MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffa2bffc7f4588.
Arg3: 8000000000000000.
Arg4: 0000000000000000.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3156.
Key : Analysis.Elapsed.mSec
Value: 3207.
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 484.
Key : Analysis.Init.Elapsed.mSec
Value: 4696.
Key : Analysis.Memory.CommitPeak.Mb
Value: 85.
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a.
Key : Bugcheck.Code.TargetModel
Value: 0x1a.
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: MEMORY_CORRUPTION_ONE_BIT
Key : Failure.Hash
Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Key : MemoryManagement.PFN
Value: 0
BUGCHECK_CODE: 1a.
BUGCHECK_P1: 41792.
BUGCHECK_P2: ffffa2bffc7f4588.
BUGCHECK_P3: 8000000000000000.
BUGCHECK_P4: 0
FILE_IN_CAB: 062724-8312-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
MEMORY_CORRUPTOR: ONE_BIT.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: FileCoAuth.exe
STACK_TEXT:
ffffe388`cc21af88 fffff807`43282b6a : 00000000`0000001a 00000000`00041792 ffffa2bf`fc7f4588 80000000`00000000 : nt!KeBugCheckEx
ffffe388`cc21af90 fffff807`4321aeb6 : 00000000`00000000 00000000`00000000 00000000`0000001a ffffa2bf`fc7f4588 : nt!MiDeleteVa+0x153a
ffffe388`cc21b090 fffff807`4321afcb : ffffa2d1`00000000 ffffd08f`0fabd700 ffffe388`00000000 ffffe388`cc21b500 : nt!MiWalkPageTablesRecursively+0x776
ffffe388`cc21b130 fffff807`4321afcb : ffffa2d1`68afff18 ffffd08f`0fabd700 ffffe388`00000001 ffffe388`cc21b510 : nt!MiWalkPageTablesRecursively+0x88b
ffffe388`cc21b1d0 fffff807`4321afcb : ffffa2d1`68aff000 ffffd08f`0fabd700 ffffe388`00000002 ffffe388`cc21b520 : nt!MiWalkPageTablesRecursively+0x88b
ffffe388`cc21b270 fffff807`43217fcb : 00000000`00000000 ffffd08f`0fabd700 00000000`00000003 ffffe388`cc21b530 : nt!MiWalkPageTablesRecursively+0x88b
ffffe388`cc21b310 fffff807`43281401 : ffffe388`cc21b4b0 ffffd08f`00000000 ffffa2bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffe388`cc21b410 fffff807`4322b108 : 00000000`00000001 ffffd08f`00000000 ffffd08f`0fabd550 ffffd08f`0d56d080 : nt!MiDeletePagablePteRange+0x4f1
ffffe388`cc21b720 fffff807`4368fbf9 : ffffd08f`00000000 00000000`00000000 ffffd08f`00000000 ffffd08f`0fabd080 : nt!MiDeleteVad+0x378
ffffe388`cc21b820 fffff807`4368e7d8 : ffffd08f`294d6920 ffffd08f`0f6c8970 ffffd08f`0d56d080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe388`cc21b850 fffff807`4362fca3 : ffffd08f`294d6600 ffffd08f`294d6600 ffffd08f`294d6920 ffffd08f`0fabd080 : nt!MiCleanVad+0x30
ffffe388`cc21b880 fffff807`43712e78 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd08f`0fabd080 : nt!MmCleanProcessAddressSpace+0x137
ffffe388`cc21b900 fffff807`4368a08e : ffffd08f`0fabd080 ffffbf0a`c1a966b0 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffe388`cc21b990 fffff807`436bf15e : ffffd08f`00000000 00000000`00000001 00000000`00000000 00000012`c0c40000 : nt!PspExitThread+0x5f6
ffffe388`cc21ba90 fffff807`43411b08 : ffffd08f`0fabd080 ffffd08f`0d56d080 ffffe388`cc21bb80 ffffd08f`0fabd080 : nt!NtTerminateProcess+0xde
ffffe388`cc21bb00 00007ff9`031adae4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000012`c0b0f948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`031adae4
MODULE_NAME: hardware.
IMAGE_NAME: memory_corruption.
STACK_COMMAND: .cxr; .ecxr ; kb.
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner.
---------