MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff9600f8f47aa0
Arg3: 0000000000020000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7A38
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 4.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: M.C0
BIOS_DATE: 12/03/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M PRO-VDH (MS-7A38)
BASEBOARD_VERSION: 4.0
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff9600f8f47aa0
BUGCHECK_P3: 20000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: backgroundTaskHost.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-14-2020 17:17:17.0226
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
STACK_TEXT:
ffffc78b`fab7c058 fffff802`6900f572 : 00000000`0000001a 00000000`00041792 ffff9600`f8f47aa0 00000000`00020000 : nt!KeBugCheckEx
ffffc78b`fab7c060 fffff802`68e73297 : 00000000`00000000 ffff9600`f8f47aa0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a4e2
ffffc78b`fab7c170 fffff802`68e73751 : ffffc78b`fab7c5c0 ffff964b`007c7a38 00000000`00000000 0a000002`f842c867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffc78b`fab7c230 fffff802`68e73751 : ffffc78b`fab7c5c0 ffff964b`25803e38 00000000`00000000 0a000003`d160b867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc78b`fab7c2f0 fffff802`68e73751 : ffffc78b`fab7c5c0 ffff964b`2592c018 ffff964b`00000000 0a000001`fff0a867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc78b`fab7c3b0 fffff802`68e72edc : ffffc78b`fab7c5c0 fffff802`68eb0ba3 ffffb781`00000000 ffffcb8f`96c3dcc0 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc78b`fab7c470 fffff802`68e71348 : ffffc78b`fab7c5c0 fffff802`00000002 ffffcb8f`00000001 ffff810a`00000000 : nt!MiWalkPageTables+0x36c
ffffc78b`fab7c570 fffff802`68e7f4a0 : ffffffff`ffffffff ffff810a`a2d8f3f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffc78b`fab7c910 fffff802`693ce83d : 00000000`00000000 00000000`1f1e7b90 ffff810a`a7d2e7d0 00000000`01401000 : nt!MiDeleteVad+0x860
ffffc78b`fab7cad0 fffff802`693ce633 : ffff810a`a7d2e7d0 00000000`00000000 000001f1`e7b90000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffc78b`fab7cb00 fffff802`693ce0df : 00000000`00000000 00000000`00000004 00000000`00000002 ffff810a`a2d8f080 : nt!MiUnmapViewOfSection+0x133
ffffc78b`fab7cbe0 ffff8026`3561a138 : ffff810a`a2d8f080 fffff802`00000000 ffff8043`846fbf90 ffffc78b`fab7cca0 : nt!MmUnmapViewOfSection+0xf
ffffc78b`fab7cc10 ffff810a`a2d8f080 : fffff802`00000000 ffff8043`846fbf90 ffffc78b`fab7cca0 ffffc78b`fab70019 : win32kfull+0x1a138
ffffc78b`fab7cc18 fffff802`00000000 : ffff8043`846fbf90 ffffc78b`fab7cca0 ffffc78b`fab70019 00000000`00000000 : 0xffff810a`a2d8f080
ffffc78b`fab7cc20 ffff8043`846fbf90 : ffffc78b`fab7cca0 ffffc78b`fab70019 00000000`00000000 00000000`00000000 : 0xfffff802`00000000
ffffc78b`fab7cc28 ffffc78b`fab7cca0 : ffffc78b`fab70019 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8043`846fbf90
ffffc78b`fab7cc30 ffffc78b`fab70019 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc78b`fab7cca0
ffffc78b`fab7cc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc78b`fab70019
THREAD_SHA1_HASH_MOD_FUNC: 6a7bce617052bad6e6ad8a5917e3295f3fadfda7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ea30672fb1f82e98825baa7eb0a3536d55a1b996
THREAD_SHA1_HASH_MOD: 4b9193ef440fbfcde7a40940b4e78ef1f6969d8a
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-06-14T10:51:03.000Z
OSBUILD: 18362
OSSERVICEPACK: 900
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2012-07-07 00:22:33
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6d75
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------