SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88007cbd850, The address that the exception occurred at
Arg3: fffff88006bd95a8, Exception Record Address
Arg4: fffff88006bd8e00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.23796.amd64fre.win7sp1_ldr.170427-1518
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88007cbd850
BUGCHECK_P3: fffff88006bd95a8
BUGCHECK_P4: fffff88006bd8e00
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
iusb3xhc+4f850
fffff880`07cbd850 488b4350 mov rax,qword ptr [rbx+50h]
EXCEPTION_RECORD: fffff88006bd95a8 -- (.exr 0xfffff88006bd95a8)
ExceptionAddress: fffff88007cbd850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff88006bd8e00 -- (.cxr 0xfffff88006bd8e00)
rax=fffff88007cee018 rbx=0000000101700112 rcx=fffff88007cee1e0
rdx=0000000101700112 rsi=fffffa800d0be1b0 rdi=0000000101700112
rip=fffff88007cbd850 rsp=fffff88006bd97e0 rbp=fffffa800d1e6920
r8=fffffa800c125860 r9=0000000000000000 r10=fffffa800d1e6920
r11=fffff88006bd9938 r12=0000000000000005 r13=fffff88007cee018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`07cbd850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: e74
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
iusb3xhc+4f850
fffff880`07cbd850 488b4350 mov rax,qword ptr [rbx+50h]
BUGCHECK_STR: 0x7E
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bf100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032bf2e8
GetUlongPtrFromAddress: unable to read from fffff800032bf498
GetPointerFromAddress: unable to read from fffff800032bf0b8
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
ANALYSIS_SESSION_HOST: MSI
ANALYSIS_SESSION_TIME: 03-13-2019 14:36:44.0897
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffffa800d1e88b0 to fffff88007cbd850
STACK_TEXT:
fffff880`06bd97e0 fffffa80`0d1e88b0 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0d1e6978 : iusb3xhc+0x4f850
fffff880`06bd97e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0d1e6978 00000000`00000000 : 0xfffffa80`0d1e88b0
fffff880`06bd97f0 00000000`00000001 : 00000000`000007ff fffffa80`0d1e6978 00000000`00000000 fffff880`07cddb00 : 0x60
fffff880`06bd97f8 00000000`000007ff : fffffa80`0d1e6978 00000000`00000000 fffff880`07cddb00 fffff880`07cee018 : 0x1
fffff880`06bd9800 fffffa80`0d1e6978 : 00000000`00000000 fffff880`07cddb00 fffff880`07cee018 fffffa80`0c125860 : 0x7ff
fffff880`06bd9808 00000000`00000000 : fffff880`07cddb00 fffff880`07cee018 fffffa80`0c125860 fffff880`07ccbe19 : 0xfffffa80`0d1e6978
THREAD_SHA1_HASH_MOD_FUNC: 6bf72fd54532e159d0a464bdb65a6ab880e6742d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0530522e984365b2e49777920f61758cb1845153
THREAD_SHA1_HASH_MOD: 6bf72fd54532e159d0a464bdb65a6ab880e6742d
FAULT_INSTR_CODE: 50438b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: iusb3xhc+4f850
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 591455d7
STACK_COMMAND: .cxr 0xfffff88006bd8e00 ; kb
FAILURE_BUCKET_ID: X64_0x7E_iusb3xhc+4f850
BUCKET_ID: X64_0x7E_iusb3xhc+4f850
PRIMARY_PROBLEM_CLASS: X64_0x7E_iusb3xhc+4f850
TARGET_TIME: 2019-03-13T10:42:54.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-04-28 03:13:49
BUILDDATESTAMP_STR: 170427-1518
BUILDLAB_STR: win7sp1_ldr
BUILDOSVER_STR: 6.1.7601.23796.amd64fre.win7sp1_ldr.170427-1518
ANALYSIS_SESSION_ELAPSED_TIME: 1c03
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x7e_iusb3xhc+4f850
FAILURE_ID_HASH: {81ee09ff-022e-860d-60d4-13cd866988af}
Followup: MachineOwner
---------