000 : nt!PspExitProcess+0x70
ffffa906`24d1e7b0 fffff807`72ecd143 : 00000000`00000000 ffff9880`4cbb9101 000000c2`8040e000 00000000`00000000 : nt!PspExitThread+0x5c7
ffffa906`24d1e8c0 fffff807`7283e551 : ffff800a`50e49540 ffff800a`00000000 00000000`00000000 fffff807`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffa906`24d1e900 fffff807`729c5a60 : 00000000`00000001 ffffa906`24d1e9c0 00000000`00000000 fffff807`00000000 : nt!KiDeliverApc+0x481
ffffa906`24d1e9c0 fffff807`729d2dbf : ffff800a`50e49540 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffa906`24d1eb00 00007ffb`687dc144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c2`8039fcd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`687dc144
THREAD_SHA1_HASH_MOD_FUNC: 1c89f26bbb17015d09ca0f672981e07edfbb54e5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 828031524f46b96feb8f870ead324742e6d4c03b
THREAD_SHA1_HASH_MOD: a2ec8d7416413b211dc9c775d9f28f7b1f1b13f3
FOLLOWUP_IP:
dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+162
fffff807`8138fa12 4863f8 movsxd rdi,eax
FAULT_INSTR_CODE: b8f86348
SYMBOL_STACK_INDEX: e
SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+162
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 162
FAILURE_BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK
BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK
PRIMARY_PROBLEM_CLASS: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK
TARGET_TIME: 2020-02-04T03:47:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 8437
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41790_dxgmms2!vidmm_recycle_block::_vidmm_recycle_block
FAILURE_ID_HASH: {80770e6d-f962-9e92-764d-b939dc653edf}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801402922ef, The address that the exception occurred at
Arg3: fffff106accd0fe8, Parameter 0 of the exception
Arg4: fffff106accd0830, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff801402922ef
BUGCHECK_P3: fffff106accd0fe8
BUGCHECK_P4: fffff106accd0830
WRITE_ADDRESS: fffff8013d7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff106accd0830
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
Wof!FileProvReadCompressed+2cf
fffff801`402922ef 4c896c2620 mov qword ptr [rsi+20h],r13
EXCEPTION_PARAMETER1: fffff106accd0fe8
EXCEPTION_PARAMETER2: fffff106accd0830
BUGCHECK_STR: 0x1E_c0000005
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: WhatsApp.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 13:16:31.0818
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffff9e4f2793c000 -- (.exr 0xffff9e4f2793c000)
ExceptionAddress: 0a0000002656d867
ExceptionCode: 26563867
ExceptionFlags: 0a000000
NumberParameters: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff8013d4a6567 to fffff8013d3c14e0
STACK_TEXT:
fffff106`acccff88 fffff801`3d4a6567 : 00000000`0000001e ffffffff`c0000005 fffff801`402922ef fffff106`accd0fe8 : nt!KeBugCheckEx
fffff106`acccff90 fffff801`3d3d9136 : fffff801`402922ef fffff801`3d31654b fffff106`accd1220 fffff106`accd0830 : nt!KiFatalFilter+0x1f
fffff106`acccffd0 fffff801`3d39c55c : ffffe884`00000002 fffff106`accd1340 fffff106`acccc000 fffff106`accd2000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff106`accd0010 fffff801`3d3ca312 : fffff106`accd1340 fffff106`accd05f0 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xac
fffff106`accd0080 fffff801`3d2c2fa5 : 00000000`0000000e 00000000`00000000 fffff106`accd05f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff106`accd00b0 fffff801`3d2c753e : fffff106`accd0fe8 fffff106`accd0d30 fffff106`accd0fe8 00000000`00000000 : nt!RtlDispatchException+0x4a5
fffff106`accd0800 fffff801`3d3d341d : ffff9e4f`2793c000 fffff106`accd1090 ffff8000`00000000 00000000`00007020 : nt!KiDispatchException+0x16e
fffff106`accd0eb0 fffff801`3d3cf605 : 00000000`00000000 ffff810b`93064cd0 ffffca8f`70d7d000 fffff801`402670cc : nt!KiExceptionDispatch+0x11d
fffff106`accd1090 fffff801`402922ef : ffff810b`93064c40 00000000`00007000 fffff106`accd1250 00000000`00000000 : nt!KiPageFault+0x445
fffff106`accd1220 fffff801`40291fd8 : ffff810b`97837a98 fffff801`40274980 00000000`00007000 ffffca8f`6f5de000 : Wof!FileProvReadCompressed+0x2cf
fffff106`accd1280 fffff801`40266f2e : ffff810b`00007000 fffff801`000006db 00000000`019b96db 00000000`00001694 : Wof!FileProvReadCompressedOnNewStack+0x3cc
fffff106`accd1310 fffff801`3d269e28 : 00000000`00000001 ffff810b`93064c58 00000000`00000008 00000000`00000008 : Wof!FileProvReadCompressedCallout+0xe
fffff106`accd1340 fffff801`3d269d9d : fffff801`40266f20 ffff810b`93064c58 fffff801`40274800 fffff801`3f8e815c : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff106`accd13b0 fffff801`40291bc2 : ffff810b`945d30f8 ffff810b`93064c58 ffffffff`00000010 00000002`ffffffff : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff106`accd13f0 fffff801`402900ce : ffff810b`93064c58 fffff106`accd1500 ffff810b`945d30f8 ffffca8f`7045d4a0 : Wof!FileProvReadCompressedSwitchStacks+0x6e
fffff106`accd1430 fffff801`40261bfa : 00000000`02d29600 fffff106`accd1500 00000000`00000000 00000000`00000000 : Wof!FileProvCbRead+0x1de
fffff106`accd1480 fffff801`3f8e4a5c : ffff810b`945d3218 fffff106`accd15c8 ffff810b`00000001 00000000`00030001 : Wof!WofPreReadCallback+0x41a
fffff106`accd1540 fffff801`3f8e45a0 : fffff106`accd1720 ffffffff`ffffff00 ffff810b`91139003 00000000`00060000 : FLTMGR!FltpPerformPreCallbacks+0x2fc
fffff106`accd1650 fffff801`3f8e4112 : 00000000`00000000 fffff106`accd1720 ffff810b`91139010 fffff106`accd1730 : FLTMGR!FltpPassThroughInternal+0x90
fffff106`accd1680 fffff801`3f8e3efe : fffff106`accd1910 fffff801`3d27a4a8 fffff106`accd1880 ffffca8f`7096c960 : FLTMGR!FltpPassThrough+0x162
fffff106`accd1700 fffff801`3d231f79 : ffff810b`91139010 fffff801`3d25463b 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0x9e
fffff106`accd1760 fffff801`3d254223 : 00000000`00000005 ffff810b`91139010 ffff810b`946e7820 ffff810b`946e78e0 : nt!IofCallDriver+0x59
fffff106`accd17a0 fffff801`3d28e055 : ffff810b`946e77d0 00000000`00000000 ffff810b`946e7830 ffff810b`946e77f0 : nt!IoPageReadEx+0x1d3
fffff106`accd1810 fffff801`3d28d7a9 : 00000000`00000003 fffff106`accd18f0 fffff106`accd1a58 fffff801`3d274ef6 : nt!MiIssueHardFaultIo+0xc1
fffff106`accd1860 fffff801`3d272fab : 00000000`c0033333 00000000`00000001 00007ff6`bb25c140 ffff810b`95c43120 : nt!MiIssueHardFault+0x489
fffff106`accd1960 fffff801`3d3cf520 : ffff810b`937af080 00000043`8237ee48 00007a68`1b2024c0 ffffffff`fffec780 : nt!MmAccessFault+0x40b
fffff106`accd1b00 00007ff6`bb25c140 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000043`8237b998 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`bb25c140
CHKIMG_EXTENSION: !chkimg -lo 50 -d !Wof
fffff801402922f2 - Wof!FileProvReadCompressed+2d2
[ 24:26 ]
1 error : !Wof (fffff801402922f2)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-02-03T21:35:28.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 636b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
STORE_DATA_STRUCTURE_CORRUPTION (1c7)
The store component detected a corruption in its data structures.
Arguments:
Arg1: 0000000000000000, A chunk heap buffer's hash doesn't match.
Arg2: ffffdd851e7d2000, Chunk heap buffer whose hash didn't match.
Arg3: 000000001ecf522e, Expected buffer hash.
Arg4: 0000000000029019, Page frame number of the corrupted page.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: ffffdd851e7d2000
BUGCHECK_P3: 1ecf522e
BUGCHECK_P4: 29019
BUGCHECK_STR: 0x1C7_0
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MemCompression
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 13:16:39.0556
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80279e5d0f8 to fffff80279dc14e0
STACK_TEXT:
fffff581`64edf938 fffff802`79e5d0f8 : 00000000`000001c7 00000000`00000000 ffffdd85`1e7d2000 00000000`1ecf522e : nt!KeBugCheckEx
fffff581`64edf940 fffff802`79d50271 : 00000000`00029019 00000000`00000013 fffff581`64edfa69 fffff802`79d50004 : nt!SmHpBufferProtectEx+0x10ce78
fffff581`64edf9a0 fffff802`79d5018c : 00000000`ffffffff fffff9f1`68c7e414 ffffdd85`1a709068 00000000`00000000 : nt!SmHpChunkUnprotect+0x2d
fffff581`64edf9d0 fffff802`79d4d627 : 00000000`00000000 fffff581`64edfa69 ffffdd85`1a709050 00000000`203b4ceb : nt!ST_STORE<SM_TRAITS>::StDmPageRecordUnprotect+0x1c
fffff581`64edfa00 fffff802`79d4e92d : 00000000`00000000 ffffdd85`1aeee710 00000000`00000000 fffff802`79d3b83f : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x133
fffff581`64edfad0 fffff802`79d3b06e : ffffdd85`1a709000 fffff581`64edfb98 00000000`00000001 ffffdd85`1a711240 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc1
fffff581`64edfb20 fffff802`79d3af31 : 00000000`00000000 ffff9901`00000000 ffffdd85`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12e
fffff581`64edfbe0 fffff802`79d2a7a5 : ffffdd85`1a709000 fffff802`79d3af20 fffff581`64e29278 00000067`b4bbbdff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
fffff581`64edfc10 fffff802`79dc8b2a : ffff9901`72e79180 ffffdd85`1a711240 fffff802`79d2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff581`64edfc60 00000000`00000000 : fffff581`64ee0000 fffff581`64eda000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 693890a1f3f5ee0dd4da8e2430836951dfaf767f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1500a6ab9dcdb79749bc00716abe99ba14bfc745
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!SmHpBufferProtectEx+10ce78
fffff802`79e5d0f8 cc int 3
FAULT_INSTR_CODE: 3b9cccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!SmHpBufferProtectEx+10ce78
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10ce78
FAILURE_BUCKET_ID: 0x1C7_0_nt!SmHpBufferProtectEx
BUCKET_ID: 0x1C7_0_nt!SmHpBufferProtectEx
PRIMARY_PROBLEM_CLASS: 0x1C7_0_nt!SmHpBufferProtectEx
TARGET_TIME: 2020-02-03T18:29:20.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: fcd
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1c7_0_nt!smhpbufferprotectex
FAILURE_ID_HASH: {677f42d4-ea31-d924-1621-3373689c0a0a}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff380ba96b4d8
Arg3: 0000000000040000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff380ba96b4d8
BUGCHECK_P3: 40000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: opera.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 13:16:43.0727
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
ffffbf86`40644eb8 fffff803`2f2252ee : 00000000`0000001a 00000000`00041792 fffff380`ba96b4d8 00000000`00040000 : nt!KeBugCheckEx
ffffbf86`40644ec0 fffff803`2f0ac9e7 : 00000000`00000000 fffff380`ba96b4d8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffffbf86`40644fd0 fffff803`2f0acea1 : ffffbf86`40645420 fffff3f9`c05d4b58 00000000`00000000 0a000001`c7f5e867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffbf86`40645090 fffff803`2f0acea1 : ffffbf86`40645420 fffff3f9`fce02ea0 00000000`00000000 0a000001`e5931867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf86`40645150 fffff803`2f0acea1 : ffffbf86`40645420 fffff3f9`fcfe7010 fffff3f9`00000000 0a000001`3c030867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf86`40645210 fffff803`2f0ac62c : ffffbf86`40645420 fffff803`2f048ab5 ffff8207`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf86`406452d0 fffff803`2f0aaa98 : ffffbf86`40645420 00000000`00000002 ffffd78e`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffbf86`406453d0 fffff803`2f059f57 : ffff8207`49cb8640 fffff803`2f02c700 ffff8207`4f16c080 ffff8207`49cb83f8 : nt!MiDeletePagablePteRange+0x268
ffffbf86`40645770 fffff803`2f05968f : 00000000`00000040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x47
ffffbf86`406457c0 fffff803`2f059249 : 00000000`1752d600 00000175`2d540000 00000175`2d6bffff fffff803`00000001 : nt!MiDeletePartialVad+0x283
ffffbf86`40645900 fffff803`2f65b820 : 00000000`00000001 00000000`00000000 ffffbf86`40645a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x10d
ffffbf86`40645960 fffff803`2f65b45b : 00000000`00000000 0000006d`4edfe978 00007ebe`00002000 00000000`00000004 : nt!MmFreeVirtualMemory+0x390
ffffbf86`40645aa0 fffff803`2f1d2d18 : ffff8207`4f16c080 00000175`2d7232d8 00000000`00000000 ffff8207`00000000 : nt!NtFreeVirtualMemory+0x8b
ffffbf86`40645b00 00007ffa`0ba9c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006d`4edfe928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0ba9c484
THREAD_SHA1_HASH_MOD_FUNC: d6f07722cf56e3e31dfa7a21154ed59a802d244f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d4c446ccaafbe7d8cb7dd9dfcdfd314738c297c5
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-02-01T23:55:24.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2b71
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
REFERENCE_BY_POINTER (18)
Arguments:
Arg1: ffffe10d2269c640, Object type of the object whose reference count is being lowered
Arg2: ffff8580fa72d770, Object whose reference count is being lowered
Arg3: 0000000000000001, Reserved
Arg4: 0000000000200000, Reserved
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine
to increment the reference count of the object. When the driver is done with the
pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This bugcheck
can occur because an object's reference count goes to zero while there are still
open handles to the object, in which case the fourth parameter indicates the number
of opened handles. It may also occur when the object's reference count drops below zero
whether or not there are open handles to the object, and in that case the fourth parameter
contains the actual value of the pointer references count.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffe10d2269c640
BUGCHECK_P2: ffff8580fa72d770
BUGCHECK_P3: 1
BUGCHECK_P4: 200000
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x18
PROCESS_NAME: Discord.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 13:16:47.0320
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff807071f71c3 to fffff807071c14e0
STACK_TEXT:
ffff8009`47f6b6f8 fffff807`071f71c3 : 00000000`00000018 ffffe10d`2269c640 ffff8580`fa72d770 00000000`00000001 : nt!KeBugCheckEx
ffff8009`47f6b700 fffff807`075c7348 : ffff8581`01893970 ffffe10d`2abacdd0 ffffe10d`2abacdd0 fffff807`07370690 : nt!ObfDereferenceObject+0x1be1a3
ffff8009`47f6b740 fffff807`075c4199 : fffff807`076efbf0 fffff807`075c42a9 ffff8581`00000000 ffffe10d`00000000 : nt!AlpcSecurityDestroyProcedure+0x38
ffff8009`47f6b770 fffff807`075c2450 : ffffe10d`2abacdd0 ffffe10d`2abacdc8 ffffe10d`2abacdd0 ffffffff`ffffffff : nt!AlpcpDereferenceBlobEx+0x59
ffff8009`47f6b7b0 fffff807`075c22df : ffffffff`ffffffff ffff8009`47f6b939 ffffe10d`2abacde0 ffffffff`ffffffff : nt!AlpcpFlushResourcesPort+0xd8
ffff8009`47f6b7e0 fffff807`075c221a : ffffe10d`2abacc80 ffffe10d`2abacc50 00000000`00000000 ffff8009`47f6b939 : nt!AlpcpDoPortCleanup+0x97
ffff8009`47f6b820 fffff807`075ec408 : ffffe10d`2abacc50 ffffe10d`00000000 ffff8581`00000000 ffffe10d`2abacc50 : nt!AlpcpClosePort+0x4a
ffff8009`47f6b850 fffff807`076385a5 : ffffe10d`22e5f418 fffff807`07036a8f ffffe10d`22e5f3e0 ffffe10d`2ebda080 : nt!ObCloseHandleTableEntry+0x278
ffff8009`47f6b990 fffff807`07638241 : ffffe10d`22e5f3e0 ffffe10d`2ebda080 ffffffff`ffffff01 ffffe10d`2b51d6c0 : nt!ExSweepHandleTable+0xd5
ffff8009`47f6ba40 fffff807`07638769 : ffffffff`ffffffff ffffe10d`2b51d3c0 ffff8009`47f6ba90 ffffe10d`00000000 : nt!ObKillProcess+0x35
ffff8009`47f6ba70 fffff807`0765e6d3 : ffffe10d`2b51d3c0 ffff8581`07ca9060 ffff8009`47f6bc99 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffff8009`47f6baf0 fffff807`076cd143 : 00000000`00000000 00000000`00000001 00000000`092fa000 00000000`00000000 : nt!PspExitThread+0x60b
ffff8009`47f6bc00 fffff807`0703e551 : 00000000`0000019c 00000000`13347810 00000000`00000000 00000000`1876e4f8 : nt!KiSchedulerApcTerminate+0x33
ffff8009`47f6bc40 fffff807`071c5a60 : 00000000`00000001 ffff8009`47f6bd00 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffff8009`47f6bd00 fffff807`071d2dbf : ffffe10d`2ebda080 00007ff8`184f5930 00000000`00000020 ffffe10d`2d4e1e60 : nt!KiInitiateUserApc+0x70
ffff8009`47f6be40 00007ff8`1987fdf0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`1086e940 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`1987fdf0
THREAD_SHA1_HASH_MOD_FUNC: 5e6941c18f0c99100ee09b3bfedf3334a797a7d2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 218fa6f77819d05ed04dd21e93110131075aa609
THREAD_SHA1_HASH_MOD: 9eef8c7ca0ce66f8b8b34848179f303828cff762
FOLLOWUP_IP:
nt!AlpcSecurityDestroyProcedure+38
fffff807`075c7348 488b4b10 mov rcx,qword ptr [rbx+10h]
FAULT_INSTR_CODE: 104b8b48
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!AlpcSecurityDestroyProcedure+38
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 38
FAILURE_BUCKET_ID: 0x18_CORRUPT_REF_COUNT_nt!AlpcSecurityDestroyProcedure
BUCKET_ID: 0x18_CORRUPT_REF_COUNT_nt!AlpcSecurityDestroyProcedure
PRIMARY_PROBLEM_CLASS: 0x18_CORRUPT_REF_COUNT_nt!AlpcSecurityDestroyProcedure
TARGET_TIME: 2020-01-30T22:13:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3c6f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x18_corrupt_ref_count_nt!alpcsecuritydestroyprocedure
FAILURE_ID_HASH: {cb8f66d1-54d6-ef14-1fd1-a31af8aa04e5}
Followup: MachineOwner
---------