Microsoft (R) Windows Debugger Version 10.0.17134.12 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\Spiele\steamapps\temp\BSOD\021219-7031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff802`1329d000 PsLoadedModuleList = 0xfffff802`136b8ad0
Debug session time: Tue Feb 12 11:51:34.299 2019 (UTC + 1:00)
System Uptime: 0 days 0:48:19.014
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {3f, ac3be, 3fb74da4, 3fb74d84}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : Unknown_Image ( PAGE_HASH_ERRORS_INPAGE )
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, The subtype of the bugcheck.
Arg2: 00000000000ac3be
Arg3: 000000003fb74da4
Arg4: 000000003fb74d84
Debugging Details:
------------------
KEY_VALUES_STRING: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: ASUS
SYSTEM_PRODUCT_NAME: All Series
SYSTEM_SKU: All
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 3003
BIOS_DATE: 10/28/2015
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: MAXIMUS VII RANGER
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 3f
BUGCHECK_P2: ac3be
BUGCHECK_P3: 3fb74da4
BUGCHECK_P4: 3fb74d84
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BUGCHECK_STR: 0x1a_3f
CPU_COUNT: 8
CPU_MHZ: e0e
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
CURRENT_IRQL: 2
PAGE_HASH_ERRORS_DETECTED: 1
ANALYSIS_SESSION_HOST: DESKTOP-KM75KH7
ANALYSIS_SESSION_TIME: 02-12-2019 15:28:00.0761
ANALYSIS_VERSION: 10.0.17134.12 amd64fre
TRAP_FRAME: ffffee0a9e3ab470 -- (.trap 0xffffee0a9e3ab470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000730070 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffd9011fd3b0f4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802133ea40a rsp=ffffee0a9e3ab608 rbp=0000020d487d4ffd
r8=0000020d487d4ffe r9=0000000095460ba0 r10=0000020d487d5529
r11=0000020d487d54d3 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei ng nz na po nc
nt!RtlDecompressBufferXpressLz+0xda:
fffff802`133ea40a 418b00 mov eax,dword ptr [r8] ds:0000020d`487d4ffe=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80213567fc2 to fffff80213450440
STACK_TEXT:
ffffee0a`9e3aaff8 fffff802`13567fc2 : 00000000`0000001a 00000000`0000003f 00000000`000ac3be 00000000`3fb74da4 : nt!KeBugCheckEx
ffffee0a`9e3ab000 fffff802`134b96b4 : ffffc409`093718f0 ffffffff`ffffffff 00000000`00000000 ffffc409`093719e0 : nt!MiValidatePagefilePageHash+0x30e
ffffee0a`9e3ab0e0 fffff802`13338d2d : 00000000`00000002 ffffee0a`00000000 ffffee0a`9e3ab278 fffff802`00000000 : nt!MiWaitForInPageComplete+0x180f94
ffffee0a`9e3ab1d0 fffff802`133a4a1d : 00000000`c0033333 00000000`00000000 0000020d`487d5000 ffffc409`0222f040 : nt!MiIssueHardFault+0x1ad
ffffee0a`9e3ab2d0 fffff802`1345df83 : ffffd901`2045dea0 ffffee0a`9e3ab4f0 ffffee0a`9e3ab898 ffffee0a`9e3ab500 : nt!MmAccessFault+0x3ed
ffffee0a`9e3ab470 fffff802`133ea40a : ffffd901`1fd3b000 ffffc409`049ab050 fffff802`132a5270 ffffd901`1fd3b000 : nt!KiPageFault+0x343
ffffee0a`9e3ab608 fffff802`132a5270 : ffffd901`1fd3b000 ffffd901`1fd3b000 00000000`00000002 0000020d`487d4f40 : nt!RtlDecompressBufferXpressLz+0xda
ffffee0a`9e3ab620 fffff802`133df55a : 00000000`00000000 00000000`00000000 00000000`00000000 0000020d`487d0000 : nt!RtlDecompressBufferEx+0x60
ffffee0a`9e3ab670 fffff802`133df3f4 : 00000000`00000004 ffffee0a`9e3ab880 00000000`00000000 00000000`000000ff : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x146
ffffee0a`9e3ab750 fffff802`133df1a2 : 00000000`00000001 00000000`00004f40 00000000`00004f40 00000000`000c7000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
ffffee0a`9e3ab7a0 fffff802`133defcd : ffffc409`ffffffff ffffc409`0a280000 ffffee0a`9e3ab880 ffffc409`06e77260 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
ffffee0a`9e3ab840 fffff802`133de0e5 : ffffc409`0a280000 00000000`00000000 00000000`00000000 ffffc409`049ac788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc1
ffffee0a`9e3ab8f0 fffff802`133dd821 : ffffc409`049ab000 ffffc409`06e77260 ffffc409`0a280000 ffffc409`049ac9b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffee0a`9e3ab970 fffff802`133bcfe8 : ffffc409`08c45680 ffffc409`049ab000 ffffc409`08c45680 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffee0a`9e3ab9a0 fffff802`133e73f5 : fffff802`133dd800 ffffee0a`9e3aba50 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffee0a`9e3aba10 fffff802`133e6a44 : ffffc409`08c45600 00000000`00000000 00000006`c008af5b fffff802`132067a9 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffee0a`9e3abae0 fffff802`133e8d84 : ffffc409`08c45600 00000006`c008af5b fffff802`137f8e90 fffff802`137f8c68 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1b4
ffffee0a`9e3abb30 fffff802`133511ea : 00000000`00989680 ffffc409`08c45680 fffff802`133e8ce0 ffffc409`06e77288 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmAsyncReadQueueWorker+0xa4
ffffee0a`9e3abb70 fffff802`13323bc5 : ffffc409`08c45680 ffffc408`f9a95380 ffffc409`08c45680 00000000`00000000 : nt!ExpWorkerThread+0x16a
ffffee0a`9e3abc10 fffff802`1345789c : ffffd901`1cfa5180 ffffc409`08c45680 fffff802`13323b70 ffffee0a`9e3abec0 : nt!PspSystemThreadStartup+0x55
ffffee0a`9e3abc60 00000000`00000000 : ffffee0a`9e3ac000 ffffee0a`9e3a6000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c
THREAD_SHA1_HASH_MOD_FUNC: 7abc9e7ee9c1647032173d52714f532611068604
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 59f0724dacde29e3fd7dcd89a9840b1525355dd4
THREAD_SHA1_HASH_MOD: 7c2b727fe0ab8515945a4d96a0f6fa917ccf2d6e
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FOLLOWUP_NAME: MachineOwner
BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
DEFAULT_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
PRIMARY_PROBLEM_CLASS: PAGE_HASH_ERRORS_0x1a_3f
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
TARGET_TIME: 2019-02-12T10:51:34.000Z
OSBUILD: 17763
OSSERVICEPACK: 292
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 3b82
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:page_hash_errors_0x1a_3f
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.