SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800d14e77d0, The address that the exception occurred at
Arg3: fffff8800134c918, Exception Record Address
Arg4: fffff8800134c150, Context Record Address
Debugging Details:
------------------
TRIAGER: Could not open triage file : C:\Program Files\Windows Kits\8.0\Debuggers\x86\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiFreeRelocations+44
fffff800`d14e77d0 488b19 mov rbx,qword ptr [rcx]
EXCEPTION_RECORD: fffff8800134c918 -- (.exr 0xfffff8800134c918)
ExceptionAddress: fffff800d14e77d0 (nt!MiFreeRelocations+0x0000000000000044)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff8800134c150 -- (.cxr 0xfffff8800134c150)
rax=0000000000000000 rbx=fffffa80062d1ff0 rcx=441d8400439dbfe0
rdx=0000000000004400 rsi=fffffa80062d1e30 rdi=fffff8a0092fd000
rip=fffff800d14e77d0 rsp=fffff8800134cb50 rbp=0000000000000001
r8=0000000001000085 r9=0000000000000000 r10=fffff800d1341560
r11=fffff8a009a47870 r12=0000000080000000 r13=0000000000010000
r14=fffff8a009a47870 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiFreeRelocations+0x44:
fffff800`d14e77d0 488b19 mov rbx,qword ptr [rcx] ds:002b:441d8400`439dbfe0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800d139c178
GetUlongFromAddress: unable to read from fffff800d139c1f8
ffffffffffffffff
FOLLOWUP_IP:
nt!MiFreeRelocations+44
fffff800`d14e77d0 488b19 mov rbx,qword ptr [rcx]
BUGCHECK_STR: AV
LAST_CONTROL_TRANSFER: from fffff800d10cbaf5 to fffff800d14e77d0
STACK_TEXT:
fffff880`0134cb50 fffff800`d10cbaf5 : fffffa80`062d1ff0 00000000`00000000 fffffa80`062d1e30 00000000`000802a1 : nt!MiFreeRelocations+0x44
fffff880`0134cb80 fffff800`d13df48c : 00000000`000802a1 fffffa80`062d1e30 00000000`00000001 fffffa80`6765534d : nt!MiDeleteControlArea+0x69
fffff880`0134cbb0 fffff800`d113db4e : 00000000`00000000 fffff800`d138d040 00000000`00000000 fffffa80`062d1e38 : nt!MiSegmentDelete+0xe8
fffff880`0134cc30 fffff800`d113d805 : 00000000`00000000 fffff800`d1315260 fffff800`d13152a0 fffffa80`02281600 : nt!MiProcessDereferenceList+0x10e
fffff880`0134ccc0 fffff800`d143ea2d : fffffa80`02280040 00000000`00000080 00000000`00000000 fffff800`d113d72c : nt!MiDereferenceSegmentThread+0xd9
fffff880`0134cd50 fffff800`d1211e86 : fffff800`d133f180 fffffa80`02280040 fffffa80`02281600 fffffa80`021e06c0 : nt!PspSystemThreadStartup+0x59
fffff880`0134cda0 00000000`00000000 : fffff880`0134d000 fffff880`01347000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiFreeRelocations+44
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4f7658cb
STACK_COMMAND: .cxr 0xfffff8800134c150 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_AV_nt!MiFreeRelocations+44
BUCKET_ID: X64_AV_nt!MiFreeRelocations+44
Followup: MachineOwner
---------