FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000947, physical page number
Arg3: 000002490a5564c0, zero
Arg4: ffffd18135050000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2702
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7048
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x947
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0xf5b8411b
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x64c0
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x15506a
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0xffffffffffffffff
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x1d2b55
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 947
BUGCHECK_P3: 2490a5564c0
BUGCHECK_P4: ffffd18135050000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
fffffd07`029f01f8 fffff806`52523aab : 00000000`0000012b ffffffff`c00002c4 00000000`00000947 00000249`0a5564c0 : nt!KeBugCheckEx
fffffd07`029f0200 fffff806`52462e50 : 00000000`00000200 00000000`c00002c4 ffffd181`35050000 00000000`00000002 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffffd07`029f0250 fffff806`5235fd64 : 00000000`00000004 fffffd07`029f0460 00000000`00000000 00000000`0000026b : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1030cc
fffffd07`029f0330 fffff806`5235fbe2 : 00000000`00000001 00000000`000064c0 ffff890f`000064c0 ffff890f`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffffd07`029f0380 fffff806`5235fa0b : ffff890f`ffffffff ffff890f`87dd1000 fffffd07`029f0460 ffff890f`88802750 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
fffffd07`029f0420 fffff806`5235f851 : ffff890f`87dd1000 00000000`00000000 00000000`00000001 ffff890f`87541788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
fffffd07`029f04d0 fffff806`5235f761 : ffff890f`87540000 ffff890f`88802750 ffff890f`87dd1000 ffff890f`875419b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffffd07`029f0550 fffff806`52269e18 : ffff890f`8907d540 ffff890f`87540000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffffd07`029f0580 fffff806`52362cc1 : fffff806`5235f740 fffffd07`029f0630 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffd07`029f05f0 fffff806`5234b941 : fffffd07`029f06f0 fffff806`5278db78 ffff890f`87540000 fffffd07`029f0840 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xcd
fffffd07`029f06c0 fffff806`5234b527 : 00000000`0000000c ffff890f`87540000 fffffd07`029f0770 ffff890f`88802750 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a5
fffffd07`029f0710 fffff806`52361fd3 : 00000000`0000000c ffff890f`88802750 00000000`00000001 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
fffffd07`029f07a0 fffff806`523636af : ffff890f`00000001 ffff890f`8260c190 00000000`00000000 ffff890f`87540000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
fffffd07`029f0810 fffff806`5228e05b : ffff890f`890f1580 00000000`00000001 ffff890f`890f1640 fffff806`52274ee6 : nt!SmPageRead+0x33
fffffd07`029f0860 fffff806`5228d759 : 00000000`00000002 fffffd07`029f08f0 fffffd07`029f0a58 fffff4fa`40000040 : nt!MiIssueHardFaultIo+0x117
fffffd07`029f08b0 fffff806`52272f9b : 00000000`c0033333 00000000`00000001 00000000`010bcb10 00000000`00000000 : nt!MiIssueHardFault+0x489
fffffd07`029f0960 fffff806`523cf320 : 00000000`00000000 fffffd07`00000001 00000000`00d6d000 fffffd07`029f0b80 : nt!MmAccessFault+0x40b
fffffd07`029f0b00 00000000`0061b05e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`0053e660 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x61b05e
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+fb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fb
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8017c932da7, Address of the instruction which caused the bugcheck
Arg3: ffff91067f128c20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3656
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 68556
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8017c932da7
BUGCHECK_P3: ffff91067f128c20
BUGCHECK_P4: 0
CONTEXT: ffff91067f128c20 -- (.cxr 0xffff91067f128c20)
rax=0000000000000000 rbx=00000000000016fc rcx=ffffdc087ed193a0
rdx=ffffdc0883a72280 rsi=ffffdc087ed19398 rdi=ffffdc087dc1b9e8
rip=fffff8017c932da7 rsp=ffff91067f129610 rbp=ffffdc0883a72b30
r8=0800000000000000 r9=ffffdc0883a722d0 r10=0000000000000000
r11=ffffdc087ed19398 r12=fffff8017d10dae0 r13=ffffdc087e1a1018
r14=ffffdc087e1a1150 r15=ffffdc087dc1b9c8
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nvlddmkm+0x1b2da7:
fffff801`7c932da7 45385020 cmp byte ptr [r8+20h],r10b ds:002b:08000000`00000020=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
STACK_TEXT:
ffff9106`7f129610 ffffdc08`7a788850 : ffff9106`7f129880 ffffdc08`4d52564e ffffdc08`7dbbdd20 ffffdc08`7e1a1150 : nvlddmkm+0x1b2da7
ffff9106`7f129618 ffff9106`7f129880 : ffffdc08`4d52564e ffffdc08`7dbbdd20 ffffdc08`7e1a1150 fffff801`7c9338ca : 0xffffdc08`7a788850
ffff9106`7f129620 ffffdc08`4d52564e : ffffdc08`7dbbdd20 ffffdc08`7e1a1150 fffff801`7c9338ca fffff801`7d002a28 : 0xffff9106`7f129880
ffff9106`7f129628 ffffdc08`7dbbdd20 : ffffdc08`7e1a1150 fffff801`7c9338ca fffff801`7d002a28 ffff9106`7f129880 : 0xffffdc08`4d52564e
ffff9106`7f129630 ffffdc08`7e1a1150 : fffff801`7c9338ca fffff801`7d002a28 ffff9106`7f129880 00000000`00000001 : 0xffffdc08`7dbbdd20
ffff9106`7f129638 fffff801`7c9338ca : fffff801`7d002a28 ffff9106`7f129880 00000000`00000001 ffffdc08`7f2c0370 : 0xffffdc08`7e1a1150
ffff9106`7f129640 fffff801`7d002a28 : ffff9106`7f129880 00000000`00000001 ffffdc08`7f2c0370 00000000`00000001 : nvlddmkm+0x1b38ca
ffff9106`7f129648 ffff9106`7f129880 : 00000000`00000001 ffffdc08`7f2c0370 00000000`00000001 fffff801`7cd96b4c : nvlddmkm+0x882a28
ffff9106`7f129650 00000000`00000001 : ffffdc08`7f2c0370 00000000`00000001 fffff801`7cd96b4c 00000000`00000000 : 0xffff9106`7f129880
ffff9106`7f129658 ffffdc08`7f2c0370 : 00000000`00000001 fffff801`7cd96b4c 00000000`00000000 ffffdc08`7e1a1018 : 0x1
ffff9106`7f129660 00000000`00000001 : fffff801`7cd96b4c 00000000`00000000 ffffdc08`7e1a1018 ffffdc08`7e1a1018 : 0xffffdc08`7f2c0370
ffff9106`7f129668 fffff801`7cd96b4c : 00000000`00000000 ffffdc08`7e1a1018 ffffdc08`7e1a1018 fffff801`7d10dae0 : 0x1
ffff9106`7f129670 00000000`00000000 : ffffdc08`7e1a1018 ffffdc08`7e1a1018 fffff801`7d10dae0 ffffdc08`84776788 : nvlddmkm+0x616b4c
SYMBOL_NAME: nvlddmkm+1b2da7
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffff91067f128c20 ; kb
BUCKET_ID_FUNC_OFFSET: 1b2da7
FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80219cc8042, Address of the instruction which caused the bugcheck
Arg3: ffffd6832c659af0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7611
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80219cc8042
BUGCHECK_P3: ffffd6832c659af0
BUGCHECK_P4: 0
CONTEXT: ffffd6832c659af0 -- (.cxr 0xffffd6832c659af0)
rax=0400000000000000 rbx=ffffa08cb21a00c0 rcx=0400000000000000
rdx=ffffa08cafd08928 rsi=ffffa08cafd08938 rdi=ffffa08cafd088e0
rip=fffff80219cc8042 rsp=ffffd6832c65a4e0 rbp=0000000000000001
r8=ffffd6832c65a4e8 r9=ffffa08cad2219a0 r10=fffff80214e39cb0
r11=ffffb5fc3e800000 r12=ffffd6832c65a6c8 r13=0000000000000000
r14=ffffa08cad2219a0 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
FLTMGR!GetContextFromStreamList+0x62:
fffff802`19cc8042 488b4120 mov rax,qword ptr [rcx+20h] ds:002b:04000000`00000020=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.18362.411_none_5f53d2d858cf8
STACK_TEXT:
ffffd683`2c65a4e0 fffff802`19cc7b2a : ffffa08c`afd088e0 ffffa08c`afd088e0 ffffa08c`afd088e0 ffffd683`2c65a5d8 : FLTMGR!GetContextFromStreamList+0x62
ffffd683`2c65a550 fffff802`20516c30 : ffffa08c`afd088e0 ffffa08c`ade46138 ffffa08c`ade46050 00000000`00000000 : FLTMGR!FltGetStreamHandleContext+0x4a
ffffd683`2c65a590 fffff802`2052e4c2 : ffffa08c`ade461d8 00000000`00000000 00000000`00000000 00000000`00000000 : cldflt!HsmpGetStreamHandleContext+0x30
ffffd683`2c65a5c0 fffff802`19cc4a5c : ffffa08c`ade461d8 00000000`00000000 ffffd683`2c65a6c8 00000000`00000000 : cldflt!HsmFltPreCLEANUP+0x42
ffffd683`2c65a660 fffff802`19cc45a0 : ffffd683`2c65a840 ffffa08c`af4d1000 ffffa08c`aedf3512 00000000`00000400 : FLTMGR!FltpPerformPreCallbacks+0x2fc
ffffd683`2c65a770 fffff802`19cc4112 : ffffa08c`aedf3520 ffffd683`2c65a840 ffffa08c`aedf3520 ffffd683`2c65a850 : FLTMGR!FltpPassThroughInternal+0x90
ffffd683`2c65a7a0 fffff802`19cc3efe : ffffffff`fffe7960 00000000`00000001 00000000`00000000 ffffa08c`af4d1080 : FLTMGR!FltpPassThrough+0x162
ffffd683`2c65a820 fffff802`14e31f39 : ffffa08c`b21a00c0 fffff802`14e31e1d 00000000`00000000 ffffa08c`adfb2760 : FLTMGR!FltpDispatch+0x9e
ffffd683`2c65a880 fffff802`153e40c8 : 00000000`00000000 ffffa08c`b21a00c0 00000000`00000000 ffffa08c`aedf3520 : nt!IofCallDriver+0x59
ffffd683`2c65a8c0 fffff802`153ec218 : 00000000`00000000 00000000`00000001 ffffa08c`00000000 00000000`00007ffa : nt!IopCloseFile+0x188
ffffd683`2c65a950 fffff802`153f155e : 00000000`000003dc fffff802`158b7848 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x278
ffffd683`2c65aa90 fffff802`14fd2b18 : ffffa08c`00000000 ffffd683`00000001 ffffd683`2c65ab80 ffffd683`2c65ab80 : nt!NtClose+0xde
ffffd683`2c65ab00 00007ffa`93a5c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d1`ed47ba28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`93a5c2a4
SYMBOL_NAME: cldflt!HsmpGetStreamHandleContext+30
MODULE_NAME: cldflt
IMAGE_NAME: cldflt.sys
IMAGE_VERSION: 10.0.18362.1034
STACK_COMMAND: .cxr 0xffffd6832c659af0 ; kb
BUCKET_ID_FUNC_OFFSET: 30
FAILURE_BUCKET_ID: 0x3B_c0000005_cldflt!HsmpGetStreamHandleContext
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {527ea1ea-30d1-5d9c-51ab-fe77c8900080}
Followup: MachineOwner
---------
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 000000000000073c, physical page number
Arg3: 000001ba3e952100, zero
Arg4: ffffb3800c82e000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3187
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6013
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x73c
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0xbd1aabcf
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x2100
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0xad044
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0xffffffffffffffff
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x162ea9
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 73c
BUGCHECK_P3: 1ba3e952100
BUGCHECK_P4: ffffb3800c82e000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
ffffdb09`e47aa1f8 fffff801`73923aab : 00000000`0000012b ffffffff`c00002c4 00000000`0000073c 000001ba`3e952100 : nt!KeBugCheckEx
ffffdb09`e47aa200 fffff801`73862e50 : 00000000`00000200 00000000`c00002c4 ffffb380`0c82e000 00000000`00000002 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
ffffdb09`e47aa250 fffff801`7375fd64 : 00000000`00000004 ffffdb09`e47aa460 00000000`00000000 00000000`00000d82 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1030cc
ffffdb09`e47aa330 fffff801`7375fbe2 : 00000000`00000001 00000000`00002100 00000000`00002100 ffffdc0f`00004000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
ffffdb09`e47aa380 fffff801`7375fa0b : ffffdc0f`ffffffff ffffdc0f`a591a000 ffffdb09`e47aa460 ffffdc0f`9f39d490 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
ffffdb09`e47aa420 fffff801`7375f851 : ffffdc0f`a591a000 00000000`00000000 00000000`00000001 ffffdc0f`a154a788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
ffffdb09`e47aa4d0 fffff801`7375f761 : ffffdc0f`a1549000 ffffdc0f`9f39d490 ffffdc0f`a591a000 ffffdc0f`a154a9b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffdb09`e47aa550 fffff801`73669e18 : ffffdc0f`a1cbb080 ffffdc0f`a1549000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffdb09`e47aa580 fffff801`73762cc1 : fffff801`7375f740 ffffdb09`e47aa630 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffdb09`e47aa5f0 fffff801`7374b941 : ffffdb09`e47aa6f0 fffff801`73b8db78 ffffdc0f`a1549000 ffffdb09`e47aa840 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xcd
ffffdb09`e47aa6c0 fffff801`7374b527 : 00000000`0000000c ffffdc0f`a1549000 ffffdb09`e47aa770 ffffdc0f`9f39d490 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a5
ffffdb09`e47aa710 fffff801`73761fd3 : 00000000`0000000c ffffdc0f`9f39d490 00000000`00000004 00000000`00000004 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffdb09`e47aa7a0 fffff801`737636af : ffffdc0f`00000004 ffffdc0f`a296cd50 00000000`00000000 ffffdc0f`a1549000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffdb09`e47aa810 fffff801`7368e05b : ffffdc0f`a1bf58c0 00000000`00000001 ffffdc0f`a1bf5980 fffff801`73674ee6 : nt!SmPageRead+0x33
ffffdb09`e47aa860 fffff801`7368d759 : 00000000`00000002 ffffdb09`e47aa8f0 ffffdb09`e47aaa58 ffffd9ec`c087ca08 : nt!MiIssueHardFaultIo+0x117
ffffdb09`e47aa8b0 fffff801`73672f9b : 00000000`c0033333 00000000`00000001 0000021f`2838d4a0 00000000`00000000 : nt!MiIssueHardFault+0x489
ffffdb09`e47aa960 fffff801`737cf320 : ffffdc0f`a1cbb080 000000e3`580ff798 0000021f`28626c50 ffffffff`ffb3b4c0 : nt!MmAccessFault+0x40b
ffffdb09`e47aab00 00007fff`100845e6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
000000e3`580ff170 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`100845e6
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+fb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fb
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8074b6449c2, Address of the instruction which caused the bugcheck
Arg3: ffffd800fab91930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2827
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17705
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8074b6449c2
BUGCHECK_P3: ffffd800fab91930
BUGCHECK_P4: 0
CONTEXT: ffffd800fab91930 -- (.cxr 0xffffd800fab91930)
rax=0a0000000000f000 rbx=ffffb30fa8202290 rcx=0000000000000000
rdx=ffffb30fb38d8dd8 rsi=0000000000000001 rdi=ffffb30fb374cdd8
rip=fffff8074b6449c2 rsp=ffffe808fb332328 rbp=0000000000000026
r8=0000000000000000 r9=f5ffb30fb38d7dd8 r10=ffffb30fb374cdd8
r11=0000000000000001 r12=ffffb30fb381ea20 r13=ffffb30fb3268000
r14=0000000000000000 r15=ffffb30fb3269dd0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!RtlRbRemoveNode+0x3c2:
fffff807`4b6449c2 410fb64110 movzx eax,byte ptr [r9+10h] ds:002b:f5ffb30f`b38d7de8=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
BAD_STACK_POINTER: ffffd800fab90ff8
STACK_TEXT:
ffffe808`fb332328 fffff807`4b644380 : 00000000`00000026 ffffb30f`b3269fe0 00000000`00000000 ffffb30f`b3269dd0 : nt!RtlRbRemoveNode+0x3c2
ffffe808`fb332340 fffff807`4b643e3a : ffffb30f`a8202280 ffffb30f`b3658ab0 00000000`00000153 ffffe808`fb332450 : nt!RtlpHpVsChunkCoalesce+0xb0
ffffe808`fb3323b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x18a
SYMBOL_NAME: nt!RtlRbRemoveNode+3c2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .cxr 0xffffd800fab91930 ; kb
BUCKET_ID_FUNC_OFFSET: 3c2
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!RtlRbRemoveNode
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8186a7bd-ff19-166f-971a-62b0de07bb2f}
Followup: MachineOwner
---------