*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000014d9ff
Arg3: 000000008d5bcecc
Arg4: 000000000014d807
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3234
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 33316
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 14d9ff
BUGCHECK_P3: 8d5bcecc
BUGCHECK_P4: 14d807
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Update.exe
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: fffff907b16d8120 -- (.trap 0xfffff907b16d8120)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8041e595000 rbx=0000000000000000 rcx=fffff8041e5b3010
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041fe08a37 rsp=fffff907b16d82b8 rbp=fffff907b16d8341
r8=00000000000205f0 r9=000000000000004b r10=7ffffffffffffffc
r11=fffff77bbddee7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!memset+0xb7:
fffff804`1fe08a37 0f2941f0 movaps xmmword ptr [rcx-10h],xmm0 ds:fffff804`1e5b3000=000800010000000000000000307b7fd8
Resetting default scope
STACK_TEXT:
fffff907`b16d7c98 fffff804`1ff57a7d : 00000000`0000001a 00000000`0000003f 00000000`0014d9ff 00000000`8d5bcecc : nt!KeBugCheckEx
fffff907`b16d7ca0 fffff804`1fcb69a1 : ffffcc0c`ca273dd0 ffffffff`ffffffff 00000000`00000000 ffffde00`0c658d98 : nt!MiValidatePagefilePageHash+0x331
fffff907`b16d7d80 fffff804`1fcb4b35 : fffff907`00001000 fffff907`b16d7f00 fffff907`b16d7f10 fffff804`00000000 : nt!MiWaitForInPageComplete+0x351
fffff907`b16d7e70 fffff804`1fc0c9c8 : 00000000`c0033333 00000000`00000000 fffff804`1e5b3000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffff907`b16d7f80 fffff804`1fe0395e : 0007ffff`00000003 fffff804`20650b80 00000000`00000030 fffff804`2064e938 : nt!MmAccessFault+0x468
fffff907`b16d8120 fffff804`1fe08a37 : fffff804`2003ceab ffffcc0c`c0699d00 fffff907`00000000 fffff804`20650b80 : nt!KiPageFault+0x35e
fffff907`b16d82b8 fffff804`2003ceab : ffffcc0c`c0699d00 fffff907`00000000 fffff804`20650b80 ffffde00`0c439ae0 : nt!memset+0xb7
fffff907`b16d82c0 fffff804`2003b4d4 : 00000000`0078e000 ffffde00`0d1c0000 ffffcc0c`c8f38de0 00000000`00000000 : nt!MiUpdateCfgSystemWideBitmapWorker+0x30b
fffff907`b16d83a0 fffff804`200440ee : 00000000`00000023 fffff907`b16d8660 00000000`00000000 00000000`66540000 : nt!MiUpdateCfgSystemWideBitmap+0x70
fffff907`b16d83e0 fffff804`200431c6 : fffff907`b16d8840 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRelocateImage+0x32e
fffff907`b16d8560 fffff804`2003056b : ffffcc0c`cc20f7f0 fffff907`b16d8840 fffff907`b16d8840 00000000`00000ecf : nt!MiCreateNewSection+0x6b2
fffff907`b16d86d0 fffff804`2002fbb4 : fffff907`b16d8700 ffffde00`18706550 ffffcc0c`cc20f7f0 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
fffff907`b16d87c0 fffff804`2002f997 : 00000000`01000000 fffff907`b16d8b80 00000000`00000001 00000000`00000010 : nt!MiCreateSection+0xf4
fffff907`b16d8940 fffff804`2002f77c : 00000000`0113e3e8 00000000`0000000d 00000000`00000000 00000000`00000001 : nt!MiCreateSectionCommon+0x207
fffff907`b16d8a20 fffff804`1fe071b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x5c
fffff907`b16d8a90 00007ffe`3af8c8f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0113e348 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3af8c8f4
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 00000000001b60e1
Arg3: 0000000037130d8c
Arg4: 00000000a9268e1c
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2984
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 33542
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 1b60e1
BUGCHECK_P3: 37130d8c
BUGCHECK_P4: a9268e1c
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
PAGE_HASH_ERRORS_DETECTED: 1
STACK_TEXT:
ffffba8d`ce947688 fffff803`4cb656ad : 00000000`0000001a 00000000`0000003f 00000000`001b60e1 00000000`37130d8c : nt!KeBugCheckEx
ffffba8d`ce947690 fffff803`4ca3c6b3 : ffff8d08`75909e10 ffffffff`ffffffff ffffba8d`ce9478f0 ffff8d08`959ea700 : nt!MiValidatePagefilePageHash+0x331
ffffba8d`ce947770 fffff803`4c893e7e : 00000000`00000000 ffff8d08`00000000 ffffba8d`ce947900 fffff803`00000000 : nt!MiWaitForInPageComplete+0x1a6da3
ffffba8d`ce947860 fffff803`4c812d48 : 00000000`c0033333 00000000`00000001 00000000`0ed2ed1c fffff803`4c8ec038 : nt!MiIssueHardFault+0x18e
ffffba8d`ce947960 fffff803`4c9ebb1e : 00000000`77b23fb0 ffff8d08`537de5e0 ffffba8d`00000000 ffff8d08`00000000 : nt!MmAccessFault+0x468
ffffba8d`ce947b00 00000000`029fb1f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0dcaf520 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x29fb1f6
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8102b82614ed, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8042d57b9e2, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 132540
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff8102b82614ed
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8042d57b9e2
BUGCHECK_P4: 2
READ_ADDRESS: fffff8041d9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8041d8283c8: Unable to get Flags value from nt!KdVersionBlock
fffff8041d8283c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8102b82614ed
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: aow_exe.exe
TRAP_FRAME: ffffe9809655cf50 -- (.trap 0xffffe9809655cf50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000018 rbx=0000000000000000 rcx=0000000002171107
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042d57b9e2 rsp=ffffe9809655d0e0 rbp=ffffe9809655d390
r8=0000000000000000 r9=0000000042e220f8 r10=0000000000000001
r11=0000000042e220d9 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
aow_drv_x64_ev+0x7b9e2:
fffff804`2d57b9e2 8b548e29 mov edx,dword ptr [rsi+rcx*4+29h] ds:00000000`085c4445=????????
Resetting default scope
STACK_TEXT:
ffffe980`9655cca8 fffff804`1d613ae0 : 00000000`00000050 ffff8102`b82614ed 00000000`00000000 ffffe980`9655cf50 : nt!KeBugCheckEx
ffffe980`9655ccb0 fffff804`1d4cdcbf : 00000000`00000005 00000000`00000000 00000000`00000000 ffff8102`b82614ed : nt!MiSystemFault+0x18f320
ffffe980`9655cdb0 fffff804`1d5d1b5e : ffff8102`b007a080 fffff804`1d44f6c5 ffff8102`afc9d000 00000000`00000000 : nt!MmAccessFault+0x34f
ffffe980`9655cf50 fffff804`2d57b9e2 : ffff8102`af5a9a40 ffffe980`9655d230 ffff8102`a29433d0 ffff8102`b007a080 : nt!KiPageFault+0x35e
ffffe980`9655d0e0 ffff8102`af5a9a40 : ffffe980`9655d230 ffff8102`a29433d0 ffff8102`b007a080 00000000`0000010e : aow_drv_x64_ev+0x7b9e2
ffffe980`9655d0e8 ffffe980`9655d230 : ffff8102`a29433d0 ffff8102`b007a080 00000000`0000010e fffff804`2d560f06 : 0xffff8102`af5a9a40
ffffe980`9655d0f0 ffff8102`a29433d0 : ffff8102`b007a080 00000000`0000010e fffff804`2d560f06 00000000`0000010e : 0xffffe980`9655d230
ffffe980`9655d0f8 ffff8102`b007a080 : 00000000`0000010e fffff804`2d560f06 00000000`0000010e ffff8102`b007a080 : 0xffff8102`a29433d0
ffffe980`9655d100 00000000`0000010e : fffff804`2d560f06 00000000`0000010e ffff8102`b007a080 00000000`000000ae : 0xffff8102`b007a080
ffffe980`9655d108 fffff804`2d560f06 : 00000000`0000010e ffff8102`b007a080 00000000`000000ae 00000000`00a7e6d0 : 0x10e
ffffe980`9655d110 00000000`0000010e : ffff8102`b007a080 00000000`000000ae 00000000`00a7e6d0 00000000`00000000 : aow_drv_x64_ev+0x60f06
ffffe980`9655d118 ffff8102`b007a080 : 00000000`000000ae 00000000`00a7e6d0 00000000`00000000 fffff804`2d583675 : 0x10e
ffffe980`9655d120 00000000`000000ae : 00000000`00a7e6d0 00000000`00000000 fffff804`2d583675 ffff8102`afc9d000 : 0xffff8102`b007a080
ffffe980`9655d128 00000000`00a7e6d0 : 00000000`00000000 fffff804`2d583675 ffff8102`afc9d000 ffff8102`afc9d000 : 0xae
ffffe980`9655d130 00000000`00000000 : fffff804`2d583675 ffff8102`afc9d000 ffff8102`afc9d000 00000000`42e220f9 : 0xa7e6d0
SYMBOL_NAME: aow_drv_x64_ev+7b9e2
MODULE_NAME: aow_drv_x64_ev
IMAGE_NAME: aow_drv_x64_ev.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7b9e2
FAILURE_BUCKET_ID: AV_R_INVALID_aow_drv_x64_ev!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f12283ae-951b-de5d-11f1-3aa3364fd9fe}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbb8e33db5000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8026546188e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 46396
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffbb8e33db5000
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8026546188e
BUGCHECK_P4: 0
READ_ADDRESS: fffff802624fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026240f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8026240f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbb8e33db5000
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
TRAP_FRAME: ffff948bd73fdbc0 -- (.trap 0xffff948bd73fdbc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff838fd471e5a0 rbx=0000000000000000 rcx=ffff838fd4724570
rdx=000037fe5f690a60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026546188e rsp=ffff948bd73fdd58 rbp=ffff948bd73fe170
r8=0000000000000030 r9=0000000003fffd80 r10=0000000000000000
r11=ffffbb8f33dab000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
Ntfs!memcpy+0x1ce:
fffff802`6546188e 0f10641130 movups xmm4,xmmword ptr [rcx+rdx+30h] ds:ffffbb8e`33db5000=????????????????????????????????
Resetting default scope
STACK_TEXT:
ffff948b`d73fd918 fffff802`61c35ecd : 00000000`00000050 ffffbb8e`33db5000 00000000`00000000 ffff948b`d73fdbc0 : nt!KeBugCheckEx
ffff948b`d73fd920 fffff802`61a12ce0 : 00000000`00000114 00000000`00000000 ffff948b`d73fdc40 00000000`00000000 : nt!MiSystemFault+0x1ad79d
ffff948b`d73fda20 fffff802`61bebb1e : 00000000`00000103 00000000`00000000 ffff948b`d73fdd00 ffff948b`d73fdd08 : nt!MmAccessFault+0x400
ffff948b`d73fdbc0 fffff802`6546188e : fffff802`6544c70a 00000000`00000000 ffffbb8e`33daf000 00000000`06dda400 : nt!KiPageFault+0x35e
ffff948b`d73fdd58 fffff802`6544c70a : 00000000`00000000 ffffbb8e`33daf000 00000000`06dda400 00000000`000000f0 : Ntfs!memcpy+0x1ce
ffff948b`d73fdd60 fffff802`6544773b : 00000000`00000000 ffffbb8e`271b25a0 00000000`00000000 00000000`00000700 : Ntfs!NtfsResidentWrite+0x43e
ffff948b`d73fdf10 fffff802`65445f23 : ffffcb87`2b1a6d28 ffffcb87`2a1eda60 ffff948b`d73fe1b0 00000000`00000000 : Ntfs!NtfsCommonWrite+0x159b
ffff948b`d73fe140 fffff802`61a46d25 : 00000000`00000000 ffffcb87`2a1eda60 fffff802`6519d0a0 ffffcb87`2a1eda60 : Ntfs!NtfsFsdWrite+0x1d3
ffff948b`d73fe210 fffff802`651a248a : 00000000`00000000 00000000`00000000 fffff802`00000000 ffffcb87`0a702270 : nt!IofCallDriver+0x55
ffff948b`d73fe250 00000000`00000000 : 00000000`00000000 fffff802`00000000 ffffcb87`0a702270 00000000`00000000 : diskpt+0x1248a
SYMBOL_NAME: diskpt+1248a
MODULE_NAME: diskpt
IMAGE_NAME: diskpt.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1248a
FAILURE_BUCKET_ID: AV_R_INVALID_diskpt!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6511526-f7fa-922c-5438-36d3b6af2a6d}
Followup: MachineOwner
---------