SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8006a467b0a, The address that the exception occurred at
Arg3: ffffd00028a6a738, Exception Record Address
Arg4: ffffd00028a69f50, Context Record Address
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80264f61308
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7599
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: 3.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: V17.20
BIOS_DATE: 11/27/2012
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: 870A-G54 (MS-7599)
BASEBOARD_VERSION: 3.0
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8006a467b0a
BUGCHECK_P3: ffffd00028a6a738
BUGCHECK_P4: ffffd00028a69f50
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
hcmon+5b0a
fffff800`6a467b0a 498b8048010000 mov rax,qword ptr [r8+148h]
EXCEPTION_RECORD: ffffd00028a6a738 -- (.exr 0xffffd00028a6a738)
ExceptionAddress: fffff8006a467b0a (hcmon+0x0000000000005b0a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd00028a69f50 -- (.cxr 0xffffd00028a69f50)
rax=00000000ffffffff rbx=ffffe001dbe901b0 rcx=ffffe001dbe90458
rdx=ffffe001dbe902b8 rsi=0000000000000010 rdi=0000000000000000
rip=fffff8006a467b0a rsp=ffffd00028a6a970 rbp=0000000000000003
r8=50ffffe001dbd0db r9=0000000000000002 r10=000017fe8e7b4110
r11=ffffe001dbcb6d2e r12=000000000000005c r13=0000000000000000
r14=ffffe001dea02990 r15=000000000000001f
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00210286
hcmon+0x5b0a:
fffff800`6a467b0a 498b8048010000 mov rax,qword ptr [r8+148h] ds:002b:50ffffe0`01dbd223=????????????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: c80
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 4
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
hcmon+5b0a
fffff800`6a467b0a 498b8048010000 mov rax,qword ptr [r8+148h]
BUGCHECK_STR: AV
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80264f612a8
GetUlongPtrFromAddress: unable to read from fffff80264f61530
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-31-2020 21:13:52.0616
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from ffffe001dbe901b0 to fffff8006a467b0a
STACK_TEXT:
ffffd000`28a6a970 ffffe001`dbe901b0 : 00000000`00000010 ffffe001`dfbea050 ffffe001`db35a710 fffff802`652bc700 : hcmon+0x5b0a
ffffd000`28a6a978 00000000`00000010 : ffffe001`dfbea050 ffffe001`db35a710 fffff802`652bc700 ffffd000`28a6abb0 : 0xffffe001`dbe901b0
ffffd000`28a6a980 ffffe001`dfbea050 : ffffe001`db35a710 fffff802`652bc700 ffffd000`28a6abb0 00000000`00120010 : 0x10
ffffd000`28a6a988 ffffe001`db35a710 : fffff802`652bc700 ffffd000`28a6abb0 00000000`00120010 ffffd000`28a6aa10 : 0xffffe001`dfbea050
ffffd000`28a6a990 fffff802`652bc700 : ffffd000`28a6abb0 00000000`00120010 ffffd000`28a6aa10 00000000`00000007 : 0xffffe001`db35a710
ffffd000`28a6a998 ffffd000`28a6abb0 : 00000000`00120010 ffffd000`28a6aa10 00000000`00000007 ffffe001`dbe901b0 : nt!SepAtomSd+0xf8
ffffd000`28a6a9a0 00000000`00120010 : ffffd000`28a6aa10 00000000`00000007 ffffe001`dbe901b0 ffffd000`28a6abb8 : 0xffffd000`28a6abb0
ffffd000`28a6a9a8 ffffd000`28a6aa10 : 00000000`00000007 ffffe001`dbe901b0 ffffd000`28a6abb8 fffff800`6a4697fd : 0x120010
ffffd000`28a6a9b0 00000000`00000007 : ffffe001`dbe901b0 ffffd000`28a6abb8 fffff800`6a4697fd ffffe001`dbbe2050 : 0xffffd000`28a6aa10
ffffd000`28a6a9b8 ffffe001`dbe901b0 : ffffd000`28a6abb8 fffff800`6a4697fd ffffe001`dbbe2050 00000000`00000046 : 0x7
ffffd000`28a6a9c0 ffffd000`28a6abb8 : fffff800`6a4697fd ffffe001`dbbe2050 00000000`00000046 ffffe001`db35a710 : 0xffffe001`dbe901b0
ffffd000`28a6a9c8 fffff800`6a4697fd : ffffe001`dbbe2050 00000000`00000046 ffffe001`db35a710 00000000`00000007 : 0xffffd000`28a6abb8
ffffd000`28a6a9d0 ffffe001`dbbe2050 : 00000000`00000046 ffffe001`db35a710 00000000`00000007 00000000`00000000 : hcmon+0x77fd
ffffd000`28a6a9d8 00000000`00000046 : ffffe001`db35a710 00000000`00000007 00000000`00000000 00000000`00000000 : 0xffffe001`dbbe2050
ffffd000`28a6a9e0 ffffe001`db35a710 : 00000000`00000007 00000000`00000000 00000000`00000000 00000000`00000000 : 0x46
ffffd000`28a6a9e8 00000000`00000007 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`db35a710
ffffd000`28a6a9f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 005c003f`003f005c : 0x7
THREAD_SHA1_HASH_MOD_FUNC: e2f281330e45faaec45b967e7e8ff47ec489928d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f330904a1aad329cf3ec8b7e3f43e86a58994070
THREAD_SHA1_HASH_MOD: 5932acb7fe3e84e74e74a7b99d69cafc3f7dd15e
FAULT_INSTR_CODE: 48808b49
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: hcmon+5b0a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hcmon
IMAGE_NAME: hcmon.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 56e19aa9
STACK_COMMAND: .cxr 0xffffd00028a69f50 ; kb
BUCKET_ID_FUNC_OFFSET: 5b0a
FAILURE_BUCKET_ID: AV_hcmon!unknown_function
BUCKET_ID: AV_hcmon!unknown_function
PRIMARY_PROBLEM_CLASS: AV_hcmon!unknown_function
TARGET_TIME: 2019-12-12T11:00:24.000Z
OSBUILD: 9600
OSSERVICEPACK: 19538
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-10-15 05:04:17
BUILDDATESTAMP_STR: 191014-1700
BUILDLAB_STR: winblue_ltsb_escrow
BUILDOSVER_STR: 6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
ANALYSIS_SESSION_ELAPSED_TIME: a3f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_hcmon!unknown_function
FAILURE_ID_HASH: {ffbc4f28-feac-60ff-caa7-e4be40bec6df}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003452, The subtype of the bugcheck.
Arg2: 00007ffbea32b000
Arg3: fffff58010806d58
Arg4: 0000000000000000
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800ac7c6308
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
DUMP_TYPE: 2
BUGCHECK_P1: 3452
BUGCHECK_P2: 7ffbea32b000
BUGCHECK_P3: fffff58010806d58
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_3452
CPU_COUNT: 4
CPU_MHZ: c80
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 4
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-31-2020 21:13:50.0362
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff800ac558226 to fffff800ac5b74a0
STACK_TEXT:
ffffd000`c2b37ef8 fffff800`ac558226 : 00000000`0000001a 00000000`00003452 00007ffb`ea32b000 fffff580`10806d58 : nt!KeBugCheckEx
ffffd000`c2b37f00 fffff800`ac542bfd : ffffffff`ffffffff ffffffff`ffffffff ffffe000`9cc35da8 ffffe000`9d211400 : nt!MiDeleteAddressesInWorkingSet+0x6d6
ffffd000`c2b38800 fffff800`ac83c4af : 00000000`00040000 ffffd000`c2b38980 ffffe000`9d211400 ffffe000`9cc358c0 : nt!MiBeginProcessClean+0x101
ffffd000`c2b38850 fffff800`ac8726bc : 00000000`00040000 ffffd000`c2b38980 00000000`00000000 ffffe000`9cc358c0 : nt!MmCleanProcessAddressSpace+0x67
ffffd000`c2b388b0 fffff800`ac842987 : ffffe000`9cc358c0 ffffc000`34beda20 ffffd000`c2b38980 00000000`00000000 : nt!PspRundownSingleProcess+0xac
ffffd000`c2b38940 fffff800`ac8ec404 : ffffe000`c0000005 ffffe000`9d211400 ffffd000`c2b38c40 ffffe000`9d2114a8 : nt!PspExitThread+0x573
ffffd000`c2b38a50 fffff800`ac4cd0aa : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe000`9c9c4560 : nt!KiSchedulerApcTerminate+0x18
ffffd000`c2b38a80 fffff800`ac5bc950 : 00000000`00000000 ffffd000`c2b38b00 fffff800`ac631c3c 00000000`00000000 : nt!KiDeliverApc+0x2fa
ffffd000`c2b38b00 fffff800`ac5c748a : ffffe000`9d211400 ffffd000`c2b38cc0 000000e4`47dbafd0 00007ffb`eaf5ba40 : nt!KiInitiateUserApc+0x70
ffffd000`c2b38c40 00007ffb`eae5100a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000e4`49daf718 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`eae5100a
THREAD_SHA1_HASH_MOD_FUNC: fa3012b421a9addb84fae0a4047f30fc0bb94702
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4ec3388a18e652a27a46ee0d6c94a41bb0216db5
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!MiDeleteAddressesInWorkingSet+6d6
fffff800`ac558226 cc int 3
FAULT_INSTR_CODE: 8944cccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteAddressesInWorkingSet+6d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5da52921
IMAGE_VERSION: 6.3.9600.19538
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 6d6
FAILURE_BUCKET_ID: 0x1a_3452_nt!MiDeleteAddressesInWorkingSet
BUCKET_ID: 0x1a_3452_nt!MiDeleteAddressesInWorkingSet
PRIMARY_PROBLEM_CLASS: 0x1a_3452_nt!MiDeleteAddressesInWorkingSet
TARGET_TIME: 2019-12-26T19:28:34.000Z
OSBUILD: 9600
OSSERVICEPACK: 19538
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-10-15 05:04:17
BUILDDATESTAMP_STR: 191014-1700
BUILDLAB_STR: winblue_ltsb_escrow
BUILDOSVER_STR: 6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
ANALYSIS_SESSION_ELAPSED_TIME: 8c3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_3452_nt!mideleteaddressesinworkingset
FAILURE_ID_HASH: {0ea4a652-09f2-4590-af31-f181348e2855}
Followup: MachineOwner
---------
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000020, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000009d, error status (normally i/o status code)
Arg3: ffffe000544bf7c8, current process (virtual address for lock type 3, or PTE)
Arg4: 0000000000000000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800f656c308
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7599
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: 3.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: V17.20
BIOS_DATE: 11/27/2012
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: 870A-G54 (MS-7599)
BASEBOARD_VERSION: 3.0
DUMP_TYPE: 2
BUGCHECK_P1: 20
BUGCHECK_P2: ffffffffc000009d
BUGCHECK_P3: ffffe000544bf7c8
BUGCHECK_P4: 0
ERROR_CODE: (NTSTATUS) 0xc000009d - STATUS_DEVICE_NOT_CONNECTED
DISK_HARDWARE_ERROR: There was error with disk hardware
BUGCHECK_STR: 0x7a_c000009d
CPU_COUNT: 4
CPU_MHZ: d47
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 4
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 1
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-31-2020 21:13:43.0886
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff800f63eac64 to fffff800f635d4a0
STACK_TEXT:
ffffd001`e5870968 fffff800`f63eac64 : 00000000`0000007a 00000000`00000020 ffffffff`c000009d ffffe000`544bf7c8 : nt!KeBugCheckEx
ffffd001`e5870970 fffff800`f62f1166 : ffffe000`544bf7f8 00000000`0007b000 00000000`00000000 00000000`00000000 : nt!MiWriteComplete+0x65c
ffffd001`e5870a30 fffff800`f6272f16 : ffffe000`53665040 00000000`00000000 00000000`00000000 ffffe000`57bfa3f8 : nt!IopCompletePageWrite+0x42
ffffd001`e5870a60 fffff800`f6275f3f : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x166
ffffd001`e5870ae0 fffff800`f62757e9 : ffffe000`554e2010 ffffe000`553bf810 ffffe000`553bf8d8 00000000`00000001 : nt!KiSwapThread+0x31f
ffffd001`e5870b80 fffff800`f62753b5 : 00000000`00000002 ffffd001`e996e180 fffff800`f64f85a1 00000000`00000002 : nt!KiCommitThreadWait+0x129
ffffd001`e5870c00 fffff800`f63440c4 : ffffe000`00000003 ffffd001`e5870cf0 ffffe000`53665040 ffffe000`00000013 : nt!KeWaitForMultipleObjects+0x9a5
ffffd001`e5870cb0 fffff800`f62e0b22 : ffffd001`e996e180 00000000`00000000 00000000`00000080 ffffe000`535b2040 : nt!MiModifiedPageWriter+0xf8
ffffd001`e5870d40 fffff800`f6364f66 : ffffd001`e996e180 ffffe000`53665040 ffffd001`e997e380 0000000c`174efc65 : nt!PspSystemThreadStartup+0x18a
ffffd001`e5870da0 00000000`00000000 : ffffd001`e5871000 ffffd001`e586b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 0cc040ae7e77e096bb9f4343e24a30f7758df54e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bb7d9613fedf3d68a475f6d3b919482024bc0700
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!MiWriteComplete+65c
fffff800`f63eac64 cc int 3
FAULT_INSTR_CODE: cccccccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiWriteComplete+65c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5da52921
IMAGE_VERSION: 6.3.9600.19538
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 65c
FAILURE_BUCKET_ID: 0x7a_c000009d_nt!MiWriteComplete
BUCKET_ID: 0x7a_c000009d_nt!MiWriteComplete
PRIMARY_PROBLEM_CLASS: 0x7a_c000009d_nt!MiWriteComplete
TARGET_TIME: 2020-01-27T16:32:13.000Z
OSBUILD: 9600
OSSERVICEPACK: 19538
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-10-15 05:04:17
BUILDDATESTAMP_STR: 191014-1700
BUILDLAB_STR: winblue_ltsb_escrow
BUILDOSVER_STR: 6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
ANALYSIS_SESSION_ELAPSED_TIME: 840
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7a_c000009d_nt!miwritecomplete
FAILURE_ID_HASH: {07eb8abf-3b99-f892-fd7b-32eac4a21c50}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801039e916a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff8010396c308
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff801039e916a
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8010396c2a8
GetUlongPtrFromAddress: unable to read from fffff8010396c530
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!PspInsertThread+622
fffff801`039e916a ffd0 call rax
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 4
CPU_MHZ: ee3
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 4
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-31-2020 21:13:40.0774
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: 00000000c0000100 -- (.exr 0xc0000100)
Cannot read Exception record @ ffffffffc0000100
TRAP_FRAME: ffffc0000c8079e0 -- (.trap 0xffffc0000c8079e0)
Unable to read trap frame at ffffc000`0c8079e0
LAST_CONTROL_TRANSFER: from fffff801036f6d06 to fffff8010375d4a0
STACK_TEXT:
ffffd000`78a52b98 fffff801`036f6d06 : 00000000`0000001e ffffffff`c0000005 fffff801`039e916a 00000000`00000000 : nt!KeBugCheckEx
ffffd000`78a52ba0 fffff801`0376d842 : 00000000`c0000100 7fffffff`fffffffc ffffc000`0c8079e0 ffffd000`78a53900 : nt!KiDispatchException+0x1da
ffffd000`78a53280 fffff801`0376a86c : 00000000`00000010 fffff801`03764c6b ffffe000`db300000 ffffe000`dacd8060 : nt!KiExceptionDispatch+0xc2
ffffd000`78a53460 fffff801`039e916a : 00000000`00000001 fffff801`038f9990 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x2ec
ffffd000`78a535f0 fffff801`03a1f9ae : ffffe000`dadb2880 00000000`00000000 000000c8`dab50100 ffffd000`78a53890 : nt!PspInsertThread+0x622
ffffd000`78a53830 fffff801`03a66e7f : 00000000`00000000 ffffd000`78a53c40 ffffc000`170ada50 fffff801`a01b3138 : nt!PspCreateThread+0x252
ffffd000`78a53af0 fffff801`03a66d02 : ffffe000`dbec38f8 ffffe000`dab51750 ffffc000`0c9e7650 ffffe000`dbec3818 : nt!PsCreateSystemThreadEx+0x177
ffffd000`78a53d60 fffff801`a0122c5e : ffffe000`dbec3801 ffffe000`dbec3818 ffffd000`00000000 ffffd000`78a53ea8 : nt!PsCreateSystemThread+0x3a
ffffd000`78a53dc0 fffff801`a00e7437 : ffffd000`75cf4200 ffffe000`dbec3818 00000000`00000000 ffffe000`dbec3818 : Ntfs!NtfsPostRepairRequest+0x246
ffffd000`78a53e70 fffff801`a01b8054 : ffffe000`dbec3818 00000000`00000000 ffffd000`c0000102 ffffe000`00000000 : Ntfs!NtfsProcessException+0xffffffff`fffef347
ffffd000`78a53f50 fffff801`03760f97 : ffffd000`75cf4080 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x44
ffffd000`78a53f80 fffff801`03760f5d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
ffffd000`75cf3f00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
THREAD_SHA1_HASH_MOD_FUNC: 0cd2b4f0399453c91dabe7910ede78f097f6f7a6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ff4af327a24ef5a00630066dc8fed9a2bf073ddc
THREAD_SHA1_HASH_MOD: 4af44ef32d8a3a1e905ffdc28ec519f5b219bd68
FOLLOWUP_IP:
nt!PspInsertThread+622
fffff801`039e916a ffd0 call rax
FAULT_INSTR_CODE: 8b48d0ff
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!PspInsertThread+622
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5da52921
IMAGE_VERSION: 6.3.9600.19538
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 622
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!PspInsertThread
BUCKET_ID: 0x1E_c0000005_R_nt!PspInsertThread
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!PspInsertThread
TARGET_TIME: 2020-01-31T08:02:13.000Z
OSBUILD: 9600
OSSERVICEPACK: 19538
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-10-15 05:04:17
BUILDDATESTAMP_STR: 191014-1700
BUILDLAB_STR: winblue_ltsb_escrow
BUILDOSVER_STR: 6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
ANALYSIS_SESSION_ELAPSED_TIME: 93a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!pspinsertthread
FAILURE_ID_HASH: {62fa941e-1030-3182-7144-d59871d96d60}
Followup: MachineOwner
---------
Memtest86'da görünmese de bellek arızalı, sisteme tek bellek tak kullan.
VMware yazılımını kullanma.
HDtune programı ile Error Scan ve Health sonuçlarını paylaş.
IMAGE_NAME: hcmon.sys
Diğer depolama birimininde sonuçlarını paylaşır mısın?
Bellekleri tek tek Memtest86 testine sok.
VMware modülü hata vermiş.
Temiz kurulum ile geçebiliyorsan Windows 10'a geç ve sistemden HDD'yi çıkar, bir süre böyle dene.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.