*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff681209b4fe0
Arg3: 0000000000020000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4828
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7873
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff681209b4fe0
BUGCHECK_P3: 20000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff900c`d3517338 fffff804`1e74ccaa : 00000000`0000001a 00000000`00041792 fffff681`209b4fe0 00000000`00020000 : nt!KeBugCheckEx
ffff900c`d3517340 fffff804`1e74b4df : ffffa28b`6fbd6700 00000000`00000000 fffff681`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffff900c`d3517440 fffff804`1e7229a0 : 00000000`00000001 ffff900c`00000000 ffffa28b`6fbd6550 ffffa28b`66539080 : nt!MiDeletePagablePteRange+0x48f
ffff900c`d3517750 fffff804`1eb0391b : ffffa28b`66539080 00000000`00000000 ffffa28b`00000000 ffffa28b`00000000 : nt!MiDeleteVad+0x360
ffff900c`d3517860 fffff804`1eb027af : ffffa28b`72c6aea0 ffffa28b`72c6aea0 ffffa28b`72c6a360 ffffa28b`6fbd6080 : nt!MiCleanVad+0x43
ffff900c`d3517890 fffff804`1e9f164f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffa28b`6fbd6080 : nt!MmCleanProcessAddressSpace+0x137
ffff900c`d3517910 fffff804`1e9e6f96 : ffffa28b`6fbd6080 ffffb583`306aa870 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff900c`d3517990 fffff804`1ea4a7ee : ffffa28b`00000000 00000000`00000001 00000000`00000000 000000dd`1fee6000 : nt!PspExitThread+0x5f6
ffff900c`d3517a90 fffff804`1e806bb8 : ffffa28b`6fbd6080 ffffa28b`66539080 ffff900c`d3517b80 ffffa28b`6fbd6080 : nt!NtTerminateProcess+0xde
ffff900c`d3517b00 00007ffa`de14c324 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000dd`2007f5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`de14c324
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------