My gaming PC keeps blue screening
Specs MBD: Gigabyte B450M-DS3H CPU: AMD Ryzen 5 3600 RAM: 16GB GPU: AMD Radeon RX 560 2GB PSU: 500W OS: Windows 11 System drive: Seagate Barracuda 2TB HDD Storage drive: Western Digital 1TB HDD and Seagate 1TB external HDD
I have the five BSOD minidumps. Here are the reports.
Report 1
- *
- Bugcheck Analysis *
- * *******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000008, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
*** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. ***
*** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. ***
*** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. ***
*** Type referenced: ExceptionRecord ***
*** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. ***
*** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. ***
*** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. ***
*** Type referenced: ContextRecord ***
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec Value: 2046
Key : Analysis.Elapsed.mSec Value: 3742
Key : Analysis.IO.Other.Mb Value: 0
Key : Analysis.IO.Read.Mb Value: 1
Key : Analysis.IO.Write.Mb Value: 0
Key : Analysis.Init.CPU.mSec Value: 359
Key : Analysis.Init.Elapsed.mSec Value: 4376
Key : Analysis.Memory.CommitPeak.Mb Value: 98
Key : Analysis.Version.DbgEng Value: 10.0.27725.1000
Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI Value: 0x1e
Key : Bugcheck.Code.TargetModel Value: 0x1e
Key : Dump.Attributes.AsUlong Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1
Key : Failure.Bucket Value: AV_nt!KiDispatchException
Key : Failure.Hash Value: {00781d15-b897-afab-75cd-f83221cbf387}
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 0
BUGCHECK_P3: 8
BUGCHECK_P4: 0
FILE_IN_CAB: 111024-41531-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump
FAULTING_THREAD: ffff8001ca195540
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Plex Transcode
STACK_TEXT:
fffff30356f40fa8 fffff804
366b82b5 : 000000000000001e ffffffff
c0000005 0000000000000000 00000000
00000008 : nt!KeBugCheckEx
fffff30356f40fb0 fffff804
3662ae7c : 0000000000001000 ffff8001
d1d35800 0000000000000000 fffff303
56f41790 : nt!KiDispatchException+0x1a0325
fffff30356f41690 fffff804
36626163 : fffff30300000020 fffff303
56010088 000000f6b90fbab8 ffff8001
d18e6940 : nt!KiExceptionDispatch+0x13c
fffff30356f41870 00000000
00000000 : 0000000000000010 00000000
00000001 0000000000000000 00000000
00000000 : nt!KiPageFault+0x463
SYMBOL_NAME: nt!KiDispatchException+1a0325
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.4317
STACK_COMMAND: .process /r /p 0xffff8001d1d350c0; .thread 0xffff8001ca195540 ; kb
BUCKET_ID_FUNC_OFFSET: 1a0325
FAILURE_BUCKET_ID: AV_nt!KiDispatchException
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {00781d15-b897-afab-75cd-f83221cbf387}
Followup: MachineOwner
Report 2
- *
- Bugcheck Analysis *
- * *******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000c89515c49, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: 0000000c89515c49, address which referenced memory
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec Value: 1500
Key : Analysis.Elapsed.mSec Value: 2936
Key : Analysis.IO.Other.Mb Value: 0
Key : Analysis.IO.Read.Mb Value: 1
Key : Analysis.IO.Write.Mb Value: 0
Key : Analysis.Init.CPU.mSec Value: 312
Key : Analysis.Init.Elapsed.mSec Value: 27512
Key : Analysis.Memory.CommitPeak.Mb Value: 97
Key : Analysis.Version.DbgEng Value: 10.0.27725.1000
Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI Value: 0xd1
Key : Bugcheck.Code.TargetModel Value: 0xd1
Key : Dump.Attributes.AsUlong Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1
Key : Failure.Bucket Value: AV_CODE_AV_BAD_IP_nt!KiPageFault
Key : Failure.Hash Value: {73cd60cc-83fa-6b76-df08-1961c31d7403}
BUGCHECK_CODE: d1
BUGCHECK_P1: c89515c49
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: c89515c49
FILE_IN_CAB: 111024-47734-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump
FAULTING_THREAD: ffff870570b82080
READ_ADDRESS: fffff8027191d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000c89515c49
PROCESS_NAME: System
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: ffffc389976d18f0 -- (.trap 0xffffc389976d18f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff80271010d10 rbx=0000000000000000 rcx=fffff7e8c000e000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=0000000c89515c49 rsp=ffffc389976d1a80 rbp=ffffc389976d1b30 r8=0000000000000000 r9=ffffc389976d1990 r10=0000fffff8027101 r11=ffff997abe200000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl nz ac pe cy 0000000c`89515c49 ?? ??? Resetting default scope
FAILED_INSTRUCTION_ADDRESS: +0 0000000c`89515c49 ?? ???
STACK_TEXT:
ffffc389976d17a8 fffff802
7102ad29 : 000000000000000a 0000000c
89515c49 00000000000000ff 00000000
00000000 : nt!KeBugCheckEx
ffffc389976d17b0 fffff802
71026189 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiBugCheckDispatch+0x69
ffffc389976d18f0 0000000c
89515c49 : 0000000c892a5649 00000000
00000000 0000000000000000 00000000
82000000 : nt!KiPageFault+0x489
ffffc389976d1a80 0000000c
892a5649 : 0000000000000000 00000000
00000000 0000000082000000 ffffa981
a0787180 : 0x0000000c89515c49
ffffc389
976d1a88 0000000000000000 : 00000000
00000000 0000000082000000 ffffa981
a0787180 fffff8027101d9fc : 0x0000000c
892a5649
SYMBOL_NAME: nt!KiPageFault+489
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.4317
STACK_COMMAND: .process /r /p 0xfffff80271949f40; .thread 0xffff870570b82080 ; kb
BUCKET_ID_FUNC_OFFSET: 489
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
Report 3
- *
- Bugcheck Analysis *
- * *******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff80721ea2c2f, address which referenced memory
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec Value: 1671
Key : Analysis.Elapsed.mSec Value: 3860
Key : Analysis.IO.Other.Mb Value: 0
Key : Analysis.IO.Read.Mb Value: 1
Key : Analysis.IO.Write.Mb Value: 0
Key : Analysis.Init.CPU.mSec Value: 406
Key : Analysis.Init.Elapsed.mSec Value: 12003
Key : Analysis.Memory.CommitPeak.Mb Value: 120
Key : Analysis.Version.DbgEng Value: 10.0.27725.1000
Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI Value: 0xd1
Key : Bugcheck.Code.TargetModel Value: 0xd1
Key : Dump.Attributes.AsUlong Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1
Key : Failure.Bucket Value: AV_mouclass!memcpy
Key : Failure.Hash Value: {e505c467-bacc-0eca-ac29-b45b7c4bd7f1}
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80721ea2c2f
FILE_IN_CAB: 111324-59468-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump
FAULTING_THREAD: fffff8071094d700
WRITE_ADDRESS: fffff8071091d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80712c76940 -- (.trap 0xfffff80712c76940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffce87eff91ed0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80721ea2c2f rsp=fffff80712c76ad8 rbp=fffff80712c76b50
r8=0000000000000018 r9=0000000000000038 r10=ffffce87efff2000
r11=fffff80712c76ad0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
mouclass!memcpy+0x2f:
fffff80721ea2c2f 0f1101 movups xmmword ptr [rcx],xmm0 ds:00000000
00000000=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff80712c767f8 fffff807
1002ad29 : 000000000000000a 00000000
00000000 0000000000000002 00000000
00000001 : nt!KeBugCheckEx
fffff80712c76800 fffff807
10026189 : 0000000000000000 fffff807
0b812180 ffffe28000037320 00141422
000664da : nt!KiBugCheckDispatch+0x69
fffff80712c76940 fffff807
21ea2c2f : fffff80721ea52fd 00000000
00000018 fffff80712c76b50 ffffce87
f189a010 : nt!KiPageFault+0x489
fffff80712c76ad8 fffff807
21ea52fd : 0000000000000018 fffff807
12c76b50 ffffce87f189a010 fffff807
115ce7d0 : mouclass!memcpy+0x2f
fffff80712c76ae0 fffff807
21e83888 : 0000000000000002 ffffce87
eff04210 ffffce87eff91d70 fffff807
12c76bc0 : mouclass!MouseClassServiceCallback+0x16d
fffff80712c76b80 fffff807
0fe3c4e4 : 0000000000000000 ffffce87
00000001 0000000000000000 ffffce87
00000001 : mouhid!MouHid_ReadComplete+0x7b8
fffff80712c76c20 fffff807
0fe3c397 : ffffce87effe2010 ffffce87
e743c506 0000000000000000 00000000
00000000 : nt!IopfCompleteRequest+0x134
fffff80712c76d00 fffff807
226ccb25 : ffffce87e743c5a0 ffffce87
eca31302 0000000000000000 00000000
00000009 : nt!IofCompleteRequest+0x17
fffff80712c76d30 fffff807
226cc14d : ffffce87efee21d0 ffffce87
efee2102 ffffce87efee21d0 00000000
00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3d5
fffff80712c76e30 fffff807
0fe3c4e4 : 0000000000000000 ffffce87
eca31330 fffff80712c76f01 ffffce87
efaadd00 : HIDCLASS!HidpInterruptReadComplete+0x44d
fffff80712c76ee0 fffff807
0fe3c397 : ffffce87eca31330 00000000
00000000 0000000000000000 00000000
00000000 : nt!IopfCompleteRequest+0x134
fffff80712c76fc0 fffff807
11593cc6 : 0000000000000002 00000000
00000000 0000000000000000 fffff807
115d267d : nt!IofCompleteRequest+0x17
fffff80712c76ff0 fffff807
11592031 : ffffce87eca31330 00000000
00000001 ffffce87ec859c40 ffffce87
f7ce4020 : Wdf01000!FxRequest::CompleteInternal+0x246 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff80712c77080 fffff807
11591fbf : 0000000000000000 ffffce87
efe16440 ffffce87f7ce41c0 fffff807
12c77198 : Wdf01000!FxRequest::Complete+0x4d [minkernel\wdf\framework\shared\inc\private\common\FxRequest.hpp @ 806]
fffff80712c770e0 fffff807
1fdb2ff8 : ffffce87f7ce4020 00000000
ffffffff 0000000000000004 fffff807
12c771b0 : Wdf01000!imp_WdfRequestComplete+0x3f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 437]
fffff80712c77110 fffff807
1fdb1787 : ffffce87f7ce41c0 00000000
00000008 ffffce87f7ce4250 fffff807
12c77328 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff80712c77170 fffff807
1fdb1310 : 0000000000000004 fffff807
12c772e0 0000000000000000 ffffce87
efea6090 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x463
fffff80712c77220 fffff807
1fda9ca8 : 0000000000000004 fffff807
12c772f8 0000000000000008 fffff807
12c77300 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff80712c77250 fffff807
1fda9318 : ffffce87ec866f10 ffffce87
e7ffa200 ffffce87ef1fe2d0 ffffce87
ec866f10 : USBXHCI!Endpoint_TransferEventHandler+0x108
fffff80712c772b0 fffff807
1fda8bcc : 0000000000000000 00000000
00001388 ffffce87ec866d10 fffff807
0fe35027 : USBXHCI!Interrupter_DeferredWorkProcessor+0x738
fffff80712c773b0 fffff807
11596d2d : fffff80712c774d0 00000000
00000006 0000000100000002 fffff807
000000e1 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff80712c773e0 fffff807
11596cd5 : 000000e297abdd22 00000000
00000000 ffffce87ec866d10 fffff807
0ff38cf9 : Wdf01000!FxInterrupt::DpcHandler+0x49 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 75]
fffff80712c77410 fffff807
0fe1358c : 0000000000000000 ffffa801
3f2335b0 fffff78000000000 000000e2
9784ad4b : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x35 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffff80712c77450 fffff807
0fe12594 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiExecuteAllDpcs+0x42c
fffff80712c77990 fffff807
10019dfe : 0000000000001710 fffff807
0b812180 fffff8071094d700 ffffce87
feece080 : nt!KiRetireDpcList+0x1b4
fffff80712c77c40 00000000
00000000 : fffff80712c78000 fffff807
12c72000 0000000000000000 00000000
00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: mouclass!memcpy+2f
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.22621.1774
STACK_COMMAND: .process /r /p 0xfffff80710949f40; .thread 0xfffff8071094d700 ; kb
BUCKET_ID_FUNC_OFFSET: 2f
FAILURE_BUCKET_ID: AV_mouclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e505c467-bacc-0eca-ac29-b45b7c4bd7f1}
Followup: MachineOwner
Report 4
- *
- Bugcheck Analysis *
- * *******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8003076e1ab, The address that the exception occurred at Arg3: fffff90f162e65c8, Exception Record Address Arg4: fffff90f162e5de0, Context Record Address
Debugging Details:
KEY_VALUES_STRING: 1
Key : AV.Fault Value: Read
Key : Analysis.CPU.mSec Value: 1718
Key : Analysis.Elapsed.mSec Value: 2390
Key : Analysis.IO.Other.Mb Value: 0
Key : Analysis.IO.Read.Mb Value: 1
Key : Analysis.IO.Write.Mb Value: 0
Key : Analysis.Init.CPU.mSec Value: 421
Key : Analysis.Init.Elapsed.mSec Value: 4756
Key : Analysis.Memory.CommitPeak.Mb Value: 107
Key : Analysis.Version.DbgEng Value: 10.0.27725.1000
Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI Value: 0x1000007e
Key : Bugcheck.Code.TargetModel Value: 0x1000007e
Key : Dump.Attributes.AsUlong Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1
Key : Failure.Bucket Value: AV_Wof!FileProvCompressWorkItem
Key : Failure.Hash Value: {338de1a7-22ee-9aa6-796c-0520688fc10d}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8003076e1ab
BUGCHECK_P3: fffff90f162e65c8
BUGCHECK_P4: fffff90f162e5de0
FILE_IN_CAB: 111424-59078-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump
FAULTING_THREAD: ffffbb8e36771040
EXCEPTION_RECORD: fffff90f162e65c8 -- (.exr 0xfffff90f162e65c8) ExceptionAddress: fffff8003076e1ab (nt!RtlCompressBufferXpressHuffStandard+0x000000000000018b) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 000000063d19b04d Attempt to read from address 000000063d19b04d
CONTEXT: fffff90f162e5de0 -- (.cxr 0xfffff90f162e5de0)
rax=00000000000001ba rbx=ffffd20a3e46fb33 rcx=00000000000000ad
rdx=ffffd20a3e458568 rsi=0000000000000020 rdi=ffffd20a3d19bf12
rip=fffff8003076e1ab rsp=fffff90f162e6800 rbp=000000000000001b
r8=00000000000000dd r9=000000063d19b04d r10=ffffd20a3d19bf13
r11=ffffd20a3d19bf12 r12=ffffd20a3e46fb2a r13=ffffd20a3d19b362
r14=ffffd20a3e458000 r15=ffffd20a3d19cfd8
iopl=0 nv up ei pl nz ac pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050212
nt!RtlCompressBufferXpressHuffStandard+0x18b:
fffff8003076e1ab 413809 cmp byte ptr [r9],cl ds:002b:00000006
3d19b04d=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8003111d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 000000063d19b04d
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000063d19b04d
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff90f162e6800 fffff800
3076e011 : ffffd20a3d19b000 00000000
000000b9 ffffd20a3e480a5f ffffbb8e
348d0e2b : nt!RtlCompressBufferXpressHuffStandard+0x18b
fffff90f162e68f0 fffff800
30756aff : ffffbb8e36771040 fffff800
306b81bf fffff80000000000 00000000
00000001 : nt!RtlCompressBufferXpressHuff+0x61
fffff90f162e6950 fffff800
35398324 : fffff80000000000 ffffbb8e
348d0e28 0000000000000000 ffffbb8e
348d0e28 : nt!RtlCompressBuffer+0x6f
fffff90f162e69b0 fffff800
306b7bf5 : ffffbb8e200b9c50 ffffbb8e
36771040 fffff90f162e6b00 ffffbb8e
00000000 : Wof!FileProvCompressWorkItem+0x74
fffff90f162e6a00 fffff800
3074d487 : ffffbb8e36771040 00000000
0000033c ffffbb8e36771040 fffff800
306b7aa0 : nt!ExpWorkerThread+0x155
fffff90f162e6bf0 fffff800
30819f64 : ffffe6005db54180 ffffbb8e
36771040 fffff8003074d430 00000000
00000000 : nt!PspSystemThreadStartup+0x57
fffff90f162e6c40 00000000
00000000 : fffff90f162e7000 fffff90f
162e1000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: Wof!FileProvCompressWorkItem+74
MODULE_NAME: Wof
IMAGE_NAME: Wof.sys
IMAGE_VERSION: 10.0.22621.4034
STACK_COMMAND: .cxr 0xfffff90f162e5de0 ; kb
BUCKET_ID_FUNC_OFFSET: 74
FAILURE_BUCKET_ID: AV_Wof!FileProvCompressWorkItem
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {338de1a7-22ee-9aa6-796c-0520688fc10d}
Followup: MachineOwner
Report 5
- *
- Bugcheck Analysis *
- * *******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8021ad2b746, The address that the exception occurred at Arg3: ffffab8d814b5538, Exception Record Address Arg4: ffffab8d814b4d50, Context Record Address
Debugging Details:
KEY_VALUES_STRING: 1
Key : AV.Dereference Value: NullClassPtr
Key : AV.Fault Value: Read
Key : Analysis.CPU.mSec Value: 1703
Key : Analysis.Elapsed.mSec Value: 1703
Key : Analysis.IO.Other.Mb Value: 0
Key : Analysis.IO.Read.Mb Value: 1
Key : Analysis.IO.Write.Mb Value: 0
Key : Analysis.Init.CPU.mSec Value: 312
Key : Analysis.Init.Elapsed.mSec Value: 3017
Key : Analysis.Memory.CommitPeak.Mb Value: 99
Key : Analysis.Version.DbgEng Value: 10.0.27725.1000
Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI Value: 0x1000007e
Key : Bugcheck.Code.TargetModel Value: 0x1000007e
Key : Dump.Attributes.AsUlong Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1
Key : Failure.Bucket Value: AV_nt!PfSnGetSectionObject
Key : Failure.Hash Value: {e23ea2df-a915-d574-daa1-e257e931d113}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8021ad2b746
BUGCHECK_P3: ffffab8d814b5538
BUGCHECK_P4: ffffab8d814b4d50
FILE_IN_CAB: 111424-72593-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump
FAULTING_THREAD: ffffbf88a78b8040
EXCEPTION_RECORD: ffffab8d814b5538 -- (.exr 0xffffab8d814b5538) ExceptionAddress: fffff8021ad2b746 (nt!PfSnGetSectionObject+0x0000000000000156) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000078 Attempt to read from address 0000000000000078
CONTEXT: ffffab8d814b4d50 -- (.cxr 0xffffab8d814b4d50)
rax=0000000000000000 rbx=ffff9b0571ff95f8 rcx=14b7cfbffc450000
rdx=0000000000000001 rsi=ffff9b0572214488 rdi=0000000000000000
rip=fffff8021ad2b746 rsp=ffffab8d814b5770 rbp=ffffab8d814b5851
r8=00000000ffffff7f r9=0000000000000000 r10=0000000000000000
r11=ffffbf88a78b8180 r12=ffffab8d814b58f0 r13=0000000200000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!PfSnGetSectionObject+0x156:
fffff8021ad2b746 418b4678 mov eax,dword ptr [r14+78h] ds:002b:00000000
00000078=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: sppsvc.exe
READ_ADDRESS: fffff8021b31d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000078
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000078
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffab8d814b5770 fffff802
1ad2b2a9 : 000000000000006c ffffab8d
814b59a0 ffff9b0572214488 ffff9b05
722146c8 : nt!PfSnGetSectionObject+0x156
ffffab8d814b58a0 fffff802
1a8b7bf5 : ffffbf88a629cc70 ffffbf88
a78b8040 ffffbf88a629cc70 fffff802
1b34aac0 : nt!PfSnPopulateReadList+0x2d9
ffffab8d814b5a00 fffff802
1a94d487 : ffffbf88a78b8040 00000000
0000006c ffffbf88a78b8040 fffff802
1a8b7aa0 : nt!ExpWorkerThread+0x155
ffffab8d814b5bf0 fffff802
1aa19f64 : fffff802187fe180 ffffbf88
a78b8040 fffff8021a94d430 00000000
00000000 : nt!PspSystemThreadStartup+0x57
ffffab8d814b5c40 00000000
00000000 : ffffab8d814b6000 ffffab8d
814b0000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!PfSnGetSectionObject+156
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.4317
STACK_COMMAND: .cxr 0xffffab8d814b4d50 ; kb
BUCKET_ID_FUNC_OFFSET: 156
FAILURE_BUCKET_ID: AV_nt!PfSnGetSectionObject
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e23ea2df-a915-d574-daa1-e257e931d113}
Followup: MachineOwner
Can anyone help me troubleshoot the minidumps?