Win 10 bad pool heater mavi ekran hatası

İşletim sistemi
Windows 10
Format atmak istemiyorum derseniz şunları yapın:
  • Qualcomm Atheros ağ ve Bluetooth sürücülerinizi güncelleyin. Donanım kimliğini paylaşırsanız daha iyi iyi yardımcı olabiliriz.
  • Sisteminize bağlı bütün USB cihazlarını çıkarın.
  • Avast, Vanguard, Logitech yazılımlarını ve kaldırın.
  • Komut ekranını yönetici olarak çalıştırın ve sfc /scannow komutunu uygulayın. Sonucunda çıkan yazının ekran görüntüsünü paylaşın.
Ama MemTest86'yı mutlaka yapın ve paylaşın.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 0000000000041917
Arg3: 0000000057b3c95c
Arg4: 00000000f4b331d3

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3312

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 69379

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 41917

BUGCHECK_P3: 57b3c95c

BUGCHECK_P4: f4b331d3

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME:  ffffb580cc83b010 -- (.trap 0xffffb580cc83b010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb580cc83b268 rbx=0000000000000000 rcx=ffffb580cf931000
rdx=ffffb580cf931000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80056323ed0 rsp=ffffb580cc83b1a0 rbp=ffffb580cf931000
 r8=0000000007b6e580  r9=0000000000000461 r10=ffffb580cf931ea0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff800`56323ed0 418b00          mov     eax,dword ptr [r8] ds:00000000`07b6e580=????????
Resetting default scope

STACK_TEXT: 
ffffb580`cc83ab28 fffff800`563aba0a     : 00000000`0000001a 00000000`0000003f 00000000`00041917 00000000`57b3c95c : nt!KeBugCheckEx
ffffb580`cc83ab30 fffff800`5627588a     : ffffc585`79c79930 00000000`0000e000 ffffb580`cc83ac80 ffffc585`79c79910 : nt! ?? ::FNODOBFM::`string'+0x4684a
ffffb580`cc83ac00 fffff800`56220fe5     : ffffb580`cc83b010 ffffb580`cc83adc0 fffffa00`0003db70 ffffc585`79c79910 : nt!MiWaitForInPageComplete+0x48a
ffffb580`cc83ad30 fffff800`56283a00     : 00000000`c0033333 ffffb580`cc83b010 00000000`00000000 ffffb580`cc83b010 : nt!MiIssueHardFault+0x1b5
ffffb580`cc83ae10 fffff800`5635f5fc     : 00000006`7b3fab00 00000101`00000000 00000000`00000000 00020019`0000000c : nt!MmAccessFault+0xca0
ffffb580`cc83b010 fffff800`56323ed0     : ffffb580`cf931000 ffffc585`7ba54050 00000000`07b6e580 fffff800`562bf3e4 : nt!KiPageFault+0x13c
ffffb580`cc83b1a0 fffff800`562bf3e4     : 00000000`00001000 fffff800`5645e2e0 ffffb580`cf931000 fffff800`562ed147 : nt!RtlDecompressBufferXpressLz+0x50
ffffb580`cc83b1c0 fffff800`56316a5b     : 00000000`00000002 ffffb580`cf931000 00000000`07b6e580 ffffb580`cf931000 : nt!RtlDecompressBufferEx+0x64
ffffb580`cc83b210 fffff800`563168d3     : 00000000`00000000 ffffc585`7ba54050 00000000`00000000 00000000`0001e580 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x157
ffffb580`cc83b2f0 fffff800`56316c61     : 00000000`00000001 00000000`0000213f 00000000`00000001 ffffb580`00003000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
ffffb580`cc83b340 fffff800`56316da0     : 00000000`ffffffff ffffc585`7cafe000 ffffb580`cc83b428 ffffc585`7c843a50 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
ffffb580`cc83b3e0 fffff800`56317bc2     : fffffa7d`00000000 ffffc585`7c843a50 ffffc585`79428ea0 ffffc585`7c843a50 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98
ffffb580`cc83b4a0 fffff800`56317d09     : ffffc585`7ba54000 ffffb580`cc83b5b0 fffff800`56317ce8 fffff800`56317ce8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
ffffb580`cc83b4f0 fffff800`56270e75     : ffffc585`7c96a7c0 ffffb580`cc83b5b0 ffffc585`79428ea0 fffff800`562bdfec : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffb580`cc83b520 fffff800`56310f29     : 00000000`00000003 ffffc585`7cafe000 ffffc585`7ba54000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffb580`cc83b570 fffff800`5631432c     : ffffb580`cc83b670 ffffb580`cc83b7b0 ffffc585`7ba54000 fffff800`56311102 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffb580`cc83b640 fffff800`56314017     : ffffc585`7ba54000 ffffc585`7c843a50 fffff800`565c7a40 ffffb580`cc83b7b0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
ffffb580`cc83b690 fffff800`56310dbf     : 00000000`0000000c ffffc585`79428f50 ffffc585`7c843a50 00000000`00000003 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffb580`cc83b710 fffff800`56317ce2     : ffffc585`00000003 ffffc585`79428f50 ffffb580`00000000 ffffc585`7ba54000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
ffffb580`cc83b780 fffff800`562204c9     : 00000000`80000000 ffffc585`796f3901 fffffa3f`ffffff78 fffff400`10804310 : nt!SmPageRead+0x2e
ffffb580`cc83b7d0 fffff800`56220f8d     : 00000000`00000002 ffffb580`cc83bb00 ffffc585`79428e50 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
ffffb580`cc83b860 fffff800`56283a00     : 00000000`c0033333 ffffb580`cc83bb00 00000000`00000004 ffffb580`cc83bb00 : nt!MiIssueHardFault+0x15d
ffffb580`cc83b900 fffff800`5635f5fc     : ffffc585`7c96a7c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0xca0
ffffb580`cc83bb00 00007ff9`105b891f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
00000035`8c7ff1f0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`105b891f


SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

 *** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
 
 CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fe5e21968b517, Reserved
Arg2: b3b6f2686be8bc99, Reserved
Arg3: fffff809ca761f60, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4905

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 50338

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  109

BUGCHECK_P1: a39fe5e21968b517

BUGCHECK_P2: b3b6f2686be8bc99

BUGCHECK_P3: fffff809ca761f60

BUGCHECK_P4: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffe501`8fc6a038 00000000`00000000     : 00000000`00000109 a39fe5e2`1968b517 b3b6f268`6be8bc99 fffff809`ca761f60 : nt!KeBugCheckEx


CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis
    fffff809ca761f60-fffff809ca761f6d  14 bytes - ndis!NdisMSendNetBufferListsComplete
    [ 48 8b c4 48 89 50 10 48:ff 25 00 00 00 00 9b 65 ]
    fffff809ca7625b0-fffff809ca7625c2  19 bytes - ndis!NdisMIndicateReceiveNetBufferLists (+0x650)
    [ 4c 8b dc 55 57 49 8d ab:ff 25 00 00 00 00 2a 9f ]
33 errors : !ndis (fffff809ca761f60-fffff809ca7625c2)

SYMBOL_NAME:  ndis!NdisMSendNetBufferListsComplete+0

MODULE_NAME: ndis

IMAGE_NAME:  ndis.sys

IMAGE_VERSION:  10.0.14393.0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x109_1_ndis!NdisMSendNetBufferListsComplete

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1b628e81-9e60-c449-83ff-7d5579c29c83}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffcae540000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8020c231b94, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3437

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 114908

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffcae540000000

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8020c231b94

READ_ADDRESS: fffff8020c5c1338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8020c50ccf8: Unable to get Flags value from nt!KdVersionBlock
 ffffcae540000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

DPC_STACK_BASE:  FFFFF8020E227FB0

TRAP_FRAME:  fffff8020e2274f0 -- (.trap 0xfffff8020e2274f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffcae540000000
rdx=fffff8020e227790 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8020c231b94 rsp=fffff8020e227680 rbp=fffff8020e2276c0
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff8020e2273a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExFreeLargePool+0x74:
fffff802`0c231b94 488b0408        mov     rax,qword ptr [rax+rcx] ds:ffffcae5`40000000=????????????????
Resetting default scope

STACK_TEXT: 
fffff802`0e2273a8 fffff802`0c36f129     : 00000000`0000000a ffffcae5`40000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`0e2273b0 fffff802`0c36d707     : 00000000`00000001 fffff804`26bc3f45 ffff9b0d`4189c710 fffff802`0e227560 : nt!KiBugCheckDispatch+0x69
fffff802`0e2274f0 fffff802`0c231b94     : ffff9b0d`3fcd7030 ffff9b0d`3f9941a0 fffff802`0e227820 ffff8580`f1580004 : nt!KiPageFault+0x247
fffff802`0e227680 fffff802`0c465885     : 00000000`00000000 fffff802`0e227790 00000000`00000000 00001dff`00000000 : nt!ExFreeLargePool+0x74
fffff802`0e227750 fffff804`2939d211     : 00000000`00000000 ffff9b0d`3ff194c0 00000000`00000000 ffff78c3`59acd547 : nt!ExFreePoolWithTag+0x4f5
fffff802`0e227830 00000000`00000000     : ffff9b0d`3ff194c0 00000000`00000000 ffff78c3`59acd547 ffff9b0d`00000001 : athw10x+0x28d211


SYMBOL_NAME:  athw10x+28d211

MODULE_NAME: athw10x

IMAGE_NAME:  athw10x.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  28d211

FAILURE_BUCKET_ID:  AV_athw10x!unknown_function

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b4216231-6f01-b0f6-2216-c84e0358aa2f}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 0000000000064813
Arg3: 00000000710a1374
Arg4: 00000000e7ef55ba

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2859

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17975

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 64813

BUGCHECK_P3: 710a1374

BUGCHECK_P4: e7ef55ba

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

STACK_TEXT: 
ffffbf01`23c46448 fffff801`6ffbda0a     : 00000000`0000001a 00000000`0000003f 00000000`00064813 00000000`710a1374 : nt!KeBugCheckEx
ffffbf01`23c46450 fffff801`6fe8788a     : ffffe682`990df6f0 00000000`00020000 ffffbf01`23c46580 ffffe682`990df6d0 : nt! ?? ::FNODOBFM::`string'+0x4684a
ffffbf01`23c46520 fffff801`6fe32fe5     : ffffbf01`23c46971 ffffbf01`23c466e0 ffff8700`00105480 ffffe682`990df6d0 : nt!MiWaitForInPageComplete+0x48a
ffffbf01`23c46650 fffff801`6fe95a00     : 00000000`c0033333 ffffbf01`23c46971 00000000`00000000 ffffbf01`23c46971 : nt!MiIssueHardFault+0x1b5
ffffbf01`23c46730 fffff801`6fe88a98     : 00000000`00000001 fffff801`6fe584e1 ffffbf01`203c0180 ffffbf01`ffffffff : nt!MmAccessFault+0xca0
ffffbf01`23c46930 fffff801`6ff2dcdf     : 00000000`00000000 ffffe682`90575440 ffffe682`962a47c0 00000000`00000000 : nt!MiProbeLeafFrame+0x3e8
ffffbf01`23c46a30 fffff801`6ff2aa9c     : 00000000`00000000 ffffe682`96285838 ffffe682`96285878 ffffe682`96285878 : nt!MmStoreProbeAndLockPages+0x87
ffffbf01`23c46b10 fffff801`6ff29fbd     : 00000000`00040000 00000000`00000080 00000000`00000080 fffff801`71e31070 : nt!SmKmProbeAndLockAddress+0x5c
ffffbf01`23c46b40 fffff801`6feba182     : 00000000`00040000 00000000`00000080 ffffe682`962a47c0 00000000`00000004 : nt!SmKmStoreHelperCommandProcess+0xc9
ffffbf01`23c46ba0 fffff801`6feba4bd     : ffffe682`962a47c0 00000000`00000080 fffff801`6feba10c ffffe682`96285838 : nt!SmKmStoreHelperWorker+0x76
ffffbf01`23c46c10 fffff801`6ff6d456     : fffff801`70160180 ffffe682`962a47c0 fffff801`6feba47c 00000000`00000000 : nt!PspSystemThreadStartup+0x41
ffffbf01`23c46c60 00000000`00000000     : ffffbf01`23c47000 ffffbf01`23c41000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

 *** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
 
 KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: ffff8e0bb3498834, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000bb3600, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2749

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7184

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffff80000003

BUGCHECK_P2: ffff8e0bb3498834

BUGCHECK_P3: 0

BUGCHECK_P4: bb3600

EXCEPTION_PARAMETER2:  0000000000bb3600

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffca00`bb67f088 fffff803`8d1fa14e     : 00000000`0000001e ffffffff`80000003 ffff8e0b`b3498834 00000000`00000000 : nt!KeBugCheckEx
ffffca00`bb67f090 fffff803`8d1cc202     : 00000000`00bb35af 00000000`00bb35b9 fffff803`8d39ba40 fffff803`8d113820 : nt! ?? ::FNODOBFM::`string'+0x29f8e
ffffca00`bb67f760 fffff803`8d1c9873     : 00000000`00000000 fffff803`8d077000 ffffca00`bb67faf0 fffff803`8d2c2885 : nt!KiExceptionDispatch+0xc2
ffffca00`bb67f940 ffff8e0b`b3498835     : 00000000`001ef6c3 ffff8e0b`b2f96000 ffff8e0b`b2f96880 ffffca00`bb67fb70 : nt!KiBreakpointTrap+0xf3
ffffca00`bb67fad8 00000000`001ef6c3     : ffff8e0b`b2f96000 ffff8e0b`b2f96880 ffffca00`bb67fb70 ffff8e0b`b34ac1ee : 0xffff8e0b`b3498835
ffffca00`bb67fae0 ffff8e0b`b2f96000     : ffff8e0b`b2f96880 ffffca00`bb67fb70 ffff8e0b`b34ac1ee ffff8e0b`b348a000 : 0x1ef6c3
ffffca00`bb67fae8 ffff8e0b`b2f96880     : ffffca00`bb67fb70 ffff8e0b`b34ac1ee ffff8e0b`b348a000 00000000`000007dd : 0xffff8e0b`b2f96000
ffffca00`bb67faf0 ffffca00`bb67fb70     : ffff8e0b`b34ac1ee ffff8e0b`b348a000 00000000`000007dd 00000000`000007dd : 0xffff8e0b`b2f96880
ffffca00`bb67faf8 ffff8e0b`b34ac1ee     : ffff8e0b`b348a000 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0xffffca00`bb67fb70
ffffca00`bb67fb00 ffff8e0b`b348a000     : 00000000`000007dd 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0xffff8e0b`b34ac1ee
ffffca00`bb67fb08 00000000`000007dd     : 00000000`000007dd 00000000`000007dd 00000000`000007dd ffffca00`bb67fb38 : 0xffff8e0b`b348a000
ffffca00`bb67fb10 00000000`000007dd     : 00000000`000007dd 00000000`000007dd ffffca00`bb67fb38 ffffca00`bb67fb38 : 0x7dd
ffffca00`bb67fb18 00000000`000007dd     : 00000000`000007dd ffffca00`bb67fb38 ffffca00`bb67fb38 00000000`000007dd : 0x7dd
ffffca00`bb67fb20 00000000`000007dd     : ffffca00`bb67fb38 ffffca00`bb67fb38 00000000`000007dd 00000000`000007dd : 0x7dd
ffffca00`bb67fb28 ffffca00`bb67fb38     : ffffca00`bb67fb38 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0x7dd
ffffca00`bb67fb30 ffffca00`bb67fb38     : 00000000`000007dd 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0xffffca00`bb67fb38
ffffca00`bb67fb38 00000000`000007dd     : 00000000`000007dd 00000000`000007dd 00000000`000007dd 00000000`00000c95 : 0xffffca00`bb67fb38
ffffca00`bb67fb40 00000000`000007dd     : 00000000`000007dd 00000000`000007dd 00000000`00000c95 00000000`001ef6c3 : 0x7dd
ffffca00`bb67fb48 00000000`000007dd     : 00000000`000007dd 00000000`00000c95 00000000`001ef6c3 00000000`00000000 : 0x7dd
ffffca00`bb67fb50 00000000`000007dd     : 00000000`00000c95 00000000`001ef6c3 00000000`00000000 fffff803`8d077000 : 0x7dd
ffffca00`bb67fb58 00000000`00000c95     : 00000000`001ef6c3 00000000`00000000 fffff803`8d077000 ffff8e0b`b34ae408 : 0x7dd
ffffca00`bb67fb60 00000000`001ef6c3     : 00000000`00000000 fffff803`8d077000 ffff8e0b`b34ae408 ffff8e0b`b2f97e80 : 0xc95
ffffca00`bb67fb68 00000000`00000000     : fffff803`8d077000 ffff8e0b`b34ae408 ffff8e0b`b2f97e80 00000000`00000000 : 0x1ef6c3


SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+29f8e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.14393.0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  29f8e

FAILURE_BUCKET_ID:  0x1E_80000003_nt!_??_::FNODOBFM::_string_

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {85ddfc4f-36e8-8725-6d57-f514f47381f8}

Followup:     MachineOwner
---------

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2327

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 97274

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  19

BUGCHECK_P1: 22

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

POOL_ADDRESS: fffff803741c2338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037410dcf8: Unable to get Flags value from nt!KdVersionBlock
 0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

DPC_STACK_BASE:  FFFFF80375E3BFB0

STACK_TEXT: 
fffff803`75e3b678 fffff803`73f7e5d0     : 00000000`00000019 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff803`75e3b680 fffff803`74066885     : 00000000`00000000 fffff803`75e3b790 00000000`00000000 00001e00`00000000 : nt! ?? ::FNODOBFM::`string'+0xa410
fffff803`75e3b750 fffff807`99e5d211     : 00000000`00000000 ffff8587`73e73610 00000000`00000000 fffff647`b6ddfdaf : nt!ExFreePoolWithTag+0x4f5
fffff803`75e3b830 00000000`00000000     : ffff8587`73e73610 00000000`00000000 fffff647`b6ddfdaf 00000000`00000001 : athw10x+0x28d211


SYMBOL_NAME:  athw10x+28d211

MODULE_NAME: athw10x

IMAGE_NAME:  athw10x.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  28d211

FAILURE_BUCKET_ID:  0x19_22_athw10x!unknown_function

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6389468c-1c97-ca58-db47-c5c836243ee4}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000000a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80a9385ff77, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 76121

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: a

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80a9385ff77

WRITE_ADDRESS: fffff80163433338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8016337ecf8: Unable to get Flags value from nt!KdVersionBlock
 000000000000000a

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steamwebhelper.exe

DPC_STACK_BASE:  FFFFD80080DADFB0

TRAP_FRAME:  ffffd80080dacff0 -- (.trap 0xffffd80080dacff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffff808e53203870
rdx=0000000000000040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80a9385ff77 rsp=ffffd80080dad180 rbp=ffffd80080dad200
 r8=0000000000000000  r9=0000000000000040 r10=0000000000000001
r11=ffffd80080dac610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ndis!NdisFreeNetBufferListContext+0x27:
fffff80a`9385ff77 664101780a      add     word ptr [r8+0Ah],di ds:00000000`0000000a=????
Resetting default scope

STACK_TEXT: 
ffffd800`80dacea8 fffff801`631e1129     : 00000000`0000000a 00000000`0000000a 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd800`80daceb0 fffff801`631df707     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd800`80dacff0 fffff80a`9385ff77     : 00000000`00000004 ffffd800`80dad388 fffff80a`93d3f580 fffff801`630ecf82 : nt!KiPageFault+0x247
ffffd800`80dad180 fffff80a`93d29874     : ffff808e`53203870 00000000`00000000 00000000`0001d274 fffff80a`93d21f25 : ndis!NdisFreeNetBufferListContext+0x27
ffffd800`80dad1b0 fffff80a`93d260c8     : 00000000`00000000 ffffd800`80dad2a0 00000000`00000001 00000000`00000000 : wfplwfs!L2FreeNetBufferListContext+0x74
ffffd800`80dad1e0 fffff80a`93d21db0     : ffff808e`4f07bad0 ffffd800`80dad2c9 00000000`00000000 ffffd800`80dad368 : wfplwfs!L2ProcessClassifyOut+0xb4
ffffd800`80dad210 fffff80a`93d21c03     : ffffd800`80dad302 00000000`00000000 ffffd800`80dad371 ffff808e`4f07bad0 : wfplwfs!L2p802_3IsNblPermitted+0x178
ffffd800`80dad310 fffff80a`93d219d2     : ffff808e`537da001 ffff808e`537da010 ffffd800`80dad4d0 ffffd800`80dad510 : wfplwfs!L2802_3IsNetBufferListPermitted+0x103
ffffd800`80dad3c0 fffff80a`93d23ef1     : 00000000`00000002 00000000`00000038 ffffd800`80dad518 ffff808e`537da010 : wfplwfs!L2InspectNetBufferLists+0x10a
ffffd800`80dad480 fffff80a`93853e97     : 00000000`00000001 ffff808e`53203870 00000000`00008000 00000000`00000000 : wfplwfs!LwfUpperRecvNetBufferLists+0x81
ffffd800`80dad510 fffff80a`93852c2d     : ffff808e`537db3d0 ffffd800`80dad660 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x47
ffffd800`80dad560 ffff808e`538fc063     : ffff9c88`00000000 00000000`00000570 00000000`00000000 00000000`00000001 : ndis!NdisMIndicateReceiveNetBufferLists+0x67d
ffffd800`80dad750 ffff9c88`00000000     : 00000000`00000570 00000000`00000000 00000000`00000001 00000000`00000001 : 0xffff808e`538fc063
ffffd800`80dad758 00000000`00000570     : 00000000`00000000 00000000`00000001 00000000`00000001 fffff80a`968141a9 : 0xffff9c88`00000000
ffffd800`80dad760 00000000`00000000     : 00000000`00000001 00000000`00000001 fffff80a`968141a9 00000000`000000c3 : 0x570


SYMBOL_NAME:  wfplwfs!L2FreeNetBufferListContext+74

MODULE_NAME: wfplwfs

IMAGE_NAME:  wfplwfs.sys

IMAGE_VERSION:  10.0.14393.0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  74

FAILURE_BUCKET_ID:  AV_wfplwfs!L2FreeNetBufferListContext

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {01ce207b-35ec-3415-694f-dc8dc30eedcb}

Followup:     MachineOwner
---------

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ff366e3caa5ea, Reserved
Arg2: b3b6ffed364b5254, Reserved
Arg3: fffff80919351f60, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3952

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13771

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  109

BUGCHECK_P1: a39ff366e3caa5ea

BUGCHECK_P2: b3b6ffed364b5254

BUGCHECK_P3: fffff80919351f60

BUGCHECK_P4: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffd280`6bba6678 00000000`00000000     : 00000000`00000109 a39ff366`e3caa5ea b3b6ffed`364b5254 fffff809`19351f60 : nt!KeBugCheckEx


CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis
    fffff80919351f60-fffff80919351f6d  14 bytes - ndis!NdisMSendNetBufferListsComplete
    [ 48 8b c4 48 89 50 10 48:ff 25 00 00 00 00 9b 35 ]
    fffff809193525b0-fffff809193525c2  19 bytes - ndis!NdisMIndicateReceiveNetBufferLists (+0x650)
    [ 4c 8b dc 55 57 49 8d ab:ff 25 00 00 00 00 2a 6f ]
33 errors : !ndis (fffff80919351f60-fffff809193525c2)

SYMBOL_NAME:  ndis!NdisMSendNetBufferListsComplete+0

MODULE_NAME: ndis

IMAGE_NAME:  ndis.sys

IMAGE_VERSION:  10.0.14393.0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x109_1_ndis!NdisMSendNetBufferListsComplete

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1b628e81-9e60-c449-83ff-7d5579c29c83}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 000000000007df8f
Arg3: 00000000ec709c10
Arg4: 00000000d350d9bb

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3062

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 51193

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 7df8f

BUGCHECK_P3: ec709c10

BUGCHECK_P4: d350d9bb

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME:  ffffc201ba256260 -- (.trap 0xffffc201ba256260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000060 rbx=0000000000000000 rcx=000002b97a83b000
rdx=000002b97a841000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80163693e01 rsp=ffffc201ba2563f0 rbp=0000000000000002
 r8=0000000000000000  r9=000002b97ae1acd0 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!ProbeForWrite+0x41:
fffff801`63693e01 0fb601          movzx   eax,byte ptr [rcx] ds:000002b9`7a83b000=??
Resetting default scope

STACK_TEXT: 
ffffc201`ba255288 fffff801`63429a0a     : 00000000`0000001a 00000000`0000003f 00000000`0007df8f 00000000`ec709c10 : nt!KeBugCheckEx
ffffc201`ba255290 fffff801`632f388a     : ffff8285`62d18810 00000000`00010000 ffffc201`ba2553c0 ffff8285`62d187f0 : nt! ?? ::FNODOBFM::`string'+0x4684a
ffffc201`ba255360 fffff801`6329efe5     : ffffc201`ba255770 ffffc201`ba255520 fffffb80`0001c0b8 ffff8285`62d187f0 : nt!MiWaitForInPageComplete+0x48a
ffffc201`ba255490 fffff801`63301a00     : 00000000`c0033333 ffffc201`ba255770 00000000`00000000 ffffc201`ba255770 : nt!MiIssueHardFault+0x1b5
ffffc201`ba255570 fffff801`633dd5fc     : 00000000`00000001 00000000`00000000 fffffb80`5d4b27f8 ffffed00`039d1610 : nt!MmAccessFault+0xca0
ffffc201`ba255770 fffff801`633a1ed0     : ffffc201`bb48d000 ffff8285`649ac050 00000000`03817710 fffff801`6333d3e4 : nt!KiPageFault+0x13c
ffffc201`ba255900 fffff801`6333d3e4     : 00000000`00001000 fffff801`634dc2e0 ffffc201`bb48d000 000000ba`964ff630 : nt!RtlDecompressBufferXpressLz+0x50
ffffc201`ba255920 fffff801`63394a5b     : 00000000`00000002 ffffc201`bb48d000 00000000`03817710 ffffc201`bb48d000 : nt!RtlDecompressBufferEx+0x64
ffffc201`ba255970 fffff801`633948d3     : 00000000`00000000 ffff8285`649ac050 00000000`00000000 00000000`00007710 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x157
ffffc201`ba255a50 fffff801`63394c61     : 00000000`00000001 00000000`000034da 00000000`00000001 ffffc201`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
ffffc201`ba255aa0 fffff801`63394da0     : 00000000`ffffffff ffff8285`67160000 ffffc201`ba255b88 ffff8285`648d5180 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
ffffc201`ba255b40 fffff801`63395bc2     : 000002b9`00000000 ffff8285`648d5180 00000000`000007c3 ffff8285`648d5180 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98
ffffc201`ba255c00 fffff801`63395d09     : ffff8285`649ac000 ffffc201`ba255d10 fffff801`63395ce8 fffff801`63395ce8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
ffffc201`ba255c50 fffff801`632eee75     : ffff8285`662ce7c0 ffffc201`ba255d10 ffff8285`661058c0 fffff801`6333bfec : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffc201`ba255c80 fffff801`6338ef29     : 00000000`00000003 ffff8285`67160000 ffff8285`649ac000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffc201`ba255cd0 fffff801`6339232c     : ffffc201`ba255dd0 ffffc201`ba255f10 ffff8285`649ac000 fffff801`6338f102 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffc201`ba255da0 fffff801`63392017     : ffff8285`649ac000 ffff8285`648d5180 fffff801`63645a40 ffffc201`ba255f10 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
ffffc201`ba255df0 fffff801`6338edbf     : 00000000`0000000c ffff8285`66105970 ffff8285`648d5180 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffc201`ba255e70 fffff801`63395ce2     : ffff8285`00000001 ffff8285`66105970 ffffc201`00000000 ffff8285`649ac000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
ffffc201`ba255ee0 fffff801`6329e4c9     : 00000000`00000000 00020019`0000000c 0000000b`ffffffff 00000002`00000000 : nt!SmPageRead+0x2e
ffffc201`ba255f30 fffff801`6329ef8d     : 00000000`00000002 ffffc201`ba256260 ffff8285`66105870 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
ffffc201`ba255fc0 fffff801`63301a00     : 00000000`c0033333 ffffc201`ba256260 00000000`00000000 ffffc201`ba256260 : nt!MiIssueHardFault+0x15d
ffffc201`ba256060 fffff801`633dd5fc     : 00000000`00000000 00000000`00000000 00000000`00000008 00000000`00000001 : nt!MmAccessFault+0xca0
ffffc201`ba256260 fffff801`63693e01     : 00000000`00000000 fffff801`633926a4 00000000`00000000 ffff8285`661058c0 : nt!KiPageFault+0x13c
ffffc201`ba2563f0 fffff80c`213c2d4d     : ffff8285`648d5180 00000000`00000000 ffff8285`64320900 ffff8285`5d224b20 : nt!ProbeForWrite+0x41
ffffc201`ba256420 fffff80c`213c2560     : 000000ba`964fe680 00000000`00000070 00000000`00000000 00000000`00000070 : nsiproxy!NsippProbeAndAllocateParameters+0x4ad
ffffc201`ba2565f0 fffff80c`213c2251     : 00000000`00000000 ffff8285`6181a560 ffff8285`6181a490 00000000`00000000 : nsiproxy!NsippEnumerateObjectsAllParameters+0x170
ffffc201`ba2567e0 fffff801`6368aa20     : ffff8285`5e313ef0 00000000`00000000 00000000`00000000 fffff801`634d60a2 : nsiproxy!NsippDispatch+0x61
ffffc201`ba256820 fffff801`63689904     : 00008737`00000000 ffff8285`5e313e04 00000000`00000000 ffffc201`ba256b80 : nt!IopSynchronousServiceTail+0x1a0
ffffc201`ba2568e0 fffff801`63689286     : 00000000`00000008 00000000`0000061c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x674
ffffc201`ba256a20 fffff801`633df070     : ffff8285`662ce7c0 000000ba`964fe4e8 ffffc201`ba256aa8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffc201`ba256a90 00007fff`8c944f34     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1d9
000000ba`964fe578 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`8c944f34


SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

 *** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
 
 CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ff6e39aa27a7d, Reserved
Arg2: b3b70369ed2281ff, Reserved
Arg3: fffff8069a051f60, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3640

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25722

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  109

BUGCHECK_P1: a39ff6e39aa27a7d

BUGCHECK_P2: b3b70369ed2281ff

BUGCHECK_P3: fffff8069a051f60

BUGCHECK_P4: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff9400`7edff038 00000000`00000000     : 00000000`00000109 a39ff6e3`9aa27a7d b3b70369`ed2281ff fffff806`9a051f60 : nt!KeBugCheckEx


CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis
    fffff8069a051f60-fffff8069a051f6d  14 bytes - ndis!NdisMSendNetBufferListsComplete
    [ 48 8b c4 48 89 50 10 48:ff 25 00 00 00 00 9b 05 ]
    fffff8069a0525b0-fffff8069a0525c2  19 bytes - ndis!NdisMIndicateReceiveNetBufferLists (+0x650)
    [ 4c 8b dc 55 57 49 8d ab:ff 25 00 00 00 00 2a 3f ]
33 errors : !ndis (fffff8069a051f60-fffff8069a0525c2)

SYMBOL_NAME:  ndis!NdisMSendNetBufferListsComplete+0

MODULE_NAME: ndis

IMAGE_NAME:  ndis.sys

IMAGE_VERSION:  10.0.14393.0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x109_1_ndis!NdisMSendNetBufferListsComplete

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1b628e81-9e60-c449-83ff-7d5579c29c83}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 0000000000008a8c
Arg3: 00000000203ac9d3
Arg4: 00000000e1ab1bda

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2593

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15902

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 8a8c

BUGCHECK_P3: 203ac9d3

BUGCHECK_P4: e1ab1bda

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME:  ffffd2010f37a010 -- (.trap 0xffffd2010f37a010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd2010f37a268 rbx=0000000000000000 rcx=ffffd2010fc80000
rdx=ffffd2010fc80000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801d11a7ed0 rsp=ffffd2010f37a1a0 rbp=ffffd2010fc80000
 r8=000000000091f400  r9=0000000000000768 r10=ffffd2010fc80ea0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff801`d11a7ed0 418b00          mov     eax,dword ptr [r8] ds:00000000`0091f400=????????
Resetting default scope

STACK_TEXT: 
ffffd201`0f379b28 fffff801`d122fa0a     : 00000000`0000001a 00000000`0000003f 00000000`00008a8c 00000000`203ac9d3 : nt!KeBugCheckEx
ffffd201`0f379b30 fffff801`d10f988a     : ffffa909`ee6ad030 00000000`00010000 ffffd201`0f379c80 ffffa909`ee6ad010 : nt! ?? ::FNODOBFM::`string'+0x4684a
ffffd201`0f379c00 fffff801`d10a4fe5     : ffffd201`0f37a010 ffffd201`0f379dc0 ffffcf80`000048f8 ffffa909`ee6ad010 : nt!MiWaitForInPageComplete+0x48a
ffffd201`0f379d30 fffff801`d1107a00     : 00000000`c0033333 ffffd201`0f37a010 00000000`00000000 ffffd201`0f37a010 : nt!MiIssueHardFault+0x1b5
ffffd201`0f379e10 fffff801`d11e35fc     : 00000000`ffffffff 00000000`00000000 ffff9883`e89ff5d0 00000000`00000000 : nt!MmAccessFault+0xca0
ffffd201`0f37a010 fffff801`d11a7ed0     : ffffd201`0fc80000 ffffa909`edac6050 00000000`0091f400 fffff801`d11433e4 : nt!KiPageFault+0x13c
ffffd201`0f37a1a0 fffff801`d11433e4     : 00000000`00001000 fffff801`d12e22e0 ffffd201`0fc80000 fffff801`d1171147 : nt!RtlDecompressBufferXpressLz+0x50
ffffd201`0f37a1c0 fffff801`d119aa5b     : 00000000`00000002 ffffd201`0fc80000 00000000`0091f400 ffffd201`0fc80000 : nt!RtlDecompressBufferEx+0x64
ffffd201`0f37a210 fffff801`d119a8d3     : 00000000`00000000 ffffa909`edac6050 00000000`00000000 00000000`0000f400 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x157
ffffd201`0f37a2f0 fffff801`d119ac61     : 00000000`00000001 00000000`00000075 00000000`00000001 ffffd201`0000b000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
ffffd201`0f37a340 fffff801`d119ada0     : 00000000`ffffffff ffffa909`ee569000 ffffd201`0f37a428 ffffa909`ef133130 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
ffffd201`0f37a3e0 fffff801`d119bbc2     : ffffd201`0f37a4b8 ffffa909`ef133130 ffffe1fa`89f223b8 ffffa909`ef133130 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98
ffffd201`0f37a4a0 fffff801`d119bd09     : ffffa909`edac6000 ffffd201`0f37a5b0 fffff801`d119bce8 fffff801`d119bce8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
ffffd201`0f37a4f0 fffff801`d10f4e75     : ffffa909`ee231040 ffffd201`0f37a5b0 ffffa909`ee6a7370 fffff801`d1141fec : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffd201`0f37a520 fffff801`d1194f29     : 00000000`00000003 ffffa909`ee569000 ffffa909`edac6000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd201`0f37a570 fffff801`d119832c     : ffffd201`0f37a670 ffffd201`0f37a7b0 ffffa909`edac6000 fffff801`d1195102 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffd201`0f37a640 fffff801`d1198017     : ffffa909`edac6000 ffffa909`ef133130 fffff801`d144ba40 ffffd201`0f37a7b0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
ffffd201`0f37a690 fffff801`d1194dbf     : 00000000`0000000c ffffa909`ee6a7420 ffffa909`ef133130 00000000`0000000b : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffd201`0f37a710 fffff801`d119bce2     : ffffa909`0000000b ffffa909`ee6a7420 ffffd201`00000000 ffffa909`edac6000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
ffffd201`0f37a780 fffff801`d10a44c9     : ffffd201`0f37ab00 ffffa909`e913bc01 ffffd201`0f37a820 fffffe00`10804310 : nt!SmPageRead+0x2e
ffffd201`0f37a7d0 fffff801`d10a4f8d     : 00000000`00000002 ffffd201`0f37ab00 ffffa909`ee6a7320 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
ffffd201`0f37a860 fffff801`d1107a00     : 00000000`c0033333 ffffd201`0f37ab00 00000000`00000004 ffffd201`0f37ab00 : nt!MiIssueHardFault+0x15d
ffffd201`0f37a900 fffff801`d11e35fc     : ffffa909`ee231040 00000000`00000000 00000000`00000000 ffffa909`ee231040 : nt!MmAccessFault+0xca0
ffffd201`0f37ab00 00007ffc`e9b81bde     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
000000d9`8c3ff340 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e9b81bde


SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

 *** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
 
 BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2999

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 76114

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs1_release

    Key  : WER.OS.Timestamp
    Value: 2016-07-15T16:16:00Z

    Key  : WER.OS.Version
    Value: 10.0.14393.0


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  19

BUGCHECK_P1: 22

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

POOL_ADDRESS: fffff8008ac31338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8008ab7ccf8: Unable to get Flags value from nt!KdVersionBlock
 0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

DPC_STACK_BASE:  FFFFF8008C83FFB0

STACK_TEXT: 
fffff800`8c83f678 fffff800`8a9ed5d0     : 00000000`00000019 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff800`8c83f680 fffff800`8aad5885     : 00000000`00000000 fffff800`8c83f790 00000000`00000000 00001e00`00000000 : nt! ?? ::FNODOBFM::`string'+0xa410
fffff800`8c83f750 fffff804`7965d211     : 00000000`00000000 ffff8b8e`44dcd300 00000000`00000000 ffff7f5e`7cd49cb7 : nt!ExFreePoolWithTag+0x4f5
fffff800`8c83f830 00000000`00000000     : ffff8b8e`44dcd300 00000000`00000000 ffff7f5e`7cd49cb7 ffff8b8e`00000001 : athw10x+0x28d211


SYMBOL_NAME:  athw10x+28d211

MODULE_NAME: athw10x

IMAGE_NAME:  athw10x.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  28d211

FAILURE_BUCKET_ID:  0x19_22_athw10x!unknown_function

OS_VERSION:  10.0.14393.0

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6389468c-1c97-ca58-db47-c5c836243ee4}

Followup:     MachineOwner
---------

Durumdan mutlaka haberdar edin.
 
Format atmak istemiyorum derseniz şunları yapın:
  • Qualcomm atheros ağ ve Bluetooth sürücülerinizi güncelleyin. Donanım kimliğini paylaşırsanız daha iyi iyi yardımcı olabiliriz.
  • Sisteminize bağlı bütün USB cihazlarını çıkarın.
  • Avast, Vanguard, Logitech yazılımlarını ve kaldırın.
  • Komut ekranını yönetici olarak çalıştırın ve sfc /scannow komutunu uygulayın. Sonucunda çıkan yazının ekran görüntüsünü paylaşın.
Ama Memtest86'yı mutlaka yapın ve paylaşın.

Kod:
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains.
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000041917.
Arg3: 0000000057b3c95c.
Arg4: 00000000f4b331d3.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3312.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 69379.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 73.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 3f.

BUGCHECK_P2: 41917.

BUGCHECK_P3: 57b3c95c.

BUGCHECK_P4: f4b331d3.

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MemCompression.

PAGE_HASH_ERRORS_DETECTED: 1.

TRAP_FRAME: ffffb580cc83b010 -- (.trap 0xffffb580cc83b010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb580cc83b268 rbx=0000000000000000 rcx=ffffb580cf931000.
rdx=ffffb580cf931000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80056323ed0 rsp=ffffb580cc83b1a0 rbp=ffffb580cf931000.
r8=0000000007b6e580 r9=0000000000000461 r10=ffffb580cf931ea0.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!RtlDecompressBufferXpressLz+0x50:
fffff800`56323ed0 418b00 mov eax,dword ptr [r8] ds:00000000`07b6e580=????????
Resetting default scope.

STACK_TEXT:
ffffb580`cc83ab28 fffff800`563aba0a : 00000000`0000001a 00000000`0000003f 00000000`00041917 00000000`57b3c95c : nt!KeBugCheckEx.
ffffb580`cc83ab30 fffff800`5627588a : ffffc585`79c79930 00000000`0000e000 ffffb580`cc83ac80 ffffc585`79c79910 : nt! ?? ::FNODOBFM::`string'+0x4684a.
ffffb580`cc83ac00 fffff800`56220fe5 : ffffb580`cc83b010 ffffb580`cc83adc0 fffffa00`0003db70 ffffc585`79c79910 : nt!MiWaitForInPageComplete+0x48a.
ffffb580`cc83ad30 fffff800`56283a00 : 00000000`c0033333 ffffb580`cc83b010 00000000`00000000 ffffb580`cc83b010 : nt!MiIssueHardFault+0x1b5.
ffffb580`cc83ae10 fffff800`5635f5fc : 00000006`7b3fab00 00000101`00000000 00000000`00000000 00020019`0000000c : nt!MmAccessFault+0xca0.
ffffb580`cc83b010 fffff800`56323ed0 : ffffb580`cf931000 ffffc585`7ba54050 00000000`07b6e580 fffff800`562bf3e4 : nt!KiPageFault+0x13c.
ffffb580`cc83b1a0 fffff800`562bf3e4 : 00000000`00001000 fffff800`5645e2e0 ffffb580`cf931000 fffff800`562ed147 : nt!RtlDecompressBufferXpressLz+0x50.
ffffb580`cc83b1c0 fffff800`56316a5b : 00000000`00000002 ffffb580`cf931000 00000000`07b6e580 ffffb580`cf931000 : nt!RtlDecompressBufferEx+0x64.
ffffb580`cc83b210 fffff800`563168d3 : 00000000`00000000 ffffc585`7ba54050 00000000`00000000 00000000`0001e580 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x157.
ffffb580`cc83b2f0 fffff800`56316c61 : 00000000`00000001 00000000`0000213f 00000000`00000001 ffffb580`00003000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b.
ffffb580`cc83b340 fffff800`56316da0 : 00000000`ffffffff ffffc585`7cafe000 ffffb580`cc83b428 ffffc585`7c843a50 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199.
ffffb580`cc83b3e0 fffff800`56317bc2 : fffffa7d`00000000 ffffc585`7c843a50 ffffc585`79428ea0 ffffc585`7c843a50 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98.
ffffb580`cc83b4a0 fffff800`56317d09 : ffffc585`7ba54000 ffffb580`cc83b5b0 fffff800`56317ce8 fffff800`56317ce8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52.
ffffb580`cc83b4f0 fffff800`56270e75 : ffffc585`7c96a7c0 ffffb580`cc83b5b0 ffffc585`79428ea0 fffff800`562bdfec : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21.
ffffb580`cc83b520 fffff800`56310f29 : 00000000`00000003 ffffc585`7cafe000 ffffc585`7ba54000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85.
ffffb580`cc83b570 fffff800`5631432c : ffffb580`cc83b670 ffffb580`cc83b7b0 ffffc585`7ba54000 fffff800`56311102 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad.
ffffb580`cc83b640 fffff800`56314017 : ffffc585`7ba54000 ffffc585`7c843a50 fffff800`565c7a40 ffffb580`cc83b7b0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4.
ffffb580`cc83b690 fffff800`56310dbf : 00000000`0000000c ffffc585`79428f50 ffffc585`7c843a50 00000000`00000003 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf.
ffffb580`cc83b710 fffff800`56317ce2 : ffffc585`00000003 ffffc585`79428f50 ffffb580`00000000 ffffc585`7ba54000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b.
ffffb580`cc83b780 fffff800`562204c9 : 00000000`80000000 ffffc585`796f3901 fffffa3f`ffffff78 fffff400`10804310 : nt!SmPageRead+0x2e.
ffffb580`cc83b7d0 fffff800`56220f8d : 00000000`00000002 ffffb580`cc83bb00 ffffc585`79428e50 00000000`00000000 : nt!MiIssueHardFaultIo+0x145.
ffffb580`cc83b860 fffff800`56283a00 : 00000000`c0033333 ffffb580`cc83bb00 00000000`00000004 ffffb580`cc83bb00 : nt!MiIssueHardFault+0x15d.
ffffb580`cc83b900 fffff800`5635f5fc : ffffc585`7c96a7c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0xca0.
ffffb580`cc83bb00 00007ff9`105b891f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c.
00000035`8c7ff1f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`105b891f.

SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE.

MODULE_NAME: Unknown_Module.

IMAGE_NAME: Unknown_Image.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner.
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or.
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code.
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel.
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware.
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fe5e21968b517, Reserved.
Arg2: b3b6f2686be8bc99, Reserved.
Arg3: fffff809ca761f60, Failure type dependent information.
Arg4: 0000000000000001, Type of corrupted region, can be.
0 : A generic data region.
1 : Modification of a function or .pdata.
2 : A processor IDT.
3 : A processor GDT.
4 : Type 1 process list corruption.
5 : Type 2 process list corruption.
6 : Debug routine modification.
7 : Critical MSR modification.
8 : Object type.
9 : A processor IVT.
a : Modification of a system service function.
b : A generic session data region.
c : Modification of a session function or .pdata.
d : Modification of an import table.
e : Modification of a session import table.
f : Ps Win32 callout modification.
10 : Debug switch routine modification.
11 : IRP allocator modification.
12 : Driver call dispatcher modification.
13 : IRP completion dispatcher modification.
14 : IRP deallocator modification.
15 : A processor control register.
16 : Critical floating point control register modification.
17 : Local APIC modification.
18 : Kernel notification callout modification.
19 : Loaded module list modification.
1a : Type 3 process list corruption.
1b : Type 4 process list corruption.
1c : Driver object corruption.
1d : Executive callback object modification.
1e : Modification of module padding.
1f : Modification of a protected process.
20 : A generic data region.
21 : A page hash mismatch.
22 : A session page hash mismatch.
23 : Load config directory modification.
24 : Inverted function table modification.
25 : Session configuration modification.
26 : An extended processor control register.
27 : Type 1 pool corruption.
28 : Type 2 pool corruption.
29 : Type 3 pool corruption.
2a : Type 4 pool corruption.
2b : Modification of a function or .pdata.
2c : Image integrity corruption.
2d : Processor misconfiguration.
2e : Type 5 process list corruption.
2f : Process shadow corruption.
30 : Retpoline code page corruption.
101 : General pool corruption.
102 : Modification of win32k.sys.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4905.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 50338.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 74.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 109.

BUGCHECK_P1: a39fe5e21968b517.

BUGCHECK_P2: b3b6f2686be8bc99.

BUGCHECK_P3: fffff809ca761f60.

BUGCHECK_P4: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
ffffe501`8fc6a038 00000000`00000000 : 00000000`00000109 a39fe5e2`1968b517 b3b6f268`6be8bc99 fffff809`ca761f60 : nt!KeBugCheckEx.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis.
fffff809ca761f60-fffff809ca761f6d 14 bytes - ndis!NdisMSendNetBufferListsComplete.
[ 48 8b c4 48 89 50 10 48:ff 25 00 00 00 00 9b 65 ]
fffff809ca7625b0-fffff809ca7625c2 19 bytes - ndis!NdisMIndicateReceiveNetBufferLists (+0x650)
[ 4c 8b dc 55 57 49 8d ab:ff 25 00 00 00 00 2a 9f ]
33 errors : !ndis (fffff809ca761f60-fffff809ca7625c2)

SYMBOL_NAME: ndis!NdisMSendNetBufferListsComplete+0.

MODULE_NAME: ndis.

IMAGE_NAME: ndis.sys.

IMAGE_VERSION: 10.0.14393.0.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 0.

FAILURE_BUCKET_ID: 0x109_1_ndis!NdisMSendNetBufferListsComplete.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {1b628e81-9e60-c449-83ff-7d5579c29c83}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffcae540000000, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8020c231b94, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3437.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 114908.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 70.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: ffffcae540000000.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff8020c231b94.

READ_ADDRESS: fffff8020c5c1338: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8020c50ccf8: Unable to get Flags value from nt!KdVersionBlock.
ffffcae540000000.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

DPC_STACK_BASE: FFFFF8020E227FB0.

TRAP_FRAME: fffff8020e2274f0 -- (.trap 0xfffff8020e2274f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffcae540000000.
rdx=fffff8020e227790 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8020c231b94 rsp=fffff8020e227680 rbp=fffff8020e2276c0.
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000.
r11=fffff8020e2273a0 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!ExFreeLargePool+0x74:
fffff802`0c231b94 488b0408 mov rax,qword ptr [rax+rcx] ds:ffffcae5`40000000=????????????????
Resetting default scope.

STACK_TEXT:
fffff802`0e2273a8 fffff802`0c36f129 : 00000000`0000000a ffffcae5`40000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff802`0e2273b0 fffff802`0c36d707 : 00000000`00000001 fffff804`26bc3f45 ffff9b0d`4189c710 fffff802`0e227560 : nt!KiBugCheckDispatch+0x69.
fffff802`0e2274f0 fffff802`0c231b94 : ffff9b0d`3fcd7030 ffff9b0d`3f9941a0 fffff802`0e227820 ffff8580`f1580004 : nt!KiPageFault+0x247.
fffff802`0e227680 fffff802`0c465885 : 00000000`00000000 fffff802`0e227790 00000000`00000000 00001dff`00000000 : nt!ExFreeLargePool+0x74.
fffff802`0e227750 fffff804`2939d211 : 00000000`00000000 ffff9b0d`3ff194c0 00000000`00000000 ffff78c3`59acd547 : nt!ExFreePoolWithTag+0x4f5.
fffff802`0e227830 00000000`00000000 : ffff9b0d`3ff194c0 00000000`00000000 ffff78c3`59acd547 ffff9b0d`00000001 : athw10x+0x28d211.

SYMBOL_NAME: athw10x+28d211.

MODULE_NAME: athw10x.

IMAGE_NAME: athw10x.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 28d211.

FAILURE_BUCKET_ID: AV_athw10x!unknown_function.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b4216231-6f01-b0f6-2216-c84e0358aa2f}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains.
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000064813.
Arg3: 00000000710a1374.
Arg4: 00000000e7ef55ba.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 2859.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 17975.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 71.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 3f.

BUGCHECK_P2: 64813.

BUGCHECK_P3: 710a1374.

BUGCHECK_P4: e7ef55ba.

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MemCompression.

PAGE_HASH_ERRORS_DETECTED: 1.

STACK_TEXT:
ffffbf01`23c46448 fffff801`6ffbda0a : 00000000`0000001a 00000000`0000003f 00000000`00064813 00000000`710a1374 : nt!KeBugCheckEx.
ffffbf01`23c46450 fffff801`6fe8788a : ffffe682`990df6f0 00000000`00020000 ffffbf01`23c46580 ffffe682`990df6d0 : nt! ?? ::FNODOBFM::`string'+0x4684a.
ffffbf01`23c46520 fffff801`6fe32fe5 : ffffbf01`23c46971 ffffbf01`23c466e0 ffff8700`00105480 ffffe682`990df6d0 : nt!MiWaitForInPageComplete+0x48a.
ffffbf01`23c46650 fffff801`6fe95a00 : 00000000`c0033333 ffffbf01`23c46971 00000000`00000000 ffffbf01`23c46971 : nt!MiIssueHardFault+0x1b5.
ffffbf01`23c46730 fffff801`6fe88a98 : 00000000`00000001 fffff801`6fe584e1 ffffbf01`203c0180 ffffbf01`ffffffff : nt!MmAccessFault+0xca0.
ffffbf01`23c46930 fffff801`6ff2dcdf : 00000000`00000000 ffffe682`90575440 ffffe682`962a47c0 00000000`00000000 : nt!MiProbeLeafFrame+0x3e8.
ffffbf01`23c46a30 fffff801`6ff2aa9c : 00000000`00000000 ffffe682`96285838 ffffe682`96285878 ffffe682`96285878 : nt!MmStoreProbeAndLockPages+0x87.
ffffbf01`23c46b10 fffff801`6ff29fbd : 00000000`00040000 00000000`00000080 00000000`00000080 fffff801`71e31070 : nt!SmKmProbeAndLockAddress+0x5c.
ffffbf01`23c46b40 fffff801`6feba182 : 00000000`00040000 00000000`00000080 ffffe682`962a47c0 00000000`00000004 : nt!SmKmStoreHelperCommandProcess+0xc9.
ffffbf01`23c46ba0 fffff801`6feba4bd : ffffe682`962a47c0 00000000`00000080 fffff801`6feba10c ffffe682`96285838 : nt!SmKmStoreHelperWorker+0x76.
ffffbf01`23c46c10 fffff801`6ff6d456 : fffff801`70160180 ffffe682`962a47c0 fffff801`6feba47c 00000000`00000000 : nt!PspSystemThreadStartup+0x41.
ffffbf01`23c46c60 00000000`00000000 : ffffbf01`23c47000 ffffbf01`23c41000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16.

SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE.

MODULE_NAME: Unknown_Module.

IMAGE_NAME: Unknown_Image.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner.
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled.
Arg2: ffff8e0bb3498834, The address that the exception occurred at.
Arg3: 0000000000000000, Parameter 0 of the exception.
Arg4: 0000000000bb3600, Parameter 1 of the exception.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 2749.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 7184.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 68.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffff80000003.

BUGCHECK_P2: ffff8e0bb3498834.

BUGCHECK_P3: 0.

BUGCHECK_P4: bb3600.

EXCEPTION_PARAMETER2: 0000000000bb3600.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
ffffca00`bb67f088 fffff803`8d1fa14e : 00000000`0000001e ffffffff`80000003 ffff8e0b`b3498834 00000000`00000000 : nt!KeBugCheckEx.
ffffca00`bb67f090 fffff803`8d1cc202 : 00000000`00bb35af 00000000`00bb35b9 fffff803`8d39ba40 fffff803`8d113820 : nt! ?? ::FNODOBFM::`string'+0x29f8e.
ffffca00`bb67f760 fffff803`8d1c9873 : 00000000`00000000 fffff803`8d077000 ffffca00`bb67faf0 fffff803`8d2c2885 : nt!KiExceptionDispatch+0xc2.
ffffca00`bb67f940 ffff8e0b`b3498835 : 00000000`001ef6c3 ffff8e0b`b2f96000 ffff8e0b`b2f96880 ffffca00`bb67fb70 : nt!KiBreakpointTrap+0xf3.
ffffca00`bb67fad8 00000000`001ef6c3 : ffff8e0b`b2f96000 ffff8e0b`b2f96880 ffffca00`bb67fb70 ffff8e0b`b34ac1ee : 0xffff8e0b`b3498835.
ffffca00`bb67fae0 ffff8e0b`b2f96000 : ffff8e0b`b2f96880 ffffca00`bb67fb70 ffff8e0b`b34ac1ee ffff8e0b`b348a000 : 0x1ef6c3.
ffffca00`bb67fae8 ffff8e0b`b2f96880 : ffffca00`bb67fb70 ffff8e0b`b34ac1ee ffff8e0b`b348a000 00000000`000007dd : 0xffff8e0b`b2f96000.
ffffca00`bb67faf0 ffffca00`bb67fb70 : ffff8e0b`b34ac1ee ffff8e0b`b348a000 00000000`000007dd 00000000`000007dd : 0xffff8e0b`b2f96880.
ffffca00`bb67faf8 ffff8e0b`b34ac1ee : ffff8e0b`b348a000 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0xffffca00`bb67fb70.
ffffca00`bb67fb00 ffff8e0b`b348a000 : 00000000`000007dd 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0xffff8e0b`b34ac1ee.
ffffca00`bb67fb08 00000000`000007dd : 00000000`000007dd 00000000`000007dd 00000000`000007dd ffffca00`bb67fb38 : 0xffff8e0b`b348a000.
ffffca00`bb67fb10 00000000`000007dd : 00000000`000007dd 00000000`000007dd ffffca00`bb67fb38 ffffca00`bb67fb38 : 0x7dd.
ffffca00`bb67fb18 00000000`000007dd : 00000000`000007dd ffffca00`bb67fb38 ffffca00`bb67fb38 00000000`000007dd : 0x7dd.
ffffca00`bb67fb20 00000000`000007dd : ffffca00`bb67fb38 ffffca00`bb67fb38 00000000`000007dd 00000000`000007dd : 0x7dd.
ffffca00`bb67fb28 ffffca00`bb67fb38 : ffffca00`bb67fb38 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0x7dd.
ffffca00`bb67fb30 ffffca00`bb67fb38 : 00000000`000007dd 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0xffffca00`bb67fb38.
ffffca00`bb67fb38 00000000`000007dd : 00000000`000007dd 00000000`000007dd 00000000`000007dd 00000000`00000c95 : 0xffffca00`bb67fb38.
ffffca00`bb67fb40 00000000`000007dd : 00000000`000007dd 00000000`000007dd 00000000`00000c95 00000000`001ef6c3 : 0x7dd.
ffffca00`bb67fb48 00000000`000007dd : 00000000`000007dd 00000000`00000c95 00000000`001ef6c3 00000000`00000000 : 0x7dd.
ffffca00`bb67fb50 00000000`000007dd : 00000000`00000c95 00000000`001ef6c3 00000000`00000000 fffff803`8d077000 : 0x7dd.
ffffca00`bb67fb58 00000000`00000c95 : 00000000`001ef6c3 00000000`00000000 fffff803`8d077000 ffff8e0b`b34ae408 : 0x7dd.
ffffca00`bb67fb60 00000000`001ef6c3 : 00000000`00000000 fffff803`8d077000 ffff8e0b`b34ae408 ffff8e0b`b2f97e80 : 0xc95.
ffffca00`bb67fb68 00000000`00000000 : fffff803`8d077000 ffff8e0b`b34ae408 ffff8e0b`b2f97e80 00000000`00000000 : 0x1ef6c3.

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+29f8e.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.14393.0.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 29f8e.

FAILURE_BUCKET_ID: 0x1E_80000003_nt!_??_::FNODOBFM::_string_.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {85ddfc4f-36e8-8725-6d57-f514f47381f8}

Followup: MachineOwner.
---------

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of.
the problem, and then special pool applied to the suspect tags or the driver.
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: 0000000000000000.
Arg3: 0000000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 2327.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 97274.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 69.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 19.

BUGCHECK_P1: 22.

BUGCHECK_P2: 0.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

POOL_ADDRESS: fffff803741c2338: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8037410dcf8: Unable to get Flags value from nt!KdVersionBlock.
0000000000000000.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MemCompression.

DPC_STACK_BASE: FFFFF80375E3BFB0.

STACK_TEXT:
fffff803`75e3b678 fffff803`73f7e5d0 : 00000000`00000019 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx.
fffff803`75e3b680 fffff803`74066885 : 00000000`00000000 fffff803`75e3b790 00000000`00000000 00001e00`00000000 : nt! ?? ::FNODOBFM::`string'+0xa410.
fffff803`75e3b750 fffff807`99e5d211 : 00000000`00000000 ffff8587`73e73610 00000000`00000000 fffff647`b6ddfdaf : nt!ExFreePoolWithTag+0x4f5.
fffff803`75e3b830 00000000`00000000 : ffff8587`73e73610 00000000`00000000 fffff647`b6ddfdaf 00000000`00000001 : athw10x+0x28d211.

SYMBOL_NAME: athw10x+28d211.

MODULE_NAME: athw10x.

IMAGE_NAME: athw10x.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 28d211.

FAILURE_BUCKET_ID: 0x19_22_athw10x!unknown_function.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6389468c-1c97-ca58-db47-c5c836243ee4}

Followup: MachineOwner.
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000000a, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg4: fffff80a9385ff77, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 2483.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 76121.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: d1.

BUGCHECK_P1: a.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff80a9385ff77.

WRITE_ADDRESS: fffff80163433338: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8016337ecf8: Unable to get Flags value from nt!KdVersionBlock.
000000000000000a.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: steamwebhelper.exe.

DPC_STACK_BASE: FFFFD80080DADFB0.

TRAP_FRAME: ffffd80080dacff0 -- (.trap 0xffffd80080dacff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffff808e53203870.
rdx=0000000000000040 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80a9385ff77 rsp=ffffd80080dad180 rbp=ffffd80080dad200.
r8=0000000000000000 r9=0000000000000040 r10=0000000000000001.
r11=ffffd80080dac610 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
ndis!NdisFreeNetBufferListContext+0x27:
fffff80a`9385ff77 664101780a add word ptr [r8+0Ah],di ds:00000000`0000000a=????
Resetting default scope.

STACK_TEXT:
ffffd800`80dacea8 fffff801`631e1129 : 00000000`0000000a 00000000`0000000a 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
ffffd800`80daceb0 fffff801`631df707 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
ffffd800`80dacff0 fffff80a`9385ff77 : 00000000`00000004 ffffd800`80dad388 fffff80a`93d3f580 fffff801`630ecf82 : nt!KiPageFault+0x247.
ffffd800`80dad180 fffff80a`93d29874 : ffff808e`53203870 00000000`00000000 00000000`0001d274 fffff80a`93d21f25 : ndis!NdisFreeNetBufferListContext+0x27.
ffffd800`80dad1b0 fffff80a`93d260c8 : 00000000`00000000 ffffd800`80dad2a0 00000000`00000001 00000000`00000000 : wfplwfs!L2FreeNetBufferListContext+0x74.
ffffd800`80dad1e0 fffff80a`93d21db0 : ffff808e`4f07bad0 ffffd800`80dad2c9 00000000`00000000 ffffd800`80dad368 : wfplwfs!L2ProcessClassifyOut+0xb4.
ffffd800`80dad210 fffff80a`93d21c03 : ffffd800`80dad302 00000000`00000000 ffffd800`80dad371 ffff808e`4f07bad0 : wfplwfs!L2p802_3IsNblPermitted+0x178.
ffffd800`80dad310 fffff80a`93d219d2 : ffff808e`537da001 ffff808e`537da010 ffffd800`80dad4d0 ffffd800`80dad510 : wfplwfs!L2802_3IsNetBufferListPermitted+0x103.
ffffd800`80dad3c0 fffff80a`93d23ef1 : 00000000`00000002 00000000`00000038 ffffd800`80dad518 ffff808e`537da010 : wfplwfs!L2InspectNetBufferLists+0x10a.
ffffd800`80dad480 fffff80a`93853e97 : 00000000`00000001 ffff808e`53203870 00000000`00008000 00000000`00000000 : wfplwfs!LwfUpperRecvNetBufferLists+0x81.
ffffd800`80dad510 fffff80a`93852c2d : ffff808e`537db3d0 ffffd800`80dad660 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x47.
ffffd800`80dad560 ffff808e`538fc063 : ffff9c88`00000000 00000000`00000570 00000000`00000000 00000000`00000001 : ndis!NdisMIndicateReceiveNetBufferLists+0x67d.
ffffd800`80dad750 ffff9c88`00000000 : 00000000`00000570 00000000`00000000 00000000`00000001 00000000`00000001 : 0xffff808e`538fc063.
ffffd800`80dad758 00000000`00000570 : 00000000`00000000 00000000`00000001 00000000`00000001 fffff80a`968141a9 : 0xffff9c88`00000000.
ffffd800`80dad760 00000000`00000000 : 00000000`00000001 00000000`00000001 fffff80a`968141a9 00000000`000000c3 : 0x570.

SYMBOL_NAME: wfplwfs!L2FreeNetBufferListContext+74.

MODULE_NAME: wfplwfs.

IMAGE_NAME: wfplwfs.sys.

IMAGE_VERSION: 10.0.14393.0.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 74.

FAILURE_BUCKET_ID: AV_wfplwfs!L2FreeNetBufferListContext.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {01ce207b-35ec-3415-694f-dc8dc30eedcb}

Followup: MachineOwner.
---------

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or.
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code.
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel.
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware.
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ff366e3caa5ea, Reserved.
Arg2: b3b6ffed364b5254, Reserved.
Arg3: fffff80919351f60, Failure type dependent information.
Arg4: 0000000000000001, Type of corrupted region, can be.
0 : A generic data region.
1 : Modification of a function or .pdata.
2 : A processor IDT.
3 : A processor GDT.
4 : Type 1 process list corruption.
5 : Type 2 process list corruption.
6 : Debug routine modification.
7 : Critical MSR modification.
8 : Object type.
9 : A processor IVT.
a : Modification of a system service function.
b : A generic session data region.
c : Modification of a session function or .pdata.
d : Modification of an import table.
e : Modification of a session import table.
f : Ps Win32 callout modification.
10 : Debug switch routine modification.
11 : IRP allocator modification.
12 : Driver call dispatcher modification.
13 : IRP completion dispatcher modification.
14 : IRP deallocator modification.
15 : A processor control register.
16 : Critical floating point control register modification.
17 : Local APIC modification.
18 : Kernel notification callout modification.
19 : Loaded module list modification.
1a : Type 3 process list corruption.
1b : Type 4 process list corruption.
1c : Driver object corruption.
1d : Executive callback object modification.
1e : Modification of module padding.
1f : Modification of a protected process.
20 : A generic data region.
21 : A page hash mismatch.
22 : A session page hash mismatch.
23 : Load config directory modification.
24 : Inverted function table modification.
25 : Session configuration modification.
26 : An extended processor control register.
27 : Type 1 pool corruption.
28 : Type 2 pool corruption.
29 : Type 3 pool corruption.
2a : Type 4 pool corruption.
2b : Modification of a function or .pdata.
2c : Image integrity corruption.
2d : Processor misconfiguration.
2e : Type 5 process list corruption.
2f : Process shadow corruption.
30 : Retpoline code page corruption.
101 : General pool corruption.
102 : Modification of win32k.sys.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3952.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 13771.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 74.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 109.

BUGCHECK_P1: a39ff366e3caa5ea.

BUGCHECK_P2: b3b6ffed364b5254.

BUGCHECK_P3: fffff80919351f60.

BUGCHECK_P4: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
ffffd280`6bba6678 00000000`00000000 : 00000000`00000109 a39ff366`e3caa5ea b3b6ffed`364b5254 fffff809`19351f60 : nt!KeBugCheckEx.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis.
fffff80919351f60-fffff80919351f6d 14 bytes - ndis!NdisMSendNetBufferListsComplete.
[ 48 8b c4 48 89 50 10 48:ff 25 00 00 00 00 9b 35 ]
fffff809193525b0-fffff809193525c2 19 bytes - ndis!NdisMIndicateReceiveNetBufferLists (+0x650)
[ 4c 8b dc 55 57 49 8d ab:ff 25 00 00 00 00 2a 6f ]
33 errors : !ndis (fffff80919351f60-fffff809193525c2)

SYMBOL_NAME: ndis!NdisMSendNetBufferListsComplete+0.

MODULE_NAME: ndis.

IMAGE_NAME: ndis.sys.

IMAGE_VERSION: 10.0.14393.0.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 0.

FAILURE_BUCKET_ID: 0x109_1_ndis!NdisMSendNetBufferListsComplete.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {1b628e81-9e60-c449-83ff-7d5579c29c83}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains.
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000007df8f.
Arg3: 00000000ec709c10.
Arg4: 00000000d350d9bb.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3062.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 51193.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 70.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 3f.

BUGCHECK_P2: 7df8f.

BUGCHECK_P3: ec709c10.

BUGCHECK_P4: d350d9bb.

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MemCompression.

PAGE_HASH_ERRORS_DETECTED: 1.

TRAP_FRAME: ffffc201ba256260 -- (.trap 0xffffc201ba256260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000060 rbx=0000000000000000 rcx=000002b97a83b000.
rdx=000002b97a841000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80163693e01 rsp=ffffc201ba2563f0 rbp=0000000000000002.
r8=0000000000000000 r9=000002b97ae1acd0 r10=0000000000000000.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po cy.
nt!ProbeForWrite+0x41:
fffff801`63693e01 0fb601 movzx eax,byte ptr [rcx] ds:000002b9`7a83b000=??
Resetting default scope.

STACK_TEXT:
ffffc201`ba255288 fffff801`63429a0a : 00000000`0000001a 00000000`0000003f 00000000`0007df8f 00000000`ec709c10 : nt!KeBugCheckEx.
ffffc201`ba255290 fffff801`632f388a : ffff8285`62d18810 00000000`00010000 ffffc201`ba2553c0 ffff8285`62d187f0 : nt! ?? ::FNODOBFM::`string'+0x4684a.
ffffc201`ba255360 fffff801`6329efe5 : ffffc201`ba255770 ffffc201`ba255520 fffffb80`0001c0b8 ffff8285`62d187f0 : nt!MiWaitForInPageComplete+0x48a.
ffffc201`ba255490 fffff801`63301a00 : 00000000`c0033333 ffffc201`ba255770 00000000`00000000 ffffc201`ba255770 : nt!MiIssueHardFault+0x1b5.
ffffc201`ba255570 fffff801`633dd5fc : 00000000`00000001 00000000`00000000 fffffb80`5d4b27f8 ffffed00`039d1610 : nt!MmAccessFault+0xca0.
ffffc201`ba255770 fffff801`633a1ed0 : ffffc201`bb48d000 ffff8285`649ac050 00000000`03817710 fffff801`6333d3e4 : nt!KiPageFault+0x13c.
ffffc201`ba255900 fffff801`6333d3e4 : 00000000`00001000 fffff801`634dc2e0 ffffc201`bb48d000 000000ba`964ff630 : nt!RtlDecompressBufferXpressLz+0x50.
ffffc201`ba255920 fffff801`63394a5b : 00000000`00000002 ffffc201`bb48d000 00000000`03817710 ffffc201`bb48d000 : nt!RtlDecompressBufferEx+0x64.
ffffc201`ba255970 fffff801`633948d3 : 00000000`00000000 ffff8285`649ac050 00000000`00000000 00000000`00007710 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x157.
ffffc201`ba255a50 fffff801`63394c61 : 00000000`00000001 00000000`000034da 00000000`00000001 ffffc201`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b.
ffffc201`ba255aa0 fffff801`63394da0 : 00000000`ffffffff ffff8285`67160000 ffffc201`ba255b88 ffff8285`648d5180 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199.
ffffc201`ba255b40 fffff801`63395bc2 : 000002b9`00000000 ffff8285`648d5180 00000000`000007c3 ffff8285`648d5180 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98.
ffffc201`ba255c00 fffff801`63395d09 : ffff8285`649ac000 ffffc201`ba255d10 fffff801`63395ce8 fffff801`63395ce8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52.
ffffc201`ba255c50 fffff801`632eee75 : ffff8285`662ce7c0 ffffc201`ba255d10 ffff8285`661058c0 fffff801`6333bfec : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21.
ffffc201`ba255c80 fffff801`6338ef29 : 00000000`00000003 ffff8285`67160000 ffff8285`649ac000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85.
ffffc201`ba255cd0 fffff801`6339232c : ffffc201`ba255dd0 ffffc201`ba255f10 ffff8285`649ac000 fffff801`6338f102 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad.
ffffc201`ba255da0 fffff801`63392017 : ffff8285`649ac000 ffff8285`648d5180 fffff801`63645a40 ffffc201`ba255f10 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4.
ffffc201`ba255df0 fffff801`6338edbf : 00000000`0000000c ffff8285`66105970 ffff8285`648d5180 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf.
ffffc201`ba255e70 fffff801`63395ce2 : ffff8285`00000001 ffff8285`66105970 ffffc201`00000000 ffff8285`649ac000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b.
ffffc201`ba255ee0 fffff801`6329e4c9 : 00000000`00000000 00020019`0000000c 0000000b`ffffffff 00000002`00000000 : nt!SmPageRead+0x2e.
ffffc201`ba255f30 fffff801`6329ef8d : 00000000`00000002 ffffc201`ba256260 ffff8285`66105870 00000000`00000000 : nt!MiIssueHardFaultIo+0x145.
ffffc201`ba255fc0 fffff801`63301a00 : 00000000`c0033333 ffffc201`ba256260 00000000`00000000 ffffc201`ba256260 : nt!MiIssueHardFault+0x15d.
ffffc201`ba256060 fffff801`633dd5fc : 00000000`00000000 00000000`00000000 00000000`00000008 00000000`00000001 : nt!MmAccessFault+0xca0.
ffffc201`ba256260 fffff801`63693e01 : 00000000`00000000 fffff801`633926a4 00000000`00000000 ffff8285`661058c0 : nt!KiPageFault+0x13c.
ffffc201`ba2563f0 fffff80c`213c2d4d : ffff8285`648d5180 00000000`00000000 ffff8285`64320900 ffff8285`5d224b20 : nt!ProbeForWrite+0x41.
ffffc201`ba256420 fffff80c`213c2560 : 000000ba`964fe680 00000000`00000070 00000000`00000000 00000000`00000070 : nsiproxy!NsippProbeAndAllocateParameters+0x4ad.
ffffc201`ba2565f0 fffff80c`213c2251 : 00000000`00000000 ffff8285`6181a560 ffff8285`6181a490 00000000`00000000 : nsiproxy!NsippEnumerateObjectsAllParameters+0x170.
ffffc201`ba2567e0 fffff801`6368aa20 : ffff8285`5e313ef0 00000000`00000000 00000000`00000000 fffff801`634d60a2 : nsiproxy!NsippDispatch+0x61.
ffffc201`ba256820 fffff801`63689904 : 00008737`00000000 ffff8285`5e313e04 00000000`00000000 ffffc201`ba256b80 : nt!IopSynchronousServiceTail+0x1a0.
ffffc201`ba2568e0 fffff801`63689286 : 00000000`00000008 00000000`0000061c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x674.
ffffc201`ba256a20 fffff801`633df070 : ffff8285`662ce7c0 000000ba`964fe4e8 ffffc201`ba256aa8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56.
ffffc201`ba256a90 00007fff`8c944f34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1d9.
000000ba`964fe578 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`8c944f34.

SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE.

MODULE_NAME: Unknown_Module.

IMAGE_NAME: Unknown_Image.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner.
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or.
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code.
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel.
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware.
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ff6e39aa27a7d, Reserved.
Arg2: b3b70369ed2281ff, Reserved.
Arg3: fffff8069a051f60, Failure type dependent information.
Arg4: 0000000000000001, Type of corrupted region, can be.
0 : A generic data region.
1 : Modification of a function or .pdata.
2 : A processor IDT.
3 : A processor GDT.
4 : Type 1 process list corruption.
5 : Type 2 process list corruption.
6 : Debug routine modification.
7 : Critical MSR modification.
8 : Object type.
9 : A processor IVT.
a : Modification of a system service function.
b : A generic session data region.
c : Modification of a session function or .pdata.
d : Modification of an import table.
e : Modification of a session import table.
f : Ps Win32 callout modification.
10 : Debug switch routine modification.
11 : IRP allocator modification.
12 : Driver call dispatcher modification.
13 : IRP completion dispatcher modification.
14 : IRP deallocator modification.
15 : A processor control register.
16 : Critical floating point control register modification.
17 : Local APIC modification.
18 : Kernel notification callout modification.
19 : Loaded module list modification.
1a : Type 3 process list corruption.
1b : Type 4 process list corruption.
1c : Driver object corruption.
1d : Executive callback object modification.
1e : Modification of module padding.
1f : Modification of a protected process.
20 : A generic data region.
21 : A page hash mismatch.
22 : A session page hash mismatch.
23 : Load config directory modification.
24 : Inverted function table modification.
25 : Session configuration modification.
26 : An extended processor control register.
27 : Type 1 pool corruption.
28 : Type 2 pool corruption.
29 : Type 3 pool corruption.
2a : Type 4 pool corruption.
2b : Modification of a function or .pdata.
2c : Image integrity corruption.
2d : Processor misconfiguration.
2e : Type 5 process list corruption.
2f : Process shadow corruption.
30 : Retpoline code page corruption.
101 : General pool corruption.
102 : Modification of win32k.sys.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3640.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 25722.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 109.

BUGCHECK_P1: a39ff6e39aa27a7d.

BUGCHECK_P2: b3b70369ed2281ff.

BUGCHECK_P3: fffff8069a051f60.

BUGCHECK_P4: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
ffff9400`7edff038 00000000`00000000 : 00000000`00000109 a39ff6e3`9aa27a7d b3b70369`ed2281ff fffff806`9a051f60 : nt!KeBugCheckEx.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis.
fffff8069a051f60-fffff8069a051f6d 14 bytes - ndis!NdisMSendNetBufferListsComplete.
[ 48 8b c4 48 89 50 10 48:ff 25 00 00 00 00 9b 05 ]
fffff8069a0525b0-fffff8069a0525c2 19 bytes - ndis!NdisMIndicateReceiveNetBufferLists (+0x650)
[ 4c 8b dc 55 57 49 8d ab:ff 25 00 00 00 00 2a 3f ]
33 errors : !ndis (fffff8069a051f60-fffff8069a0525c2)

SYMBOL_NAME: ndis!NdisMSendNetBufferListsComplete+0.

MODULE_NAME: ndis.

IMAGE_NAME: ndis.sys.

IMAGE_VERSION: 10.0.14393.0.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 0.

FAILURE_BUCKET_ID: 0x109_1_ndis!NdisMSendNetBufferListsComplete.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {1b628e81-9e60-c449-83ff-7d5579c29c83}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains.
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000008a8c.
Arg3: 00000000203ac9d3.
Arg4: 00000000e1ab1bda.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 2593.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 15902.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 70.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 3f.

BUGCHECK_P2: 8a8c.

BUGCHECK_P3: 203ac9d3.

BUGCHECK_P4: e1ab1bda.

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MemCompression.

PAGE_HASH_ERRORS_DETECTED: 1.

TRAP_FRAME: ffffd2010f37a010 -- (.trap 0xffffd2010f37a010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd2010f37a268 rbx=0000000000000000 rcx=ffffd2010fc80000.
rdx=ffffd2010fc80000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff801d11a7ed0 rsp=ffffd2010f37a1a0 rbp=ffffd2010fc80000.
r8=000000000091f400 r9=0000000000000768 r10=ffffd2010fc80ea0.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!RtlDecompressBufferXpressLz+0x50:
fffff801`d11a7ed0 418b00 mov eax,dword ptr [r8] ds:00000000`0091f400=????????
Resetting default scope.

STACK_TEXT:
ffffd201`0f379b28 fffff801`d122fa0a : 00000000`0000001a 00000000`0000003f 00000000`00008a8c 00000000`203ac9d3 : nt!KeBugCheckEx.
ffffd201`0f379b30 fffff801`d10f988a : ffffa909`ee6ad030 00000000`00010000 ffffd201`0f379c80 ffffa909`ee6ad010 : nt! ?? ::FNODOBFM::`string'+0x4684a.
ffffd201`0f379c00 fffff801`d10a4fe5 : ffffd201`0f37a010 ffffd201`0f379dc0 ffffcf80`000048f8 ffffa909`ee6ad010 : nt!MiWaitForInPageComplete+0x48a.
ffffd201`0f379d30 fffff801`d1107a00 : 00000000`c0033333 ffffd201`0f37a010 00000000`00000000 ffffd201`0f37a010 : nt!MiIssueHardFault+0x1b5.
ffffd201`0f379e10 fffff801`d11e35fc : 00000000`ffffffff 00000000`00000000 ffff9883`e89ff5d0 00000000`00000000 : nt!MmAccessFault+0xca0.
ffffd201`0f37a010 fffff801`d11a7ed0 : ffffd201`0fc80000 ffffa909`edac6050 00000000`0091f400 fffff801`d11433e4 : nt!KiPageFault+0x13c.
ffffd201`0f37a1a0 fffff801`d11433e4 : 00000000`00001000 fffff801`d12e22e0 ffffd201`0fc80000 fffff801`d1171147 : nt!RtlDecompressBufferXpressLz+0x50.
ffffd201`0f37a1c0 fffff801`d119aa5b : 00000000`00000002 ffffd201`0fc80000 00000000`0091f400 ffffd201`0fc80000 : nt!RtlDecompressBufferEx+0x64.
ffffd201`0f37a210 fffff801`d119a8d3 : 00000000`00000000 ffffa909`edac6050 00000000`00000000 00000000`0000f400 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x157.
ffffd201`0f37a2f0 fffff801`d119ac61 : 00000000`00000001 00000000`00000075 00000000`00000001 ffffd201`0000b000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b.
ffffd201`0f37a340 fffff801`d119ada0 : 00000000`ffffffff ffffa909`ee569000 ffffd201`0f37a428 ffffa909`ef133130 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199.
ffffd201`0f37a3e0 fffff801`d119bbc2 : ffffd201`0f37a4b8 ffffa909`ef133130 ffffe1fa`89f223b8 ffffa909`ef133130 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98.
ffffd201`0f37a4a0 fffff801`d119bd09 : ffffa909`edac6000 ffffd201`0f37a5b0 fffff801`d119bce8 fffff801`d119bce8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52.
ffffd201`0f37a4f0 fffff801`d10f4e75 : ffffa909`ee231040 ffffd201`0f37a5b0 ffffa909`ee6a7370 fffff801`d1141fec : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21.
ffffd201`0f37a520 fffff801`d1194f29 : 00000000`00000003 ffffa909`ee569000 ffffa909`edac6000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85.
ffffd201`0f37a570 fffff801`d119832c : ffffd201`0f37a670 ffffd201`0f37a7b0 ffffa909`edac6000 fffff801`d1195102 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad.
ffffd201`0f37a640 fffff801`d1198017 : ffffa909`edac6000 ffffa909`ef133130 fffff801`d144ba40 ffffd201`0f37a7b0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4.
ffffd201`0f37a690 fffff801`d1194dbf : 00000000`0000000c ffffa909`ee6a7420 ffffa909`ef133130 00000000`0000000b : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf.
ffffd201`0f37a710 fffff801`d119bce2 : ffffa909`0000000b ffffa909`ee6a7420 ffffd201`00000000 ffffa909`edac6000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b.
ffffd201`0f37a780 fffff801`d10a44c9 : ffffd201`0f37ab00 ffffa909`e913bc01 ffffd201`0f37a820 fffffe00`10804310 : nt!SmPageRead+0x2e.
ffffd201`0f37a7d0 fffff801`d10a4f8d : 00000000`00000002 ffffd201`0f37ab00 ffffa909`ee6a7320 00000000`00000000 : nt!MiIssueHardFaultIo+0x145.
ffffd201`0f37a860 fffff801`d1107a00 : 00000000`c0033333 ffffd201`0f37ab00 00000000`00000004 ffffd201`0f37ab00 : nt!MiIssueHardFault+0x15d.
ffffd201`0f37a900 fffff801`d11e35fc : ffffa909`ee231040 00000000`00000000 00000000`00000000 ffffa909`ee231040 : nt!MmAccessFault+0xca0.
ffffd201`0f37ab00 00007ffc`e9b81bde : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c.
000000d9`8c3ff340 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e9b81bde.

SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE.

MODULE_NAME: Unknown_Module.

IMAGE_NAME: Unknown_Image.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner.
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of.
the problem, and then special pool applied to the suspect tags or the driver.
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: 0000000000000000.
Arg3: 0000000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 2999.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 76114.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 69.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: rs1_release.

Key : WER.OS.Timestamp.
Value: 2016-07-15T16:16:00Z.

Key : WER.OS.Version.
Value: 10.0.14393.0.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 19.

BUGCHECK_P1: 22.

BUGCHECK_P2: 0.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

POOL_ADDRESS: fffff8008ac31338: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8008ab7ccf8: Unable to get Flags value from nt!KdVersionBlock.
0000000000000000.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MemCompression.

DPC_STACK_BASE: FFFFF8008C83FFB0.

STACK_TEXT:
fffff800`8c83f678 fffff800`8a9ed5d0 : 00000000`00000019 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx.
fffff800`8c83f680 fffff800`8aad5885 : 00000000`00000000 fffff800`8c83f790 00000000`00000000 00001e00`00000000 : nt! ?? ::FNODOBFM::`string'+0xa410.
fffff800`8c83f750 fffff804`7965d211 : 00000000`00000000 ffff8b8e`44dcd300 00000000`00000000 ffff7f5e`7cd49cb7 : nt!ExFreePoolWithTag+0x4f5.
fffff800`8c83f830 00000000`00000000 : ffff8b8e`44dcd300 00000000`00000000 ffff7f5e`7cd49cb7 ffff8b8e`00000001 : athw10x+0x28d211.

SYMBOL_NAME: athw10x+28d211.

MODULE_NAME: athw10x.

IMAGE_NAME: athw10x.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 28d211.

FAILURE_BUCKET_ID: 0x19_22_athw10x!unknown_function.

OS_VERSION: 10.0.14393.0.

BUILDLAB_STR: rs1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6389468c-1c97-ca58-db47-c5c836243ee4}

Followup: MachineOwner.
---------

Durumdan mutlaka haberdar edin.

Ben şimdi mem test yapacağım sizi haberdar edeceğim Memtest ortalama kaç Dk sürebilir?
 
Ben şimdi MemTest yapacağım, sizi haberdar edeceğim. MemTest ortalama kaç dk. sürebilir?
RAM'inizin boyutuna ve hızına bağlı olarak değişiyor. Ortalama 3 saat sürüyor, sizde daha kısa sürebilir.

MemTest'i yaptıktan sonra geri dönüş yapın ve sonucunu paylaşın. Yoksa bildirim gelmiyor.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı