• Now's your chance win big! Join our community and get entered to win a RTX 2060 GPU, plus more! Join here.

    Pi Cast Episode 3 streams live on Tuesday, August 4th at 2:30 pm ET (7:30 PM BST). Watch live right here!

    Catch Scharon on the Tom's Hardware Show live on Thursday, August 6th at 2:00 pm ET (7:00 PM BST). Click here!

Memory Corruption One Bit/Large BSOD

luminant

Honorable
Jul 16, 2013
42
0
10,540
2
Hi.
Over the past week I've had 3 BSODs due to "Memory_corruption_one_bit". Tried running diagnostics on my memory and got no errors, also did a sfc /scannow and same again, no errors.

Not installed any new hardware or software lately. Done numerous virus scans using Malware bytes and windows defender, nothing came up. Checked the MEMORY.DMP log and found no mention of any drivers causing the issue, but maybe I overlooked it.

First MEMORY.DMP:
Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 14393.206.amd64fre.rs1_release.160915-0644
Machine Name:
Kernel base = 0xfffff801`33a7f000 PsLoadedModuleList = 0xfffff801`33d83080
Debug session time: Fri Oct 7 20:39:14.990 2016 (UTC + 1:00)
System Uptime: 1 days 2:03:43.663
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000051`3252b018). Type ".hh dbgerr001" for details
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41792, ffff8200289fa1f8, 800000000, 0}

Probably caused by : memory_corruption ( ONE_BIT )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8200289fa1f8
Arg3: 0000000800000000
Arg4: 0000000000000000

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 14393.206.amd64fre.rs1_release.160915-0644

SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME: Z97X-Gaming 5

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: To be filled by O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: F7

BIOS_DATE: 09/18/2015

BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT: Z97X-Gaming 5

BASEBOARD_VERSION: x.x

DUMP_TYPE: 1

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff8200289fa1f8

BUGCHECK_P3: 800000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT

BUGCHECK_STR: 0x1a_41792

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: SARADOC

ANALYSIS_SESSION_TIME: 10-07-2016 20:42:11.0665

ANALYSIS_VERSION: 10.0.10586.567 amd64fre

STACK_TEXT:
ffffc000`0948a2f8 fffff801`33bfa557 : 00000000`0000001a 00000000`00041792 ffff8200`289fa1f8 00000008`00000000 : nt!KeBugCheckEx
ffffc000`0948a300 fffff801`33ae1e93 : fffff801`33d8a3c0 fffff801`00000000 00000000`00000000 fffff801`33a7f000 : nt! ?? ::FNODOBFM::`string'+0x220c7
ffffc000`0948a510 fffff801`33b41e89 : 00000051`3f4fffff 00000051`3f4fffff 00000051`3f400000 ffffe58d`213dd3e0 : nt!MiDeleteVad+0x7f3
ffffc000`0948a640 fffff801`33f3867d : 00000000`00000000 00000051`3f400000 00000000`00000000 fffff801`00000000 : nt!MiFreeVadRange+0x4d
ffffc000`0948a680 fffff801`33bd3f93 : ffffc000`0948a980 fffff801`33f1f3aa 00000000`00010002 ffffe58d`1f86b040 : nt!NtFreeVirtualMemory+0x2dd
ffffc000`0948a7a0 fffff801`33bcc470 : fffff801`33effa98 ffffe58d`1f86b040 ffffc000`0948a980 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
ffffc000`0948a938 fffff801`33effa98 : ffffe58d`1f86b040 ffffc000`0948a980 00000000`00000000 ffffe58d`1f86b040 : nt!KiServiceLinkage
ffffc000`0948a940 fffff801`33efad6e : 00000000`00000000 ffffe58d`1f86b040 00000000`00000000 ffffe58d`1f7e7380 : nt!PspExitThread+0x360
ffffc000`0948aa80 fffff801`33f6618c : ffffe58d`1f86b040 00000000`00000000 ffffe58d`1f86b040 00000000`00000000 : nt!PspTerminateThreadByPointer+0x96
ffffc000`0948aac0 fffff801`33bd3f93 : ffffe58d`1f86b040 ffffc000`0948ab80 00000000`00000010 ffffe58d`1f837250 : nt!NtTerminateThread+0x44
ffffc000`0948ab00 00007ffd`3acb58b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000051`3f4ff738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`3acb58b4


STACK_COMMAND: kb

THREAD_SHA1_HASH_MOD_FUNC: 76a8696f7e07b2d275f41c28fde2b6a7b028067d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fc8c7f2274acd8860d10ed160d17c66abaa0fc91

THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c

SYMBOL_NAME: ONE_BIT

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: hardware

IMAGE_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION:

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME: 2016-10-07T19:39:14.000Z

OSBUILD: 14393

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2016-09-15 17:21:59

BUILDDATESTAMP_STR: 160915-0644

BUILDLAB_STR: rs1_release

BUILDOSVER_STR: 10.0.14393.206.amd64fre.rs1_release.160915-0644

ANALYSIS_SESSION_ELAPSED_TIME: 950

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner
---------

Second:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 12B, {ffffffffc00002c4, 326, 7bd23f0, ffffc801e2c02000}

Probably caused by : memory_corruption

Followup: memory_corruption
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000326, physical page number
Arg3: 0000000007bd23f0, zero
Arg4: ffffc801e2c02000, zero

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 14393.321.amd64fre.rs1_release_inmarket.161004-2338

SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME: Z97X-Gaming 5

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: To be filled by O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: F7

BIOS_DATE: 09/18/2015

BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT: Z97X-Gaming 5

BASEBOARD_VERSION: x.x

DUMP_TYPE: 1

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 326

BUGCHECK_P3: 7bd23f0

BUGCHECK_P4: ffffc801e2c02000

BUGCHECK_STR: 0x12B_c00002c4_StCtDecompressFailed

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)

DEFAULT_BUCKET_ID: CODE_CORRUPTION

PROCESS_NAME: MemCompression

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: SARADOC

ANALYSIS_SESSION_TIME: 10-17-2016 21:02:14.0337

ANALYSIS_VERSION: 10.0.10586.567 amd64fre

LAST_CONTROL_TRANSFER: from fffff801062a65d7 to fffff801061d72c0

STACK_TEXT:
ffffc801`e2a2f4f8 fffff801`062a65d7 : 00000000`0000012b ffffffff`c00002c4 00000000`00000326 00000000`07bd23f0 : nt!KeBugCheckEx
ffffc801`e2a2f500 fffff801`0622e944 : 00000000`00000200 00000000`00000003 00000000`07bd23f0 ffffc801`e2c02000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x117
ffffc801`e2a2f550 fffff801`06197413 : 00000000`00000000 ffffb786`1cd28050 00000000`00000000 00000000`000023f0 : nt! ?? ::FNODOBFM::`string'+0x484b4
ffffc801`e2a2f630 fffff801`061977a1 : 00000000`00000001 00000000`000005c4 00000000`00000001 ffffc801`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
ffffc801`e2a2f680 fffff801`061978e0 : 00000000`ffffffff ffffb786`24994000 ffffc801`e2a2f768 ffffb786`1ecc9800 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
ffffc801`e2a2f720 fffff801`06198702 : 00000000`00000027 ffffb786`1ecc9800 fffff801`063b0400 ffffb786`1ecc9800 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98
ffffc801`e2a2f7e0 fffff801`06198849 : ffffb786`1cd28000 ffffc801`e2a2f8f0 fffff801`06198828 fffff801`06198828 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
ffffc801`e2a2f830 fffff801`060e3d55 : ffffb786`20314080 ffffc801`e2a2f8f0 ffffb786`2133c900 fffff801`06160558 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffc801`e2a2f860 fffff801`06191a6d : 00000000`00000003 ffffb786`24994000 ffffb786`1cd28000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffc801`e2a2f8b0 fffff801`06194e70 : ffffc801`e2a2f9b0 ffffc801`e2a2faf0 ffffb786`1cd28000 fffff801`06191c46 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffc801`e2a2f980 fffff801`06194b5b : ffffb786`1cd28000 ffffb786`1ecc9800 fffff801`06447a40 ffffc801`e2a2faf0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
ffffc801`e2a2f9d0 fffff801`06191903 : 00000000`0000000c ffffb786`2133c9b0 ffffb786`1ecc9800 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffc801`e2a2fa50 fffff801`06198822 : ffffb786`00000001 ffffb786`2133c9b0 ffffc801`00000000 ffffb786`1cd28000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
ffffc801`e2a2fac0 fffff801`06110409 : ffffc801`e2a2fe40 fffff801`062d8301 ffffc801`e2a2fb60 ffffc801`e2a2fb99 : nt!SmPageRead+0x2e
ffffc801`e2a2fb10 fffff801`0611078d : 00000000`00000002 ffffc801`e2a2fe40 ffffb786`2133c8b0 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
ffffc801`e2a2fba0 fffff801`060fe2e0 : 00000000`c0033333 ffffc801`e2a2fe40 00000000`00000004 ffffc801`e2a2fe40 : nt!MiIssueHardFault+0x15d
ffffc801`e2a2fc40 fffff801`061e08fc : ffffb786`20314080 0000009c`0957d410 00000000`00000000 00007ff8`bdf204b0 : nt!MmAccessFault+0xca0
ffffc801`e2a2fe40 00007ff8`be24526e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
0000009c`0957cb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`be24526e


STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8010608e595 - nt!MiDuplicateCloneLeaf+39
[ fa:a9 ]
fffff80106095bda-fffff80106095bdb 2 bytes - nt!MiCloneReserveVadCommit+62 (+0x7645)
[ 80 f6:00 96 ]
fffff80106095c63-fffff80106095c64 2 bytes - nt!MiCloneReserveVadCommit+eb (+0x89)
[ 80 f6:00 96 ]
fffff8010609b53f-fffff8010609b540 2 bytes - nt!MiFlushDirtyBitsToPfn+73 (+0x58dc)
[ 80 f6:00 96 ]
fffff8010609b598-fffff8010609b599 2 bytes - nt!MiFlushDirtyBitsToPfn+cc (+0x59)
[ 80 f6:00 96 ]
fffff8010609b67f - nt!MiFlushDirtyBitsToPfn+1b3 (+0xe7)
[ fa:a9 ]
fffff801060a0f3c-fffff801060a0f3d 2 bytes - nt!MiExchangeWsle+54 (+0x58bd)
[ 80 f6:00 96 ]
fffff801060a0f83 - nt!MiExchangeWsle+9b (+0x47)
[ fa:a9 ]
fffff801060a1277 - nt!MiAllocateContiguousMemory+227 (+0x2f4)
[ fa:a9 ]
fffff801060a12ab-fffff801060a12ac 2 bytes - nt!MiAllocateContiguousMemory+25b (+0x34)
[ 80 f6:00 96 ]
fffff801060a1631-fffff801060a1632 2 bytes - nt!MmUnmapIoSpace+71 (+0x386)
[ 80 f6:00 96 ]
fffff801060a1704-fffff801060a1705 2 bytes - nt!MiZeroAndFlushPtes+40 (+0xd3)
[ 80 f6:00 96 ]
fffff801060a1816-fffff801060a1817 2 bytes - nt!MiZeroAndFlushPtes+152 (+0x112)
[ 80 f6:00 96 ]
fffff801060a1a15 - nt!MiMapContiguousMemory+115 (+0x1ff)
[ fa:a9 ]
fffff801060a1a5a-fffff801060a1a5b 2 bytes - nt!MiMapContiguousMemory+15a (+0x45)
[ 80 f6:00 96 ]
fffff801060a1aa9 - nt!MiMapContiguousMemory+1a9 (+0x4f)
[ fa:a9 ]
fffff801060a26ad-fffff801060a26ae 2 bytes - nt!MiMappingHasIoReferences+d (+0xc04)
[ 80 f6:00 96 ]
fffff801060a29bf - nt!MiDrainZeroLookasides+af (+0x312)
[ fa:a9 ]
fffff801060a2ac3-fffff801060a2ac4 2 bytes - nt!MiSetImageProtection+17 (+0x104)
[ 80 f6:00 96 ]
fffff801060a2b32-fffff801060a2b33 2 bytes - nt!MiRemoveImagePageFromSystemWorkingSet+46 (+0x6f)
[ 80 f6:00 96 ]
fffff801060a2c62-fffff801060a2c63 2 bytes - nt!MiSetSystemCodeProtection+52 (+0x130)
[ 80 f6:00 96 ]
fffff801060a2d64-fffff801060a2d66 3 bytes - nt!MiSetSystemCodeProtection+154 (+0x102)
[ 40 fb f6:00 4b 96 ]
fffff801060a2d7a - nt!MiSetSystemCodeProtection+16a (+0x16)
[ fa:a9 ]
fffff801060a2fc9-fffff801060a2fcb 3 bytes - nt!MiSetSystemCodeProtection+3b9 (+0x24f)
[ 40 fb f6:00 4b 96 ]
fffff801060a2ffc - nt!MiSetSystemCodeProtection+3ec (+0x33)
[ fa:a9 ]
fffff801060a304e-fffff801060a304f 2 bytes - nt!MiSetSystemCodeProtection+43e (+0x52)
[ 80 f6:00 96 ]
fffff801060a307b-fffff801060a307e 4 bytes - nt!MiSetSystemCodeProtection+46b (+0x2d)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801060a308d-fffff801060a3091 5 bytes - nt!MiSetSystemCodeProtection+47d (+0x12)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801060a3199-fffff801060a319a 2 bytes - nt!MiMoveValidWsle+8d (+0x10c)
[ 80 f6:00 96 ]
fffff801060a31c3 - nt!MiMoveValidWsle+b7 (+0x2a)
[ fa:a9 ]
fffff801060a3456-fffff801060a3457 2 bytes - nt!MiMakeDriverPagesPrivate+52 (+0x293)
[ 80 f6:00 96 ]
fffff801060a3554 - nt!MiMakeDriverPagesPrivate+150 (+0xfe)
[ fa:a9 ]
fffff801060a35c3 - nt!MiMakeDriverPagesPrivate+1bf (+0x6f)
[ fa:a9 ]
fffff801060a35e6 - nt!MiMakeDriverPagesPrivate+1e2 (+0x23)
[ fa:a9 ]
fffff801060a3687 - nt!MiMakeDriverPagesPrivate+283 (+0xa1)
[ fa:a9 ]
fffff801060a37b3 - nt!MiMakeDriverPagesPrivate+3af (+0x12c)
[ fa:a9 ]
fffff801060a37fd - nt!MiMakeDriverPagesPrivate+3f9 (+0x4a)
[ fa:a9 ]
fffff801060a38d0 - nt!MiTradeActivePage+5c (+0xd3)
[ fa:a9 ]
fffff801060a3949-fffff801060a394a 2 bytes - nt!MiTradeActivePage+d5 (+0x79)
[ 80 f6:00 96 ]
fffff801060a3c0c - nt!MiGetTopLevelPfn+5c (+0x2c3)
[ fa:a9 ]
fffff801060a4614 - nt!MiFindContiguousPages+214 (+0xa08)
[ fa:a9 ]
fffff801060a4903 - nt!MiPfnsWorthTrying+73 (+0x2ef)
[ fa:a9 ]
fffff801060a4a8c - nt!MiPfnsWorthTrying+1fc (+0x189)
[ fa:a9 ]
fffff801060a4ed5 - nt!MiAllocateMostlyContiguous+245 (+0x449)
[ fa:a9 ]
fffff801060a4fea - nt!MiAllocateMostlyContiguous+35a (+0x115)
[ fa:a9 ]
fffff801060a55d4 - nt!MiActivePageClaimCandidate+34 (+0x5ea)
[ fa:a9 ]
fffff801060a5709-fffff801060a570b 3 bytes - nt!MiActivePageClaimCandidate+169 (+0x135)
[ 40 fb f6:00 4b 96 ]
fffff801060a575c-fffff801060a575d 2 bytes - nt!MiActivePageClaimCandidate+1bc (+0x53)
[ 80 f6:00 96 ]
fffff801060a5772-fffff801060a5773 2 bytes - nt!MiActivePageClaimCandidate+1d2 (+0x16)
[ ff f6:7f 96 ]
fffff801060a58de-fffff801060a58e2 5 bytes - nt!MiActivePageClaimCandidate+33e (+0x16c)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
fffff801062d8387-fffff801062d8389 3 bytes - nt!ExFreePoolWithTag+387
[ 40 fb f6:00 4b 96 ]
fffff801062d883d-fffff801062d883e 2 bytes - nt!ExFreePoolWithTag+83d (+0x4b6)
[ 80 f6:00 96 ]
fffff801062d9c85-fffff801062d9c87 3 bytes - nt!ExDeferredFreePool+4e5 (+0x1448)
[ 40 fb f6:00 4b 96 ]
fffff801062d9cba - nt!ExDeferredFreePool+51a (+0x35)
[ fa:a9 ]
fffff801062e1f30-fffff801062e1f31 2 bytes - nt!_guard_dispatch_icall_fptr
[ 70 37:b0 ca ]
fffff80106459491 - nt!MmDuplicateMemory+231
[ fa:a9 ]
fffff801064594e9 - nt!MmDuplicateMemory+289 (+0x58)
[ fa:a9 ]
fffff8010645956e - nt!MmDuplicateMemory+30e (+0x85)
[ fa:a9 ]
fffff80106459799 - nt!MmDuplicateMemory+539 (+0x22b)
[ fa:a9 ]
fffff80106459e20-fffff80106459e21 2 bytes - nt!MiMarkKernelPageTablePages+c (+0x687)
[ 80 f6:00 96 ]
fffff80106459e71-fffff80106459e72 2 bytes - nt!MiMarkKernelPageTablePages+5d (+0x51)
[ 00 f7:80 96 ]
fffff8010645a371 - nt!MmMarkHiberPhase+71 (+0x500)
[ fa:a9 ]
fffff8010645a388 - nt!MmMarkHiberPhase+88 (+0x17)
[ fa:a9 ]
fffff8010645a97b - nt!MiMarkHiberNotCachedPages+2b (+0x5f3)
[ fa:a9 ]
fffff8010645aa93 - nt!MiMarkNonPagedHiberPhasePages+67 (+0x118)
[ fa:a9 ]
fffff8010645ab5d-fffff8010645ab5e 2 bytes - nt!MiMarkKernelPageTablesHelper+3d (+0xca)
[ 80 f6:00 96 ]
fffff8010645ae0c-fffff8010645ae0d 2 bytes - nt!MiEnumerateKernelLeafPtes+10 (+0x2af)
[ 80 f6:00 96 ]
fffff8010645ae16-fffff8010645ae17 2 bytes - nt!MiEnumerateKernelLeafPtes+1a (+0x0a)
[ 00 f7:80 96 ]
fffff8010645d64a-fffff8010645d64b 2 bytes - nt!MmInitializeProcessor+3a (+0x2834)
[ 80 f6:00 96 ]
fffff80106461d1c - nt! ?? ::OKHAJAOM::`string'+28ac (+0x46d2)
[ fa:a9 ]
fffff80106461da4 - nt! ?? ::OKHAJAOM::`string'+2934 (+0x88)
[ fa:a9 ]
fffff80106461e4c - nt! ?? ::OKHAJAOM::`string'+29dc (+0xa8)
[ fa:a9 ]
fffff80106461f56 - nt! ?? ::OKHAJAOM::`string'+2ae6 (+0x10a)
[ fa:a9 ]
fffff8010646a55f - nt!MmFreeIndependentPages+53
[ fa:a9 ]
fffff801064c2d5d - nt!MmChangeImageProtection+159 (+0x587fe)
[ fa:a9 ]
fffff801064c2f64 - nt!MiAllocateDriverPage+9c (+0x207)
[ fa:a9 ]
fffff801064c2fcf - nt!MiValidateImagePfn+3b (+0x6b)
[ fa:a9 ]
fffff801064c3018-fffff801064c3019 2 bytes - nt!MiValidateImagePfn+84 (+0x49)
[ 80 f6:00 96 ]
fffff801064c4476-fffff801064c447a 5 bytes - nt!MiInitializeWorkingSetList+f2 (+0x145e)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801064c44ba - nt!MiInitializeWorkingSetList+136 (+0x44)
[ fa:a9 ]
fffff801064c450d - nt!MiInitializeWorkingSetList+189 (+0x53)
[ fa:a9 ]
fffff801064eafd9 - nt!PfpPfnPrioRequest+99 (+0x26acc)
[ fa:a9 ]
fffff801064eb018 - nt!PfpPfnPrioRequest+d8 (+0x3f)
[ fa:a9 ]
fffff801065024be - nt!MiReleaseProcessReferenceToSessionDataPage+a2 (+0x174a6)
[ fa:a9 ]
fffff801065118a4-fffff801065118a6 3 bytes - nt!MiMapViewOfDataSection+c44 (+0xf3e6)
[ 40 fb f6:00 4b 96 ]
fffff801065118e9-fffff801065118ed 5 bytes - nt!MiMapViewOfDataSection+c89 (+0x45)
[ d7 be 7d fb f6:c7 92 25 4b 96 ]
fffff80106512e9d-fffff80106512e9e 2 bytes - nt!MiReturnPageTablePageCommitment+16d (+0x15b4)
[ 80 f6:00 96 ]
fffff80106514c73 - nt!MiPfPrepareSequentialReadList+2e3 (+0x1dd6)
[ fa:a9 ]
fffff80106517a73 - nt!MiRelocateImagePfn+73 (+0x2e00)
[ fa:a9 ]
fffff80106517a7f-fffff80106517a80 2 bytes - nt!MiRelocateImagePfn+7f (+0x0c)
[ 80 f6:00 96 ]
fffff80106517a9a-fffff80106517a9b 2 bytes - nt!MiRelocateImagePfn+9a (+0x1b)
[ ff f6:7f 96 ]
fffff8010652324f - nt!MiPfPrepareReadList+4cf (+0xb7b5)
[ fa:a9 ]
fffff801065433a7 - nt!MiCreateImageFileMap+ff (+0x20158)
[ fa:a9 ]
fffff8010654705b-fffff8010654705c 2 bytes - nt!MiPrefetchDriverPages+23 (+0x3cb4)
[ 80 f6:00 96 ]
fffff801065478d2 - nt!MmCreateProcessAddressSpace+1de (+0x877)
[ fa:a9 ]
fffff80106547964-fffff80106547965 2 bytes - nt!MmCreateProcessAddressSpace+270 (+0x92)
[ 80 f6:00 96 ]
fffff80106547a88 - nt!MmCreateProcessAddressSpace+394 (+0x124)
[ fa:a9 ]
fffff8010657148a-fffff8010657148b 2 bytes - nt!MiFreeDriverInitialization+5e (+0x29a02)
[ 80 f6:00 96 ]
fffff8010657165c - nt!MiFreeInitializationCode+150 (+0x1d2)
[ fa:a9 ]
fffff8010657c2ed-fffff8010657c2ee 2 bytes - nt!MiSelectSystemImageAddress+25 (+0xac91)
[ 80 f6:00 96 ]
fffff8010658400e-fffff8010658400f 2 bytes - nt!MmAllocateIndependentPages+6e (+0x7d21)
[ 80 f6:00 96 ]
fffff801065840b5 - nt!MmAllocateIndependentPages+115 (+0xa7)
[ fa:a9 ]
fffff8010659ea7c-fffff8010659ea7d 2 bytes - nt!MmAllocateMappingAddress+94 (+0x1a9c7)
[ 80 f6:00 96 ]
fffff801065a40f9-fffff801065a40fd 5 bytes - nt!MiDereferenceSessionFinal+1a9 (+0x567d)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801065acfea-fffff801065acfec 3 bytes - nt!MiInitializeDynamicBitmap+fe (+0x8ef1)
[ 40 fb f6:00 4b 96 ]
fffff801065ad02e-fffff801065ad031 4 bytes - nt!MiInitializeDynamicBitmap+142 (+0x44)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801065ad040-fffff801065ad044 5 bytes - nt!MiInitializeDynamicBitmap+154 (+0x12)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801065ad12c-fffff801065ad12d 2 bytes - nt!MiInitializeDynamicBitmap+240 (+0xec)
[ 80 f6:00 96 ]
fffff801065ad16f - nt!MiInitializeDynamicBitmap+283 (+0x43)
[ fa:a9 ]
fffff801065ad5dc-fffff801065ad5dd 2 bytes - nt!MiSessionCreateInternal+12c (+0x46d)
[ 80 f6:00 96 ]
fffff801065ad83b - nt!MiMapNewSession+c3 (+0x25f)
[ fa:a9 ]
fffff801065ad84d-fffff801065ad84f 3 bytes - nt!MiMapNewSession+d5 (+0x12)
[ 40 fb f6:00 4b 96 ]
fffff801065ad856-fffff801065ad859 4 bytes - nt!MiMapNewSession+de (+0x09)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801065ad8ec-fffff801065ad8f0 5 bytes - nt!MiMapNewSession+174 (+0x96)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801065ad951-fffff801065ad954 4 bytes - nt!MiMapNewSession+1d9 (+0x65)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801065ad968 - nt!MiMapNewSession+1f0 (+0x17)
[ fa:a9 ]
fffff801065ad97a-fffff801065ad97c 3 bytes - nt!MiMapNewSession+202 (+0x12)
[ 40 fb f6:00 4b 96 ]
fffff801065ad9ca - nt!MiMapNewSession+252 (+0x50)
[ fa:a9 ]
fffff801065ada30-fffff801065ada32 3 bytes - nt!MiMapNewSession+2b8 (+0x66)
[ 40 fb f6:00 4b 96 ]
fffff801065ada69-fffff801065ada6c 4 bytes - nt!MiMapNewSession+2f1 (+0x39)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801065ada7e-fffff801065ada82 5 bytes - nt!MiMapNewSession+306 (+0x15)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801065b7135-fffff801065b7136 2 bytes - nt!MiReleaseDriverPtes+41 (+0x96b7)
[ 80 f6:00 96 ]
fffff801065b7229-fffff801065b722a 2 bytes - nt!MiReleaseDriverPtes+135 (+0xf4)
[ 80 f6:00 96 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
3870 errors : !nt (fffff8010608e595-fffff801066f32d2)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: LARGE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

BUCKET_ID: MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE

TARGET_TIME: 2016-10-17T19:59:29.000Z

OSBUILD: 14393

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2016-10-05 10:17:53

BUILDDATESTAMP_STR: 161004-2338

BUILDLAB_STR: rs1_release_inmarket

BUILDOSVER_STR: 10.0.14393.321.amd64fre.rs1_release_inmarket.161004-2338

ANALYSIS_SESSION_ELAPSED_TIME: cffb

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:memory_corruption_large

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000326, physical page number
Arg3: 0000000007bd23f0, zero
Arg4: ffffc801e2c02000, zero

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 14393.321.amd64fre.rs1_release_inmarket.161004-2338

SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME: Z97X-Gaming 5

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: To be filled by O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: F7

BIOS_DATE: 09/18/2015

BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT: Z97X-Gaming 5

BASEBOARD_VERSION: x.x

DUMP_TYPE: 1

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 326

BUGCHECK_P3: 7bd23f0

BUGCHECK_P4: ffffc801e2c02000

BUGCHECK_STR: 0x12B_c00002c4_StCtDecompressFailed

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)

DEFAULT_BUCKET_ID: CODE_CORRUPTION

PROCESS_NAME: MemCompression

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: SARADOC

ANALYSIS_SESSION_TIME: 10-17-2016 21:03:34.0326

ANALYSIS_VERSION: 10.0.10586.567 amd64fre

LAST_CONTROL_TRANSFER: from fffff801062a65d7 to fffff801061d72c0

STACK_TEXT:
ffffc801`e2a2f4f8 fffff801`062a65d7 : 00000000`0000012b ffffffff`c00002c4 00000000`00000326 00000000`07bd23f0 : nt!KeBugCheckEx
ffffc801`e2a2f500 fffff801`0622e944 : 00000000`00000200 00000000`00000003 00000000`07bd23f0 ffffc801`e2c02000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x117
ffffc801`e2a2f550 fffff801`06197413 : 00000000`00000000 ffffb786`1cd28050 00000000`00000000 00000000`000023f0 : nt! ?? ::FNODOBFM::`string'+0x484b4
ffffc801`e2a2f630 fffff801`061977a1 : 00000000`00000001 00000000`000005c4 00000000`00000001 ffffc801`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
ffffc801`e2a2f680 fffff801`061978e0 : 00000000`ffffffff ffffb786`24994000 ffffc801`e2a2f768 ffffb786`1ecc9800 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
ffffc801`e2a2f720 fffff801`06198702 : 00000000`00000027 ffffb786`1ecc9800 fffff801`063b0400 ffffb786`1ecc9800 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98
ffffc801`e2a2f7e0 fffff801`06198849 : ffffb786`1cd28000 ffffc801`e2a2f8f0 fffff801`06198828 fffff801`06198828 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
ffffc801`e2a2f830 fffff801`060e3d55 : ffffb786`20314080 ffffc801`e2a2f8f0 ffffb786`2133c900 fffff801`06160558 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffc801`e2a2f860 fffff801`06191a6d : 00000000`00000003 ffffb786`24994000 ffffb786`1cd28000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffc801`e2a2f8b0 fffff801`06194e70 : ffffc801`e2a2f9b0 ffffc801`e2a2faf0 ffffb786`1cd28000 fffff801`06191c46 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffc801`e2a2f980 fffff801`06194b5b : ffffb786`1cd28000 ffffb786`1ecc9800 fffff801`06447a40 ffffc801`e2a2faf0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
ffffc801`e2a2f9d0 fffff801`06191903 : 00000000`0000000c ffffb786`2133c9b0 ffffb786`1ecc9800 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffc801`e2a2fa50 fffff801`06198822 : ffffb786`00000001 ffffb786`2133c9b0 ffffc801`00000000 ffffb786`1cd28000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
ffffc801`e2a2fac0 fffff801`06110409 : ffffc801`e2a2fe40 fffff801`062d8301 ffffc801`e2a2fb60 ffffc801`e2a2fb99 : nt!SmPageRead+0x2e
ffffc801`e2a2fb10 fffff801`0611078d : 00000000`00000002 ffffc801`e2a2fe40 ffffb786`2133c8b0 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
ffffc801`e2a2fba0 fffff801`060fe2e0 : 00000000`c0033333 ffffc801`e2a2fe40 00000000`00000004 ffffc801`e2a2fe40 : nt!MiIssueHardFault+0x15d
ffffc801`e2a2fc40 fffff801`061e08fc : ffffb786`20314080 0000009c`0957d410 00000000`00000000 00007ff8`bdf204b0 : nt!MmAccessFault+0xca0
ffffc801`e2a2fe40 00007ff8`be24526e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
0000009c`0957cb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`be24526e


STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8010608e595 - nt!MiDuplicateCloneLeaf+39
[ fa:a9 ]
fffff80106095bda-fffff80106095bdb 2 bytes - nt!MiCloneReserveVadCommit+62 (+0x7645)
[ 80 f6:00 96 ]
fffff80106095c63-fffff80106095c64 2 bytes - nt!MiCloneReserveVadCommit+eb (+0x89)
[ 80 f6:00 96 ]
fffff8010609b53f-fffff8010609b540 2 bytes - nt!MiFlushDirtyBitsToPfn+73 (+0x58dc)
[ 80 f6:00 96 ]
fffff8010609b598-fffff8010609b599 2 bytes - nt!MiFlushDirtyBitsToPfn+cc (+0x59)
[ 80 f6:00 96 ]
fffff8010609b67f - nt!MiFlushDirtyBitsToPfn+1b3 (+0xe7)
[ fa:a9 ]
fffff801060a0f3c-fffff801060a0f3d 2 bytes - nt!MiExchangeWsle+54 (+0x58bd)
[ 80 f6:00 96 ]
fffff801060a0f83 - nt!MiExchangeWsle+9b (+0x47)
[ fa:a9 ]
fffff801060a1277 - nt!MiAllocateContiguousMemory+227 (+0x2f4)
[ fa:a9 ]
fffff801060a12ab-fffff801060a12ac 2 bytes - nt!MiAllocateContiguousMemory+25b (+0x34)
[ 80 f6:00 96 ]
fffff801060a1631-fffff801060a1632 2 bytes - nt!MmUnmapIoSpace+71 (+0x386)
[ 80 f6:00 96 ]
fffff801060a1704-fffff801060a1705 2 bytes - nt!MiZeroAndFlushPtes+40 (+0xd3)
[ 80 f6:00 96 ]
fffff801060a1816-fffff801060a1817 2 bytes - nt!MiZeroAndFlushPtes+152 (+0x112)
[ 80 f6:00 96 ]
fffff801060a1a15 - nt!MiMapContiguousMemory+115 (+0x1ff)
[ fa:a9 ]
fffff801060a1a5a-fffff801060a1a5b 2 bytes - nt!MiMapContiguousMemory+15a (+0x45)
[ 80 f6:00 96 ]
fffff801060a1aa9 - nt!MiMapContiguousMemory+1a9 (+0x4f)
[ fa:a9 ]
fffff801060a26ad-fffff801060a26ae 2 bytes - nt!MiMappingHasIoReferences+d (+0xc04)
[ 80 f6:00 96 ]
fffff801060a29bf - nt!MiDrainZeroLookasides+af (+0x312)
[ fa:a9 ]
fffff801060a2ac3-fffff801060a2ac4 2 bytes - nt!MiSetImageProtection+17 (+0x104)
[ 80 f6:00 96 ]
fffff801060a2b32-fffff801060a2b33 2 bytes - nt!MiRemoveImagePageFromSystemWorkingSet+46 (+0x6f)
[ 80 f6:00 96 ]
fffff801060a2c62-fffff801060a2c63 2 bytes - nt!MiSetSystemCodeProtection+52 (+0x130)
[ 80 f6:00 96 ]
fffff801060a2d64-fffff801060a2d66 3 bytes - nt!MiSetSystemCodeProtection+154 (+0x102)
[ 40 fb f6:00 4b 96 ]
fffff801060a2d7a - nt!MiSetSystemCodeProtection+16a (+0x16)
[ fa:a9 ]
fffff801060a2fc9-fffff801060a2fcb 3 bytes - nt!MiSetSystemCodeProtection+3b9 (+0x24f)
[ 40 fb f6:00 4b 96 ]
fffff801060a2ffc - nt!MiSetSystemCodeProtection+3ec (+0x33)
[ fa:a9 ]
fffff801060a304e-fffff801060a304f 2 bytes - nt!MiSetSystemCodeProtection+43e (+0x52)
[ 80 f6:00 96 ]
fffff801060a307b-fffff801060a307e 4 bytes - nt!MiSetSystemCodeProtection+46b (+0x2d)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801060a308d-fffff801060a3091 5 bytes - nt!MiSetSystemCodeProtection+47d (+0x12)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801060a3199-fffff801060a319a 2 bytes - nt!MiMoveValidWsle+8d (+0x10c)
[ 80 f6:00 96 ]
fffff801060a31c3 - nt!MiMoveValidWsle+b7 (+0x2a)
[ fa:a9 ]
fffff801060a3456-fffff801060a3457 2 bytes - nt!MiMakeDriverPagesPrivate+52 (+0x293)
[ 80 f6:00 96 ]
fffff801060a3554 - nt!MiMakeDriverPagesPrivate+150 (+0xfe)
[ fa:a9 ]
fffff801060a35c3 - nt!MiMakeDriverPagesPrivate+1bf (+0x6f)
[ fa:a9 ]
fffff801060a35e6 - nt!MiMakeDriverPagesPrivate+1e2 (+0x23)
[ fa:a9 ]
fffff801060a3687 - nt!MiMakeDriverPagesPrivate+283 (+0xa1)
[ fa:a9 ]
fffff801060a37b3 - nt!MiMakeDriverPagesPrivate+3af (+0x12c)
[ fa:a9 ]
fffff801060a37fd - nt!MiMakeDriverPagesPrivate+3f9 (+0x4a)
[ fa:a9 ]
fffff801060a38d0 - nt!MiTradeActivePage+5c (+0xd3)
[ fa:a9 ]
fffff801060a3949-fffff801060a394a 2 bytes - nt!MiTradeActivePage+d5 (+0x79)
[ 80 f6:00 96 ]
fffff801060a3c0c - nt!MiGetTopLevelPfn+5c (+0x2c3)
[ fa:a9 ]
fffff801060a4614 - nt!MiFindContiguousPages+214 (+0xa08)
[ fa:a9 ]
fffff801060a4903 - nt!MiPfnsWorthTrying+73 (+0x2ef)
[ fa:a9 ]
fffff801060a4a8c - nt!MiPfnsWorthTrying+1fc (+0x189)
[ fa:a9 ]
fffff801060a4ed5 - nt!MiAllocateMostlyContiguous+245 (+0x449)
[ fa:a9 ]
fffff801060a4fea - nt!MiAllocateMostlyContiguous+35a (+0x115)
[ fa:a9 ]
fffff801060a55d4 - nt!MiActivePageClaimCandidate+34 (+0x5ea)
[ fa:a9 ]
fffff801060a5709-fffff801060a570b 3 bytes - nt!MiActivePageClaimCandidate+169 (+0x135)
[ 40 fb f6:00 4b 96 ]
fffff801060a575c-fffff801060a575d 2 bytes - nt!MiActivePageClaimCandidate+1bc (+0x53)
[ 80 f6:00 96 ]
fffff801060a5772-fffff801060a5773 2 bytes - nt!MiActivePageClaimCandidate+1d2 (+0x16)
[ ff f6:7f 96 ]
fffff801060a58de-fffff801060a58e2 5 bytes - nt!MiActivePageClaimCandidate+33e (+0x16c)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
fffff801062d8387-fffff801062d8389 3 bytes - nt!ExFreePoolWithTag+387
[ 40 fb f6:00 4b 96 ]
fffff801062d883d-fffff801062d883e 2 bytes - nt!ExFreePoolWithTag+83d (+0x4b6)
[ 80 f6:00 96 ]
fffff801062d9c85-fffff801062d9c87 3 bytes - nt!ExDeferredFreePool+4e5 (+0x1448)
[ 40 fb f6:00 4b 96 ]
fffff801062d9cba - nt!ExDeferredFreePool+51a (+0x35)
[ fa:a9 ]
fffff801062e1f30-fffff801062e1f31 2 bytes - nt!_guard_dispatch_icall_fptr
[ 70 37:b0 ca ]
fffff80106459491 - nt!MmDuplicateMemory+231
[ fa:a9 ]
fffff801064594e9 - nt!MmDuplicateMemory+289 (+0x58)
[ fa:a9 ]
fffff8010645956e - nt!MmDuplicateMemory+30e (+0x85)
[ fa:a9 ]
fffff80106459799 - nt!MmDuplicateMemory+539 (+0x22b)
[ fa:a9 ]
fffff80106459e20-fffff80106459e21 2 bytes - nt!MiMarkKernelPageTablePages+c (+0x687)
[ 80 f6:00 96 ]
fffff80106459e71-fffff80106459e72 2 bytes - nt!MiMarkKernelPageTablePages+5d (+0x51)
[ 00 f7:80 96 ]
fffff8010645a371 - nt!MmMarkHiberPhase+71 (+0x500)
[ fa:a9 ]
fffff8010645a388 - nt!MmMarkHiberPhase+88 (+0x17)
[ fa:a9 ]
fffff8010645a97b - nt!MiMarkHiberNotCachedPages+2b (+0x5f3)
[ fa:a9 ]
fffff8010645aa93 - nt!MiMarkNonPagedHiberPhasePages+67 (+0x118)
[ fa:a9 ]
fffff8010645ab5d-fffff8010645ab5e 2 bytes - nt!MiMarkKernelPageTablesHelper+3d (+0xca)
[ 80 f6:00 96 ]
fffff8010645ae0c-fffff8010645ae0d 2 bytes - nt!MiEnumerateKernelLeafPtes+10 (+0x2af)
[ 80 f6:00 96 ]
fffff8010645ae16-fffff8010645ae17 2 bytes - nt!MiEnumerateKernelLeafPtes+1a (+0x0a)
[ 00 f7:80 96 ]
fffff8010645d64a-fffff8010645d64b 2 bytes - nt!MmInitializeProcessor+3a (+0x2834)
[ 80 f6:00 96 ]
fffff80106461d1c - nt! ?? ::OKHAJAOM::`string'+28ac (+0x46d2)
[ fa:a9 ]
fffff80106461da4 - nt! ?? ::OKHAJAOM::`string'+2934 (+0x88)
[ fa:a9 ]
fffff80106461e4c - nt! ?? ::OKHAJAOM::`string'+29dc (+0xa8)
[ fa:a9 ]
fffff80106461f56 - nt! ?? ::OKHAJAOM::`string'+2ae6 (+0x10a)
[ fa:a9 ]
fffff8010646a55f - nt!MmFreeIndependentPages+53
[ fa:a9 ]
fffff801064c2d5d - nt!MmChangeImageProtection+159 (+0x587fe)
[ fa:a9 ]
fffff801064c2f64 - nt!MiAllocateDriverPage+9c (+0x207)
[ fa:a9 ]
fffff801064c2fcf - nt!MiValidateImagePfn+3b (+0x6b)
[ fa:a9 ]
fffff801064c3018-fffff801064c3019 2 bytes - nt!MiValidateImagePfn+84 (+0x49)
[ 80 f6:00 96 ]
fffff801064c4476-fffff801064c447a 5 bytes - nt!MiInitializeWorkingSetList+f2 (+0x145e)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801064c44ba - nt!MiInitializeWorkingSetList+136 (+0x44)
[ fa:a9 ]
fffff801064c450d - nt!MiInitializeWorkingSetList+189 (+0x53)
[ fa:a9 ]
fffff801064eafd9 - nt!PfpPfnPrioRequest+99 (+0x26acc)
[ fa:a9 ]
fffff801064eb018 - nt!PfpPfnPrioRequest+d8 (+0x3f)
[ fa:a9 ]
fffff801065024be - nt!MiReleaseProcessReferenceToSessionDataPage+a2 (+0x174a6)
[ fa:a9 ]
fffff801065118a4-fffff801065118a6 3 bytes - nt!MiMapViewOfDataSection+c44 (+0xf3e6)
[ 40 fb f6:00 4b 96 ]
fffff801065118e9-fffff801065118ed 5 bytes - nt!MiMapViewOfDataSection+c89 (+0x45)
[ d7 be 7d fb f6:c7 92 25 4b 96 ]
fffff80106512e9d-fffff80106512e9e 2 bytes - nt!MiReturnPageTablePageCommitment+16d (+0x15b4)
[ 80 f6:00 96 ]
fffff80106514c73 - nt!MiPfPrepareSequentialReadList+2e3 (+0x1dd6)
[ fa:a9 ]
fffff80106517a73 - nt!MiRelocateImagePfn+73 (+0x2e00)
[ fa:a9 ]
fffff80106517a7f-fffff80106517a80 2 bytes - nt!MiRelocateImagePfn+7f (+0x0c)
[ 80 f6:00 96 ]
fffff80106517a9a-fffff80106517a9b 2 bytes - nt!MiRelocateImagePfn+9a (+0x1b)
[ ff f6:7f 96 ]
fffff8010652324f - nt!MiPfPrepareReadList+4cf (+0xb7b5)
[ fa:a9 ]
fffff801065433a7 - nt!MiCreateImageFileMap+ff (+0x20158)
[ fa:a9 ]
fffff8010654705b-fffff8010654705c 2 bytes - nt!MiPrefetchDriverPages+23 (+0x3cb4)
[ 80 f6:00 96 ]
fffff801065478d2 - nt!MmCreateProcessAddressSpace+1de (+0x877)
[ fa:a9 ]
fffff80106547964-fffff80106547965 2 bytes - nt!MmCreateProcessAddressSpace+270 (+0x92)
[ 80 f6:00 96 ]
fffff80106547a88 - nt!MmCreateProcessAddressSpace+394 (+0x124)
[ fa:a9 ]
fffff8010657148a-fffff8010657148b 2 bytes - nt!MiFreeDriverInitialization+5e (+0x29a02)
[ 80 f6:00 96 ]
fffff8010657165c - nt!MiFreeInitializationCode+150 (+0x1d2)
[ fa:a9 ]
fffff8010657c2ed-fffff8010657c2ee 2 bytes - nt!MiSelectSystemImageAddress+25 (+0xac91)
[ 80 f6:00 96 ]
fffff8010658400e-fffff8010658400f 2 bytes - nt!MmAllocateIndependentPages+6e (+0x7d21)
[ 80 f6:00 96 ]
fffff801065840b5 - nt!MmAllocateIndependentPages+115 (+0xa7)
[ fa:a9 ]
fffff8010659ea7c-fffff8010659ea7d 2 bytes - nt!MmAllocateMappingAddress+94 (+0x1a9c7)
[ 80 f6:00 96 ]
fffff801065a40f9-fffff801065a40fd 5 bytes - nt!MiDereferenceSessionFinal+1a9 (+0x567d)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801065acfea-fffff801065acfec 3 bytes - nt!MiInitializeDynamicBitmap+fe (+0x8ef1)
[ 40 fb f6:00 4b 96 ]
fffff801065ad02e-fffff801065ad031 4 bytes - nt!MiInitializeDynamicBitmap+142 (+0x44)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801065ad040-fffff801065ad044 5 bytes - nt!MiInitializeDynamicBitmap+154 (+0x12)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801065ad12c-fffff801065ad12d 2 bytes - nt!MiInitializeDynamicBitmap+240 (+0xec)
[ 80 f6:00 96 ]
fffff801065ad16f - nt!MiInitializeDynamicBitmap+283 (+0x43)
[ fa:a9 ]
fffff801065ad5dc-fffff801065ad5dd 2 bytes - nt!MiSessionCreateInternal+12c (+0x46d)
[ 80 f6:00 96 ]
fffff801065ad83b - nt!MiMapNewSession+c3 (+0x25f)
[ fa:a9 ]
fffff801065ad84d-fffff801065ad84f 3 bytes - nt!MiMapNewSession+d5 (+0x12)
[ 40 fb f6:00 4b 96 ]
fffff801065ad856-fffff801065ad859 4 bytes - nt!MiMapNewSession+de (+0x09)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801065ad8ec-fffff801065ad8f0 5 bytes - nt!MiMapNewSession+174 (+0x96)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801065ad951-fffff801065ad954 4 bytes - nt!MiMapNewSession+1d9 (+0x65)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801065ad968 - nt!MiMapNewSession+1f0 (+0x17)
[ fa:a9 ]
fffff801065ad97a-fffff801065ad97c 3 bytes - nt!MiMapNewSession+202 (+0x12)
[ 40 fb f6:00 4b 96 ]
fffff801065ad9ca - nt!MiMapNewSession+252 (+0x50)
[ fa:a9 ]
fffff801065ada30-fffff801065ada32 3 bytes - nt!MiMapNewSession+2b8 (+0x66)
[ 40 fb f6:00 4b 96 ]
fffff801065ada69-fffff801065ada6c 4 bytes - nt!MiMapNewSession+2f1 (+0x39)
[ a0 7d fb f6:80 25 4b 96 ]
fffff801065ada7e-fffff801065ada82 5 bytes - nt!MiMapNewSession+306 (+0x15)
[ d0 be 7d fb f6:c0 92 25 4b 96 ]
fffff801065b7135-fffff801065b7136 2 bytes - nt!MiReleaseDriverPtes+41 (+0x96b7)
[ 80 f6:00 96 ]
fffff801065b7229-fffff801065b722a 2 bytes - nt!MiReleaseDriverPtes+135 (+0xf4)
[ 80 f6:00 96 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
3870 errors : !nt (fffff8010608e595-fffff801066f32d2)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: LARGE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

BUCKET_ID: MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE

TARGET_TIME: 2016-10-17T19:59:29.000Z

OSBUILD: 14393

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2016-10-05 10:17:53

BUILDDATESTAMP_STR: 161004-2338

BUILDLAB_STR: rs1_release_inmarket

BUILDOSVER_STR: 10.0.14393.321.amd64fre.rs1_release_inmarket.161004-2338

ANALYSIS_SESSION_ELAPSED_TIME: e5c2

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:memory_corruption_large

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------

Build:
16GB ram
4690k
980ti
250GB 840 evo SSD
650w psu
Windows 10 anniversary.

Any help would be appreciated. I'm not too sure what else to try, other than driver updates, but even then I wouldn't know which driver was out of date or causing the crash.

Thanks in advance.
 
the error code 41792 indicated a corrupted page table entry.
this is part of the virtual memory not the physical memory. IE the single bit error can be in the storage pathway to your c:\pagefile.sys
this means you would want to update your motherboard SATA drivers for your primary and secondary sata controllers, you will want to check your data cables on your sata drives for proper connection. I just unplug them and plug them into the primary sata controller (the slower one directly supported by the CPU chipset) This can also be a bug in the firmware of the solid state device so check for firmware updates.

also, the sata drivers from the motherboard vendor are tied to the bios version. you should make sure you update both the BIOS and the motherboard SATA drivers.

most virus infections of the storage drivers result in more than a single bit corruption but you can run Malwarebytes if you have not already done so. often single bit corruptions can occur by overclocking, so remove any BIOS overclock, and any overclock drivers and see if your problem goes away.

the key point is that all of the bugcheck sub error codes indicate a problem in the storage subsystem (virtual memory) rather than a generic problem in your RAM. You might find the problem will go away if your turn off your system virtual memory, delete your hidden pagefile.sys.
boot into bios, let the solid state drive run its clean up routines for a hour or so, boot back into windows and turn on the virtual memory so your system creates a new pagefile.sys. Note if you don't turn on virtual memory windows will create a page file in RAM and page anyway without using the storage drive. This can be useful to see if the problem goes away. Most of the time you just update the bios, SATA drivers, firmware of ssd, and check the cables for bad connections and the problem just goes away. Switching the data line to a different controller helps to isolate the location of the problem down to various drivers or bugs in sata controller hardware.

you can also get this error with certain cache bugs in firmware or hard coded circuits in hard drives. Sometimes you can turn off lazy writing on the drive to reduce the chances of hitting the error if you can not update the firmware or BIOS.






 

luminant

Honorable
Jul 16, 2013
42
0
10,540
2


I've never actually touched the voltage settings before in the BIOS, kept everything stock. I could give it a go, but I would be surprised, the BSOD has happened before when trying to restart my PC, and when my PC has been idle. The last crash happened when I was watching a DVD, so there hasn't been much load on any part of the PC.
 

luminant

Honorable
Jul 16, 2013
42
0
10,540
2
Had another BSOD, this time the error came up as "FAULTY_HARDWARE_CORRUPTED_PAGE". In the memory dump it also listed a memory corruption. I'll add the second log to the main post.
 

luminant

Honorable
Jul 16, 2013
42
0
10,540
2


It's running at 1600mhz, the default speed its set at. Not made any changes to it through XMP profile or otherwise
 

luminant

Honorable
Jul 16, 2013
42
0
10,540
2
I got another crash about a week after the last. Most of the dump was the same but I noticed the arguments were different:

Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 0000000004346000
Arg3: 0000000000011ade
Arg4: ffffdb0010804310
 

Mr_Paradox

Commendable
Dec 27, 2016
1
0
1,510
0


Did you manage to fix this issue because im having very similar issues where it will BSOD at random points when gaming then sometimes on start up and it will cycle errors on start up and the mini dump says that its Memory Corruption one bit large , i dont know whether i need to buy new ram
 
the error code 41792 indicated a corrupted page table entry.
this is part of the virtual memory not the physical memory. IE the single bit error can be in the storage pathway to your c:\pagefile.sys
this means you would want to update your motherboard SATA drivers for your primary and secondary sata controllers, you will want to check your data cables on your sata drives for proper connection. I just unplug them and plug them into the primary sata controller (the slower one directly supported by the CPU chipset) This can also be a bug in the firmware of the solid state device so check for firmware updates.

also, the sata drivers from the motherboard vendor are tied to the bios version. you should make sure you update both the BIOS and the motherboard SATA drivers.

most virus infections of the storage drivers result in more than a single bit corruption but you can run Malwarebytes if you have not already done so. often single bit corruptions can occur by overclocking, so remove any BIOS overclock, and any overclock drivers and see if your problem goes away.

the key point is that all of the bugcheck sub error codes indicate a problem in the storage subsystem (virtual memory) rather than a generic problem in your RAM. You might find the problem will go away if your turn off your system virtual memory, delete your hidden pagefile.sys.
boot into bios, let the solid state drive run its clean up routines for a hour or so, boot back into windows and turn on the virtual memory so your system creates a new pagefile.sys. Note if you don't turn on virtual memory windows will create a page file in RAM and page anyway without using the storage drive. This can be useful to see if the problem goes away. Most of the time you just update the bios, SATA drivers, firmware of ssd, and check the cables for bad connections and the problem just goes away. Switching the data line to a different controller helps to isolate the location of the problem down to various drivers or bugs in sata controller hardware.

you can also get this error with certain cache bugs in firmware or hard coded circuits in hard drives. Sometimes you can turn off lazy writing on the drive to reduce the chances of hitting the error if you can not update the firmware or BIOS.






 

luminant

Honorable
Jul 16, 2013
42
0
10,540
2


Thank you for the very detailed reply, I'm sure many other people will find it useful in the future. For me the solution was simply checking the SATA connection, it appears one of them became loose (perhaps when transporting my PC from university to home). I've checked my bios and drives firmwares and it appears they are up to date, so I'm assuming it was just a loose SATA connection, particularly as I have not had a BSOD for over a month now.
 

ASK THE COMMUNITY

TRENDING THREADS

Latest posts