SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8006a467b0a, The address that the exception occurred at
Arg3: ffffd00028a6a738, Exception Record Address
Arg4: ffffd00028a69f50, Context Record Address
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80264f61308
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7599
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: 3.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: V17.20
BIOS_DATE: 11/27/2012
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: 870A-G54 (MS-7599)
BASEBOARD_VERSION: 3.0
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8006a467b0a
BUGCHECK_P3: ffffd00028a6a738
BUGCHECK_P4: ffffd00028a69f50
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
hcmon+5b0a
fffff800`6a467b0a 498b8048010000 mov rax,qword ptr [r8+148h]
EXCEPTION_RECORD: ffffd00028a6a738 -- (.exr 0xffffd00028a6a738)
ExceptionAddress: fffff8006a467b0a (hcmon+0x0000000000005b0a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd00028a69f50 -- (.cxr 0xffffd00028a69f50)
rax=00000000ffffffff rbx=ffffe001dbe901b0 rcx=ffffe001dbe90458
rdx=ffffe001dbe902b8 rsi=0000000000000010 rdi=0000000000000000
rip=fffff8006a467b0a rsp=ffffd00028a6a970 rbp=0000000000000003
r8=50ffffe001dbd0db r9=0000000000000002 r10=000017fe8e7b4110
r11=ffffe001dbcb6d2e r12=000000000000005c r13=0000000000000000
r14=ffffe001dea02990 r15=000000000000001f
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00210286
hcmon+0x5b0a:
fffff800`6a467b0a 498b8048010000 mov rax,qword ptr [r8+148h] ds:002b:50ffffe0`01dbd223=????????????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: c80
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 4
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
hcmon+5b0a
fffff800`6a467b0a 498b8048010000 mov rax,qword ptr [r8+148h]
BUGCHECK_STR: AV
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80264f612a8
GetUlongPtrFromAddress: unable to read from fffff80264f61530
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-31-2020 21:13:52.0616
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from ffffe001dbe901b0 to fffff8006a467b0a
STACK_TEXT:
ffffd000`28a6a970 ffffe001`dbe901b0 : 00000000`00000010 ffffe001`dfbea050 ffffe001`db35a710 fffff802`652bc700 : hcmon+0x5b0a
ffffd000`28a6a978 00000000`00000010 : ffffe001`dfbea050 ffffe001`db35a710 fffff802`652bc700 ffffd000`28a6abb0 : 0xffffe001`dbe901b0
ffffd000`28a6a980 ffffe001`dfbea050 : ffffe001`db35a710 fffff802`652bc700 ffffd000`28a6abb0 00000000`00120010 : 0x10
ffffd000`28a6a988 ffffe001`db35a710 : fffff802`652bc700 ffffd000`28a6abb0 00000000`00120010 ffffd000`28a6aa10 : 0xffffe001`dfbea050
ffffd000`28a6a990 fffff802`652bc700 : ffffd000`28a6abb0 00000000`00120010 ffffd000`28a6aa10 00000000`00000007 : 0xffffe001`db35a710
ffffd000`28a6a998 ffffd000`28a6abb0 : 00000000`00120010 ffffd000`28a6aa10 00000000`00000007 ffffe001`dbe901b0 : nt!SepAtomSd+0xf8
ffffd000`28a6a9a0 00000000`00120010 : ffffd000`28a6aa10 00000000`00000007 ffffe001`dbe901b0 ffffd000`28a6abb8 : 0xffffd000`28a6abb0
ffffd000`28a6a9a8 ffffd000`28a6aa10 : 00000000`00000007 ffffe001`dbe901b0 ffffd000`28a6abb8 fffff800`6a4697fd : 0x120010
ffffd000`28a6a9b0 00000000`00000007 : ffffe001`dbe901b0 ffffd000`28a6abb8 fffff800`6a4697fd ffffe001`dbbe2050 : 0xffffd000`28a6aa10
ffffd000`28a6a9b8 ffffe001`dbe901b0 : ffffd000`28a6abb8 fffff800`6a4697fd ffffe001`dbbe2050 00000000`00000046 : 0x7
ffffd000`28a6a9c0 ffffd000`28a6abb8 : fffff800`6a4697fd ffffe001`dbbe2050 00000000`00000046 ffffe001`db35a710 : 0xffffe001`dbe901b0
ffffd000`28a6a9c8 fffff800`6a4697fd : ffffe001`dbbe2050 00000000`00000046 ffffe001`db35a710 00000000`00000007 : 0xffffd000`28a6abb8
ffffd000`28a6a9d0 ffffe001`dbbe2050 : 00000000`00000046 ffffe001`db35a710 00000000`00000007 00000000`00000000 : hcmon+0x77fd
ffffd000`28a6a9d8 00000000`00000046 : ffffe001`db35a710 00000000`00000007 00000000`00000000 00000000`00000000 : 0xffffe001`dbbe2050
ffffd000`28a6a9e0 ffffe001`db35a710 : 00000000`00000007 00000000`00000000 00000000`00000000 00000000`00000000 : 0x46
ffffd000`28a6a9e8 00000000`00000007 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`db35a710
ffffd000`28a6a9f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 005c003f`003f005c : 0x7
THREAD_SHA1_HASH_MOD_FUNC: e2f281330e45faaec45b967e7e8ff47ec489928d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f330904a1aad329cf3ec8b7e3f43e86a58994070
THREAD_SHA1_HASH_MOD: 5932acb7fe3e84e74e74a7b99d69cafc3f7dd15e
FAULT_INSTR_CODE: 48808b49
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: hcmon+5b0a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hcmon
IMAGE_NAME: hcmon.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 56e19aa9
STACK_COMMAND: .cxr 0xffffd00028a69f50 ; kb
BUCKET_ID_FUNC_OFFSET: 5b0a
FAILURE_BUCKET_ID: AV_hcmon!unknown_function
BUCKET_ID: AV_hcmon!unknown_function
PRIMARY_PROBLEM_CLASS: AV_hcmon!unknown_function
TARGET_TIME: 2019-12-12T11:00:24.000Z
OSBUILD: 9600
OSSERVICEPACK: 19538
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-10-15 05:04:17
BUILDDATESTAMP_STR: 191014-1700
BUILDLAB_STR: winblue_ltsb_escrow
BUILDOSVER_STR: 6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
ANALYSIS_SESSION_ELAPSED_TIME: a3f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_hcmon!unknown_function
FAILURE_ID_HASH: {ffbc4f28-feac-60ff-caa7-e4be40bec6df}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003452, The subtype of the bugcheck.
Arg2: 00007ffbea32b000
Arg3: fffff58010806d58
Arg4: 0000000000000000
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800ac7c6308
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
DUMP_TYPE: 2
BUGCHECK_P1: 3452
BUGCHECK_P2: 7ffbea32b000
BUGCHECK_P3: fffff58010806d58
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_3452
CPU_COUNT: 4
CPU_MHZ: c80
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 4
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-31-2020 21:13:50.0362
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff800ac558226 to fffff800ac5b74a0
STACK_TEXT:
ffffd000`c2b37ef8 fffff800`ac558226 : 00000000`0000001a 00000000`00003452 00007ffb`ea32b000 fffff580`10806d58 : nt!KeBugCheckEx
ffffd000`c2b37f00 fffff800`ac542bfd : ffffffff`ffffffff ffffffff`ffffffff ffffe000`9cc35da8 ffffe000`9d211400 : nt!MiDeleteAddressesInWorkingSet+0x6d6
ffffd000`c2b38800 fffff800`ac83c4af : 00000000`00040000 ffffd000`c2b38980 ffffe000`9d211400 ffffe000`9cc358c0 : nt!MiBeginProcessClean+0x101
ffffd000`c2b38850 fffff800`ac8726bc : 00000000`00040000 ffffd000`c2b38980 00000000`00000000 ffffe000`9cc358c0 : nt!MmCleanProcessAddressSpace+0x67
ffffd000`c2b388b0 fffff800`ac842987 : ffffe000`9cc358c0 ffffc000`34beda20 ffffd000`c2b38980 00000000`00000000 : nt!PspRundownSingleProcess+0xac
ffffd000`c2b38940 fffff800`ac8ec404 : ffffe000`c0000005 ffffe000`9d211400 ffffd000`c2b38c40 ffffe000`9d2114a8 : nt!PspExitThread+0x573
ffffd000`c2b38a50 fffff800`ac4cd0aa : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe000`9c9c4560 : nt!KiSchedulerApcTerminate+0x18
ffffd000`c2b38a80 fffff800`ac5bc950 : 00000000`00000000 ffffd000`c2b38b00 fffff800`ac631c3c 00000000`00000000 : nt!KiDeliverApc+0x2fa
ffffd000`c2b38b00 fffff800`ac5c748a : ffffe000`9d211400 ffffd000`c2b38cc0 000000e4`47dbafd0 00007ffb`eaf5ba40 : nt!KiInitiateUserApc+0x70
ffffd000`c2b38c40 00007ffb`eae5100a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000e4`49daf718 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`eae5100a
THREAD_SHA1_HASH_MOD_FUNC: fa3012b421a9addb84fae0a4047f30fc0bb94702
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4ec3388a18e652a27a46ee0d6c94a41bb0216db5
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!MiDeleteAddressesInWorkingSet+6d6
fffff800`ac558226 cc int 3
FAULT_INSTR_CODE: 8944cccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteAddressesInWorkingSet+6d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5da52921
IMAGE_VERSION: 6.3.9600.19538
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 6d6
FAILURE_BUCKET_ID: 0x1a_3452_nt!MiDeleteAddressesInWorkingSet
BUCKET_ID: 0x1a_3452_nt!MiDeleteAddressesInWorkingSet
PRIMARY_PROBLEM_CLASS: 0x1a_3452_nt!MiDeleteAddressesInWorkingSet
TARGET_TIME: 2019-12-26T19:28:34.000Z
OSBUILD: 9600
OSSERVICEPACK: 19538
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-10-15 05:04:17
BUILDDATESTAMP_STR: 191014-1700
BUILDLAB_STR: winblue_ltsb_escrow
BUILDOSVER_STR: 6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
ANALYSIS_SESSION_ELAPSED_TIME: 8c3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_3452_nt!mideleteaddressesinworkingset
FAILURE_ID_HASH: {0ea4a652-09f2-4590-af31-f181348e2855}
Followup: MachineOwner
---------
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000020, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000009d, error status (normally i/o status code)
Arg3: ffffe000544bf7c8, current process (virtual address for lock type 3, or PTE)
Arg4: 0000000000000000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800f656c308
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7599
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: 3.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: V17.20
BIOS_DATE: 11/27/2012
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: 870A-G54 (MS-7599)
BASEBOARD_VERSION: 3.0
DUMP_TYPE: 2
BUGCHECK_P1: 20
BUGCHECK_P2: ffffffffc000009d
BUGCHECK_P3: ffffe000544bf7c8
BUGCHECK_P4: 0
ERROR_CODE: (NTSTATUS) 0xc000009d - STATUS_DEVICE_NOT_CONNECTED
DISK_HARDWARE_ERROR: There was error with disk hardware
BUGCHECK_STR: 0x7a_c000009d
CPU_COUNT: 4
CPU_MHZ: d47
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 4
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 1
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-31-2020 21:13:43.0886
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff800f63eac64 to fffff800f635d4a0
STACK_TEXT:
ffffd001`e5870968 fffff800`f63eac64 : 00000000`0000007a 00000000`00000020 ffffffff`c000009d ffffe000`544bf7c8 : nt!KeBugCheckEx
ffffd001`e5870970 fffff800`f62f1166 : ffffe000`544bf7f8 00000000`0007b000 00000000`00000000 00000000`00000000 : nt!MiWriteComplete+0x65c
ffffd001`e5870a30 fffff800`f6272f16 : ffffe000`53665040 00000000`00000000 00000000`00000000 ffffe000`57bfa3f8 : nt!IopCompletePageWrite+0x42
ffffd001`e5870a60 fffff800`f6275f3f : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x166
ffffd001`e5870ae0 fffff800`f62757e9 : ffffe000`554e2010 ffffe000`553bf810 ffffe000`553bf8d8 00000000`00000001 : nt!KiSwapThread+0x31f
ffffd001`e5870b80 fffff800`f62753b5 : 00000000`00000002 ffffd001`e996e180 fffff800`f64f85a1 00000000`00000002 : nt!KiCommitThreadWait+0x129
ffffd001`e5870c00 fffff800`f63440c4 : ffffe000`00000003 ffffd001`e5870cf0 ffffe000`53665040 ffffe000`00000013 : nt!KeWaitForMultipleObjects+0x9a5
ffffd001`e5870cb0 fffff800`f62e0b22 : ffffd001`e996e180 00000000`00000000 00000000`00000080 ffffe000`535b2040 : nt!MiModifiedPageWriter+0xf8
ffffd001`e5870d40 fffff800`f6364f66 : ffffd001`e996e180 ffffe000`53665040 ffffd001`e997e380 0000000c`174efc65 : nt!PspSystemThreadStartup+0x18a
ffffd001`e5870da0 00000000`00000000 : ffffd001`e5871000 ffffd001`e586b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 0cc040ae7e77e096bb9f4343e24a30f7758df54e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bb7d9613fedf3d68a475f6d3b919482024bc0700
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!MiWriteComplete+65c
fffff800`f63eac64 cc int 3
FAULT_INSTR_CODE: cccccccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiWriteComplete+65c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5da52921
IMAGE_VERSION: 6.3.9600.19538
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 65c
FAILURE_BUCKET_ID: 0x7a_c000009d_nt!MiWriteComplete
BUCKET_ID: 0x7a_c000009d_nt!MiWriteComplete
PRIMARY_PROBLEM_CLASS: 0x7a_c000009d_nt!MiWriteComplete
TARGET_TIME: 2020-01-27T16:32:13.000Z
OSBUILD: 9600
OSSERVICEPACK: 19538
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-10-15 05:04:17
BUILDDATESTAMP_STR: 191014-1700
BUILDLAB_STR: winblue_ltsb_escrow
BUILDOSVER_STR: 6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
ANALYSIS_SESSION_ELAPSED_TIME: 840
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7a_c000009d_nt!miwritecomplete
FAILURE_ID_HASH: {07eb8abf-3b99-f892-fd7b-32eac4a21c50}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801039e916a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff8010396c308
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff801039e916a
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8010396c2a8
GetUlongPtrFromAddress: unable to read from fffff8010396c530
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!PspInsertThread+622
fffff801`039e916a ffd0 call rax
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 4
CPU_MHZ: ee3
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 4
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-31-2020 21:13:40.0774
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: 00000000c0000100 -- (.exr 0xc0000100)
Cannot read Exception record @ ffffffffc0000100
TRAP_FRAME: ffffc0000c8079e0 -- (.trap 0xffffc0000c8079e0)
Unable to read trap frame at ffffc000`0c8079e0
LAST_CONTROL_TRANSFER: from fffff801036f6d06 to fffff8010375d4a0
STACK_TEXT:
ffffd000`78a52b98 fffff801`036f6d06 : 00000000`0000001e ffffffff`c0000005 fffff801`039e916a 00000000`00000000 : nt!KeBugCheckEx
ffffd000`78a52ba0 fffff801`0376d842 : 00000000`c0000100 7fffffff`fffffffc ffffc000`0c8079e0 ffffd000`78a53900 : nt!KiDispatchException+0x1da
ffffd000`78a53280 fffff801`0376a86c : 00000000`00000010 fffff801`03764c6b ffffe000`db300000 ffffe000`dacd8060 : nt!KiExceptionDispatch+0xc2
ffffd000`78a53460 fffff801`039e916a : 00000000`00000001 fffff801`038f9990 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x2ec
ffffd000`78a535f0 fffff801`03a1f9ae : ffffe000`dadb2880 00000000`00000000 000000c8`dab50100 ffffd000`78a53890 : nt!PspInsertThread+0x622
ffffd000`78a53830 fffff801`03a66e7f : 00000000`00000000 ffffd000`78a53c40 ffffc000`170ada50 fffff801`a01b3138 : nt!PspCreateThread+0x252
ffffd000`78a53af0 fffff801`03a66d02 : ffffe000`dbec38f8 ffffe000`dab51750 ffffc000`0c9e7650 ffffe000`dbec3818 : nt!PsCreateSystemThreadEx+0x177
ffffd000`78a53d60 fffff801`a0122c5e : ffffe000`dbec3801 ffffe000`dbec3818 ffffd000`00000000 ffffd000`78a53ea8 : nt!PsCreateSystemThread+0x3a
ffffd000`78a53dc0 fffff801`a00e7437 : ffffd000`75cf4200 ffffe000`dbec3818 00000000`00000000 ffffe000`dbec3818 : Ntfs!NtfsPostRepairRequest+0x246
ffffd000`78a53e70 fffff801`a01b8054 : ffffe000`dbec3818 00000000`00000000 ffffd000`c0000102 ffffe000`00000000 : Ntfs!NtfsProcessException+0xffffffff`fffef347
ffffd000`78a53f50 fffff801`03760f97 : ffffd000`75cf4080 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x44
ffffd000`78a53f80 fffff801`03760f5d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
ffffd000`75cf3f00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
THREAD_SHA1_HASH_MOD_FUNC: 0cd2b4f0399453c91dabe7910ede78f097f6f7a6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ff4af327a24ef5a00630066dc8fed9a2bf073ddc
THREAD_SHA1_HASH_MOD: 4af44ef32d8a3a1e905ffdc28ec519f5b219bd68
FOLLOWUP_IP:
nt!PspInsertThread+622
fffff801`039e916a ffd0 call rax
FAULT_INSTR_CODE: 8b48d0ff
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!PspInsertThread+622
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5da52921
IMAGE_VERSION: 6.3.9600.19538
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 622
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!PspInsertThread
BUCKET_ID: 0x1E_c0000005_R_nt!PspInsertThread
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!PspInsertThread
TARGET_TIME: 2020-01-31T08:02:13.000Z
OSBUILD: 9600
OSSERVICEPACK: 19538
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-10-15 05:04:17
BUILDDATESTAMP_STR: 191014-1700
BUILDLAB_STR: winblue_ltsb_escrow
BUILDOSVER_STR: 6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700
ANALYSIS_SESSION_ELAPSED_TIME: 93a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!pspinsertthread
FAILURE_ID_HASH: {62fa941e-1030-3182-7144-d59871d96d60}
Followup: MachineOwner
---------