MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff381537ad1d8
Arg3: 0080000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff381537ad1d8
BUGCHECK_P3: 80000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: RainbowSix.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:38.0231
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
ffff830c`f1ffbef8 fffff804`7e2252ee : 00000000`0000001a 00000000`00041792 fffff381`537ad1d8 00800000`00000000 : nt!KeBugCheckEx
ffff830c`f1ffbf00 fffff804`7e0ac9e7 : ffffa781`1760c9c0 fffff381`537ad1d8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffff830c`f1ffc010 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`c0a9bd68 00000000`00000000 0a000002`53d87867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff830c`f1ffc0d0 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fce054d8 00000000`00000000 0a000001`a87cc867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff830c`f1ffc190 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fcfe7028 fffff3f9`00000000 0a000001`f15c3867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff830c`f1ffc250 fffff804`7e0ac62c : ffff830c`f1ffc460 ffffcd02`40c02c90 00000000`00000000 ffffa781`16f25e80 : nt!MiWalkPageTablesRecursively+0x6a1
ffff830c`f1ffc310 fffff804`7e0aaa98 : ffff830c`f1ffc460 fffff3f9`00000002 00000000`00000001 90000001`00000000 : nt!MiWalkPageTables+0x36c
ffff830c`f1ffc410 fffff804`7e0b8bf0 : ffffffff`ffffffff ffffa781`1760c838 ffffa781`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff830c`f1ffc7b0 fffff804`7e5c7a5d : 00000000`00000000 ffffa781`24273750 ffffa781`24273750 00000000`00000000 : nt!MiDeleteVad+0x860
ffff830c`f1ffc970 fffff804`7e5c7853 : ffffa781`1751b800 00000000`00000000 000002a6`f5a30000 00000000`00000000 : nt!MiUnmapVad+0x49
ffff830c`f1ffc9a0 fffff804`7e5c76e9 : ffffa781`1760c4c0 00000000`00000008 ffffa781`16ea97a0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffff830c`f1ffca80 fffff804`7e5c73dc : ffffa781`2249f080 000000ad`650fa4a0 000000ad`650fa4a0 ffffa781`1760c4c0 : nt!NtUnmapViewOfSectionEx+0x99
ffff830c`f1ffcad0 fffff804`7e1d2d18 : ffffa781`2249f080 000000ad`650fa568 000000ad`650fa320 00000000`00000000 : nt!NtUnmapViewOfSection+0xc
ffff830c`f1ffcb00 00007ffc`a5c1c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ad`650fa028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5c1c604
THREAD_SHA1_HASH_MOD_FUNC: e3e3f454f5c5e2fe31f4ba7b6315002a603841a7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4d67aab2a3257d5ed2dec242e32feabe54b26c4
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-02-12T17:02:19.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3d32
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff878ad7e00100, Address of the heap that reported the corruption
Arg3: ffff878added2000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7A39
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.L0
BIOS_DATE: 01/22/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 12
BUGCHECK_P2: ffff878ad7e00100
BUGCHECK_P3: ffff878added2000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff8062d7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff878added2000
FAULTING_IP:
nt!ExAllocatePoolWithTag+5d
fffff806`2d56f06d 4885c0 test rax,rax
BUGCHECK_STR: 0x13a_12
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:44.0197
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8062d51ad78 to fffff8062d3c1510
STACK_TEXT:
ffffb709`b8d4f3f8 fffff806`2d51ad78 : 00000000`0000013a 00000000`00000012 ffff878a`d7e00100 ffff878a`dded2000 : nt!KeBugCheckEx
ffffb709`b8d4f400 fffff806`2d51add8 : 00000000`00000012 00000000`008a0000 ffff878a`d7e00100 fffff806`2d239c1d : nt!RtlpHeapHandleError+0x40
ffffb709`b8d4f440 fffff806`2d51aa01 : ffff878a`d7e00280 00000000`00000000 ffffb709`b8d4f590 fffff806`2d233294 : nt!RtlpHpHeapHandleError+0x58
ffffb709`b8d4f470 fffff806`2d242d3d : ffff878a`d7e00280 00000000`00000000 00000036`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffb709`b8d4f4a0 fffff806`2d23330e : ffff878a`0000008a ffff878a`00000880 ffff878a`00000880 ffff878a`d7e00000 : nt!RtlpHpVsContextAllocateInternal+0x38d
ffffb709`b8d4f510 fffff806`2d56f06d : 00000000`80000001 00000000`00000000 00000000`00000000 00000000`00000800 : nt!ExAllocateHeapPool+0xc0e
ffffb709`b8d4f650 fffff806`2d7fcc07 : 00000000`00000100 ffffb709`b8d4f840 00000000`08000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffb709`b8d4f6a0 fffff806`2d7dad65 : ffffb709`b8d4f840 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiCreatePagingFileMap+0x677
ffffb709`b8d4f7c0 fffff806`2d7da2af : 00000000`08000000 ffffb709`b8d4fb80 00000000`00000001 00000000`00000004 : nt!MiCreateSection+0x205
ffffb709`b8d4f940 fffff806`2d7da040 : 00000064`261fef00 00000000`000f0007 00000064`261fef18 ffffb907`7943e140 : nt!MiCreateSectionCommon+0x1ff
ffffb709`b8d4fa20 fffff806`2d3d2e18 : ffffb907`7856e080 00000064`261ff4e8 ffffb709`b8d4faa8 0000023f`e8b64e60 : nt!NtCreateSection+0x60
ffffb709`b8d4fa90 00007ff8`182bca04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000064`261feea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`182bca04
THREAD_SHA1_HASH_MOD_FUNC: b703b9990189b46fad16261bcd91d57070401b54
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7deeae155b30a074f22a6bf5432efe0793ed51eb
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+5d
fffff806`2d56f06d 4885c0 test rax,rax
FAULT_INSTR_CODE: fc08548
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!ExAllocatePoolWithTag+5d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5d
FAILURE_BUCKET_ID: 0x13a_12_nt!ExAllocatePoolWithTag
BUCKET_ID: 0x13a_12_nt!ExAllocatePoolWithTag
PRIMARY_PROBLEM_CLASS: 0x13a_12_nt!ExAllocatePoolWithTag
TARGET_TIME: 2020-02-13T19:11:44.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 16fd
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x13a_12_nt!exallocatepoolwithtag
FAILURE_ID_HASH: {b9670819-63de-0938-5c20-377096ee8f03}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80220cf03fa, Address of the instruction which caused the bugcheck
Arg3: ffff8e04ac5e17b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80220cf03fa
BUGCHECK_P3: ffff8e04ac5e17b0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiProcessCrcList+13a
fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h]
CONTEXT: ffff8e04ac5e17b0 -- (.cxr 0xffff8e04ac5e17b0)
rax=8000000000000000 rbx=ffffc00bffdb2080 rcx=ffffa28000000000
rdx=002078c978739131 rsi=02ffa28004455570 rdi=0000000000000004
rip=fffff80220cf03fa rsp=ffff8e04ac5e21a0 rbp=ffff8e04ac5e2259
r8=ffffc00c02f76180 r9=ffffc00c02200000 r10=0000000000000000
r11=ffffa78000000000 r12=ffffc00c0093d060 r13=0000000000000000
r14=ffffc00c02200028 r15=ffffa7807123ffb0
iopl=0 nv up ei pl nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050203
nt!MiProcessCrcList+0x13a:
fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h] ds:002b:02ffa280`04455580=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:41.0338
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80220cf0d9e to fffff80220cf03fa
STACK_TEXT:
ffff8e04`ac5e21a0 fffff802`20cf0d9e : 00000000`00000080 00000000`00000000 00000000`00000000 ffffa280`0c5da7d0 : nt!MiProcessCrcList+0x13a
ffff8e04`ac5e22c0 fffff802`20cf3912 : 00000000`00000000 00000000`00000000 ffff8e04`ac5e24e0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x30e
ffff8e04`ac5e23e0 fffff802`20bfffcd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiCombineIdenticalPages+0x20e
ffff8e04`ac5e2650 fffff802`207d2d18 : ffffc00b`ffdb2080 000000cf`c1c2a000 ffff8e04`ac5e2b80 ffffc00b`fe8e9f60 : nt!NtSetSystemInformation+0x5dd
ffff8e04`ac5e2b00 00007ff9`282ff534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000cf`c1eff728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`282ff534
THREAD_SHA1_HASH_MOD_FUNC: 9f7f5ae14aebe5bdd59891fe3799ef6417ce15c2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e51720b5d0470781f64b96f311802cf0e9b9fd33
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!MiProcessCrcList+13a
fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h]
FAULT_INSTR_CODE: 4c107e8b
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiProcessCrcList+13a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 29371fe3
IMAGE_VERSION: 10.0.18362.628
STACK_COMMAND: .cxr 0xffff8e04ac5e17b0 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 13a
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MiProcessCrcList
BUCKET_ID: 0x3B_c0000005_nt!MiProcessCrcList
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!MiProcessCrcList
TARGET_TIME: 2020-02-12T16:32:40.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5973
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!miprocesscrclist
FAILURE_ID_HASH: {d7db7768-4133-3f2f-1a28-ac11cb6d4f46}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80031ae5de9, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7A39
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.L0
BIOS_DATE: 01/22/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80031ae5de9
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff80031f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!RtlpHpLfhSubsegmentFreeBlock+299
fffff800`31ae5de9 49397008 cmp qword ptr [r8+8],rsi
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:34.0494
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffc78bfb267a00 -- (.trap 0xffffc78bfb267a00)
Unable to read trap frame at ffffc78b`fb267a00
LAST_CONTROL_TRANSFER: from fffff80031c2fda7 to fffff80031bc14e0
STACK_TEXT:
ffff8988`ba07aae8 fffff800`31c2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`31ae5de9 00000000`00000000 : nt!KeBugCheckEx
ffff8988`ba07aaf0 fffff800`31bd341d : 00000000`00000000 fffff800`00000000 ffffc78b`fb267a00 00000000`00000000 : nt!KiDispatchException+0x1689d7
ffff8988`ba07b1a0 fffff800`31bcf1a2 : ffffc78b`fb539170 fffff800`31a4ae66 ffffa406`d5803180 ffffa406`dd82ad68 : nt!KiExceptionDispatch+0x11d
ffff8988`ba07b380 fffff800`31ae5de9 : 00000001`005000e0 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiGeneralProtectionFault+0x322
ffff8988`ba07b510 fffff800`31a45ed7 : ffffc78b`fa800340 ffffc78b`ffa97eff ffffc78b`fa8048d0 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x299
ffff8988`ba07b5d0 fffff800`31d6f0a9 : 00000000`00000158 ffffc78b`feb03310 00000000`00000158 01000000`00100000 : nt!ExFreeHeapPool+0x357
ffff8988`ba07b6f0 fffff800`31ffa2d7 : ffffc78b`feb03350 ffffc78b`feb03350 ffffa406`d2ea67a0 fffff800`31e6d4c0 : nt!ExFreePool+0x9
ffff8988`ba07b720 fffff800`31ffa0e8 : 00000000`00000000 ffffc78b`feb03330 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x197
ffff8988`ba07b780 fffff800`31a3a9a9 : 00000000`00000000 00000000`00000000 ffff8988`ba07b909 ffffc78b`feb03380 : nt!ObpRemoveObjectRoutine+0x88
ffff8988`ba07b7e0 fffff800`31fec457 : 00000000`00000000 ffffc78b`feb03350 ffffc78b`00000001 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9
ffff8988`ba07b820 fffff800`320385a5 : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffff8988`ba07b960 fffff800`32038241 : 00000000`00000000 ffffa406`daab6080 ffffffff`ffffff01 ffffa406`da3ee380 : nt!ExSweepHandleTable+0xd5
ffff8988`ba07ba10 fffff800`32038769 : ffffffff`ffffffff ffffa406`da3ee080 ffff8988`ba07ba60 ffffa406`00000000 : nt!ObKillProcess+0x35
ffff8988`ba07ba40 fffff800`3205e6d3 : ffffa406`da3ee080 ffffc78b`fae8a060 00000000`00000001 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffff8988`ba07bac0 fffff800`32052113 : fffff800`00000000 ffffee8c`7493d301 00000000`00000000 00000000`00000088 : nt!PspExitThread+0x60b
ffff8988`ba07bbd0 fffff800`31b2a7bf : ffffa406`daab6080 00000000`00000080 ffffee8c`7493d2c0 00000000`00000001 : nt!PspTerminateThreadByPointer+0x53
ffff8988`ba07bc10 fffff800`31bc8b2a : ffffd780`d9fc7180 ffffa406`daab6080 fffff800`31b2a750 00000000`00000246 : nt!PspSystemThreadStartup+0x6f
ffff8988`ba07bc60 00000000`00000000 : ffff8988`ba07c000 ffff8988`ba076000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 650aca80b8cc7391d9e9a1c3d6bf376046b26a74
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4343f43d4f2fbf0ba9d4e517789195e9edd23e83
THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
FOLLOWUP_IP:
nt!ExFreePool+9
fffff800`31d6f0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.628
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!ExFreePool
BUCKET_ID: 0x1E_c0000005_R_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!ExFreePool
TARGET_TIME: 2020-02-12T18:23:36.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7d9f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!exfreepool
FAILURE_ID_HASH: {ad89d73f-a540-2de7-18be-0204e4670731}
Followup: Pool_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffe5bfff90fd80
Arg3: 0080000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7A39
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.L0
BIOS_DATE: 01/22/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffe5bfff90fd80
BUGCHECK_P3: 80000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:31.0998
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
ffffd305`7fcd7ef8 fffff805`0ca252ee : 00000000`0000001a 00000000`00041792 ffffe5bf`ff90fd80 00800000`00000000 : nt!KeBugCheckEx
ffffd305`7fcd7f00 fffff805`0c8ac9e7 : ffffc28a`322f6800 ffffe5bf`ff90fd80 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffffd305`7fcd8010 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`dfffc878 00000000`00000000 0a000002`563b0867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffd305`7fcd80d0 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f96fffe0 00000000`00000000 0a000002`5628b867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd305`7fcd8190 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f97cb7f8 ffffe5f2`00000000 0a000002`56274867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd305`7fcd8250 fffff805`0c8ac62c : ffffd305`7fcd8460 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd305`7fcd8310 fffff805`0c8aaa98 : ffffd305`7fcd8460 ffffc28a`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffd305`7fcd8410 fffff805`0c8b8bf0 : ffffffff`ffffffff ffffc28a`322f6678 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffd305`7fcd87b0 fffff805`0cdc7a5d : ffffc28a`2b1a4830 00000000`000b2000 ffffc28a`3020bae0 00000000`00000000 : nt!MiDeleteVad+0x860
ffffd305`7fcd8970 fffff805`0cdc7853 : ffffc28a`3020bae0 00007fff`21fb0000 ffffc28a`2b196d00 00000000`00000000 : nt!MiUnmapVad+0x49
ffffd305`7fcd89a0 fffff805`0cdc76e9 : ffffc28a`322f6300 00000000`00000008 ffffc28a`262a20c0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffd305`7fcd8a80 fffff805`0cdc73dc : ffffc28a`3069a080 00000269`762b2b00 000000b6`669bf1a0 ffffc28a`322f6300 : nt!NtUnmapViewOfSectionEx+0x99
ffffd305`7fcd8ad0 fffff805`0c9d2d18 : ffffc28a`3069a080 00000269`762b2a18 00000000`00000020 ffffc28a`00000000 : nt!NtUnmapViewOfSection+0xc
ffffd305`7fcd8b00 00007fff`23a9c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`669bf068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`23a9c604
THREAD_SHA1_HASH_MOD_FUNC: e3e3f454f5c5e2fe31f4ba7b6315002a603841a7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4d67aab2a3257d5ed2dec242e32feabe54b26c4
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-02-11T16:06:18.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1952
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------