SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800d066850, The address that the exception occurred at
Arg3: fffff88003be75a8, Exception Record Address
Arg4: fffff88003be6e00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1734
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21241
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8800d066850
BUGCHECK_P3: fffff88003be75a8
BUGCHECK_P4: fffff88003be6e00
EXCEPTION_RECORD: fffff88003be75a8 -- (.exr 0xfffff88003be75a8)
ExceptionAddress: fffff8800d066850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff88003be6e00 -- (.cxr 0xfffff88003be6e00)
rax=fffff8800d097018 rbx=0000000101700112 rcx=fffff8800d0971e0
rdx=0000000101700112 rsi=fffffa800d1fe1b0 rdi=0000000101700112
rip=fffff8800d066850 rsp=fffff88003be77e0 rbp=fffffa800c3f7a00
r8=fffffa80116d2720 r9=0000000000000000 r10=fffffa800c3f7a00
r11=fffff88003be7938 r12=0000000000000001 r13=fffff8800d097018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`0d066850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031072e8
GetUlongPtrFromAddress: unable to read from fffff80003107498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`03be77e0 fffffa80`0a516920 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0c3f7a58 : iusb3xhc+0x4f850
fffff880`03be77e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0c3f7a58 00000000`00000000 : 0xfffffa80`0a516920
fffff880`03be77f0 00000000`00000001 : 00000000`000007ff fffffa80`0c3f7a58 00000000`00000000 fffff880`0d086b00 : 0x60
fffff880`03be77f8 00000000`000007ff : fffffa80`0c3f7a58 00000000`00000000 fffff880`0d086b00 fffff880`0d097018 : 0x1
fffff880`03be7800 fffffa80`0c3f7a58 : 00000000`00000000 fffff880`0d086b00 fffff880`0d097018 fffffa80`116d2720 : 0x7ff
fffff880`03be7808 00000000`00000000 : fffff880`0d086b00 fffff880`0d097018 fffffa80`116d2720 fffff880`0d074e19 : 0xfffffa80`0c3f7a58
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff88003be6e00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006709850, The address that the exception occurred at
Arg3: fffff880039165a8, Exception Record Address
Arg4: fffff88003915e00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1546
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11904
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88006709850
BUGCHECK_P3: fffff880039165a8
BUGCHECK_P4: fffff88003915e00
EXCEPTION_RECORD: fffff880039165a8 -- (.exr 0xfffff880039165a8)
ExceptionAddress: fffff88006709850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff88003915e00 -- (.cxr 0xfffff88003915e00)
rax=fffff8800673a018 rbx=0000000101700112 rcx=fffff8800673a1e0
rdx=0000000101700112 rsi=fffffa8007e451b0 rdi=0000000101700112
rip=fffff88006709850 rsp=fffff880039167e0 rbp=fffffa8007007410
r8=fffffa8007e43b20 r9=0000000000000000 r10=fffffa8007007410
r11=fffff88003916938 r12=0000000000000002 r13=fffff8800673a018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`06709850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff800030060e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030060e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030060e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030c52e8
GetUlongPtrFromAddress: unable to read from fffff800030c5498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`039167e0 fffffa80`0bb30eb0 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`07007468 : iusb3xhc+0x4f850
fffff880`039167e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`07007468 00000000`00000000 : 0xfffffa80`0bb30eb0
fffff880`039167f0 00000000`00000001 : 00000000`000007ff fffffa80`07007468 00000000`00000000 fffff880`06729b00 : 0x60
fffff880`039167f8 00000000`000007ff : fffffa80`07007468 00000000`00000000 fffff880`06729b00 fffff880`0673a018 : 0x1
fffff880`03916800 fffffa80`07007468 : 00000000`00000000 fffff880`06729b00 fffff880`0673a018 fffffa80`07e43b20 : 0x7ff
fffff880`03916808 00000000`00000000 : fffff880`06729b00 fffff880`0673a018 fffffa80`07e43b20 fffff880`06717e19 : 0xfffffa80`07007468
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff88003915e00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a7c850, The address that the exception occurred at
Arg3: fffff88003ef6598, Exception Record Address
Arg4: fffff88003ef5df0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 2171
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17111
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88004a7c850
BUGCHECK_P3: fffff88003ef6598
BUGCHECK_P4: fffff88003ef5df0
EXCEPTION_RECORD: fffff88003ef6598 -- (.exr 0xfffff88003ef6598)
ExceptionAddress: fffff88004a7c850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff88003ef5df0 -- (.cxr 0xfffff88003ef5df0)
rax=fffff88004aad018 rbx=0000000101700112 rcx=fffff88004aad1e0
rdx=0000000101700112 rsi=fffffa8007e221b0 rdi=0000000101700112
rip=fffff88004a7c850 rsp=fffff88003ef67d0 rbp=fffffa8007e22ba0
r8=fffffa8007e04b20 r9=0000000000000000 r10=fffffa8007e22ba0
r11=fffff88003ef6928 r12=0000000000000001 r13=fffff88004aad018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`04a7c850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b92e8
GetUlongPtrFromAddress: unable to read from fffff800030b9498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`03ef67d0 fffffa80`0caef000 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`07e22bf8 : iusb3xhc+0x4f850
fffff880`03ef67d8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`07e22bf8 00000000`00000000 : 0xfffffa80`0caef000
fffff880`03ef67e0 00000000`00000001 : 00000000`000007ff fffffa80`07e22bf8 00000000`00000000 fffff880`04a9cb00 : 0x60
fffff880`03ef67e8 00000000`000007ff : fffffa80`07e22bf8 00000000`00000000 fffff880`04a9cb00 fffff880`04aad018 : 0x1
fffff880`03ef67f0 fffffa80`07e22bf8 : 00000000`00000000 fffff880`04a9cb00 fffff880`04aad018 fffffa80`07e04b20 : 0x7ff
fffff880`03ef67f8 00000000`00000000 : fffff880`04a9cb00 fffff880`04aad018 fffffa80`07e04b20 fffff880`04a8ae19 : 0xfffffa80`07e22bf8
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff88003ef5df0 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800476a850, The address that the exception occurred at
Arg3: fffff88008e2c598, Exception Record Address
Arg4: fffff88008e2bdf0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1483
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8068
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8800476a850
BUGCHECK_P3: fffff88008e2c598
BUGCHECK_P4: fffff88008e2bdf0
EXCEPTION_RECORD: fffff88008e2c598 -- (.exr 0xfffff88008e2c598)
ExceptionAddress: fffff8800476a850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff88008e2bdf0 -- (.cxr 0xfffff88008e2bdf0)
rax=fffff8800479b018 rbx=0000000101700112 rcx=fffff8800479b1e0
rdx=0000000101700112 rsi=fffffa8007bd01b0 rdi=0000000101700112
rip=fffff8800476a850 rsp=fffff88008e2c7d0 rbp=fffffa800c5ba7c0
r8=fffffa800ad4bb20 r9=0000000000000000 r10=fffffa800c5ba7c0
r11=fffff88008e2c928 r12=0000000000000001 r13=fffff8800479b018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`0476a850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff800030000e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030000e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030000e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030bf2e8
GetUlongPtrFromAddress: unable to read from fffff800030bf498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`08e2c7d0 fffffa80`07d064e0 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0c5ba818 : iusb3xhc+0x4f850
fffff880`08e2c7d8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0c5ba818 00000000`00000000 : 0xfffffa80`07d064e0
fffff880`08e2c7e0 00000000`00000001 : 00000000`000007ff fffffa80`0c5ba818 00000000`00000000 fffff880`0478ab00 : 0x60
fffff880`08e2c7e8 00000000`000007ff : fffffa80`0c5ba818 00000000`00000000 fffff880`0478ab00 fffff880`0479b018 : 0x1
fffff880`08e2c7f0 fffffa80`0c5ba818 : 00000000`00000000 fffff880`0478ab00 fffff880`0479b018 fffffa80`0ad4bb20 : 0x7ff
fffff880`08e2c7f8 00000000`00000000 : fffff880`0478ab00 fffff880`0479b018 fffffa80`0ad4bb20 fffff880`04778e19 : 0xfffffa80`0c5ba818
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff88008e2bdf0 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800484f850, The address that the exception occurred at
Arg3: fffff880037fc3a8, Exception Record Address
Arg4: fffff880037fbc00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1562
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21283
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8800484f850
BUGCHECK_P3: fffff880037fc3a8
BUGCHECK_P4: fffff880037fbc00
EXCEPTION_RECORD: fffff880037fc3a8 -- (.exr 0xfffff880037fc3a8)
ExceptionAddress: fffff8800484f850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff880037fbc00 -- (.cxr 0xfffff880037fbc00)
rax=fffff88004880018 rbx=0000000101700112 rcx=fffff880048801e0
rdx=0000000101700112 rsi=fffffa8007b8d1b0 rdi=0000000101700112
rip=fffff8800484f850 rsp=fffff880037fc5e0 rbp=fffffa800b42d860
r8=fffffa800b18e460 r9=0000000000000000 r10=fffffa800b42d860
r11=fffff880037fc738 r12=0000000000000003 r13=fffff88004880018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`0484f850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031072e8
GetUlongPtrFromAddress: unable to read from fffff80003107498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`037fc5e0 fffffa80`10e992e0 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0b42d8b8 : iusb3xhc+0x4f850
fffff880`037fc5e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0b42d8b8 00000000`00000000 : 0xfffffa80`10e992e0
fffff880`037fc5f0 00000000`00000001 : 00000000`000007ff fffffa80`0b42d8b8 00000000`00000000 fffff880`0486fb00 : 0x60
fffff880`037fc5f8 00000000`000007ff : fffffa80`0b42d8b8 00000000`00000000 fffff880`0486fb00 fffff880`04880018 : 0x1
fffff880`037fc600 fffffa80`0b42d8b8 : 00000000`00000000 fffff880`0486fb00 fffff880`04880018 fffffa80`0b18e460 : 0x7ff
fffff880`037fc608 00000000`00000000 : fffff880`0486fb00 fffff880`04880018 fffffa80`0b18e460 fffff880`0485de19 : 0xfffffa80`0b42d8b8
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff880037fbc00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800434a850, The address that the exception occurred at
Arg3: fffff880037d93a8, Exception Record Address
Arg4: fffff880037d8c00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1812
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 20528
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8800434a850
BUGCHECK_P3: fffff880037d93a8
BUGCHECK_P4: fffff880037d8c00
EXCEPTION_RECORD: fffff880037d93a8 -- (.exr 0xfffff880037d93a8)
ExceptionAddress: fffff8800434a850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff880037d8c00 -- (.cxr 0xfffff880037d8c00)
rax=fffff8800437b018 rbx=0000000101700112 rcx=fffff8800437b1e0
rdx=0000000101700112 rsi=fffffa8007e0b1b0 rdi=0000000101700112
rip=fffff8800434a850 rsp=fffff880037d95e0 rbp=fffffa800ac44010
r8=fffffa800b45db20 r9=0000000000000000 r10=fffffa800ac44010
r11=fffff880037d9738 r12=0000000000000002 r13=fffff8800437b018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`0434a850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80002ff40e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff40e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff40e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b32e8
GetUlongPtrFromAddress: unable to read from fffff800030b3498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`037d95e0 fffffa80`0db4eea0 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0ac44068 : iusb3xhc+0x4f850
fffff880`037d95e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0ac44068 00000000`00000000 : 0xfffffa80`0db4eea0
fffff880`037d95f0 00000000`00000001 : 00000000`000007ff fffffa80`0ac44068 00000000`00000000 fffff880`0436ab00 : 0x60
fffff880`037d95f8 00000000`000007ff : fffffa80`0ac44068 00000000`00000000 fffff880`0436ab00 fffff880`0437b018 : 0x1
fffff880`037d9600 fffffa80`0ac44068 : 00000000`00000000 fffff880`0436ab00 fffff880`0437b018 fffffa80`0b45db20 : 0x7ff
fffff880`037d9608 00000000`00000000 : fffff880`0436ab00 fffff880`0437b018 fffffa80`0b45db20 fffff880`04358e19 : 0xfffffa80`0ac44068
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff880037d8c00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004574850, The address that the exception occurred at
Arg3: fffff880037ee3a8, Exception Record Address
Arg4: fffff880037edc00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8388
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88004574850
BUGCHECK_P3: fffff880037ee3a8
BUGCHECK_P4: fffff880037edc00
EXCEPTION_RECORD: fffff880037ee3a8 -- (.exr 0xfffff880037ee3a8)
ExceptionAddress: fffff88004574850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff880037edc00 -- (.cxr 0xfffff880037edc00)
rax=fffff880045a5018 rbx=0000000101700112 rcx=fffff880045a51e0
rdx=0000000101700112 rsi=fffffa800af6b810 rdi=0000000101700112
rip=fffff88004574850 rsp=fffff880037ee5e0 rbp=fffffa800b9ce530
r8=fffffa800af8e9f0 r9=0000000000000000 r10=fffffa800b9ce530
r11=fffff880037ee738 r12=0000000000000001 r13=fffff880045a5018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`04574850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff800030540e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030540e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030540e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031132e8
GetUlongPtrFromAddress: unable to read from fffff80003113498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`037ee5e0 fffffa80`0b9b5f90 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0b9ce588 : iusb3xhc+0x4f850
fffff880`037ee5e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0b9ce588 00000000`00000000 : 0xfffffa80`0b9b5f90
fffff880`037ee5f0 00000000`00000001 : 00000000`000007ff fffffa80`0b9ce588 00000000`00000000 fffff880`04594b00 : 0x60
fffff880`037ee5f8 00000000`000007ff : fffffa80`0b9ce588 00000000`00000000 fffff880`04594b00 fffff880`045a5018 : 0x1
fffff880`037ee600 fffffa80`0b9ce588 : 00000000`00000000 fffff880`04594b00 fffff880`045a5018 fffffa80`0af8e9f0 : 0x7ff
fffff880`037ee608 00000000`00000000 : fffff880`04594b00 fffff880`045a5018 fffffa80`0af8e9f0 fffff880`04582e19 : 0xfffffa80`0b9ce588
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff880037edc00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004564850, The address that the exception occurred at
Arg3: fffff880039163a8, Exception Record Address
Arg4: fffff88003915c00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1514
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19301
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88004564850
BUGCHECK_P3: fffff880039163a8
BUGCHECK_P4: fffff88003915c00
EXCEPTION_RECORD: fffff880039163a8 -- (.exr 0xfffff880039163a8)
ExceptionAddress: fffff88004564850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff88003915c00 -- (.cxr 0xfffff88003915c00)
rax=fffff88004595018 rbx=0000000101700112 rcx=fffff880045951e0
rdx=0000000101700112 rsi=fffffa8007e25810 rdi=0000000101700112
rip=fffff88004564850 rsp=fffff880039165e0 rbp=fffffa800bdfe7b0
r8=fffffa8007e09b20 r9=0000000000000000 r10=fffffa800bdfe7b0
r11=fffff88003916738 r12=0000000000000001 r13=fffff88004595018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`04564850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff800030070e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030070e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030070e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030c62e8
GetUlongPtrFromAddress: unable to read from fffff800030c6498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`039165e0 fffffa80`0bd10690 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0bdfe808 : iusb3xhc+0x4f850
fffff880`039165e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0bdfe808 00000000`00000000 : 0xfffffa80`0bd10690
fffff880`039165f0 00000000`00000001 : 00000000`000007ff fffffa80`0bdfe808 00000000`00000000 fffff880`04584b00 : 0x60
fffff880`039165f8 00000000`000007ff : fffffa80`0bdfe808 00000000`00000000 fffff880`04584b00 fffff880`04595018 : 0x1
fffff880`03916600 fffffa80`0bdfe808 : 00000000`00000000 fffff880`04584b00 fffff880`04595018 fffffa80`07e09b20 : 0x7ff
fffff880`03916608 00000000`00000000 : fffff880`04584b00 fffff880`04595018 fffffa80`07e09b20 fffff880`04572e19 : 0xfffffa80`0bdfe808
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff88003915c00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004b06850, The address that the exception occurred at
Arg3: fffff880037e75a8, Exception Record Address
Arg4: fffff880037e6e00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1561
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9212
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88004b06850
BUGCHECK_P3: fffff880037e75a8
BUGCHECK_P4: fffff880037e6e00
EXCEPTION_RECORD: fffff880037e75a8 -- (.exr 0xfffff880037e75a8)
ExceptionAddress: fffff88004b06850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff880037e6e00 -- (.cxr 0xfffff880037e6e00)
rax=fffff88004b37018 rbx=0000000101700112 rcx=fffff88004b371e0
rdx=0000000101700112 rsi=fffffa800abc51b0 rdi=0000000101700112
rip=fffff88004b06850 rsp=fffff880037e77e0 rbp=fffffa800829de90
r8=fffffa800aa33b20 r9=0000000000000000 r10=fffffa800829de90
r11=fffff880037e7938 r12=0000000000000002 r13=fffff88004b37018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`04b06850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8000304f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000304f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000304f0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000310e2e8
GetUlongPtrFromAddress: unable to read from fffff8000310e498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`037e77e0 fffffa80`0cbd61d0 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0829dee8 : iusb3xhc+0x4f850
fffff880`037e77e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0829dee8 00000000`00000000 : 0xfffffa80`0cbd61d0
fffff880`037e77f0 00000000`00000001 : 00000000`000007ff fffffa80`0829dee8 00000000`00000000 fffff880`04b26b00 : 0x60
fffff880`037e77f8 00000000`000007ff : fffffa80`0829dee8 00000000`00000000 fffff880`04b26b00 fffff880`04b37018 : 0x1
fffff880`037e7800 fffffa80`0829dee8 : 00000000`00000000 fffff880`04b26b00 fffff880`04b37018 fffffa80`0aa33b20 : 0x7ff
fffff880`037e7808 00000000`00000000 : fffff880`04b26b00 fffff880`04b37018 fffffa80`0aa33b20 fffff880`04b14e19 : 0xfffffa80`0829dee8
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff880037e6e00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006691850, The address that the exception occurred at
Arg3: fffff880037ee3a8, Exception Record Address
Arg4: fffff880037edc00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1530
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13744
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88006691850
BUGCHECK_P3: fffff880037ee3a8
BUGCHECK_P4: fffff880037edc00
EXCEPTION_RECORD: fffff880037ee3a8 -- (.exr 0xfffff880037ee3a8)
ExceptionAddress: fffff88006691850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff880037edc00 -- (.cxr 0xfffff880037edc00)
rax=fffff880066c2018 rbx=0000000101700112 rcx=fffff880066c21e0
rdx=0000000101700112 rsi=fffffa800b19c610 rdi=0000000101700112
rip=fffff88006691850 rsp=fffff880037ee5e0 rbp=fffffa800bd9ae90
r8=fffffa800a466b20 r9=0000000000000000 r10=fffffa800bd9ae90
r11=fffff880037ee738 r12=0000000000000001 r13=fffff880066c2018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`06691850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030fe2e8
GetUlongPtrFromAddress: unable to read from fffff800030fe498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`037ee5e0 fffffa80`0bd566c0 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0bd9aee8 : iusb3xhc+0x4f850
fffff880`037ee5e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0bd9aee8 00000000`00000000 : 0xfffffa80`0bd566c0
fffff880`037ee5f0 00000000`00000001 : 00000000`000007ff fffffa80`0bd9aee8 00000000`00000000 fffff880`066b1b00 : 0x60
fffff880`037ee5f8 00000000`000007ff : fffffa80`0bd9aee8 00000000`00000000 fffff880`066b1b00 fffff880`066c2018 : 0x1
fffff880`037ee600 fffffa80`0bd9aee8 : 00000000`00000000 fffff880`066b1b00 fffff880`066c2018 fffffa80`0a466b20 : 0x7ff
fffff880`037ee608 00000000`00000000 : fffff880`066b1b00 fffff880`066c2018 fffffa80`0a466b20 fffff880`0669fe19 : 0xfffffa80`0bd9aee8
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff880037edc00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88005316850, The address that the exception occurred at
Arg3: fffff880037cb3a8, Exception Record Address
Arg4: fffff880037cac00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1515
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9877
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88005316850
BUGCHECK_P3: fffff880037cb3a8
BUGCHECK_P4: fffff880037cac00
EXCEPTION_RECORD: fffff880037cb3a8 -- (.exr 0xfffff880037cb3a8)
ExceptionAddress: fffff88005316850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff880037cac00 -- (.cxr 0xfffff880037cac00)
rax=fffff88005347018 rbx=0000000101700112 rcx=fffff880053471e0
rdx=0000000101700112 rsi=fffffa8007fce1b0 rdi=0000000101700112
rip=fffff88005316850 rsp=fffff880037cb5e0 rbp=fffffa800bf42be0
r8=fffffa800b142840 r9=0000000000000000 r10=fffffa800bf42be0
r11=fffff880037cb738 r12=0000000000000001 r13=fffff88005347018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`05316850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80002ff30e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff30e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff30e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b22e8
GetUlongPtrFromAddress: unable to read from fffff800030b2498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`037cb5e0 fffffa80`0bf11870 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0bf42c38 : iusb3xhc+0x4f850
fffff880`037cb5e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0bf42c38 00000000`00000000 : 0xfffffa80`0bf11870
fffff880`037cb5f0 00000000`00000001 : 00000000`000007ff fffffa80`0bf42c38 00000000`00000000 fffff880`05336b00 : 0x60
fffff880`037cb5f8 00000000`000007ff : fffffa80`0bf42c38 00000000`00000000 fffff880`05336b00 fffff880`05347018 : 0x1
fffff880`037cb600 fffffa80`0bf42c38 : 00000000`00000000 fffff880`05336b00 fffff880`05347018 fffffa80`0b142840 : 0x7ff
fffff880`037cb608 00000000`00000000 : fffff880`05336b00 fffff880`05347018 fffffa80`0b142840 fffff880`05324e19 : 0xfffffa80`0bf42c38
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff880037cac00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a8a850, The address that the exception occurred at
Arg3: fffff880037e03a8, Exception Record Address
Arg4: fffff880037dfc00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8166
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88004a8a850
BUGCHECK_P3: fffff880037e03a8
BUGCHECK_P4: fffff880037dfc00
EXCEPTION_RECORD: fffff880037e03a8 -- (.exr 0xfffff880037e03a8)
ExceptionAddress: fffff88004a8a850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff880037dfc00 -- (.cxr 0xfffff880037dfc00)
rax=fffff88004abb018 rbx=0000000101700112 rcx=fffff88004abb1e0
rdx=0000000101700112 rsi=fffffa8007b881b0 rdi=0000000101700112
rip=fffff88004a8a850 rsp=fffff880037e05e0 rbp=fffffa8007bfbda0
r8=fffffa800b08bb20 r9=0000000000000000 r10=fffffa8007bfbda0
r11=fffff880037e0738 r12=0000000000000001 r13=fffff88004abb018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`04a8a850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b92e8
GetUlongPtrFromAddress: unable to read from fffff800030b9498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`037e05e0 fffffa80`0be28510 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`07bfbdf8 : iusb3xhc+0x4f850
fffff880`037e05e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`07bfbdf8 00000000`00000000 : 0xfffffa80`0be28510
fffff880`037e05f0 00000000`00000001 : 00000000`000007ff fffffa80`07bfbdf8 00000000`00000000 fffff880`04aaab00 : 0x60
fffff880`037e05f8 00000000`000007ff : fffffa80`07bfbdf8 00000000`00000000 fffff880`04aaab00 fffff880`04abb018 : 0x1
fffff880`037e0600 fffffa80`07bfbdf8 : 00000000`00000000 fffff880`04aaab00 fffff880`04abb018 fffffa80`0b08bb20 : 0x7ff
fffff880`037e0608 00000000`00000000 : fffff880`04aaab00 fffff880`04abb018 fffffa80`0b08bb20 fffff880`04a98e19 : 0xfffffa80`07bfbdf8
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff880037dfc00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880032a2850, The address that the exception occurred at
Arg3: fffff8800390f3a8, Exception Record Address
Arg4: fffff8800390ec00, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1827
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19676
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr
Key : WER.OS.Timestamp
Value: 2016-03-25T06:00:00Z
Key : WER.OS.Version
Value: 7.1.7601.23403
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff880032a2850
BUGCHECK_P3: fffff8800390f3a8
BUGCHECK_P4: fffff8800390ec00
EXCEPTION_RECORD: fffff8800390f3a8 -- (.exr 0xfffff8800390f3a8)
ExceptionAddress: fffff880032a2850 (iusb3xhc+0x000000000004f850)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162
CONTEXT: fffff8800390ec00 -- (.cxr 0xfffff8800390ec00)
rax=fffff880032d3018 rbx=0000000101700112 rcx=fffff880032d31e0
rdx=0000000101700112 rsi=fffffa8007bc4810 rdi=0000000101700112
rip=fffff880032a2850 rsp=fffff8800390f5e0 rbp=fffffa800b3c77b0
r8=fffffa800abecb20 r9=0000000000000000 r10=fffffa800b3c77b0
r11=fffff8800390f738 r12=0000000000000001 r13=fffff880032d3018
r14=0000000000000001 r15=0000000101700112
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
iusb3xhc+0x4f850:
fffff880`032a2850 488b4350 mov rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030fe2e8
GetUlongPtrFromAddress: unable to read from fffff800030fe498
0000000101700162
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000101700162
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`0390f5e0 fffffa80`0b384000 : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0b3c7808 : iusb3xhc+0x4f850
fffff880`0390f5e8 00000000`00000060 : 00000000`00000001 00000000`000007ff fffffa80`0b3c7808 00000000`00000000 : 0xfffffa80`0b384000
fffff880`0390f5f0 00000000`00000001 : 00000000`000007ff fffffa80`0b3c7808 00000000`00000000 fffff880`032c2b00 : 0x60
fffff880`0390f5f8 00000000`000007ff : fffffa80`0b3c7808 00000000`00000000 fffff880`032c2b00 fffff880`032d3018 : 0x1
fffff880`0390f600 fffffa80`0b3c7808 : 00000000`00000000 fffff880`032c2b00 fffff880`032d3018 fffffa80`0abecb20 : 0x7ff
fffff880`0390f608 00000000`00000000 : fffff880`032c2b00 fffff880`032d3018 fffffa80`0abecb20 fffff880`032b0e19 : 0xfffffa80`0b3c7808
SYMBOL_NAME: iusb3xhc+4f850
MODULE_NAME: iusb3xhc
IMAGE_NAME: iusb3xhc.sys
STACK_COMMAND: .cxr 0xfffff8800390ec00 ; kb
FAILURE_BUCKET_ID: 0x7E_iusb3xhc+4f850
OS_VERSION: 7.1.7601.23403
BUILDLAB_STR: win7sp1_ldr
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {b7cde346-ebd9-272e-95fc-bfa95a7acb11}
Followup: MachineOwner
---------