MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff81bffd629b28
Arg3: 0000000000400000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2421
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7968
Key : Analysis.Init.CPU.mSec
Value: 764
Key : Analysis.Init.Elapsed.mSec
Value: 7961
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : MemoryManagement.PFN
Value: 400
FILE_IN_CAB: 113021-11500-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff81bffd629b28
BUGCHECK_P3: 400000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: sppsvc.exe
STACK_TEXT:
fffff604`14a83d48 fffff807`4e0440ca : 00000000`0000001a 00000000`00041792 ffff81bf`fd629b28 00000000`00400000 : nt!KeBugCheckEx
fffff604`14a83d50 fffff807`4e09e416 : 00000000`00000000 00000000`00000000 00000000`0000013f ffff81bf`fd629b28 : nt!MiDeleteVa+0x153a
fffff604`14a83e50 fffff807`4e09e52b : ffff81c0`00000000 ffffe087`d63e6700 fffff604`00000000 fffff604`14a842c0 : nt!MiWalkPageTablesRecursively+0x776
fffff604`14a83ef0 fffff807`4e09e52b : ffff81c0`e06fff58 ffffe087`d63e6700 fffff604`00000001 fffff604`14a842d0 : nt!MiWalkPageTablesRecursively+0x88b
fffff604`14a83f90 fffff807`4e09e52b : ffff81c0`e06ff000 ffffe087`d63e6700 fffff604`00000002 fffff604`14a842e0 : nt!MiWalkPageTablesRecursively+0x88b
fffff604`14a84030 fffff807`4e004f4b : 00000000`00000000 ffffe087`d63e6700 00000000`00000003 fffff604`14a842f0 : nt!MiWalkPageTablesRecursively+0x88b
fffff604`14a840d0 fffff807`4e042961 : fffff604`14a84270 ffffe087`00000000 ffff81bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff604`14a841d0 fffff807`4e012aa0 : 00000000`00000001 fffff604`00000000 ffffe087`d63e6550 ffffe087`d6283080 : nt!MiDeletePagablePteRange+0x4f1
fffff604`14a844e0 fffff807`4e401149 : ffffe087`d3f4c940 00000000`00000000 ffffe087`00000000 ffffe087`00000000 : nt!MiDeleteVad+0x360
fffff604`14a845f0 fffff807`4e4007e0 : ffffe087`d3f4c940 ffffe087`d3dd2d10 ffffe087`d6283080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff604`14a84620 fffff807`4e3feaaf : ffffe087`d3f4cd00 ffffe087`d3f4cd00 ffffe087`d3f4c940 ffffe087`d63e6080 : nt!MiCleanVad+0x30
fffff604`14a84650 fffff807`4e45c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe087`d63e6080 : nt!MmCleanProcessAddressSpace+0x137
fffff604`14a846d0 fffff807`4e4b0c26 : ffffe087`d63e6080 ffff8f8d`062906b0 fffff604`14a84920 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffff604`14a84760 fffff807`4e4f5538 : 00000000`00000000 00000000`00000001 00000001`00000000 00000038`553f8000 : nt!PspExitThread+0x5f6
fffff604`14a84860 fffff807`4e00ef67 : 00000000`00000101 00000000`00000000 ffffe087`d5642b50 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff604`14a848a0 fffff807`4e1fb840 : 0000018f`48592240 fffff604`14a84950 00000038`5515fa88 ffffe087`00000000 : nt!KiDeliverApc+0x487
fffff604`14a84950 fffff807`4e208d5f : 00000000`00000000 fffff604`14a84b80 00000000`00000000 ffffe087`d82ec1c0 : nt!KiInitiateUserApc+0x70
fffff604`14a84a90 00007ffa`c69f07c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`5515fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`c69f07c4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner