If all else fails use Windows debug to analyse the crash dump logs.
Basic WinDBG methods for debugging crash dumps in Windows 10
www.tenforums.com
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88008f94c48
Arg3: fffff88008f944a0
Arg4: fffff80002ddde2e
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-TJ4UU2H
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 24
BUGCHECK_P1: 1904fb
BUGCHECK_P2: fffff88008f94c48
BUGCHECK_P3: fffff88008f944a0
BUGCHECK_P4: fffff80002ddde2e
EXCEPTION_RECORD: fffff88008f94c48 -- (.exr 0xfffff88008f94c48)
ExceptionAddress: fffff80002ddde2e (nt!FsRtlNotifyFilterReportChange+0x0000000000000122)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88008f944a0 -- (.cxr 0xfffff88008f944a0)
rax=9cfff8a0028aa358 rbx=fffffa8003fc3060 rcx=0000000000000082
rdx=fffffa80030d76b0 rsi=fffff8a002df33e0 rdi=fffff8a002df3410
rip=fffff80002ddde2e rsp=fffff88008f94e80 rbp=0000000000000002
r8=fffff8a0038a56f0 r9=0000000000000000 r10=0000000000000060
r11=fffff88008f94fa8 r12=fffff88008f94f40 r13=fffff8a0038a56f0
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!FsRtlNotifyFilterReportChange+0x122:
fffff800`02ddde2e 66833800 cmp word ptr [rax],0 ds:002b:9cfff8a0`028aa358=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: qw.exe
READ_ADDRESS: fffff80002c42068: Unable to get Flags value from nt!KdVersionBlock
fffff80002c42068: Unable to get Flags value from nt!KdVersionBlock
fffff80002c42068: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002d002e0
GetUlongPtrFromAddress: unable to read from fffff80002d00490
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`08f94e80 fffff880`01648a54 : fffffa80`02ea6980 fffffa80`030d76b0 fffff8a0`038a56f0 01ceb348`37570060 : nt!FsRtlNotifyFilterReportChange+0x122
fffff880`08f94fb0 fffff880`016ce9bd : 00000000`00000000 fffff8a0`02c635c0 fffff8a0`02c636f0 fffff8a0`038a56f0 : Ntfs!NtfsReportDirNotify+0x104
fffff880`08f95070 fffff880`0163f639 : 00000000`00000098 fffff800`02dbf576 fffff880`08f955d0 00000000`00006000 : Ntfs!NtfsCommonCleanup+0xe9d
fffff880`08f95490 fffff800`02ad4878 : fffff880`08f955d0 fffff8a0`019db3a0 fffffa80`018fb550 fffff880`08f95650 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`08f954c0 fffff880`0163f6b2 : fffff880`0163f620 00000002`0008002c 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`08f955a0 fffff880`016dcba4 : fffff880`08f95670 fffff880`08f95670 fffff880`08f95670 00000000`00000000 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
fffff880`08f95610 fffff800`02f71d26 : fffff880`08f95670 fffffa80`02c45460 fffffa80`02c45460 fffffa80`030d7030 : Ntfs!NtfsFsdCleanup+0x144
fffff880`08f95880 fffff880`01143bcf : fffffa80`02c45800 fffff880`08f95920 fffffa80`02c95350 fffffa80`02c54010 : nt!IovCallDriver+0x566
fffff880`08f958e0 fffff880`011426df : fffffa80`02ef69e0 fffffa80`02ef69e0 fffffa80`02d43000 fffffa80`02c45460 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`08f95970 fffff800`02f71d26 : fffffa80`02c45460 00000000`00000002 fffffa80`02ef69e0 00000000`00000000 : fltmgr!FltpDispatch+0xcf
fffff880`08f959d0 fffff800`02dd196f : fffffa80`02c45460 fffffa80`03df8950 00000000`00000000 fffffa80`02548420 : nt!IovCallDriver+0x566
fffff880`08f95a30 fffff800`02dbf964 : 00000000`00000000 fffffa80`03df8950 fffff880`01160101 fffffa80`02530f01 : nt!IopCloseFile+0x11f
fffff880`08f95ac0 fffff800`02dbf721 : fffffa80`03df8950 fffffa80`00000001 fffff8a0`02f50500 00000000`00000002 : nt!ObpDecrementHandleCount+0xb4
fffff880`08f95b40 fffff800`02dbfce4 : 00000000`00000418 fffffa80`03df8950 fffff8a0`02f50500 00000000`00000418 : nt!ObpCloseHandleTableEntry+0xb1
fffff880`08f95bd0 fffff800`02ac7e53 : fffffa80`03fc3060 fffff880`08f95ca0 00000000`7efdb000 00000000`7efdb000 : nt!ObpCloseHandle+0x94
fffff880`08f95c20 00000000`76df13aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001ae088 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76df13aa
SYMBOL_NAME: nt!FsRtlNotifyFilterReportChange+122
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.18247
STACK_COMMAND: .cxr 0xfffff88008f944a0 ; kb
FAILURE_BUCKET_ID: X64_0x24_VRF_nt!FsRtlNotifyFilterReportChange+122
OS_VERSION: 7.1.7601.18247
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {13ccbb6f-9ab6-8211-c685-1556472c30e3}
Followup: MachineOwner
---------