MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff63ffdaa7538
Arg3: 0000000000008000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3171
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8740
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 6764
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : MemoryManagement.PFN
Value: 8
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 120621-10015-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff63ffdaa7538
BUGCHECK_P3: 8000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: sihost.exe
STACK_TEXT:
ffff820f`7505a0f8 fffff804`524440ca : 00000000`0000001a 00000000`00041792 fffff63f`fdaa7538 00000000`00008000 : nt!KeBugCheckEx
ffff820f`7505a100 fffff804`5249e416 : 00000000`00000000 00000000`00000000 00000000`000000fa fffff63f`fdaa7538 : nt!MiDeleteVa+0x153a
ffff820f`7505a200 fffff804`5249e52b : fffff67b`00000000 ffffc805`f65979c0 ffff820f`00000000 ffff820f`7505a670 : nt!MiWalkPageTablesRecursively+0x776
ffff820f`7505a2a0 fffff804`5249e52b : fffff67b`3d8fff68 ffffc805`f65979c0 ffff820f`00000001 ffff820f`7505a680 : nt!MiWalkPageTablesRecursively+0x88b
ffff820f`7505a340 fffff804`5249e52b : fffff67b`3d8ff000 ffffc805`f65979c0 ffff820f`00000002 ffff820f`7505a690 : nt!MiWalkPageTablesRecursively+0x88b
ffff820f`7505a3e0 fffff804`52404f4b : 00000000`00000000 ffffc805`f65979c0 00000000`00000003 ffff820f`7505a6a0 : nt!MiWalkPageTablesRecursively+0x88b
ffff820f`7505a480 fffff804`52442961 : ffff820f`7505a620 ffffc805`00000000 fffff63f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff820f`7505a580 fffff804`52412aa0 : 00000000`00000001 ffff820f`00000000 ffffc805`f6597810 ffffc805`f1952080 : nt!MiDeletePagablePteRange+0x4f1
ffff820f`7505a890 fffff804`52801149 : ffffc805`f5db75c0 00000000`00000000 ffffc805`00000000 ffffc805`00000000 : nt!MiDeleteVad+0x360
ffff820f`7505a9a0 fffff804`528007e0 : ffffc805`f5db75c0 ffffc805`f33707f0 ffffc805`f1952080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff820f`7505a9d0 fffff804`527feaaf : ffffc805`f5db8560 ffffc805`f5db8560 ffffc805`f5db75c0 ffffc805`f6597340 : nt!MiCleanVad+0x30
ffff820f`7505aa00 fffff804`5285c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc805`f6597340 : nt!MmCleanProcessAddressSpace+0x137
ffff820f`7505aa80 fffff804`528b0c26 : ffffc805`f6597340 ffff878e`a07798e0 ffff820f`7505acd0 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff820f`7505ab10 fffff804`528f5538 : 00000000`40010004 00000000`00000001 00000000`00000000 00000049`3cbc7000 : nt!PspExitThread+0x5f6
ffff820f`7505ac10 fffff804`5240ef67 : 00000000`00000000 00000000`00000000 00000000`00000000 00007ffb`56a02630 : nt!KiSchedulerApcTerminate+0x38
ffff820f`7505ac50 fffff804`525fb840 : 00000000`0003007e ffff820f`7505ad00 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffff820f`7505ad00 fffff804`52608d5f : 00000000`00000000 00000000`00000010 ffff820f`00000001 ffffc805`00000000 : nt!KiInitiateUserApc+0x70
ffff820f`7505ae40 00007ffb`56a50b80 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000049`3ce7f6d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`56a50b80
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner