1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803daada00d, The address that the exception occurred at
Arg3: ffffbf011d12d508, Exception Record Address
Arg4: ffffbf011d12cd20, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for RTKVHD64.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 3202
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14497
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 405
Key : Analysis.Init.Elapsed.mSec
Value: 2975
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.DumpHeader
Value: 0x1000007e
Key : Bugcheck.Code.Register
Value: 0x7e
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 060723-13562-01.dmp
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff803daada00d
BUGCHECK_P3: ffffbf011d12d508
BUGCHECK_P4: ffffbf011d12cd20
EXCEPTION_RECORD: ffffbf011d12d508 -- (.exr 0xffffbf011d12d508)
ExceptionAddress: fffff803daada00d (RTKVHD64+0x00000000000aa00d)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000060
Attempt to read from address 0000000000000060
CONTEXT: ffffbf011d12cd20 -- (.cxr 0xffffbf011d12cd20)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffac88e376bd78 rsi=0000000000000000 rdi=ffffac88e3767458
rip=fffff803daada00d rsp=ffffbf011d12d740 rbp=ffffbf011d12d809
r8=ffffac88e2e38de0 r9=ffffd600af525180 r10=ffffac88d195ee50
r11=ffffac88e54a5de0 r12=0000000000000001 r13=ffffac88e7cc3aa0
r14=ffffac88e37775c8 r15=0000000000000002
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
RTKVHD64+0xaa00d:
fffff803`daada00d 488b4160 mov rax,qword ptr [rcx+60h] ds:002b:00000000`00000060=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8037011c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000060
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000060
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffbf01`1d12d740 00000000`00000000 : 00000000`00000000 ffffbf01`1d12d809 00000000`6d446266 00000000`00000000 : RTKVHD64+0xaa00d
SYMBOL_NAME: RTKVHD64+aa00d
MODULE_NAME: RTKVHD64
IMAGE_NAME: RTKVHD64.sys
STACK_COMMAND: .cxr 0xffffbf011d12cd20 ; kb
BUCKET_ID_FUNC_OFFSET: aa00d
FAILURE_BUCKET_ID: AV_RTKVHD64!unknown_function
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8427c922-ba45-a12b-e45a-4e0138637121}
Followup: MachineOwner
---------