KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ad215f, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruktionen p 0x%08lx refererade till minnet p 0x%08lx. Det gick inte att utf ra en minnes tg rd. F ljande fel returnerades: The memory could not be %s.
FAULTING_IP:
nt!KiSecondaryClockInterrupt+24f
fffff800`02ad215f 0f285510 movaps xmm2,xmmword ptr [rbp+10h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: 0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instruktionen p 0x%08lx refererade till minnet p 0x%08lx. Det gick inte att utf ra en minnes tg rd. F ljande fel returnerades: The memory could not be %s.
BUGCHECK_STR: 0x1e_c0000005
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: dota.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b117e8 to fffff80002ac6c40
CONTEXT: 406d280f3065280f -- (.cxr 0x406d280f3065280f)
Unable to read context, NTSTATUS 0xC0000141
STACK_TEXT:
fffff880`07eb7208 fffff800`02b117e8 : 00000000`0000001e ffffffff`c0000005 fffff800`02ad215f 00000000`00000000 : nt!KeBugCheckEx
fffff880`07eb7210 fffff800`02ac62c2 : fffff880`07eb79e8 00000000`0022da70 fffff880`07eb7a90 00000000`0022db50 : nt! ?? ::FNODOBFM::`string'+0x487ed
fffff880`07eb78b0 fffff800`02ac4bca : 00000000`00000001 fffff800`02ac9f53 00000000`00000003 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`07eb7a90 fffff800`02ad215f : 00000000`0022da70 fffff880`07eb7ca0 00000000`0022db50 00000000`3aeed010 : nt!KiGeneralProtectionFault+0x10a
fffff880`07eb7c20 00000000`624866e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSecondaryClockInterrupt+0x24f
00000000`0022d9bc 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x624866e3
FOLLOWUP_IP:
nt!KiSecondaryClockInterrupt+24f
fffff800`02ad215f 0f285510 movaps xmm2,xmmword ptr [rbp+10h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiSecondaryClockInterrupt+24f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 50e79935
STACK_COMMAND: .cxr 0x406d280f3065280f ; kb
FAILURE_BUCKET_ID: X64_0x1e_c0000005_nt!KiSecondaryClockInterrupt+24f
BUCKET_ID: X64_0x1e_c0000005_nt!KiSecondaryClockInterrupt+24f
Followup: MachineOwner