My gaming PC keeps blue screening

Specs MBD: Gigabyte B450M-DS3H CPU: AMD Ryzen 5 3600 RAM: 16GB GPU: AMD Radeon RX 560 2GB PSU: 500W OS: Windows 11 System drive: Seagate Barracuda 2TB HDD Storage drive: Western Digital 1TB HDD and Seagate 1TB external HDD

I have the five BSOD minidumps. Here are the reports.

Report 1


  • *
  • Bugcheck Analysis *
  • * *******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000008, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:




*** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. ***


*** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. ***


*** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. ***


*** Type referenced: ExceptionRecord ***






*** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. ***


*** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. ***


*** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. ***


*** Type referenced: ContextRecord ***



KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec Value: 2046

Key : Analysis.Elapsed.mSec Value: 3742

Key : Analysis.IO.Other.Mb Value: 0

Key : Analysis.IO.Read.Mb Value: 1

Key : Analysis.IO.Write.Mb Value: 0

Key : Analysis.Init.CPU.mSec Value: 359

Key : Analysis.Init.Elapsed.mSec Value: 4376

Key : Analysis.Memory.CommitPeak.Mb Value: 98

Key : Analysis.Version.DbgEng Value: 10.0.27725.1000

Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre

Key : Analysis.Version.Ext Value: 1.2408.27.1

Key : Bugcheck.Code.LegacyAPI Value: 0x1e

Key : Bugcheck.Code.TargetModel Value: 0x1e

Key : Dump.Attributes.AsUlong Value: 8

Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1

Key : Failure.Bucket Value: AV_nt!KiDispatchException

Key : Failure.Hash Value: {00781d15-b897-afab-75cd-f83221cbf387}

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 0

BUGCHECK_P3: 8

BUGCHECK_P4: 0

FILE_IN_CAB: 111024-41531-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump

FAULTING_THREAD: ffff8001ca195540

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Plex Transcode

STACK_TEXT: fffff30356f40fa8 fffff804366b82b5 : 000000000000001e ffffffffc0000005 0000000000000000 0000000000000008 : nt!KeBugCheckEx fffff30356f40fb0 fffff8043662ae7c : 0000000000001000 ffff8001d1d35800 0000000000000000 fffff30356f41790 : nt!KiDispatchException+0x1a0325 fffff30356f41690 fffff80436626163 : fffff30300000020 fffff30356010088 000000f6b90fbab8 ffff8001d18e6940 : nt!KiExceptionDispatch+0x13c fffff30356f41870 0000000000000000 : 0000000000000010 0000000000000001 0000000000000000 0000000000000000 : nt!KiPageFault+0x463

SYMBOL_NAME: nt!KiDispatchException+1a0325

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.4317

STACK_COMMAND: .process /r /p 0xffff8001d1d350c0; .thread 0xffff8001ca195540 ; kb

BUCKET_ID_FUNC_OFFSET: 1a0325

FAILURE_BUCKET_ID: AV_nt!KiDispatchException

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {00781d15-b897-afab-75cd-f83221cbf387}

Followup: MachineOwner

Report 2


  • *
  • Bugcheck Analysis *
  • * *******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000c89515c49, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: 0000000c89515c49, address which referenced memory

Debugging Details:

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec Value: 1500

Key : Analysis.Elapsed.mSec Value: 2936

Key : Analysis.IO.Other.Mb Value: 0

Key : Analysis.IO.Read.Mb Value: 1

Key : Analysis.IO.Write.Mb Value: 0

Key : Analysis.Init.CPU.mSec Value: 312

Key : Analysis.Init.Elapsed.mSec Value: 27512

Key : Analysis.Memory.CommitPeak.Mb Value: 97

Key : Analysis.Version.DbgEng Value: 10.0.27725.1000

Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre

Key : Analysis.Version.Ext Value: 1.2408.27.1

Key : Bugcheck.Code.LegacyAPI Value: 0xd1

Key : Bugcheck.Code.TargetModel Value: 0xd1

Key : Dump.Attributes.AsUlong Value: 8

Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1

Key : Failure.Bucket Value: AV_CODE_AV_BAD_IP_nt!KiPageFault

Key : Failure.Hash Value: {73cd60cc-83fa-6b76-df08-1961c31d7403}

BUGCHECK_CODE: d1

BUGCHECK_P1: c89515c49

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: c89515c49

FILE_IN_CAB: 111024-47734-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump

FAULTING_THREAD: ffff870570b82080

READ_ADDRESS: fffff8027191d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000c89515c49

PROCESS_NAME: System

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

TRAP_FRAME: ffffc389976d18f0 -- (.trap 0xffffc389976d18f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff80271010d10 rbx=0000000000000000 rcx=fffff7e8c000e000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=0000000c89515c49 rsp=ffffc389976d1a80 rbp=ffffc389976d1b30 r8=0000000000000000 r9=ffffc389976d1990 r10=0000fffff8027101 r11=ffff997abe200000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl nz ac pe cy 0000000c`89515c49 ?? ??? Resetting default scope

FAILED_INSTRUCTION_ADDRESS: +0 0000000c`89515c49 ?? ???

STACK_TEXT: ffffc389976d17a8 fffff8027102ad29 : 000000000000000a 0000000c89515c49 00000000000000ff 0000000000000000 : nt!KeBugCheckEx ffffc389976d17b0 fffff80271026189 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiBugCheckDispatch+0x69 ffffc389976d18f0 0000000c89515c49 : 0000000c892a5649 0000000000000000 0000000000000000 0000000082000000 : nt!KiPageFault+0x489 ffffc389976d1a80 0000000c892a5649 : 0000000000000000 0000000000000000 0000000082000000 ffffa981a0787180 : 0x0000000c89515c49 ffffc389976d1a88 0000000000000000 : 0000000000000000 0000000082000000 ffffa981a0787180 fffff8027101d9fc : 0x0000000c892a5649

SYMBOL_NAME: nt!KiPageFault+489

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.4317

STACK_COMMAND: .process /r /p 0xfffff80271949f40; .thread 0xffff870570b82080 ; kb

BUCKET_ID_FUNC_OFFSET: 489

FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup: MachineOwner

Report 3


  • *
  • Bugcheck Analysis *
  • * *******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff80721ea2c2f, address which referenced memory

Debugging Details:

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec Value: 1671

Key : Analysis.Elapsed.mSec Value: 3860

Key : Analysis.IO.Other.Mb Value: 0

Key : Analysis.IO.Read.Mb Value: 1

Key : Analysis.IO.Write.Mb Value: 0

Key : Analysis.Init.CPU.mSec Value: 406

Key : Analysis.Init.Elapsed.mSec Value: 12003

Key : Analysis.Memory.CommitPeak.Mb Value: 120

Key : Analysis.Version.DbgEng Value: 10.0.27725.1000

Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre

Key : Analysis.Version.Ext Value: 1.2408.27.1

Key : Bugcheck.Code.LegacyAPI Value: 0xd1

Key : Bugcheck.Code.TargetModel Value: 0xd1

Key : Dump.Attributes.AsUlong Value: 8

Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1

Key : Failure.Bucket Value: AV_mouclass!memcpy

Key : Failure.Hash Value: {e505c467-bacc-0eca-ac29-b45b7c4bd7f1}

BUGCHECK_CODE: d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80721ea2c2f

FILE_IN_CAB: 111324-59468-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump

FAULTING_THREAD: fffff8071094d700

WRITE_ADDRESS: fffff8071091d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff80712c76940 -- (.trap 0xfffff80712c76940) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=ffffce87eff91ed0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80721ea2c2f rsp=fffff80712c76ad8 rbp=fffff80712c76b50 r8=0000000000000018 r9=0000000000000038 r10=ffffce87efff2000 r11=fffff80712c76ad0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe cy mouclass!memcpy+0x2f: fffff80721ea2c2f 0f1101 movups xmmword ptr [rcx],xmm0 ds:0000000000000000=???????????????????????????????? Resetting default scope

STACK_TEXT: fffff80712c767f8 fffff8071002ad29 : 000000000000000a 0000000000000000 0000000000000002 0000000000000001 : nt!KeBugCheckEx fffff80712c76800 fffff80710026189 : 0000000000000000 fffff8070b812180 ffffe28000037320 00141422000664da : nt!KiBugCheckDispatch+0x69 fffff80712c76940 fffff80721ea2c2f : fffff80721ea52fd 0000000000000018 fffff80712c76b50 ffffce87f189a010 : nt!KiPageFault+0x489 fffff80712c76ad8 fffff80721ea52fd : 0000000000000018 fffff80712c76b50 ffffce87f189a010 fffff807115ce7d0 : mouclass!memcpy+0x2f fffff80712c76ae0 fffff80721e83888 : 0000000000000002 ffffce87eff04210 ffffce87eff91d70 fffff80712c76bc0 : mouclass!MouseClassServiceCallback+0x16d fffff80712c76b80 fffff8070fe3c4e4 : 0000000000000000 ffffce8700000001 0000000000000000 ffffce8700000001 : mouhid!MouHid_ReadComplete+0x7b8 fffff80712c76c20 fffff8070fe3c397 : ffffce87effe2010 ffffce87e743c506 0000000000000000 0000000000000000 : nt!IopfCompleteRequest+0x134 fffff80712c76d00 fffff807226ccb25 : ffffce87e743c5a0 ffffce87eca31302 0000000000000000 0000000000000009 : nt!IofCompleteRequest+0x17 fffff80712c76d30 fffff807226cc14d : ffffce87efee21d0 ffffce87efee2102 ffffce87efee21d0 0000000000000009 : HIDCLASS!HidpDistributeInterruptReport+0x3d5 fffff80712c76e30 fffff8070fe3c4e4 : 0000000000000000 ffffce87eca31330 fffff80712c76f01 ffffce87efaadd00 : HIDCLASS!HidpInterruptReadComplete+0x44d fffff80712c76ee0 fffff8070fe3c397 : ffffce87eca31330 0000000000000000 0000000000000000 0000000000000000 : nt!IopfCompleteRequest+0x134 fffff80712c76fc0 fffff80711593cc6 : 0000000000000002 0000000000000000 0000000000000000 fffff807115d267d : nt!IofCompleteRequest+0x17 fffff80712c76ff0 fffff80711592031 : ffffce87eca31330 0000000000000001 ffffce87ec859c40 ffffce87f7ce4020 : Wdf01000!FxRequest::CompleteInternal+0x246 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869] fffff80712c77080 fffff80711591fbf : 0000000000000000 ffffce87efe16440 ffffce87f7ce41c0 fffff80712c77198 : Wdf01000!FxRequest::Complete+0x4d [minkernel\wdf\framework\shared\inc\private\common\FxRequest.hpp @ 806] fffff80712c770e0 fffff8071fdb2ff8 : ffffce87f7ce4020 00000000ffffffff 0000000000000004 fffff80712c771b0 : Wdf01000!imp_WdfRequestComplete+0x3f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 437] fffff80712c77110 fffff8071fdb1787 : ffffce87f7ce41c0 0000000000000008 ffffce87f7ce4250 fffff80712c77328 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8 fffff80712c77170 fffff8071fdb1310 : 0000000000000004 fffff80712c772e0 0000000000000000 ffffce87efea6090 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x463 fffff80712c77220 fffff8071fda9ca8 : 0000000000000004 fffff80712c772f8 0000000000000008 fffff80712c77300 : USBXHCI!Bulk_EP_TransferEventHandler+0x10 fffff80712c77250 fffff8071fda9318 : ffffce87ec866f10 ffffce87e7ffa200 ffffce87ef1fe2d0 ffffce87ec866f10 : USBXHCI!Endpoint_TransferEventHandler+0x108 fffff80712c772b0 fffff8071fda8bcc : 0000000000000000 0000000000001388 ffffce87ec866d10 fffff8070fe35027 : USBXHCI!Interrupter_DeferredWorkProcessor+0x738 fffff80712c773b0 fffff80711596d2d : fffff80712c774d0 0000000000000006 0000000100000002 fffff807000000e1 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc fffff80712c773e0 fffff80711596cd5 : 000000e297abdd22 0000000000000000 ffffce87ec866d10 fffff8070ff38cf9 : Wdf01000!FxInterrupt::DpcHandler+0x49 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 75] fffff80712c77410 fffff8070fe1358c : 0000000000000000 ffffa8013f2335b0 fffff78000000000 000000e29784ad4b : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x35 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410] fffff80712c77450 fffff8070fe12594 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiExecuteAllDpcs+0x42c fffff80712c77990 fffff80710019dfe : 0000000000001710 fffff8070b812180 fffff8071094d700 ffffce87feece080 : nt!KiRetireDpcList+0x1b4 fffff80712c77c40 0000000000000000 : fffff80712c78000 fffff80712c72000 0000000000000000 0000000000000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: mouclass!memcpy+2f

MODULE_NAME: mouclass

IMAGE_NAME: mouclass.sys

IMAGE_VERSION: 10.0.22621.1774

STACK_COMMAND: .process /r /p 0xfffff80710949f40; .thread 0xfffff8071094d700 ; kb

BUCKET_ID_FUNC_OFFSET: 2f

FAILURE_BUCKET_ID: AV_mouclass!memcpy

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e505c467-bacc-0eca-ac29-b45b7c4bd7f1}

Followup: MachineOwner

Report 4


  • *
  • Bugcheck Analysis *
  • * *******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8003076e1ab, The address that the exception occurred at Arg3: fffff90f162e65c8, Exception Record Address Arg4: fffff90f162e5de0, Context Record Address

Debugging Details:

KEY_VALUES_STRING: 1

Key : AV.Fault Value: Read

Key : Analysis.CPU.mSec Value: 1718

Key : Analysis.Elapsed.mSec Value: 2390

Key : Analysis.IO.Other.Mb Value: 0

Key : Analysis.IO.Read.Mb Value: 1

Key : Analysis.IO.Write.Mb Value: 0

Key : Analysis.Init.CPU.mSec Value: 421

Key : Analysis.Init.Elapsed.mSec Value: 4756

Key : Analysis.Memory.CommitPeak.Mb Value: 107

Key : Analysis.Version.DbgEng Value: 10.0.27725.1000

Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre

Key : Analysis.Version.Ext Value: 1.2408.27.1

Key : Bugcheck.Code.LegacyAPI Value: 0x1000007e

Key : Bugcheck.Code.TargetModel Value: 0x1000007e

Key : Dump.Attributes.AsUlong Value: 8

Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1

Key : Failure.Bucket Value: AV_Wof!FileProvCompressWorkItem

Key : Failure.Hash Value: {338de1a7-22ee-9aa6-796c-0520688fc10d}

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8003076e1ab

BUGCHECK_P3: fffff90f162e65c8

BUGCHECK_P4: fffff90f162e5de0

FILE_IN_CAB: 111424-59078-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump

FAULTING_THREAD: ffffbb8e36771040

EXCEPTION_RECORD: fffff90f162e65c8 -- (.exr 0xfffff90f162e65c8) ExceptionAddress: fffff8003076e1ab (nt!RtlCompressBufferXpressHuffStandard+0x000000000000018b) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 000000063d19b04d Attempt to read from address 000000063d19b04d

CONTEXT: fffff90f162e5de0 -- (.cxr 0xfffff90f162e5de0) rax=00000000000001ba rbx=ffffd20a3e46fb33 rcx=00000000000000ad rdx=ffffd20a3e458568 rsi=0000000000000020 rdi=ffffd20a3d19bf12 rip=fffff8003076e1ab rsp=fffff90f162e6800 rbp=000000000000001b r8=00000000000000dd r9=000000063d19b04d r10=ffffd20a3d19bf13 r11=ffffd20a3d19bf12 r12=ffffd20a3e46fb2a r13=ffffd20a3d19b362 r14=ffffd20a3e458000 r15=ffffd20a3d19cfd8 iopl=0 nv up ei pl nz ac pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050212 nt!RtlCompressBufferXpressHuffStandard+0x18b: fffff8003076e1ab 413809 cmp byte ptr [r9],cl ds:002b:000000063d19b04d=?? Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff8003111d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 000000063d19b04d

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 000000063d19b04d

EXCEPTION_STR: 0xc0000005

STACK_TEXT: fffff90f162e6800 fffff8003076e011 : ffffd20a3d19b000 00000000000000b9 ffffd20a3e480a5f ffffbb8e348d0e2b : nt!RtlCompressBufferXpressHuffStandard+0x18b fffff90f162e68f0 fffff80030756aff : ffffbb8e36771040 fffff800306b81bf fffff80000000000 0000000000000001 : nt!RtlCompressBufferXpressHuff+0x61 fffff90f162e6950 fffff80035398324 : fffff80000000000 ffffbb8e348d0e28 0000000000000000 ffffbb8e348d0e28 : nt!RtlCompressBuffer+0x6f fffff90f162e69b0 fffff800306b7bf5 : ffffbb8e200b9c50 ffffbb8e36771040 fffff90f162e6b00 ffffbb8e00000000 : Wof!FileProvCompressWorkItem+0x74 fffff90f162e6a00 fffff8003074d487 : ffffbb8e36771040 000000000000033c ffffbb8e36771040 fffff800306b7aa0 : nt!ExpWorkerThread+0x155 fffff90f162e6bf0 fffff80030819f64 : ffffe6005db54180 ffffbb8e36771040 fffff8003074d430 0000000000000000 : nt!PspSystemThreadStartup+0x57 fffff90f162e6c40 0000000000000000 : fffff90f162e7000 fffff90f162e1000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x34

SYMBOL_NAME: Wof!FileProvCompressWorkItem+74

MODULE_NAME: Wof

IMAGE_NAME: Wof.sys

IMAGE_VERSION: 10.0.22621.4034

STACK_COMMAND: .cxr 0xfffff90f162e5de0 ; kb

BUCKET_ID_FUNC_OFFSET: 74

FAILURE_BUCKET_ID: AV_Wof!FileProvCompressWorkItem

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {338de1a7-22ee-9aa6-796c-0520688fc10d}

Followup: MachineOwner

Report 5


  • *
  • Bugcheck Analysis *
  • * *******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8021ad2b746, The address that the exception occurred at Arg3: ffffab8d814b5538, Exception Record Address Arg4: ffffab8d814b4d50, Context Record Address

Debugging Details:

KEY_VALUES_STRING: 1

Key : AV.Dereference Value: NullClassPtr

Key : AV.Fault Value: Read

Key : Analysis.CPU.mSec Value: 1703

Key : Analysis.Elapsed.mSec Value: 1703

Key : Analysis.IO.Other.Mb Value: 0

Key : Analysis.IO.Read.Mb Value: 1

Key : Analysis.IO.Write.Mb Value: 0

Key : Analysis.Init.CPU.mSec Value: 312

Key : Analysis.Init.Elapsed.mSec Value: 3017

Key : Analysis.Memory.CommitPeak.Mb Value: 99

Key : Analysis.Version.DbgEng Value: 10.0.27725.1000

Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre

Key : Analysis.Version.Ext Value: 1.2408.27.1

Key : Bugcheck.Code.LegacyAPI Value: 0x1000007e

Key : Bugcheck.Code.TargetModel Value: 0x1000007e

Key : Dump.Attributes.AsUlong Value: 8

Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1

Key : Failure.Bucket Value: AV_nt!PfSnGetSectionObject

Key : Failure.Hash Value: {e23ea2df-a915-d574-daa1-e257e931d113}

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8021ad2b746

BUGCHECK_P3: ffffab8d814b5538

BUGCHECK_P4: ffffab8d814b4d50

FILE_IN_CAB: 111424-72593-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump

FAULTING_THREAD: ffffbf88a78b8040

EXCEPTION_RECORD: ffffab8d814b5538 -- (.exr 0xffffab8d814b5538) ExceptionAddress: fffff8021ad2b746 (nt!PfSnGetSectionObject+0x0000000000000156) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000078 Attempt to read from address 0000000000000078

CONTEXT: ffffab8d814b4d50 -- (.cxr 0xffffab8d814b4d50) rax=0000000000000000 rbx=ffff9b0571ff95f8 rcx=14b7cfbffc450000 rdx=0000000000000001 rsi=ffff9b0572214488 rdi=0000000000000000 rip=fffff8021ad2b746 rsp=ffffab8d814b5770 rbp=ffffab8d814b5851 r8=00000000ffffff7f r9=0000000000000000 r10=0000000000000000 r11=ffffbf88a78b8180 r12=ffffab8d814b58f0 r13=0000000200000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!PfSnGetSectionObject+0x156: fffff8021ad2b746 418b4678 mov eax,dword ptr [r14+78h] ds:002b:0000000000000078=???????? Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: sppsvc.exe

READ_ADDRESS: fffff8021b31d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000078

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000078

EXCEPTION_STR: 0xc0000005

STACK_TEXT: ffffab8d814b5770 fffff8021ad2b2a9 : 000000000000006c ffffab8d814b59a0 ffff9b0572214488 ffff9b05722146c8 : nt!PfSnGetSectionObject+0x156 ffffab8d814b58a0 fffff8021a8b7bf5 : ffffbf88a629cc70 ffffbf88a78b8040 ffffbf88a629cc70 fffff8021b34aac0 : nt!PfSnPopulateReadList+0x2d9 ffffab8d814b5a00 fffff8021a94d487 : ffffbf88a78b8040 000000000000006c ffffbf88a78b8040 fffff8021a8b7aa0 : nt!ExpWorkerThread+0x155 ffffab8d814b5bf0 fffff8021aa19f64 : fffff802187fe180 ffffbf88a78b8040 fffff8021a94d430 0000000000000000 : nt!PspSystemThreadStartup+0x57 ffffab8d814b5c40 0000000000000000 : ffffab8d814b6000 ffffab8d814b0000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x34

SYMBOL_NAME: nt!PfSnGetSectionObject+156

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.4317

STACK_COMMAND: .cxr 0xffffab8d814b4d50 ; kb

BUCKET_ID_FUNC_OFFSET: 156

FAILURE_BUCKET_ID: AV_nt!PfSnGetSectionObject

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e23ea2df-a915-d574-daa1-e257e931d113}

Followup: MachineOwner

Can anyone help me troubleshoot the minidumps?