MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000001e10d
Arg3: 000000000001e10d
Arg4: 00000000944ebfb3
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4210
BIOS_DATE: 06/25/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: H110M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 3f
BUGCHECK_P2: 1e10d
BUGCHECK_P3: 1e10d
BUGCHECK_P4: 944ebfb3
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BUGCHECK_STR: 0x1a_3f
CPU_COUNT: 4
CPU_MHZ: db0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: B4'00000000 (cache) B4'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: bf1.exe
CURRENT_IRQL: 2
PAGE_HASH_ERRORS_DETECTED: 1
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-20-2020 22:48:45.0984
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff800d5f9f6be0 -- (.trap 0xffff800d5f9f6be0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800d5f9f6f38 rbx=0000000000000000 rcx=ffffae08f5400280
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80631c43d31 rsp=ffff800d5f9f6d70 rbp=ffffae08f5400280
r8=ffffae090ae56000 r9=0000000000000000 r10=ffffae090ae5cbf0
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!RtlpHpVsContextFree+0x41:
fffff806`31c43d31 410fb74822 movzx ecx,word ptr [r8+22h] ds:ffffae09`0ae56022=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80631e6409a to fffff80631dc1510
STACK_TEXT:
ffff800d`5f9f6748 fffff806`31e6409a : 00000000`0000001a 00000000`0000003f 00000000`0001e10d 00000000`0001e10d : nt!KeBugCheckEx
ffff800d`5f9f6750 fffff806`31c8df82 : ffff978a`e9967600 ffffffff`ffffffff 00000000`00000000 ffff978a`e99676f0 : nt!MiValidatePagefilePageHash+0x10186e
ffff800d`5f9f6830 fffff806`31c8d4cd : 00000000`00000002 ffff800d`00000000 ffff800d`5f9f69e8 fffff806`00000000 : nt!MiWaitForInPageComplete+0x472
ffff800d`5f9f6940 fffff806`31c72fab : 00000000`c0033333 00000000`00000000 ffffae09`0ae56022 ffffae09`0ae56022 : nt!MiIssueHardFault+0x1ad
ffff800d`5f9f6a40 fffff806`31dcf620 : 00000000`00000000 00000000`00000000 00000000`00000484 00000000`0000001e : nt!MmAccessFault+0x40b
ffff800d`5f9f6be0 fffff806`31c43d31 : ffff800d`5f9f6d90 ffff978a`e4306690 00000000`00000000 fffff806`00000000 : nt!KiPageFault+0x360
ffff800d`5f9f6d70 fffff806`31c460ed : ffff978a`dc402340 00000000`000000ff ffff800d`5f9f6fe8 00000000`00000000 : nt!RtlpHpVsContextFree+0x41
ffff800d`5f9f6e10 fffff806`31f6f0a9 : ffff800d`5f9f7070 00000000`00000004 ffff800d`5f9f7078 01000000`00100000 : nt!ExFreeHeapPool+0x56d
ffff800d`5f9f6f30 fffff806`41001767 : ffff800d`5f9f7088 00000000`00000004 ffffbb91`42d566c3 00000000`00000000 : nt!ExFreePool+0x9
ffff800d`5f9f6f60 fffff806`4106d642 : ffffae09`0ae5cc00 00000000`00000000 ffff978a`00000003 00000000`00001b20 : dxgmms2!operator delete+0x17
ffff800d`5f9f6f90 fffff806`4106c798 : ffffae09`06b8c770 00000000`00000000 00000000`00000000 ffff800d`5f9f72f0 : dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x3b2
ffff800d`5f9f71d0 fffff806`4100278a : ffffae09`06b8c770 ffff800d`5f9f72f0 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::DestroyAllocation+0xc
ffff800d`5f9f7200 fffff806`3feebebf : 00000000`00000000 ffff800d`5f9f7330 00000000`00000000 00000000`00000000 : dxgmms2!VidMmDestroyAllocation+0x1a
ffff800d`5f9f7230 fffff806`3ff3e3c2 : ffffae09`0b749010 fffff806`3ff42add ffffae09`0b749010 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x49b
ffff800d`5f9f73c0 fffff806`3ff1a5ce : ffffae09`0b749010 ffffae09`0b749100 00000000`00000000 ffffae09`0b749188 : dxgkrnl!DXGDEVICE::DrainAllocations+0x4a
ffff800d`5f9f7420 fffff806`3ff1f424 : ffffae09`0b749010 ffffae09`030be810 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x156
ffff800d`5f9f7460 fffff806`3fefb35e : 00000000`00000000 ffff800d`5f9f7590 ffffae09`0b749010 ffffae09`0b749010 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
ffff800d`5f9f7490 fffff806`3fefcde5 : ffffae09`06a6f5a0 00000000`00000000 ffffae09`06a6f5a0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x44e
ffff800d`5f9f7700 fffff806`3fe08d04 : 00000000`00000005 ffffae09`06a6f5a0 ffff978a`de7e2690 ffff978a`e7df4080 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff800d`5f9f7840 fffff806`321cdb36 : 00000000`00000000 00000000`00000000 00000000`0000ff00 ffff978a`e4d173d0 : dxgkrnl!DxgkProcessNotify+0xa4
ffff800d`5f9f7880 fffff806`322686b0 : ffff978a`e7df4000 ffff978a`e7df4080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x212
ffff800d`5f9f7950 fffff806`3225eadf : ffff978a`eac2f688 00000000`00000000 ffff800d`5f9f7b80 00000000`00000000 : nt!PspExitProcess+0x70
ffff800d`5f9f7980 fffff806`32239fbb : 00000000`00000000 ffff800d`5f9f7b01 00000000`002c1000 ffff978a`eac2f080 : nt!PspExitThread+0x5c7
ffff800d`5f9f7a90 fffff806`31dd2e15 : ffff978a`00001b20 ffff978a`eac2f080 ffff978a`e7df4080 00000000`00000248 : nt!NtTerminateProcess+0xeb
ffff800d`5f9f7b00 00007ff8`de19c644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`03cffc18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`de19c644
THREAD_SHA1_HASH_MOD_FUNC: ab473d53931b88aa99a963dc2b7a19233243ba38
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 72afa84b4e83c052b509a715f290c65d63b46199
THREAD_SHA1_HASH_MOD: 3dfc752e715d6bcffd8cb38ee7f8a6da33e9e3bf
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FOLLOWUP_NAME: MachineOwner
BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
DEFAULT_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
PRIMARY_PROBLEM_CLASS: PAGE_HASH_ERRORS_0x1a_3f
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
TARGET_TIME: 2020-02-17T18:20:20.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 777a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:page_hash_errors_0x1a_3f
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.