PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000025d14d, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0a00022000226b4c, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2006
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 99
BUGCHECK_P2: 25d14d
BUGCHECK_P3: 2
BUGCHECK_P4: a00022000226b4c
BUGCHECK_STR: 0x4E_99
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: League of Legends.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-18-2020 16:46:51.0729
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff80455c384fe to fffff80455bc2390
STACK_TEXT:
ffff808e`90edea58 fffff804`55c384fe : 00000000`0000004e 00000000`00000099 00000000`0025d14d 00000000`00000002 : nt!KeBugCheckEx
ffff808e`90edea60 fffff804`55ae8517 : 00000000`00000003 ffff808e`90edf1b0 ffff808e`90edf1b0 ffff808e`90edf100 : nt!MiDeletePteRun+0x188a4e
ffff808e`90edec80 fffff804`55ae4032 : ffffc406`438e89c0 fffff600`001e3000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffff808e`90edecb0 fffff804`55ae41c1 : ffff808e`90edf100 fffff67b`00000f10 00000000`00000000 0a000000`bc619867 : nt!MiWalkPageTablesRecursively+0x512
ffff808e`90eded70 fffff804`55ae41c1 : ffff808e`90edf100 fffff67b`3d800000 00000000`00000000 0a000002`38ae0867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff808e`90edee30 fffff804`55ae41c1 : ffff808e`90edf100 fffff67b`3d9ec000 fffff67b`00000000 0a000003`7aedf867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff808e`90edeef0 fffff804`55ae394c : ffff808e`90edf100 00000000`00000000 fffffb9e`00000000 ffffc406`438e89c0 : nt!MiWalkPageTablesRecursively+0x6a1
ffff808e`90edefb0 fffff804`55ae1db8 : ffff808e`90edf100 00000000`00000002 e8c244d3`00000001 ffff808e`00000000 : nt!MiWalkPageTables+0x36c
ffff808e`90edf0b0 fffff804`55aeff10 : ffffffff`ffffffff ffffc406`438e8838 ffffc406`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff808e`90edf450 fffff804`560884ed : ffffc406`42da4080 00000000`00000000 ffffc406`492a7860 ffffc406`42da4080 : nt!MiDeleteVad+0x860
ffff808e`90edf610 fffff804`56087a3f : ffffc406`492b9d80 ffffc406`492b9d80 ffffc406`438e84c0 fffff804`55e6a400 : nt!MiCleanVad+0x4d
ffff808e`90edf640 fffff804`55fde469 : ffffffff`00000000 ffffffff`ffffffff ffff808e`90edf801 ffffc406`438e84c0 : nt!MmCleanProcessAddressSpace+0x137
ffff808e`90edf6c0 fffff804`560d1473 : ffffc406`438e84c0 ffffd587`9dffa060 ffff808e`90edf8e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffff808e`90edf740 fffff804`560ced53 : 00000000`c0000005 00000000`00000001 00000000`03b0f000 00000000`00000000 : nt!PspExitThread+0x60b
ffff808e`90edf850 fffff804`55b16e11 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff808e`90edf890 fffff804`55bc68f0 : 00000000`00000001 ffff808e`90edf950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffff808e`90edf950 fffff804`55bd3cbf : ffffc406`42da4080 00000000`1080e478 00000000`ffffffff 00000000`00001cff : nt!KiInitiateUserApc+0x70
ffff808e`90edfa90 00007ffe`433786f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`1080e458 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`433786f4
THREAD_SHA1_HASH_MOD_FUNC: 12362c45d4d7c42f8f190b16d3b1472a08d5d965
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 22a67266a4b92454a3bfec2905489c590012a1ae
THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
FOLLOWUP_IP:
nt!MiDeletePteRun+188a4e
fffff804`55c384fe cc int 3
FAULT_INSTR_CODE: 448b49cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeletePteRun+188a4e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5629d63a
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 188a4e
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDeletePteRun
BUCKET_ID: 0x4E_99_nt!MiDeletePteRun
PRIMARY_PROBLEM_CLASS: 0x4E_99_nt!MiDeletePteRun
TARGET_TIME: 2020-04-15T19:14:52.000Z
OSBUILD: 18362
OSSERVICEPACK: 778
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-10-23 09:39:54
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 136a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x4e_99_nt!mideletepterun
FAILURE_ID_HASH: {826a8dfe-b402-47c5-bb75-e9ab5230289f}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8200dac35fc8
Arg3: 00000000a9000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff8200dac35fc8
BUGCHECK_P3: a9000000
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.18362.772_none_5f13f94c58ff4
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-18-2020 16:46:55.0899
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff806760502b8 to fffff80675fc2390
STACK_TEXT:
ffffad82`9f38deb8 fffff806`760502b8 : 00000000`0000001a 00000000`00041792 ffff8200`dac35fc8 00000000`a9000000 : nt!KeBugCheckEx
ffffad82`9f38dec0 fffff806`75ee3d07 : 00000000`00000000 ffff8200`dac35fc8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x16a7b8
ffffad82`9f38dfd0 fffff806`75ee41c1 : ffffad82`9f38e420 ffff8241`006d61a8 00000000`00000000 0a000000`ae677867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffad82`9f38e090 fffff806`75ee41c1 : ffffad82`9f38e420 ffff8241`208036b0 00000000`00000000 0a000002`e3a45867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffad82`9f38e150 fffff806`75ee41c1 : ffffad82`9f38e420 ffff8241`20904018 ffff8241`00000000 0a000000`0c148867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffad82`9f38e210 fffff806`75ee394c : ffffad82`9f38e420 ffff94b3`c0000000 ffff94b3`00000000 ffffb00d`eaf9e580 : nt!MiWalkPageTablesRecursively+0x6a1
ffffad82`9f38e2d0 fffff806`75ee1db8 : ffffad82`9f38e420 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffad82`9f38e3d0 fffff806`75f368f7 : ffffb00d`eaf9e640 fffff806`75e95e60 ffffb00d`eadf2080 ffffb00d`eaf9e3f8 : nt!MiDeletePagablePteRange+0x268
ffffad82`9f38e770 fffff806`75f3602f : 00000000`00000040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x47
ffffad82`9f38e7c0 fffff806`75f35be9 : 00000000`1b586c00 000001b5`86a40000 000001b5`86c2ffff fffff806`00000001 : nt!MiDeletePartialVad+0x283
ffffad82`9f38e900 fffff806`76494960 : 00000000`00000001 00000000`00000000 ffffad82`9f38ea60 ffffffff`ffffffff : nt!MiFreeVadRange+0x10d
ffffad82`9f38e960 fffff806`7649459b : 00000000`00000000 000000b3`906fced8 000001b5`00002000 00007ff8`00000004 : nt!MmFreeVirtualMemory+0x390
ffffad82`9f38eaa0 fffff806`75fd3c18 : ffffb00d`eadf2080 00000000`00000000 ffffb00d`e9e23ad0 000001b5`8221c630 : nt!NtFreeVirtualMemory+0x8b
ffffad82`9f38eb00 00007ff8`1ea3c434 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b3`906fce88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`1ea3c434
THREAD_SHA1_HASH_MOD_FUNC: d6f07722cf56e3e31dfa7a21154ed59a802d244f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0ec81e5d79216aa61daa1ab6c937d6f70f0ec544
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
FOLLOWUP_IP:
nt!MiDeleteVa+16a7b8
fffff806`760502b8 cc int 3
FAULT_INSTR_CODE: d65ae8cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVa+16a7b8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5629d63a
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16a7b8
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
PRIMARY_PROBLEM_CLASS: 0x1a_41792_nt!MiDeleteVa
TARGET_TIME: 2020-04-16T22:19:59.000Z
OSBUILD: 18362
OSSERVICEPACK: 778
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-10-23 09:39:54
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2498
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41792_nt!mideleteva
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff10152af0fc0
Arg3: 0000000008000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2006
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff10152af0fc0
BUGCHECK_P3: 8000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MpCmdRun.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-18-2020 16:47:07.0241
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
STACK_TEXT:
fffff90f`73adeeb8 fffff805`042502b8 : 00000000`0000001a 00000000`00041792 fffff101`52af0fc0 00000000`08000000 : nt!KeBugCheckEx
fffff90f`73adeec0 fffff805`040e3d07 : 00000000`00000000 fffff101`52af0fc0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x16a7b8
fffff90f`73adefd0 fffff805`040e41c1 : fffff90f`73adf420 fffff178`80a95780 00000000`00000000 0a000000`bc15f867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff90f`73adf090 fffff805`040e41c1 : fffff90f`73adf420 fffff178`bc4054a8 00000000`00000000 0a000000`bc15e867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff90f`73adf150 fffff805`040e41c1 : fffff90f`73adf420 fffff178`bc5e2028 fffff178`00000000 0a000000`bc15d867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff90f`73adf210 fffff805`040e394c : fffff90f`73adf420 fffff178`bd8a4420 00000000`00000000 80000000`bc07f867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff90f`73adf2d0 fffff805`040e1db8 : fffff90f`73adf420 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff90f`73adf3d0 fffff805`041368f7 : ffff8005`0bddc680 fffff805`04095e60 ffff8005`0bdcf0c0 ffff8005`0bddc438 : nt!MiDeletePagablePteRange+0x268
fffff90f`73adf770 fffff805`0413602f : 00000000`00000040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x47
fffff90f`73adf7c0 fffff805`04135be9 : 00000000`2a55e200 000002a5`5e0d0000 000002a5`5e29ffff fffff805`00000001 : nt!MiDeletePartialVad+0x283
fffff90f`73adf900 fffff805`04694960 : 00000000`00000001 00000000`00000000 fffff90f`73adfa60 ffffffff`ffffffff : nt!MiFreeVadRange+0x10d
fffff90f`73adf960 fffff805`0469459b : 00000000`00000000 000000ce`81d0ebe8 00000000`00002000 ffffffff`00000004 : nt!MmFreeVirtualMemory+0x390
fffff90f`73adfaa0 fffff805`041d3c18 : ffff8005`0bdcf0c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
fffff90f`73adfb00 00007ffc`bdb1c434 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ce`81d0eb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`bdb1c434
THREAD_SHA1_HASH_MOD_FUNC: d6f07722cf56e3e31dfa7a21154ed59a802d244f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0ec81e5d79216aa61daa1ab6c937d6f70f0ec544
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-04-18T11:46:07.000Z
OSBUILD: 18362
OSSERVICEPACK: 778
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-10-23 09:39:54
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: c92
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffcfb58c82fc0
Arg3: 0000000028000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2006
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: fffffcfb58c82fc0
BUGCHECK_P3: 28000000
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: steamwebhelper
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-18-2020 16:47:03.0477
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff802178502b8 to fffff802177c2390
STACK_TEXT:
ffffa089`eed94dc8 fffff802`178502b8 : 00000000`0000001a 00000000`00041792 fffffcfb`58c82fc0 00000000`28000000 : nt!KeBugCheckEx
ffffa089`eed94dd0 fffff802`176e3d07 : 00000000`00000000 fffffcfb`58c82fc0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x16a7b8
ffffa089`eed94ee0 fffff802`176e41c1 : ffffa089`eed95330 fffffcfe`7dac6410 00000000`00000000 0a000000`b697b863 : nt!MiWalkPageTablesRecursively+0x1e7
ffffa089`eed94fa0 fffff802`176e41c1 : ffffa089`eed95330 fffffcfe`7f3ed630 00000000`00000000 0a000000`83616863 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa089`eed95060 fffff802`176e41c1 : ffffa089`eed95330 fffffcfe`7f3f9f68 fffffcfe`00000000 0a000002`ea815863 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa089`eed95120 fffff802`176e394c : ffffa089`eed95330 fffff802`1786702a ffff8d01`00000000 00000000`00000004 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa089`eed951e0 fffff802`176e1db8 : ffffa089`eed95330 00000000`00000002 ffffb387`00000001 00000000`00000001 : nt!MiWalkPageTables+0x36c
ffffa089`eed952e0 fffff802`17cdb010 : ffffb387`878bdad0 00000000`00000010 00000000`00000103 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffa089`eed95680 fffff802`1773aa0a : ffffb387`8c4e9080 ffffb387`8c120080 00000000`00000002 fffff802`00000000 : nt!MiDeleteVadBitmap+0x8c
ffffa089`eed95710 fffff802`17cdae80 : ffffb387`8c4e9080 00000000`00000000 ffffb387`8c4e9640 ffffb387`8c120080 : nt!MiDeleteFinalPageTables+0xca
ffffa089`eed957d0 fffff802`17cd9e9e : ffffb387`8c4e9080 ffffa089`eed95a39 ffffb387`8c120080 ffffb387`8c4e9370 : nt!MmDeleteProcessAddressSpace+0x64
ffffa089`eed95820 fffff802`17cc3740 : 00000000`00000000 ffffb387`8c4e9050 ffffa089`eed95a39 00000000`00000000 : nt!PspProcessDelete+0x13e
ffffa089`eed958b0 fffff802`17713269 : 00000000`00000000 00000000`00000000 ffffa089`eed95a39 ffffb387`8c4e9080 : nt!ObpRemoveObjectRoutine+0x80
ffffa089`eed95910 fffff802`17cb5ab7 : 00000000`ffffa1f4 ffffb387`8c4e9050 ffffb387`8c4e9050 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9
ffffa089`eed95950 fffff802`17cbadae : 00000000`0000038c ffffb387`8c7038a0 ffffb387`8c7038a0 ffffb387`8d9731c0 : nt!ObCloseHandleTableEntry+0x2c7
ffffa089`eed95a90 fffff802`177d3c18 : ffffb387`8c120080 ffffa089`eed95b80 ffffa089`eed95b80 00000000`00000000 : nt!NtClose+0xde
ffffa089`eed95b00 00007ffb`6e9bc254 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000050`424fef08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`6e9bc254
THREAD_SHA1_HASH_MOD_FUNC: 95a06de08ee35bf0d43fae82c48aa5703cc5b23c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0bfea7482f59fc8fbbb78dcbabcfa690f658ff30
THREAD_SHA1_HASH_MOD: aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c
FOLLOWUP_IP:
nt!MiDeleteVa+16a7b8
fffff802`178502b8 cc int 3
FAULT_INSTR_CODE: d65ae8cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVa+16a7b8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5629d63a
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16a7b8
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
PRIMARY_PROBLEM_CLASS: 0x1a_41792_nt!MiDeleteVa
TARGET_TIME: 2020-04-18T11:35:23.000Z
OSBUILD: 18362
OSSERVICEPACK: 778
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-10-23 09:39:54
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 187d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41792_nt!mideleteva
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffaf800007efc0
Arg3: 00000000a0000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2006
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffaf800007efc0
BUGCHECK_P3: a0000000
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: steam.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-18-2020 16:46:59.0872
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8022b4502b8 to fffff8022b3c2390
STACK_TEXT:
ffffb68e`c2813e88 fffff802`2b4502b8 : 00000000`0000001a 00000000`00041792 ffffaf80`0007efc0 00000000`a0000000 : nt!KeBugCheckEx
ffffb68e`c2813e90 fffff802`2b2e3d07 : ffffb78d`c6a3c9c0 ffffaf80`0007efc0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x16a7b8
ffffb68e`c2813fa0 fffff802`2b2e41c1 : ffffb68e`c28143f0 ffffafd7`c00003f0 00000000`00000000 0a000000`a96e9867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffb68e`c2814060 fffff802`2b2e41c1 : ffffb68e`c28143f0 ffffafd7`ebe00000 00000000`00000000 0a000001`6a821867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffb68e`c2814120 fffff802`2b2e41c1 : ffffb68e`c28143f0 ffffafd7`ebf5f000 ffffafd7`00000000 0a000002`ea320867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffb68e`c28141e0 fffff802`2b2e394c : ffffb68e`c28143f0 00000000`00000000 00000000`00000000 ffffb78d`c1a96510 : nt!MiWalkPageTablesRecursively+0x6a1
ffffb68e`c28142a0 fffff802`2b2e1db8 : ffffb68e`c28143f0 ffffeb00`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffb68e`c28143a0 fffff802`2b2eff10 : ffffffff`ffffffff ffffb78d`c6a3c838 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffb68e`c2814740 fffff802`2b335b7a : 00000000`0000fffc ffffb78d`c2039080 00000000`00000000 fffff802`2b2eaeea : nt!MiDeleteVad+0x860
ffffb68e`c2814900 fffff802`2b894960 : 00000000`00000000 00000000`00000000 ffffb68e`c2814a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffffb68e`c2814960 fffff802`2b89459b : ffffb78d`c7b9d560 fffff802`2b7f4afd 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x390
ffffb68e`c2814aa0 fffff802`2b3d3c18 : ffffb78d`c2039080 00000000`07d5ae18 00000000`00000000 ffffb78d`c7b9d560 : nt!NtFreeVirtualMemory+0x8b
ffffb68e`c2814b00 00007ffe`8c3fc434 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0735e928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8c3fc434
THREAD_SHA1_HASH_MOD_FUNC: 3688233b1bc673d7a2c3e9a2aaafa883fd00c046
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bd5b9a9193cf66c32fa3f35c0a23357c4cb863f3
THREAD_SHA1_HASH_MOD: fe34192f63d13620a8987d294372ee74d699cfee
FOLLOWUP_IP:
nt!MiDeleteVa+16a7b8
fffff802`2b4502b8 cc int 3
FAULT_INSTR_CODE: d65ae8cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVa+16a7b8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5629d63a
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16a7b8
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
PRIMARY_PROBLEM_CLASS: 0x1a_41792_nt!MiDeleteVa
TARGET_TIME: 2020-04-17T21:07:52.000Z
OSBUILD: 18362
OSSERVICEPACK: 778
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-10-23 09:39:54
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1a78
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41792_nt!mideleteva
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
---------