Hello, I've been having issues with my PC and I need help pinpointing the cause. I built the PC last year and it was running smoothly until May of this year, when I got a dreaded FAULTY_HARDWARE_CORRUPTED_PAGE BSOD. I wrote it off as a one-time occurrence and decided to wait and see if anything would happen again, and I've had three more BSODs since then. Not only more of the one I previously mentioned, but also SYSTEM_THREAD_EXCEPTION_NOT_HANDLED.
I'm no expert, but based on what I've seen from the minidumps using WinDbg, I strongly suspect that the hardware is the cause at this point. However, the BSODs seem to be completely random, happen every few weeks, and are impossible to replicate at will, so testing the exact cause seems like it's going to be difficult. I ran four passes of MemTest86 overnight a few weeks ago and got 0 errors. Suppose I should stress test my CPU next and give MemTest another try too. Aside from that, I updated to the latest BIOS (I have an ASRock B650M-HDV/M.2 and 7600X) and that did nothing to help. If you have suggestions of any kind for me or insight that would help decide whether the RAM/CPU/mobo or anything else is the culprit, I would be very thankful.
Important to note is that I've done zero overclocking of any kind, so that's not the problem here.
What I get when I analyze my four minidumps using WinDbg:
I'm no expert, but based on what I've seen from the minidumps using WinDbg, I strongly suspect that the hardware is the cause at this point. However, the BSODs seem to be completely random, happen every few weeks, and are impossible to replicate at will, so testing the exact cause seems like it's going to be difficult. I ran four passes of MemTest86 overnight a few weeks ago and got 0 errors. Suppose I should stress test my CPU next and give MemTest another try too. Aside from that, I updated to the latest BIOS (I have an ASRock B650M-HDV/M.2 and 7600X) and that did nothing to help. If you have suggestions of any kind for me or insight that would help decide whether the RAM/CPU/mobo or anything else is the culprit, I would be very thankful.
Important to note is that I've done zero overclocking of any kind, so that's not the problem here.
What I get when I analyze my four minidumps using WinDbg:
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000668, physical page number
Arg3: 0000027adcaccef0, zero
Arg4: ffffb6013e626000, zero
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1171
Key : Analysis.Elapsed.mSec
Value: 1223
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 4760
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x668
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0x1aa0f5c4
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x1cef0
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x27b3c1
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0x27cdc0
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x834246
Key : Bugcheck.Code.LegacyAPI
Value: 0x12b
Key : Bugcheck.Code.TargetModel
Value: 0x12b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
Key : Failure.Hash
Value: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 668
BUGCHECK_P3: 27adcaccef0
BUGCHECK_P4: ffffb6013e626000
FILE_IN_CAB: 050324-6093-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
fffff403`5b08fbe8 fffff800`1abc4daf : 00000000`0000012b ffffffff`c00002c4 00000000`00000668 0000027a`dcaccef0 : nt!KeBugCheckEx
fffff403`5b08fbf0 fffff800`1aa5fb1b : 00000000`00000200 00000000`00000003 ffffa58e`0b68f050 0000027a`dcaccef0 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffff403`5b08fc40 fffff800`1abc5d88 : 00000000`00000004 fffff800`1abbf512 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x2c5
fffff403`5b08fd10 fffff800`1abc69e8 : 00000000`00000001 00000000`00003fe6 00000000`00000000 ffffa58e`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff403`5b08fd60 fffff800`1abc5575 : ffffffff`ffffffff ffffa58e`2afa7000 fffff403`5b08fe40 ffffa58e`11204050 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x1c4
fffff403`5b08fe00 fffff800`1abbf00b : fffff403`5b090039 fffff800`00000001 fffff800`1b2694c0 ffffa58e`1891c2c0 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc9
fffff403`5b08feb0 fffff800`1abbeee1 : ffffa58e`0b68f000 ffffa58e`11204050 ffffa58e`2afa7000 ffffa58e`0b6909c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x93
fffff403`5b08ff30 fffff800`1a8294da : ffffa58e`2def20f4 ffffa58e`0b68f000 00000000`00000000 ffffa58e`2afa7000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffff403`5b08ff60 fffff800`1aa5f59e : fffff800`1abbeec0 fffff403`5b090000 00000000`00000002 ffffa58e`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffff403`5b08ffd0 fffff800`1abc0de8 : fffff403`00000000 ffffa58d`ea1f21d8 00000000`000003ff ffffa58e`11204050 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xd6
fffff403`5b0900a0 fffff800`1abbe6f3 : 00000000`000003ff 00000000`000003ff fffff403`5b090150 ffffa58e`11204050 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x48
fffff403`5b0900f0 fffff800`1aa5f032 : 00000000`0000000c ffffa58e`11204050 00000000`00000010 00000000`00000010 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x1d7
fffff403`5b090180 fffff800`1abc8062 : ffffa58e`1891c380 fffff403`5b090240 00000000`00000010 fffff403`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x1cc
fffff403`5b090200 fffff800`1aa51050 : ffffa58e`2131a47a 00000000`00000001 ffffa58e`2a189740 fffff800`1a837259 : nt!SmPageRead+0x42
fffff403`5b090240 fffff800`1a94d857 : 00000000`00000002 fffff403`5b090380 ffffa58e`1891c270 ffffa58e`1891c270 : nt!MiIssueHardFaultIo+0x102ed0
fffff403`5b090290 fffff800`1a830371 : 00000000`c0033333 00000000`00000001 00000000`ab840430 fffff800`00000000 : nt!MiIssueHardFault+0x207
fffff403`5b090340 fffff800`1aa295fa : ffffa58e`2def2080 ffffa58e`140ef540 00000000`00001a3c ffffffff`ffb3b4c0 : nt!MmAccessFault+0x331
fffff403`5b090460 00000152`b98caa52 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x37a
0000003e`f13fe2e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000152`b98caa52
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+fb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3447
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: fb
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
This BugCheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000668, physical page number
Arg3: 0000027adcaccef0, zero
Arg4: ffffb6013e626000, zero
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1171
Key : Analysis.Elapsed.mSec
Value: 1223
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 4760
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x668
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0x1aa0f5c4
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x1cef0
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x27b3c1
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0x27cdc0
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x834246
Key : Bugcheck.Code.LegacyAPI
Value: 0x12b
Key : Bugcheck.Code.TargetModel
Value: 0x12b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
Key : Failure.Hash
Value: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 668
BUGCHECK_P3: 27adcaccef0
BUGCHECK_P4: ffffb6013e626000
FILE_IN_CAB: 050324-6093-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
fffff403`5b08fbe8 fffff800`1abc4daf : 00000000`0000012b ffffffff`c00002c4 00000000`00000668 0000027a`dcaccef0 : nt!KeBugCheckEx
fffff403`5b08fbf0 fffff800`1aa5fb1b : 00000000`00000200 00000000`00000003 ffffa58e`0b68f050 0000027a`dcaccef0 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffff403`5b08fc40 fffff800`1abc5d88 : 00000000`00000004 fffff800`1abbf512 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x2c5
fffff403`5b08fd10 fffff800`1abc69e8 : 00000000`00000001 00000000`00003fe6 00000000`00000000 ffffa58e`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff403`5b08fd60 fffff800`1abc5575 : ffffffff`ffffffff ffffa58e`2afa7000 fffff403`5b08fe40 ffffa58e`11204050 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x1c4
fffff403`5b08fe00 fffff800`1abbf00b : fffff403`5b090039 fffff800`00000001 fffff800`1b2694c0 ffffa58e`1891c2c0 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc9
fffff403`5b08feb0 fffff800`1abbeee1 : ffffa58e`0b68f000 ffffa58e`11204050 ffffa58e`2afa7000 ffffa58e`0b6909c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x93
fffff403`5b08ff30 fffff800`1a8294da : ffffa58e`2def20f4 ffffa58e`0b68f000 00000000`00000000 ffffa58e`2afa7000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffff403`5b08ff60 fffff800`1aa5f59e : fffff800`1abbeec0 fffff403`5b090000 00000000`00000002 ffffa58e`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffff403`5b08ffd0 fffff800`1abc0de8 : fffff403`00000000 ffffa58d`ea1f21d8 00000000`000003ff ffffa58e`11204050 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xd6
fffff403`5b0900a0 fffff800`1abbe6f3 : 00000000`000003ff 00000000`000003ff fffff403`5b090150 ffffa58e`11204050 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x48
fffff403`5b0900f0 fffff800`1aa5f032 : 00000000`0000000c ffffa58e`11204050 00000000`00000010 00000000`00000010 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x1d7
fffff403`5b090180 fffff800`1abc8062 : ffffa58e`1891c380 fffff403`5b090240 00000000`00000010 fffff403`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x1cc
fffff403`5b090200 fffff800`1aa51050 : ffffa58e`2131a47a 00000000`00000001 ffffa58e`2a189740 fffff800`1a837259 : nt!SmPageRead+0x42
fffff403`5b090240 fffff800`1a94d857 : 00000000`00000002 fffff403`5b090380 ffffa58e`1891c270 ffffa58e`1891c270 : nt!MiIssueHardFaultIo+0x102ed0
fffff403`5b090290 fffff800`1a830371 : 00000000`c0033333 00000000`00000001 00000000`ab840430 fffff800`00000000 : nt!MiIssueHardFault+0x207
fffff403`5b090340 fffff800`1aa295fa : ffffa58e`2def2080 ffffa58e`140ef540 00000000`00001a3c ffffffff`ffb3b4c0 : nt!MmAccessFault+0x331
fffff403`5b090460 00000152`b98caa52 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x37a
0000003e`f13fe2e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000152`b98caa52
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+fb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3447
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: fb
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807134eabe4, The address that the exception occurred at
Arg3: ffffc7084f05ebe8, Exception Record Address
Arg4: ffffc7084f05e400, Context Record Address
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x3317f4, File: 0x338c40 - C:\ProgramData\Dbg\sym\Ntfs.sys\4B276609333000\Ntfs.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 2171
Key : Analysis.Elapsed.mSec
Value: 2158
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 4227
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Bugcheck.Code.TargetModel
Value: 0x1000007e
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_Ntfs!NtfsFlushVolumeFlushSingleFcb
Key : Failure.Hash
Value: {0ed87bea-8110-0a6c-770e-836775b36072}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff807134eabe4
BUGCHECK_P3: ffffc7084f05ebe8
BUGCHECK_P4: ffffc7084f05e400
FILE_IN_CAB: 051024-5390-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
EXCEPTION_RECORD: ffffc7084f05ebe8 -- (.exr 0xffffc7084f05ebe8)
ExceptionAddress: fffff807134eabe4 (Ntfs!NtfsFlushVolumeFlushSingleFcb+0x0000000000000c30)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffc7084f05e400 -- (.cxr 0xffffc7084f05e400)
rax=004000026c4804b1 rbx=0000000000000000 rcx=ffffda8d88673230
rdx=0000000000200000 rsi=ffffda8d88673010 rdi=ffffc7084f05f020
rip=fffff807134eabe4 rsp=ffffc7084f05ee20 rbp=ffffc7084f05f480
r8=ffffda8d88673230 r9=0000000000000001 r10=ffffda8d88673050
r11=ffffda8d88673014 r12=0000000000000007 r13=ffffc7084f05efa8
r14=ffffda8d88673170 r15=ffffda8d88673230
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
Ntfs!NtfsFlushVolumeFlushSingleFcb+0xc30:
fffff807`134eabe4 8b4018 mov eax,dword ptr [rax+18h] ds:002b:00400002`6c4804c9=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8071191c4a8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffc708`4f05ee20 fffff807`134e927f : ffffc708`4f05f020 ffffc904`69ee31b0 ffffda8d`88673010 ffffc708`4f05efa8 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0xc30
ffffc708`4f05ef70 fffff807`10ed6fd5 : ffffc904`652c3bb0 ffffc904`9dc3c080 ffffc904`652c3bb0 ffffc904`00000000 : Ntfs!NtfsFlushVolumeMultiThreadFcbWalkerWorker+0x2ef
ffffc708`4f05f380 fffff807`10f6db37 : ffffc904`9dc3c080 00000000`000003db ffffc904`9dc3c080 fffff807`10ed6e80 : nt!ExpWorkerThread+0x155
ffffc708`4f05f570 fffff807`1101d554 : ffffb281`bebc5180 ffffc904`9dc3c080 fffff807`10f6dae0 d600210c`003a0000 : nt!PspSystemThreadStartup+0x57
ffffc708`4f05f5c0 00000000`00000000 : ffffc708`4f060000 ffffc708`4f059000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: Ntfs!NtfsFlushVolumeFlushSingleFcb+c30
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.22621.1376
STACK_COMMAND: .cxr 0xffffc7084f05e400 ; kb
BUCKET_ID_FUNC_OFFSET: c30
FAILURE_BUCKET_ID: AV_Ntfs!NtfsFlushVolumeFlushSingleFcb
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0ed87bea-8110-0a6c-770e-836775b36072}
Followup: MachineOwner
---------
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807134eabe4, The address that the exception occurred at
Arg3: ffffc7084f05ebe8, Exception Record Address
Arg4: ffffc7084f05e400, Context Record Address
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x3317f4, File: 0x338c40 - C:\ProgramData\Dbg\sym\Ntfs.sys\4B276609333000\Ntfs.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 2171
Key : Analysis.Elapsed.mSec
Value: 2158
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 4227
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Bugcheck.Code.TargetModel
Value: 0x1000007e
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_Ntfs!NtfsFlushVolumeFlushSingleFcb
Key : Failure.Hash
Value: {0ed87bea-8110-0a6c-770e-836775b36072}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff807134eabe4
BUGCHECK_P3: ffffc7084f05ebe8
BUGCHECK_P4: ffffc7084f05e400
FILE_IN_CAB: 051024-5390-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
EXCEPTION_RECORD: ffffc7084f05ebe8 -- (.exr 0xffffc7084f05ebe8)
ExceptionAddress: fffff807134eabe4 (Ntfs!NtfsFlushVolumeFlushSingleFcb+0x0000000000000c30)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffc7084f05e400 -- (.cxr 0xffffc7084f05e400)
rax=004000026c4804b1 rbx=0000000000000000 rcx=ffffda8d88673230
rdx=0000000000200000 rsi=ffffda8d88673010 rdi=ffffc7084f05f020
rip=fffff807134eabe4 rsp=ffffc7084f05ee20 rbp=ffffc7084f05f480
r8=ffffda8d88673230 r9=0000000000000001 r10=ffffda8d88673050
r11=ffffda8d88673014 r12=0000000000000007 r13=ffffc7084f05efa8
r14=ffffda8d88673170 r15=ffffda8d88673230
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
Ntfs!NtfsFlushVolumeFlushSingleFcb+0xc30:
fffff807`134eabe4 8b4018 mov eax,dword ptr [rax+18h] ds:002b:00400002`6c4804c9=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8071191c4a8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffc708`4f05ee20 fffff807`134e927f : ffffc708`4f05f020 ffffc904`69ee31b0 ffffda8d`88673010 ffffc708`4f05efa8 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0xc30
ffffc708`4f05ef70 fffff807`10ed6fd5 : ffffc904`652c3bb0 ffffc904`9dc3c080 ffffc904`652c3bb0 ffffc904`00000000 : Ntfs!NtfsFlushVolumeMultiThreadFcbWalkerWorker+0x2ef
ffffc708`4f05f380 fffff807`10f6db37 : ffffc904`9dc3c080 00000000`000003db ffffc904`9dc3c080 fffff807`10ed6e80 : nt!ExpWorkerThread+0x155
ffffc708`4f05f570 fffff807`1101d554 : ffffb281`bebc5180 ffffc904`9dc3c080 fffff807`10f6dae0 d600210c`003a0000 : nt!PspSystemThreadStartup+0x57
ffffc708`4f05f5c0 00000000`00000000 : ffffc708`4f060000 ffffc708`4f059000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: Ntfs!NtfsFlushVolumeFlushSingleFcb+c30
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.22621.1376
STACK_COMMAND: .cxr 0xffffc7084f05e400 ; kb
BUCKET_ID_FUNC_OFFSET: c30
FAILURE_BUCKET_ID: AV_Ntfs!NtfsFlushVolumeFlushSingleFcb
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0ed87bea-8110-0a6c-770e-836775b36072}
Followup: MachineOwner
---------
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000495, physical page number
Arg3: 000001942c8caed0, zero
Arg4: ffff9100344ba000, zero
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1828
Key : Analysis.Elapsed.mSec
Value: 2292
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 4523
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x495
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0xac67432e
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x1aed0
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x4a3b63
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0x27c969
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x75b89a
Key : Bugcheck.Code.LegacyAPI
Value: 0x12b
Key : Bugcheck.Code.TargetModel
Value: 0x12b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
Key : Failure.Hash
Value: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 495
BUGCHECK_P3: 1942c8caed0
BUGCHECK_P4: ffff9100344ba000
FILE_IN_CAB: 060324-7125-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
fffff587`4a6afbe8 fffff805`4edc4daf : 00000000`0000012b ffffffff`c00002c4 00000000`00000495 00000194`2c8caed0 : nt!KeBugCheckEx
fffff587`4a6afbf0 fffff805`4ec5fb1b : 00000000`00000200 00000000`00000003 ffffc804`f4324050 00000194`2c8caed0 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffff587`4a6afc40 fffff805`4edc5d88 : 00000000`00000004 fffff805`4edbf512 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x2c5
fffff587`4a6afd10 fffff805`4edc69e8 : 00000000`00000001 00000000`000077b1 00000000`00000000 ffffc804`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff587`4a6afd60 fffff805`4edc5575 : ffffffff`ffffffff ffffc804`fe386000 fffff587`4a6afe40 ffffc805`2847e7d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x1c4
fffff587`4a6afe00 fffff805`4edbf00b : fffff587`4a6b0039 00000000`00000001 fffff805`4f4694c0 ffffc804`d5d27260 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc9
fffff587`4a6afeb0 fffff805`4edbeee1 : ffffc804`f4324000 ffffc805`2847e7d0 ffffc804`fe386000 ffffc804`f43259c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x93
fffff587`4a6aff30 fffff805`4ea294da : ffffc804`f36210f4 ffffc804`f4324000 00000000`00000000 ffffc804`fe386000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffff587`4a6aff60 fffff805`4ec5f59e : fffff805`4edbeec0 fffff587`4a6b0000 00000000`00000002 ffffc804`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffff587`4a6affd0 fffff805`4edc0de8 : fffff587`00000000 ffffc804`d01f71d8 00000000`000003ff ffffc805`2847e7d0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xd6
fffff587`4a6b00a0 fffff805`4edbe6f3 : 00000000`000003ff 00000000`000003ff fffff587`4a6b0150 ffffc805`2847e7d0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x48
fffff587`4a6b00f0 fffff805`4ec5f032 : 00000000`0000000c ffffc805`2847e7d0 00000000`00000010 00000000`00000010 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x1d7
fffff587`4a6b0180 fffff805`4edc8062 : ffffc804`d5d27320 fffff587`4a6b0240 00000000`00000010 fffff587`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x1cc
fffff587`4a6b0200 fffff805`4ec51050 : ffffc804`2080dae5 00000000`00000001 ffffc804`f9be3700 fffff805`4ea37259 : nt!SmPageRead+0x42
fffff587`4a6b0240 fffff805`4eb4d857 : 00000000`00000002 fffff587`4a6b0380 ffffc804`d5d27210 ffffc804`d5d27210 : nt!MiIssueHardFaultIo+0x102ed0
fffff587`4a6b0290 fffff805`4ea30371 : 00000000`c0033333 00000000`00000001 00000233`2bb98028 00000000`00000000 : nt!MiIssueHardFault+0x207
fffff587`4a6b0340 fffff805`4ec295fa : ffffc804`f3620000 ffffc804`f9dd2860 00000233`2c200d00 00000000`00000000 : nt!MmAccessFault+0x331
fffff587`4a6b0460 00007ff8`ece47940 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x37a
0000006f`996fe630 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`ece47940
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+fb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3447
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: fb
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
This BugCheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000495, physical page number
Arg3: 000001942c8caed0, zero
Arg4: ffff9100344ba000, zero
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1828
Key : Analysis.Elapsed.mSec
Value: 2292
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 4523
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x495
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0xac67432e
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x1aed0
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x4a3b63
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0x27c969
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x75b89a
Key : Bugcheck.Code.LegacyAPI
Value: 0x12b
Key : Bugcheck.Code.TargetModel
Value: 0x12b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
Key : Failure.Hash
Value: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 495
BUGCHECK_P3: 1942c8caed0
BUGCHECK_P4: ffff9100344ba000
FILE_IN_CAB: 060324-7125-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
fffff587`4a6afbe8 fffff805`4edc4daf : 00000000`0000012b ffffffff`c00002c4 00000000`00000495 00000194`2c8caed0 : nt!KeBugCheckEx
fffff587`4a6afbf0 fffff805`4ec5fb1b : 00000000`00000200 00000000`00000003 ffffc804`f4324050 00000194`2c8caed0 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffff587`4a6afc40 fffff805`4edc5d88 : 00000000`00000004 fffff805`4edbf512 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x2c5
fffff587`4a6afd10 fffff805`4edc69e8 : 00000000`00000001 00000000`000077b1 00000000`00000000 ffffc804`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff587`4a6afd60 fffff805`4edc5575 : ffffffff`ffffffff ffffc804`fe386000 fffff587`4a6afe40 ffffc805`2847e7d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x1c4
fffff587`4a6afe00 fffff805`4edbf00b : fffff587`4a6b0039 00000000`00000001 fffff805`4f4694c0 ffffc804`d5d27260 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc9
fffff587`4a6afeb0 fffff805`4edbeee1 : ffffc804`f4324000 ffffc805`2847e7d0 ffffc804`fe386000 ffffc804`f43259c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x93
fffff587`4a6aff30 fffff805`4ea294da : ffffc804`f36210f4 ffffc804`f4324000 00000000`00000000 ffffc804`fe386000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffff587`4a6aff60 fffff805`4ec5f59e : fffff805`4edbeec0 fffff587`4a6b0000 00000000`00000002 ffffc804`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffff587`4a6affd0 fffff805`4edc0de8 : fffff587`00000000 ffffc804`d01f71d8 00000000`000003ff ffffc805`2847e7d0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xd6
fffff587`4a6b00a0 fffff805`4edbe6f3 : 00000000`000003ff 00000000`000003ff fffff587`4a6b0150 ffffc805`2847e7d0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x48
fffff587`4a6b00f0 fffff805`4ec5f032 : 00000000`0000000c ffffc805`2847e7d0 00000000`00000010 00000000`00000010 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x1d7
fffff587`4a6b0180 fffff805`4edc8062 : ffffc804`d5d27320 fffff587`4a6b0240 00000000`00000010 fffff587`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x1cc
fffff587`4a6b0200 fffff805`4ec51050 : ffffc804`2080dae5 00000000`00000001 ffffc804`f9be3700 fffff805`4ea37259 : nt!SmPageRead+0x42
fffff587`4a6b0240 fffff805`4eb4d857 : 00000000`00000002 fffff587`4a6b0380 ffffc804`d5d27210 ffffc804`d5d27210 : nt!MiIssueHardFaultIo+0x102ed0
fffff587`4a6b0290 fffff805`4ea30371 : 00000000`c0033333 00000000`00000001 00000233`2bb98028 00000000`00000000 : nt!MiIssueHardFault+0x207
fffff587`4a6b0340 fffff805`4ec295fa : ffffc804`f3620000 ffffc804`f9dd2860 00000233`2c200d00 00000000`00000000 : nt!MmAccessFault+0x331
fffff587`4a6b0460 00007ff8`ece47940 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x37a
0000006f`996fe630 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`ece47940
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+fb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3447
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: fb
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8013be534b6, The address that the exception occurred at
Arg3: ffffc389a3aeeba8, Exception Record Address
Arg4: ffffc389a3aee3c0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1499
Key : Analysis.Elapsed.mSec
Value: 1553
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 5063
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Bugcheck.Code.TargetModel
Value: 0x1000007e
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!ExAcquireResourceExclusiveLite
Key : Failure.Hash
Value: {d1328bfd-2b11-7819-3ef8-5888a1d52bca}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8013be534b6
BUGCHECK_P3: ffffc389a3aeeba8
BUGCHECK_P4: ffffc389a3aee3c0
FILE_IN_CAB: 070124-7531-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
EXCEPTION_RECORD: ffffc389a3aeeba8 -- (.exr 0xffffc389a3aeeba8)
ExceptionAddress: fffff8013be534b6 (nt!ExAcquireResourceExclusiveLite+0x0000000000000006)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffc389a3aee3c0 -- (.cxr 0xffffc389a3aee3c0)
rax=0000000000000702 rbx=0000000000000000 rcx=00400002715004f1
rdx=ffffdd0636048101 rsi=ffff9e0e2c6f4010 rdi=ffffc389a3aef020
rip=fffff8013be534b6 rsp=ffffc389a3aeede0 rbp=ffffc389a3aef480
r8=ffff9e0e2c6f4010 r9=ffffc389a3aeefa8 r10=fffff8013be534b0
r11=ffffc389a3aeef68 r12=0000000000000003 r13=0000000040000000
r14=ffff9e0e2c6f4010 r15=ffffdd0636048100
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!ExAcquireResourceExclusiveLite+0x6:
fffff801`3be534b6 440fb7411a movzx r8d,word ptr [rcx+1Ah] ds:002b:00400002`7150050b=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8013c91c4a8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffc389`a3aeede0 fffff801`3e99a2c4 : 00000000`00000000 ffffc389`a3aef480 ffff9e0e`1c690010 ffffc389`a3aef020 : nt!ExAcquireResourceExclusiveLite+0x6
ffffc389`a3aeee20 fffff801`3e9994cf : ffffc389`a3aef020 ffffdd06`360481b0 ffff9e0e`2c6f4010 ffffc389`a3aeefa8 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0xc0
ffffc389`a3aeef70 fffff801`3bece2d5 : ffffdd05`f935a010 ffffdd06`3ae72040 ffffdd05`f935a010 ffffdd05`00000000 : Ntfs!NtfsFlushVolumeMultiThreadFcbWalkerWorker+0x2ef
ffffc389`a3aef380 fffff801`3be0e957 : ffffdd06`3ae72040 00000000`00000439 ffffdd06`3ae72040 fffff801`3bece180 : nt!ExpWorkerThread+0x155
ffffc389`a3aef570 fffff801`3c01f3b4 : ffffb200`91861180 ffffdd06`3ae72040 fffff801`3be0e900 00000000`00000246 : nt!PspSystemThreadStartup+0x57
ffffc389`a3aef5c0 00000000`00000000 : ffffc389`a3af0000 ffffc389`a3ae9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!ExAcquireResourceExclusiveLite+6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3733
STACK_COMMAND: .cxr 0xffffc389a3aee3c0 ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: AV_nt!ExAcquireResourceExclusiveLite
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d1328bfd-2b11-7819-3ef8-5888a1d52bca}
Followup: MachineOwner
---------
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8013be534b6, The address that the exception occurred at
Arg3: ffffc389a3aeeba8, Exception Record Address
Arg4: ffffc389a3aee3c0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1499
Key : Analysis.Elapsed.mSec
Value: 1553
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 5063
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Bugcheck.Code.TargetModel
Value: 0x1000007e
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!ExAcquireResourceExclusiveLite
Key : Failure.Hash
Value: {d1328bfd-2b11-7819-3ef8-5888a1d52bca}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8013be534b6
BUGCHECK_P3: ffffc389a3aeeba8
BUGCHECK_P4: ffffc389a3aee3c0
FILE_IN_CAB: 070124-7531-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
EXCEPTION_RECORD: ffffc389a3aeeba8 -- (.exr 0xffffc389a3aeeba8)
ExceptionAddress: fffff8013be534b6 (nt!ExAcquireResourceExclusiveLite+0x0000000000000006)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffc389a3aee3c0 -- (.cxr 0xffffc389a3aee3c0)
rax=0000000000000702 rbx=0000000000000000 rcx=00400002715004f1
rdx=ffffdd0636048101 rsi=ffff9e0e2c6f4010 rdi=ffffc389a3aef020
rip=fffff8013be534b6 rsp=ffffc389a3aeede0 rbp=ffffc389a3aef480
r8=ffff9e0e2c6f4010 r9=ffffc389a3aeefa8 r10=fffff8013be534b0
r11=ffffc389a3aeef68 r12=0000000000000003 r13=0000000040000000
r14=ffff9e0e2c6f4010 r15=ffffdd0636048100
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!ExAcquireResourceExclusiveLite+0x6:
fffff801`3be534b6 440fb7411a movzx r8d,word ptr [rcx+1Ah] ds:002b:00400002`7150050b=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8013c91c4a8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffc389`a3aeede0 fffff801`3e99a2c4 : 00000000`00000000 ffffc389`a3aef480 ffff9e0e`1c690010 ffffc389`a3aef020 : nt!ExAcquireResourceExclusiveLite+0x6
ffffc389`a3aeee20 fffff801`3e9994cf : ffffc389`a3aef020 ffffdd06`360481b0 ffff9e0e`2c6f4010 ffffc389`a3aeefa8 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0xc0
ffffc389`a3aeef70 fffff801`3bece2d5 : ffffdd05`f935a010 ffffdd06`3ae72040 ffffdd05`f935a010 ffffdd05`00000000 : Ntfs!NtfsFlushVolumeMultiThreadFcbWalkerWorker+0x2ef
ffffc389`a3aef380 fffff801`3be0e957 : ffffdd06`3ae72040 00000000`00000439 ffffdd06`3ae72040 fffff801`3bece180 : nt!ExpWorkerThread+0x155
ffffc389`a3aef570 fffff801`3c01f3b4 : ffffb200`91861180 ffffdd06`3ae72040 fffff801`3be0e900 00000000`00000246 : nt!PspSystemThreadStartup+0x57
ffffc389`a3aef5c0 00000000`00000000 : ffffc389`a3af0000 ffffc389`a3ae9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!ExAcquireResourceExclusiveLite+6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3733
STACK_COMMAND: .cxr 0xffffc389a3aee3c0 ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: AV_nt!ExAcquireResourceExclusiveLite
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d1328bfd-2b11-7819-3ef8-5888a1d52bca}
Followup: MachineOwner
---------