AMD- A10-5800k
Korean Rated 500w PSU
GTX 1050ti
1x4 Hyperx 1x4 Kingston
1 TB HDD wd cavler green
Gammax 400s cooler
So here are the dumpfiles
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\user\OneDrive\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff807
Debug session time: Fri Dec 4 17:48:31.021 2020 (UTC + 8:00)
System Uptime: 0 days 21:10:12.726
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
................
For analysis of this file, run !analyze -v
2: kd> !analyze -v
***
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000001414c
Arg3: 00000000d68280e0
Arg4: 000000003ef99bfc
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RH6MTVE
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 87
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 1414c
BUGCHECK_P3: d68280e0
BUGCHECK_P4: 3ef99bfc
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: fffff3033e64c6a0 -- (.trap 0xfffff3033e64c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8071f760d20 rbx=0000000000000000 rcx=ffffcb005f7c0000
rdx=ffffcb005f7c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071f760d70 rsp=fffff3033e64c838 rbp=ffffcb005f7c0000
r8=0000021d205f1420 r9=00000000000007ee r10=ffffcb005f7c0ea0
r11=0000021d205f1c0e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff807
Resetting default scope
STACK_TEXT:
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
2: kd> !analyze -v
***
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000001414c
Arg3: 00000000d68280e0
Arg4: 000000003ef99bfc
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RH6MTVE
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 1414c
BUGCHECK_P3: d68280e0
BUGCHECK_P4: 3ef99bfc
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: fffff3033e64c6a0 -- (.trap 0xfffff3033e64c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8071f760d20 rbx=0000000000000000 rcx=ffffcb005f7c0000
rdx=ffffcb005f7c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071f760d70 rsp=fffff3033e64c838 rbp=ffffcb005f7c0000
r8=0000021d205f1420 r9=00000000000007ee r10=ffffcb005f7c0ea0
r11=0000021d205f1c0e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff807
Resetting default scope
STACK_TEXT:
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
fffff303
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
Korean Rated 500w PSU
GTX 1050ti
1x4 Hyperx 1x4 Kingston
1 TB HDD wd cavler green
Gammax 400s cooler
So here are the dumpfiles
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\user\OneDrive\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff807
1f600000 PsLoadedModuleList = 0xfffff807
1fa461b0Debug session time: Fri Dec 4 17:48:31.021 2020 (UTC + 8:00)
System Uptime: 0 days 21:10:12.726
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
................
For analysis of this file, run !analyze -v
2: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000001414c
Arg3: 00000000d68280e0
Arg4: 000000003ef99bfc
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RH6MTVE
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 87
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 1414c
BUGCHECK_P3: d68280e0
BUGCHECK_P4: 3ef99bfc
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: fffff3033e64c6a0 -- (.trap 0xfffff3033e64c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8071f760d20 rbx=0000000000000000 rcx=ffffcb005f7c0000
rdx=ffffcb005f7c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071f760d70 rsp=fffff3033e64c838 rbp=ffffcb005f7c0000
r8=0000021d205f1420 r9=00000000000007ee r10=ffffcb005f7c0ea0
r11=0000021d205f1c0e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff807
1f760d70 418b08 mov ecx,dword ptr [r8] ds:0000021d
205f1420=????????Resetting default scope
STACK_TEXT:
fffff303
3e64c208 fffff807
1f8666f2 : 000000000000001a 00000000
0000003f 000000000001414c 00000000
d68280e0 : nt!KeBugCheckExfffff303
3e64c210 fffff807
1f607052 : ffffb70a99877250 ffffffff
ffffffff 0000000000000000 ffffb70a
99877340 : nt!MiValidatePagefilePageHash+0x1014a6fffff303
3e64c2f0 fffff807
1f6072ad : 0000000000000002 fffff303
00000000 fffff3033e64c4a8 fffff807
00000000 : nt!MiWaitForInPageComplete+0x472fffff303
3e64c400 fffff807
1f6cabbb : 00000000c0033333 00000000
00000000 0000021d205f1420 fffff807
1f7cacef : nt!MiIssueHardFault+0x1adfffff303
3e64c500 fffff807
1f7d1b5e : 0000021d207078f1 fffff303
3e64c720 fffff3033e64cac8 00000000
00000000 : nt!MmAccessFault+0x40bfffff303
3e64c6a0 fffff807
1f760d70 : ffffcb005f7c0000 ffffb70a
999a2050 fffff8071f707ae0 ffffcb00
5f7c0000 : nt!KiPageFault+0x35efffff303
3e64c838 fffff807
1f707ae0 : ffffcb005f7c0000 ffffcb00
5f7c0000 0000000000000002 0000021d
205f1420 : nt!RtlDecompressBufferXpressLz+0x50fffff303
3e64c850 fffff807
1f762af9 : 0000000000000000 00000000
00000000 0000000000000000 ffffb70a
999a3788 : nt!RtlDecompressBufferEx+0x60fffff303
3e64c8a0 fffff807
1f762984 : 0000000000000004 fffff303
3e64cab0 0000000000000000 00000000
00000007 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x155fffff303
3e64c980 fffff807
1f762802 : 0000000000000001 00000000
00001420 ffffb70a00001420 ffffb70a
00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0fffff303
3e64c9d0 fffff807
1f76262b : 00000000ffffffff ffffb70a
999a5000 fffff3033e64cab0 ffffb70a
9c4ec4d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186fffff303
3e64ca70 fffff807
1f762471 : ffffb70a999a5000 fffff807
00000000 0000000000000000 ffffb70a
999a3788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcbfffff303
3e64cb20 fffff807
1f705480 : ffffb70a999a2000 ffffb70a
9c4ec4d0 ffffb70a999a5000 ffffb70a
999a39b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85fffff303
3e64cba0 fffff807
1f733585 : ffffb70a99983080 00000000
00000080 fffff8071f705330 fffff303
3e5e9278 : nt!SMKM_STORE<SM_TRAITS>::SmStReadThread+0x150fffff303
3e64cc10 fffff807
1f7cb128 : ffffcb005d754180 ffffb70a
99983080 fffff8071f733530 00000000
00000000 : nt!PspSystemThreadStartup+0x55fffff303
3e64cc60 00000000
00000000 : fffff3033e64d000 fffff303
3e647000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x28SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
2: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000001414c
Arg3: 00000000d68280e0
Arg4: 000000003ef99bfc
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RH6MTVE
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 1414c
BUGCHECK_P3: d68280e0
BUGCHECK_P4: 3ef99bfc
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: fffff3033e64c6a0 -- (.trap 0xfffff3033e64c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8071f760d20 rbx=0000000000000000 rcx=ffffcb005f7c0000
rdx=ffffcb005f7c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071f760d70 rsp=fffff3033e64c838 rbp=ffffcb005f7c0000
r8=0000021d205f1420 r9=00000000000007ee r10=ffffcb005f7c0ea0
r11=0000021d205f1c0e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff807
1f760d70 418b08 mov ecx,dword ptr [r8] ds:0000021d
205f1420=????????Resetting default scope
STACK_TEXT:
fffff303
3e64c208 fffff807
1f8666f2 : 000000000000001a 00000000
0000003f 000000000001414c 00000000
d68280e0 : nt!KeBugCheckExfffff303
3e64c210 fffff807
1f607052 : ffffb70a99877250 ffffffff
ffffffff 0000000000000000 ffffb70a
99877340 : nt!MiValidatePagefilePageHash+0x1014a6fffff303
3e64c2f0 fffff807
1f6072ad : 0000000000000002 fffff303
00000000 fffff3033e64c4a8 fffff807
00000000 : nt!MiWaitForInPageComplete+0x472fffff303
3e64c400 fffff807
1f6cabbb : 00000000c0033333 00000000
00000000 0000021d205f1420 fffff807
1f7cacef : nt!MiIssueHardFault+0x1adfffff303
3e64c500 fffff807
1f7d1b5e : 0000021d207078f1 fffff303
3e64c720 fffff3033e64cac8 00000000
00000000 : nt!MmAccessFault+0x40bfffff303
3e64c6a0 fffff807
1f760d70 : ffffcb005f7c0000 ffffb70a
999a2050 fffff8071f707ae0 ffffcb00
5f7c0000 : nt!KiPageFault+0x35efffff303
3e64c838 fffff807
1f707ae0 : ffffcb005f7c0000 ffffcb00
5f7c0000 0000000000000002 0000021d
205f1420 : nt!RtlDecompressBufferXpressLz+0x50fffff303
3e64c850 fffff807
1f762af9 : 0000000000000000 00000000
00000000 0000000000000000 ffffb70a
999a3788 : nt!RtlDecompressBufferEx+0x60fffff303
3e64c8a0 fffff807
1f762984 : 0000000000000004 fffff303
3e64cab0 0000000000000000 00000000
00000007 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x155fffff303
3e64c980 fffff807
1f762802 : 0000000000000001 00000000
00001420 ffffb70a00001420 ffffb70a
00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0fffff303
3e64c9d0 fffff807
1f76262b : 00000000ffffffff ffffb70a
999a5000 fffff3033e64cab0 ffffb70a
9c4ec4d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186fffff303
3e64ca70 fffff807
1f762471 : ffffb70a999a5000 fffff807
00000000 0000000000000000 ffffb70a
999a3788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcbfffff303
3e64cb20 fffff807
1f705480 : ffffb70a999a2000 ffffb70a
9c4ec4d0 ffffb70a999a5000 ffffb70a
999a39b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85fffff303
3e64cba0 fffff807
1f733585 : ffffb70a99983080 00000000
00000080 fffff8071f705330 fffff303
3e5e9278 : nt!SMKM_STORE<SM_TRAITS>::SmStReadThread+0x150fffff303
3e64cc10 fffff807
1f7cb128 : ffffcb005d754180 ffffb70a
99983080 fffff8071f733530 00000000
00000000 : nt!PspSystemThreadStartup+0x55fffff303
3e64cc60 00000000
00000000 : fffff3033e64d000 fffff303
3e647000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x28SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.