Blue Screen - DSYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
Machine has Windows 7 and I installed new clean reinstallation Windows 10 today. I get the BSOD each time I cold start. Here is the bugcheck analysis:
https://drive.google.com/file/d/1Rc2kosaWQt14DiOqCUeti7uAQutofRCM/view?usp=sharing
Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [R:\新增資料夾 (2)\MEMORY (2).DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff8015a400000 PsLoadedModuleList = 0xfffff801
5b02a3d0
Debug session time: Mon Nov 15 17:18:44.768 2021 (UTC + 8:00)
System Uptime: 0 days 0:00:06.702
Loading Kernel Symbols
...............................................................
....Page 242038 not present in the dump file. Type ".hh dbgerr004" for details
............................................................
....................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
0: kd> !analyze -v
- *
- Bugcheck Analysis *
- *
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8015ae3f7ee, The address that the exception occurred at
Arg3: ffffb986d9c07518, Exception Record Address
Arg4: ffffb986d9c06d50, Context Record Address
Debugging Details:
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 3484
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3611
Key : Analysis.Init.CPU.mSec
Value: 2640
Key : Analysis.Init.Elapsed.mSec
Value: 9532
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8015ae3f7ee
BUGCHECK_P3: ffffb986d9c07518
BUGCHECK_P4: ffffb986d9c06d50
EXCEPTION_RECORD: ffffb986d9c07518 -- (.exr 0xffffb986d9c07518)
ExceptionAddress: fffff8015ae3f7ee (nt!MmFreeLoaderBlock+0x0000000000000082)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000020
Attempt to read from address 0000000000000020
CONTEXT: ffffb986d9c06d50 -- (.cxr 0xffffb986d9c06d50)
rax=0000000000000000 rbx=0000000000000001 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000002 rdi=0000000000000000
rip=fffff8015ae3f7ee rsp=ffffb986d9c07750 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=ffffe30fff6022c0
r11=ffffb986d9c078d8 r12=0000000000000000 r13=0000000000000000
r14=fffff80157b098f0 r15=8000000000000000
iopl=0 nv up ei pl nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050203
nt!MmFreeLoaderBlock+0x82:
fffff8015ae3f7ee 488b5120 mov rdx,qword ptr [rcx+20h] ds:002b:00000000
00000020=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
READ_ADDRESS: 0000000000000020
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p O 0x%p O C O %s C
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000020
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffb986d9c07750 fffff801
5ae3f18a : 0000000000000001 ffffb986
d9c07940 0000000000000002 00007ff6
f5df14f0 : nt!MmFreeLoaderBlock+0x82
ffffb986d9c078e0 fffff801
5ae3f0b7 : 0000000000000000 ffffffff
fd050f80 fffff80157b098d0 00000000
00000000 : nt!KeInitSystem+0x52
ffffb986d9c07970 fffff801
5ab9b7ce : fffff80157b098d0 fffff801
57b098d0 fffff8015ab9b780 fffff801
57b098d0 : nt!Phase1InitializationIoReady+0x173
ffffb986d9c07ae0 fffff801
5a717e85 : ffffe30fffc9e040 fffff801
5ab9b780 fffff80157b098d0 f83f0000
00000000 : nt!Phase1Initialization+0x4e
ffffb986d9c07b10 fffff801
5a7fd498 : fffff80157ed0180 ffffe30f
ffc9e040 fffff8015a717e30 0000f83f
00000000 : nt!PspSystemThreadStartup+0x55
ffffb986d9c07b60 00000000
00000000 : ffffb986d9c08000 ffffb986
d9c01000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MmFreeLoaderBlock+82
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .cxr 0xffffb986d9c06d50 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 82
FAILURE_BUCKET_ID: AV_nt!MmFreeLoaderBlock
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {08057114-6f46-f58e-cd68-2b20ba87ec8f}
Followup: MachineOwner