MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc23ffc2ba998
Arg3: 0000002000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: ASUSTeK Computer Inc.
SYSTEM_PRODUCT_NAME: K53SJ
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: K53SJ.315
BIOS_DATE: 09/26/2011
BASEBOARD_MANUFACTURER: ASUSTeK Computer Inc.
BASEBOARD_PRODUCT: K53SJ
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffc23ffc2ba998
BUGCHECK_P3: 2000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: 4
CPU_MHZ: 8f7
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 2F'00000000 (cache) 2F'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: msedge.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-10-2020 20:32:45.0136
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
STACK_TEXT:
ffffd504`8cec2e08 fffff806`1c9e3de5 : 00000000`0000001a 00000000`00041792 ffffc23f`fc2ba998 00000020`00000000 : nt!KeBugCheckEx
ffffd504`8cec2e10 fffff806`1c86c437 : ffffc23f`fc2ba998 ffffc303`84402740 00000000`00000000 00000020`00000000 : nt!MiDeleteVa+0x176ef5
ffffd504`8cec2ea0 fffff806`1c86c5d1 : ffffc303`84402740 fffff806`1c86cef0 ffffc261`1ffe15d0 0a000000`307f0867 : nt!MiWalkPageTablesRecursively+0x207
ffffd504`8cec2f00 fffff806`1c86c5d1 : ffffc303`84402740 fffff806`1c86cef0 ffffc261`308fff08 0a000001`42831867 : nt!MiWalkPageTablesRecursively+0x3a1
ffffd504`8cec2f60 fffff806`1c86c5d1 : ffffc303`84402740 fffff806`1c86cef0 ffffc261`309847f8 8a000000`8b7bb867 : nt!MiWalkPageTablesRecursively+0x3a1
ffffd504`8cec2fc0 fffff806`1c85e065 : ffffc303`84402740 fffff806`1c86cef0 ffffd504`8cec3140 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x3a1
ffffd504`8cec3020 fffff806`1c852aca : 00007ff8`58af4fff 00000000`00000000 ffffd504`8cec31b0 ffffc303`84402740 : nt!MiWalkPageTables+0x1e5
ffffd504`8cec30b0 fffff806`1c852710 : ffffc303`800d55c0 ffffc303`84402590 00000000`00000001 fffff806`1c85445c : nt!MiDeletePagablePteRange+0x392
ffffd504`8cec3520 fffff806`1c853f97 : 00000000`00000000 ffffc303`00000000 ffffd504`8cec35f9 ffffc303`800d5500 : nt!MiDeleteVirtualAddresses+0x48
ffffd504`8cec3570 fffff806`1cb99ca5 : fffff806`00000000 00000000`00000000 00000000`00000000 ffffc303`84402740 : nt!MiDeleteVad+0x22f
ffffd504`8cec3660 fffff806`1cb995e8 : ffffc303`81175a80 ffffc303`8060c9d0 ffffc303`800d55c0 00000000`00000000 : nt!MiUnmapVad+0x49
ffffd504`8cec3690 fffff806`1cbf14a3 : ffffc303`8117d640 ffffc303`8117d640 ffffc303`800d55c0 ffffc303`844020c0 : nt!MiCleanVad+0x30
ffffd504`8cec36c0 fffff806`1cc20dd3 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc303`844020c0 : nt!MmCleanProcessAddressSpace+0x137
ffffd504`8cec3740 fffff806`1cb9f6ca : ffffc303`844020c0 ffff8005`aba31060 ffffd504`8cec3980 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffd504`8cec37c0 fffff806`1cc698e8 : fffff806`00000000 ffff8005`ad00b801 00000000`00000000 00000090`6aed5000 : nt!PspExitThread+0x5f6
ffffd504`8cec38c0 fffff806`1c8cc591 : ffffd504`8cec3980 fffff806`1c8657ca ffffc303`00000000 ffffc303`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffd504`8cec3900 fffff806`1c9a1e00 : 00000000`00000000 ffffd504`8cec39c0 ffffd504`8cec3b00 ffffc303`826c8be0 : nt!KiDeliverApc+0x451
ffffd504`8cec39c0 fffff806`1c9af21f : ffffc303`800d55c0 ffffc303`826c8be0 ffffd504`8cec3b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffd504`8cec3b00 00007ff8`8e9cae54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000090`6d7ff9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`8e9cae54
THREAD_SHA1_HASH_MOD_FUNC: c3d65e5c3e0126362c005a37d573b55c15243623
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 19a8c260f2cb70ac3b76e2334c3adbd2192a9ed8
THREAD_SHA1_HASH_MOD: a9ca63faa9e43cc61ef524ad38163e6a9ae5c358
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-04-10T15:18:46.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: dca
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------