7: kd> !analyze -v
***
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff480c180b0a8
Arg3: 0000000080000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2953
Key : Analysis.Init.CPU.mSec
Value: 1374
Key : Analysis.Init.Elapsed.mSec
Value: 10179
Key : Analysis.Memory.CommitPeak.Mb
Value: 107
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 1000
Key : MemoryManagement.PFN
Value: 80000
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: MEMORY.DMP
DUMP_FILE_ATTRIBUTES: 0x1000
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff480c180b0a8
BUGCHECK_P3: 80000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: HuntGame.exe
STACK_TEXT:
fffff108
fffff108
fffff108
fffff108
fffff108
fffff108
fffff108
fffff108
fffff108
fffff108
fffff108
fffff108
fffff108
fffff108
00000038
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
is a RAM OR SSD??? what is?
HELLLPPPPPP
***
- *
- Bugcheck Analysis *
- *
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff480c180b0a8
Arg3: 0000000080000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2953
Key : Analysis.Init.CPU.mSec
Value: 1374
Key : Analysis.Init.Elapsed.mSec
Value: 10179
Key : Analysis.Memory.CommitPeak.Mb
Value: 107
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 1000
Key : MemoryManagement.PFN
Value: 80000
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: MEMORY.DMP
DUMP_FILE_ATTRIBUTES: 0x1000
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff480c180b0a8
BUGCHECK_P3: 80000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: HuntGame.exe
STACK_TEXT:
fffff108
5099e938 fffff804
5e89f54d : 000000000000001a 00000000
00041792 fffff480c180b0a8 00000000
80000000 : nt!KeBugCheckExfffff108
5099e940 fffff804
5e8aba3a : 0000000000000000 fffff480
c180b0a8 ffffcef0bf77bfe9 00000000
00000000 : nt!MiDeleteVa+0x155dfffff108
5099ea40 fffff804
5e8abd59 : 0000000000000000 ffffbc0b
67902740 fffff4fa00000000 00000000
00000000 : nt!MiWalkPageTablesRecursively+0x30afffff108
5099ead0 fffff804
5e8abd59 : 0000000000000000 ffffbc0b
67902740 fffff4fa00000000 00000000
00000010 : nt!MiWalkPageTablesRecursively+0x629fffff108
5099eb60 fffff804
5e8abd59 : fffff1085099ee30 ffffbc0b
67902740 fffff10800000000 00000000
00000020 : nt!MiWalkPageTablesRecursively+0x629fffff108
5099ebf0 fffff804
5e94a181 : 0000000000000000 ffffbc0b
67902740 0000000000000000 00000000
00000030 : nt!MiWalkPageTablesRecursively+0x629fffff108
5099ec80 fffff804
5e89df10 : fffff1085099ee30 00000000
00000001 0000000000000002 00000000
00000000 : nt!MiWalkPageTables+0x381fffff108
5099ed80 fffff804
5e87e202 : ffffbc0b68204b10 fffff804
5e87e041 fffff1085099f130 00000000
00000000 : nt!MiDeletePagablePteRange+0x5d0fffff108
5099f090 fffff804
5ed293a9 : 0000000000000000 fffff108
5099f149 ffffbc0b679020c0 ffffbc0b
68204b10 : nt!MiDeleteVirtualAddresses+0x52fffff108
5099f0e0 fffff804
5e82d660 : ffffbc0b679020c0 00000000
00000000 0000000000000000 00000183
00be0000 : nt!MiDeleteVad+0x199fffff108
5099f1b0 fffff804
5ed29d76 : fffff10800000000 00000000
00000000 fffff1085099f300 fffff108
5099f380 : nt!MiFreeVadRange+0xa0fffff108
5099f200 fffff804
5ed29945 : 00000038f36fd590 fffff108
00000008 000000000000000e 00000183
00bef050 : nt!MmFreeVirtualMemory+0x3f6fffff108
5099f340 fffff804
5ea2d375 : ffffbc0b67d15080 fffff108
5099f420 0000000000000000 00000182
4c961bd0 : nt!NtFreeVirtualMemory+0x95fffff108
5099f3a0 00007ffd
79503f44 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x2500000038
f36fd728 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ffd`79503f44MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
is a RAM OR SSD??? what is?
HELLLPPPPPP