MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffea80b5dbf918
Arg3: 0080000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9564
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffea80b5dbf918
BUGCHECK_P3: 80000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.504_none_e781e76525fb2
STACK_TEXT:
ffffeb0c`434c2fe8 fffff801`0af4bfda : 00000000`0000001a 00000000`00041792 ffffea80`b5dbf918 00800000`00000000 : nt!KeBugCheckEx
ffffeb0c`434c2ff0 fffff801`0aee9606 : 00000000`00000000 ffffe680`0a55fa00 00000000`00000005 ffffea80`b5dbf918 : nt!MiDeleteVa+0x153a
ffffeb0c`434c30f0 fffff801`0aee971b : ffffeaf5`405aedf8 ffff9a8e`b1b7d9c0 ffffeb0c`00000000 ffffeb0c`434c3560 : nt!MiWalkPageTablesRecursively+0x776
ffffeb0c`434c3190 fffff801`0aee971b : ffffeaf5`7aa02d70 ffff9a8e`b1b7d9c0 ffffeb0c`00000001 ffffeb0c`434c3570 : nt!MiWalkPageTablesRecursively+0x88b
ffffeb0c`434c3230 fffff801`0aee971b : ffffeaf5`7aa02000 ffff9a8e`b1b7d9c0 ffffeb0c`00000002 ffffeb0c`434c3580 : nt!MiWalkPageTablesRecursively+0x88b
ffffeb0c`434c32d0 fffff801`0aed867b : ffffeb0c`434c3460 ffff9a8e`b1b7d9c0 00000000`00000003 ffffeb0c`434c3590 : nt!MiWalkPageTablesRecursively+0x88b
ffffeb0c`434c3370 fffff801`0af4a871 : ffffeb0c`434c3510 ffff9a8e`00000000 00000000`00000002 ffff9a8e`00000000 : nt!MiWalkPageTables+0x36b
ffffeb0c`434c3470 fffff801`0af5b738 : ffff9a8e`b1b7da80 fffff801`0af23370 ffff9a8e`b1149080 ffff9a8e`b1b7d810 : nt!MiDeletePagablePteRange+0x4f1
ffffeb0c`434c3780 fffff801`0af5b09c : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x48
ffffeb0c`434c37d0 fffff801`0af1afbf : 00000000`16bb8000 0000016b`b7ed0000 0000016b`b804ffff fffff801`00000001 : nt!MiDeletePartialVad+0x260
ffffeb0c`434c38f0 fffff801`0b2fa70c : ffffeb0c`00000001 00000000`00000000 ffffeb0c`434c3a50 0000016b`b7ed0000 : nt!MiFreeVadRange+0x113
ffffeb0c`434c3950 fffff801`0b2fa1e5 : 00000000`00000000 0000000a`4c5fcb48 00000000`00002000 00007ffb`00000004 : nt!MmFreeVirtualMemory+0x4ec
ffffeb0c`434c3aa0 fffff801`0b005eb8 : ffff9a8e`b1149080 ffff9a8e`00000000 00000000`00000000 ffff9a8e`ba104690 : nt!NtFreeVirtualMemory+0x95
ffffeb0c`434c3b00 00007ffc`1aa2c154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000a`4c5fcaf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`1aa2c154
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------