MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff280da2586c8
Arg3: 0000000020000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4686
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7959
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff280da2586c8
BUGCHECK_P3: 20000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffee89`ad2aefc8 fffff801`1034c03a : 00000000`0000001a 00000000`00041792 fffff280`da2586c8 00000000`20000000 : nt!KeBugCheckEx
ffffee89`ad2aefd0 fffff801`102e9666 : 00000000`00000000 ffffc77f`150144e0 00000000`00000006 fffff280`da2586c8 : nt!MiDeleteVa+0x153a
ffffee89`ad2af0d0 fffff801`102e977b : fffff2f9`406d12c0 ffffa606`32344700 ffffee89`00000000 ffffee89`ad2af540 : nt!MiWalkPageTablesRecursively+0x776
ffffee89`ad2af170 fffff801`102e977b : fffff2f9`7ca03688 ffffa606`32344700 ffffee89`00000001 ffffee89`ad2af550 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af210 fffff801`102e977b : fffff2f9`7ca03000 ffffa606`32344700 ffffee89`00000002 ffffee89`ad2af560 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af2b0 fffff801`102d86db : 00000000`00000000 ffffa606`32344700 1a000001`00000003 ffffee89`ad2af570 : nt!MiWalkPageTablesRecursively+0x88b
ffffee89`ad2af350 fffff801`1034a8d1 : ffffee89`ad2af4f0 ffffa606`00000000 fffff280`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffee89`ad2af450 fffff801`10322ae0 : 00000000`00000001 ffffee89`00000000 ffffa606`32344550 ffffa606`3244a040 : nt!MiDeletePagablePteRange+0x4f1
ffffee89`ad2af760 fffff801`10704aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffee89`ad2af870 fffff801`10704882 : ffffa606`333143f0 00000000`00000000 ffffa606`32344080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffee89`ad2af8a0 fffff801`107046f9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffee89`ad2af980 fffff801`10681f4c : ffffa606`3244a040 000001b4`4b000000 000001b4`49bac618 ffffa606`32344080 : nt!NtUnmapViewOfSectionEx+0x99
ffffee89`ad2af9d0 fffff801`10405fb5 : ffffa606`3244a000 ffffa606`330e1df0 ffffee89`ad2afa80 000001b4`49bea450 : nt!NtUnmapViewOfSection+0xc
ffffee89`ad2afa00 00007ffb`1de2c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ab`3d9fe0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1de2c2d4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff9a800a346b50
Arg3: 0000000000000003
Arg4: 0000000000000004
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9934
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffff9a800a346b50
BUGCHECK_P3: 3
BUGCHECK_P4: 4
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WerFault.exe
STACK_TEXT:
ffffec87`daebee88 fffff804`6e74951a : 00000000`0000001a 00000000`00041790 ffff9a80`0a346b50 00000000`00000003 : nt!KeBugCheckEx
ffffec87`daebee90 fffff804`6e749cae : 00000000`00000000 ffffec87`daebf5a0 fffff901`65751000 ffffec87`daebf4f0 : nt!MiDeletePteRun+0x17da
ffffec87`daebf0a0 fffff804`6e6e9b5d : 00000000`00000000 ffffdb06`756849c0 ffffec87`daebf4f0 fffff901`65750de0 : nt!MiDeleteVaTail+0x6e
ffffec87`daebf0d0 fffff804`6e6e977b : fffff97c`00000000 ffffdb06`756849c0 ffffec87`00000000 ffffec87`daebf540 : nt!MiWalkPageTablesRecursively+0xc6d
ffffec87`daebf170 fffff804`6e6e977b : fffff97c`be405958 ffffdb06`756849c0 ffffec87`00000001 ffffec87`daebf550 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf210 fffff804`6e6e977b : fffff97c`be405000 ffffdb06`756849c0 ffffec87`00000002 ffffec87`daebf560 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf2b0 fffff804`6e6d86db : 00000000`00000000 ffffdb06`756849c0 00000000`00000003 ffffec87`daebf570 : nt!MiWalkPageTablesRecursively+0x88b
ffffec87`daebf350 fffff804`6e74a8d1 : ffffec87`daebf4f0 ffffdb06`00000000 ffffdb06`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffec87`daebf450 fffff804`6e722ae0 : 00000000`00000001 ffffec87`00000000 ffffdb06`75684810 ffffdb06`7b895080 : nt!MiDeletePagablePteRange+0x4f1
ffffec87`daebf760 fffff804`6eb04aa9 : 00000000`00000000 00000000`00000000 000002ca`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffec87`daebf870 fffff804`6eb04882 : ffffdb06`7b69a520 00000000`00000000 ffffdb06`75684340 00000000`00000000 : nt!MiUnmapVad+0x49
ffffec87`daebf8a0 fffff804`6eb046f9 : ffff848d`353d7e80 fffff804`6eaf138c 00000000`000003f8 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffec87`daebf980 fffff804`6ea81f4c : ffffdb06`7b895080 000002ca`e9e90000 00000000`00000004 ffffdb06`75684340 : nt!NtUnmapViewOfSectionEx+0x99
ffffec87`daebf9d0 fffff804`6e805fb5 : ffffdb06`7b895000 00000000`00000010 ffffec87`daebfa80 000002ca`e7cbda30 : nt!NtUnmapViewOfSection+0xc
ffffec87`daebfa00 00007ffe`2644c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ff`f4f47fa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2644c2d4
SYMBOL_NAME: nt!MiDeletePteRun+17da
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17da
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffd811cec01e0
Arg3: 0000000000010000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7530
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13211
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffffd811cec01e0
BUGCHECK_P3: 10000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: StartMenuExperienceHost.exe
STACK_TEXT:
ffff8381`9c04f348 fffff804`1094c03a : 00000000`0000001a 00000000`00041792 fffffd81`1cec01e0 00000000`00010000 : nt!KeBugCheckEx
ffff8381`9c04f350 fffff804`1094a86f : ffff8d81`4f15a700 00000000`00000000 ffff8d81`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffff8381`9c04f450 fffff804`10922ae0 : 00000000`00000001 ffff8381`00000000 ffff8d81`4f15a550 ffff8d81`4f038080 : nt!MiDeletePagablePteRange+0x48f
ffff8381`9c04f760 fffff804`10d04aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffff8381`9c04f870 fffff804`10d04882 : ffff8d81`4efd8460 00000000`00000000 ffff8d81`4f15a080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8381`9c04f8a0 fffff804`10d046f9 : ffffde85`a532c980 fffff804`10cf138c 00000000`000005a4 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffff8381`9c04f980 fffff804`10c81f4c : ffff8d81`4f038080 00000239`d8000000 00000000`00000003 ffff8d81`4f15a080 : nt!NtUnmapViewOfSectionEx+0x99
ffff8381`9c04f9d0 fffff804`10a05fb5 : ffff8d81`4f038000 00000000`00000001 ffff8381`9c04fa80 00000239`d6b0caa0 : nt!NtUnmapViewOfSection+0xc
ffff8381`9c04fa00 00007ffa`8178c2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000cc`4dbfbc88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`8178c2d4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff200fc19c480
Arg3: 0000200000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7077
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7299
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff200fc19c480
BUGCHECK_P3: 200000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff98b`d4c05378 fffff800`0934c03a : 00000000`0000001a 00000000`00041792 fffff200`fc19c480 00002000`00000000 : nt!KeBugCheckEx
fffff98b`d4c05380 fffff800`092e9666 : 00000000`00000000 ffffa288`e36a1700 00000000`000001a5 fffff200`fc19c480 : nt!MiDeleteVa+0x153a
fffff98b`d4c05480 fffff800`092e977b : fffff279`00000000 ffffa288`e36a1700 fffff98b`00000000 fffff98b`d4c058f0 : nt!MiWalkPageTablesRecursively+0x776
fffff98b`d4c05520 fffff800`092e977b : fffff279`3c803f00 ffffa288`e36a1700 fffff98b`00000001 fffff98b`d4c05900 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c055c0 fffff800`092e977b : fffff279`3c803000 ffffa288`e36a1700 fffff98b`00000002 fffff98b`d4c05910 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05660 fffff800`092d86db : 00000000`00000000 ffffa288`e36a1700 fffff98b`00000003 fffff98b`d4c05920 : nt!MiWalkPageTablesRecursively+0x88b
fffff98b`d4c05700 fffff800`0934a8d1 : fffff98b`d4c058a0 ffffa288`00000000 fffff98b`00000002 fffff98b`00000000 : nt!MiWalkPageTables+0x36b
fffff98b`d4c05800 fffff800`09322ae0 : 00000000`00000005 fffff98b`00000000 ffffa288`e36a1550 ffffa288`e3662300 : nt!MiDeletePagablePteRange+0x4f1
fffff98b`d4c05b10 fffff800`09704aa9 : ffff8b01`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffff98b`d4c05c20 fffff800`09704882 : ffffa288`e6072ec0 00000000`00000000 ffffa288`e36a1080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff98b`d4c05c50 fffff800`097046f9 : ffff8b01`3f040d00 fffff800`096f138c 00000000`00000130 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff98b`d4c05d30 fffff800`09681f4c : ffffa288`e3662300 ffff8b01`42a6ee88 ffff8b01`42a6edb0 ffffa288`e36a1080 : nt!NtUnmapViewOfSectionEx+0x99
fffff98b`d4c05d80 fffff800`09405fb5 : 00000000`00000000 00000000`00000000 fffff98b`d4c05e30 00000000`00000002 : nt!NtUnmapViewOfSection+0xc
fffff98b`d4c05db0 fffff800`093f8400 : fffff800`0c83aa50 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 : nt!KiSystemServiceCopyEnd+0x25
fffff98b`d4c05f48 fffff800`0c83aa50 : 00000000`00000000 00000000`00000108 ffff8b01`42a6ee88 00000000`00000000 : nt!KiServiceLinkage
fffff98b`d4c05f50 fffff800`0c83b727 : fffff98b`d4c06130 ffff8b01`42a6edb0 00000000`00000000 00000000`00000000 : CI!I_MapCatalog+0x4a0
fffff98b`d4c06040 fffff800`0c83b2d3 : 00000000`00000000 ffff8b01`3ffab5b8 fffff98b`d4c061a1 00000000`000000d9 : CI!I_ReloadCatalog+0x263
fffff98b`d4c060c0 fffff800`0c83afa1 : 00000000`00000001 00000000`00000000 ffff8b01`00000001 00000000`00000000 : CI!I_ReloadCatalogDirectory+0x297
fffff98b`d4c061f0 fffff800`0c83941a : ffff8b01`3fe10e30 ffff8b01`00000001 fffff98b`d4c06360 00000000`00000004 : CI!I_ReloadCatalogs+0x1ad
fffff98b`d4c06260 fffff800`0c8390f4 : fffff98b`d4c065f0 00000000`00000014 ffff8b01`3fef7d80 00000000`00000001 : CI!I_FindFileOrHeaderHashInCatalogs+0x24a
fffff98b`d4c063c0 fffff800`0c844efe : fffff98b`d4c065ac fffff98b`d4c065b8 fffff98b`d4c065e8 fffff98b`d4c065f0 : CI!MinCrypK_VerifyHashInCatalog+0x110
fffff98b`d4c06470 fffff800`0c840770 : 00000000`00000000 00000000`00000000 ffff8b01`3fe10601 fffff800`0000002a : CI!CiVerifyFileHashInCatalogs+0x18e
fffff98b`d4c06550 fffff800`0c841c79 : 00000000`00000000 fffff98b`d4c06881 00000000`00000000 00000000`00000000 : CI!CipFindFileHash+0x2dc
fffff98b`d4c066b0 fffff800`0c8415ac : ffff8b01`3fe10660 ffffa288`ea592a80 ffffa288`e36a1080 fffff800`0ed20000 : CI!CipValidateFileHash+0x2d9
fffff98b`d4c06790 fffff800`0c83f9e2 : 00000000`00000088 00000000`00000000 ffffa288`ea592a80 fffff800`0ed20000 : CI!CipValidateImageHash+0x110
fffff98b`d4c068d0 fffff800`096735e5 : fffff98b`d4c06b10 fffff800`0ed20000 00000000`0000000f fffff800`0ed20000 : CI!CiValidateImageHeader+0x812
fffff98b`d4c06a50 fffff800`09673140 : 00000000`00000000 ffffa288`e372ea30 00000000`00000000 00000000`00018000 : nt!SeValidateImageHeader+0xd9
fffff98b`d4c06b00 fffff800`0960c09b : fffff98b`d4c07000 00000000`00000000 00000000`00000000 ffffffff`8000013c : nt!MiValidateSectionCreate+0x438
fffff98b`d4c06ce0 fffff800`0960b4e6 : fffff98b`d4c07020 fffff98b`d4c07020 fffff98b`d4c06e40 00000000`00000000 : nt!MiValidateSectionSigningPolicy+0xab
fffff98b`d4c06d40 fffff800`096ff71b : ffffa288`ea592a80 fffff98b`d4c07020 fffff98b`d4c07020 00002003`00000000 : nt!MiCreateNewSection+0x66e
fffff98b`d4c06eb0 fffff800`096fed64 : fffff98b`d4c06ee0 ffff8b01`3fe23030 ffffa288`ea592a80 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
fffff98b`d4c06fa0 fffff800`0936c1b8 : 00000000`00000000 00000000`ffffffff ffffffff`80000138 00000000`000001b0 : nt!MiCreateSection+0xf4
fffff98b`d4c07120 fffff800`09733fa2 : 00000000`00000000 fffff98b`d4c07239 ffffffff`80000138 00000000`00000000 : nt!MiCreateSystemSection+0xa4
fffff98b`d4c071c0 fffff800`0973187e : fffff800`09c2a310 ffffffff`80000138 fffff98b`d4c07358 00000000`00000000 : nt!MiCreateSectionForDriver+0x126
fffff98b`d4c072a0 fffff800`097310d2 : 00000000`00000000 fffff98b`d4c073f0 00000000`00000000 fffff800`00000000 : nt!MiObtainSectionForDriver+0xa6
fffff98b`d4c072f0 fffff800`09787c54 : fffff98b`d4c07540 00000000`00000000 fffff800`09c2a310 fffff800`097ad000 : nt!MmLoadSystemImageEx+0x156
fffff98b`d4c07490 fffff800`097328cc : fffff800`09c2a310 00000000`00000000 fffff98b`d4c07710 00000000`00000000 : nt!MiLoadImportDll+0x44
fffff98b`d4c074e0 fffff800`09732504 : ffffa288`e60eea20 fffff98b`d4c076e0 fffff98b`d4c07710 00000000`00000000 : nt!MiResolveImageReferences+0x214
fffff98b`d4c075f0 fffff800`0973160c : fffff98b`00001108 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiResolveImageImports+0x94
fffff98b`d4c07660 fffff800`09730f66 : fffff98b`d4c07898 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x690
fffff98b`d4c07800 fffff800`0971e124 : fffff98b`d4c07940 00000000`00000000 fffff800`09c458e0 00000000`00000000 : nt!MmLoadSystemImage+0x26
fffff98b`d4c07840 fffff800`09a53eaf : ffffa288`ea4f5a30 ffffa288`ea4f5a30 fffff98b`d4c07a80 00000000`00000000 : nt!IopLoadDriver+0x23c
fffff98b`d4c07a10 fffff800`09a60ad6 : ffffffff`00000000 ffff8b01`3fd2b940 00000000`00000000 fffff800`0577bcd0 : nt!IopInitializeSystemDrivers+0x157
fffff98b`d4c07ab0 fffff800`097946db : fffff800`0577bcd0 fffff800`09c47048 fffff800`097946a0 fffff800`0577bcd0 : nt!IoInitSystem+0x2e
fffff98b`d4c07ae0 fffff800`092a2ae5 : ffffa288`e3662300 fffff800`097946a0 fffff800`0577bcd0 054d842c`544fd5cc : nt!Phase1Initialization+0x3b
fffff98b`d4c07b10 fffff800`093fbbf8 : fffff800`05ae5180 ffffa288`e3662300 fffff800`092a2a90 9199d69c`9cf06576 : nt!PspSystemThreadStartup+0x55
fffff98b`d4c07b60 00000000`00000000 : fffff98b`d4c08000 fffff98b`d4c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------