MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffc3efa5ee4a0
Arg3: 0000000000100000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3639
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5465
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffffc3efa5ee4a0
BUGCHECK_P3: 100000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: backgroundTaskHost.exe
STACK_TEXT:
fffff384`795d3ec8 fffff803`28f4ccaa : 00000000`0000001a 00000000`00041792 fffffc3e`fa5ee4a0 00000000`00100000 : nt!KeBugCheckEx
fffff384`795d3ed0 fffff803`28ee9526 : 00000000`00000000 00000000`00000000 00000000`0000002d fffffc3e`fa5ee4a0 : nt!MiDeleteVa+0x153a
fffff384`795d3fd0 fffff803`28ee963b : fffffc7e`1f7d2f70 ffff948c`9a83e9c0 fffff384`00000000 fffff384`795d4440 : nt!MiWalkPageTablesRecursively+0x776
fffff384`795d4070 fffff803`28ee963b : fffffc7e`00000000 ffff948c`9a83e9c0 fffff384`00000001 fffff384`795d4450 : nt!MiWalkPageTablesRecursively+0x88b
fffff384`795d4110 fffff803`28ee963b : fffffc7e`3f0fb000 ffff948c`9a83e9c0 fffff384`00000002 fffff384`795d4460 : nt!MiWalkPageTablesRecursively+0x88b
fffff384`795d41b0 fffff803`28ed859b : fffffc7e`3f1f8fc0 ffff948c`9a83e9c0 00007df4`00000003 fffff384`795d4470 : nt!MiWalkPageTablesRecursively+0x88b
fffff384`795d4250 fffff803`28f4b541 : fffff384`795d43f0 ffff948c`00000000 00007df4`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff384`795d4350 fffff803`28f229a0 : 00000000`00000001 fffff384`00000000 ffff948c`9a83e810 ffff948c`9827f080 : nt!MiDeletePagablePteRange+0x4f1
fffff384`795d4660 fffff803`2930391b : ffff948c`9827f080 00000000`00000000 ffff948c`00000000 ffff948c`00000000 : nt!MiDeleteVad+0x360
fffff384`795d4770 fffff803`293027af : ffff948c`9b2a8560 ffff948c`9b2a8560 ffff948c`9b2a8740 ffff948c`9a83e340 : nt!MiCleanVad+0x43
fffff384`795d47a0 fffff803`291f164f : ffffffff`00000001 ffffffff`ffffffff 00000000`00000001 ffff948c`9a83e340 : nt!MmCleanProcessAddressSpace+0x137
fffff384`795d4820 fffff803`291e6f96 : ffff948c`9a83e340 ffffdf0d`5e53b730 fffff384`795d4a60 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffff384`795d48a0 fffff803`2927a978 : 00000000`00000001 00000000`00000001 ffff948c`97e23301 00000056`594a7000 : nt!PspExitThread+0x5f6
fffff384`795d49a0 fffff803`28ee25c7 : fffff384`795d0101 00000000`00000000 ffff948c`9ac722d0 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff384`795d49e0 fffff803`28ff97b0 : 00000254`10204700 fffff384`795d4a90 00000056`593cf8b8 ffff948c`00000000 : nt!KiDeliverApc+0x487
fffff384`795d4a90 fffff803`29006c5f : 00000000`00000000 00000000`00000000 00000000`00000000 fffff384`795d4cc0 : nt!KiInitiateUserApc+0x70
fffff384`795d4bd0 00007ffa`d980f7f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000056`593cf868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d980f7f4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------