MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffbb00d6c5ea20
Arg3: 0000010000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JC78BRD
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 27
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffbb00d6c5ea20
BUGCHECK_P3: 10000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RainbowSix.exe
STACK_TEXT:
ffffec8d`51f56e18 fffff806`0dc5418e : 00000000`0000001a 00000000`00041792 ffffbb00`d6c5ea20 00000100`00000000 : nt!KeBugCheckEx
ffffec8d`51f56e20 fffff806`0da119d1 : 00000000`00000003 ffffbb00`d6c5e000 ffffec8d`51f572f0 00000000`00000003 : nt!MiDeleteVa+0x191e6e
ffffec8d`51f56f10 fffff806`0da11cf0 : 00000000`00000000 ffff9887`e0fbb940 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffffec8d`51f56fa0 fffff806`0da11cf0 : 00000000`00000000 ffff9887`e0fbb940 ffffbb5d`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffffec8d`51f57030 fffff806`0da11cf0 : ffffec8d`51f572f0 ffff9887`e0fbb940 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffffec8d`51f570c0 fffff806`0da0e5fb : 00000000`00000000 ffff9887`e0fbb940 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffffec8d`51f57150 fffff806`0dac22d1 : ffffec8d`51f572f0 ffff9887`00000000 ffff9887`00000002 01400020`00000000 : nt!MiWalkPageTables+0x36b
ffffec8d`51f57250 fffff806`0daa787f : 00000000`00000000 00000000`00000060 ffff9887`e0fbba00 000001ad`8befffff : nt!MiDeletePagablePteRange+0x491
ffffec8d`51f576d0 fffff806`0da9d99b : ffff9887`e0fbb2c0 00000000`00000000 ffff9887`00000000 fffff806`00000001 : nt!MiDeleteVad+0x41f
ffffec8d`51f57800 fffff806`0de65c1c : ffffec8d`00000000 00000000`00000000 ffffec8d`51f57960 00000000`00008000 : nt!MiFreeVadRange+0xa3
ffffec8d`51f57860 fffff806`0de65845 : 00000000`00000000 ffff9887`df09eb60 00000000`00000030 00000008`f03ff398 : nt!MmFreeVirtualMemory+0x39c
ffffec8d`51f579a0 fffff806`0dbef375 : ffff9887`dd01e340 ffff9887`df80a4e0 00000000`00000000 00000000`00000000 : nt!NtFreeVirtualMemory+0x95
ffffec8d`51f57a00 00007ffd`4d8cb154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000008`f03ff358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4d8cb154
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------