0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82860c6d, The address that the exception occurred at
Arg3: 80786bf8, Exception Record Address
Arg4: 807867d0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MmZeroPageThread+462
82860c6d 8b36 mov esi,dword ptr [esi]
EXCEPTION_RECORD: 80786bf8 -- (.exr 0xffffffff80786bf8)
ExceptionAddress: 82860c6d (nt!MmZeroPageThread+0x00000462)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00002413
Attempt to read from address 00002413
CONTEXT: 807867d0 -- (.cxr 0xffffffff807867d0)
eax=047125dc ebx=00002413 ecx=0000001c edx=00000003 esi=00002413 edi=00000000
eip=82860c6d esp=80786cc0 ebp=80786d44 iopl=0 nv up ei pl nz na po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010203
nt!MmZeroPageThread+0x462:
82860c6d 8b36 mov esi,dword ptr [esi] ds:0023:00002413=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00002413
READ_ADDRESS: GetPointerFromAddress: unable to read from 8296b848
Unable to read MiSystemVaType memory at 8294ae40
00002413
FOLLOWUP_IP:
nt!MmZeroPageThread+462
82860c6d 8b36 mov esi,dword ptr [esi]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 8298e44f to 82860c6d
STACK_TEXT:
80786d44 8298e44f 00000000 80786d90 82a0afda nt!MmZeroPageThread+0x462
80786d50 82a0afda 8080a6d0 a424cac0 00000000 nt!Phase1Initialization+0x14
80786d90 828b31d9 8298e43b 8080a6d0 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmZeroPageThread+462
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02a389
STACK_COMMAND: .cxr 0xffffffff807867d0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x7E_nt!MmZeroPageThread+462
BUCKET_ID: 0x7E_nt!MmZeroPageThread+462
Followup: MachineOwner
---------