1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff81bffe1680e8
Arg3: 0000000000200000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4073
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 10511
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : MemoryManagement.PFN
Value: 200
FILE_IN_CAB: 042323-5046-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff81bffe1680e8
BUGCHECK_P3: 200000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: F1_22.exe
STACK_TEXT:
ffff840d`4e2feea8 fffff801`4bd00197 : 00000000`0000001a 00000000`00041792 ffff81bf`fe1680e8 00000000`00200000 : nt!KeBugCheckEx
ffff840d`4e2feeb0 fffff801`4bcefb3d : 00000000`00000000 ffff840d`4e2ff3b0 ffff6536`79227ab3 00000000`00000000 : nt!MiDeleteVa+0x1597
ffff840d`4e2fefb0 fffff801`4bcef93d : ffff81bf`00000000 00000000`00000000 00000000`00000000 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0xb2d
ffff840d`4e2ff040 fffff801`4bcef93d : ffff81c0`00000000 00000000`00000000 00000000`00000001 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff0d0 fffff801`4bcef93d : ffff81c0`00000000 00000000`00000000 00000000`00000002 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff160 fffff801`4bd12a01 : 00000000`00000000 00000000`00000000 00000000`00000003 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff1f0 fffff801`4bcfe9e7 : ffff840d`4e2ff3b0 ffff81c0`00000001 00000000`00000002 ffff81c0`00000000 : nt!MiWalkPageTables+0x371
ffff840d`4e2ff2f0 fffff801`4bc57ff2 : 00000000`00000000 fffff801`4bc581bd ffff840d`4e2ff6b8 ffffd00a`82a28080 : nt!MiDeletePagablePteRange+0x747
ffff840d`4e2ff620 fffff801`4c0c17f8 : 00000000`00000000 ffff840d`00000001 ffffd00a`82aed080 ffff840d`4e2ff6f0 : nt!MiDeleteVirtualAddresses+0x52
ffff840d`4e2ff670 fffff801`4c12b871 : ffffd00a`82aed080 ffffd00a`82b16760 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
ffff840d`4e2ff730 fffff801`4c12b213 : ffffd00a`82b16760 00000000`00000000 ffffd00a`82a28080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff840d`4e2ff760 fffff801`4c12ad8d : ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`82aed080 : nt!MiCleanVad+0x2f
ffff840d`4e2ff790 fffff801`4c1a590d : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd00a`82aed080 : nt!MmCleanProcessAddressSpace+0x10d
ffff840d`4e2ff810 fffff801`4c093c54 : ffffd00a`82aed080 ffffab06`8ff49770 ffffd00a`82aed080 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffff840d`4e2ff8a0 fffff801`4c1aa952 : 00000000`c000004b ffffd00a`82aed001 ffffd00a`82a280f4 00000000`00214000 : nt!PspExitThread+0x63c
ffff840d`4e2ff9a0 fffff801`4be3e0e5 : ffffd00a`00003200 ffffd00a`82a28080 ffffd00a`82aed080 ffffd00a`82aed080 : nt!NtTerminateProcess+0xf2
ffff840d`4e2ffa20 00007ffc`43caf1d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`12f5daf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`43caf1d4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------