daily pastebin goal
34%
SHARE
TWEET

Untitled

a guest Aug 12th, 2017 47 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. *******************************************************************************
  2. *                                                                             *
  3. *                        Bugcheck Analysis                                    *
  4. *                                                                             *
  5. *******************************************************************************
  6.  
  7. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
  8. This is a very common bugcheck.  Usually the exception address pinpoints
  9. the driver/function that caused the problem.  Always note this address
  10. as well as the link date of the driver/image that contains this address.
  11. Arguments:
  12. Arg1: c0000005, The exception code that was not handled
  13. Arg2: 829a4382, The address that the exception occurred at
  14. Arg3: 955525e0, Exception Record Address
  15. Arg4: 955521c0, Context Record Address
  16.  
  17. Debugging Details:
  18. ------------------
  19.  
  20. DBGHELP: c:\symbols\ntkrpamp.exe\4A5BC007410000\ntkrpamp.exe - OK
  21.  
  22. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
  23.  
  24. FAULTING_IP:
  25. nt!IopLoadDriver+448
  26. 829a4382 0fb74844        movzx   ecx,word ptr [eax+44h]
  27.  
  28. EXCEPTION_RECORD:  955525e0 -- (.exr 0xffffffff955525e0)
  29. ExceptionAddress: 829a4382 (nt!IopLoadDriver+0x00000448)
  30.    ExceptionCode: c0000005 (Access violation)
  31.   ExceptionFlags: 00000000
  32. NumberParameters: 2
  33.    Parameter[0]: 00000000
  34.    Parameter[1]: 00000044
  35. Attempt to read from address 00000044
  36.  
  37. CONTEXT:  955521c0 -- (.cxr 0xffffffff955521c0)
  38. eax=00000000 ebx=00000000 ecx=aaccad00 edx=9b7f9000 esi=82967820 edi=00000000
  39. eip=829a4382 esp=955526a8 ebp=9555287c iopl=0         nv up ei pl nz ac po nc
  40. cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010212
  41. nt!IopLoadDriver+0x448:
  42. 829a4382 0fb74844        movzx   ecx,word ptr [eax+44h]   ds:0023:00000044=????
  43. Resetting default scope
  44.  
  45. PROCESS_NAME:  System
  46.  
  47. CURRENT_IRQL:  2
  48.  
  49. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
  50.  
  51. EXCEPTION_PARAMETER1:  00000000
  52.  
  53. EXCEPTION_PARAMETER2:  00000044
  54.  
  55. READ_ADDRESS:  00000044
  56.  
  57. FOLLOWUP_IP:
  58. nt!IopLoadDriver+448
  59. 829a4382 0fb74844        movzx   ecx,word ptr [eax+44h]
  60.  
  61. BUGCHECK_STR:  0x7E
  62.  
  63. DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
  64.  
  65. LOCK_ADDRESS:  82966f60 -- (!locks 82966f60)
  66.  
  67. Resource @ nt!PiEngineLock (0x82966f60)    Exclusively owned
  68.     Contention Count = 4
  69.      Threads: 8fc98a68-01<*>
  70. 1 total locks, 1 locks currently held
  71.  
  72. PNP_TRIAGE:
  73.     Lock address  : 0x82966f60
  74.     Thread Count  : 1
  75.     Thread address: 0x8fc98a68
  76.     Thread wait   : 0x36e1
  77.  
  78. LAST_CONTROL_TRANSFER:  from 828dde71 to 8286c394
  79.  
  80. STACK_TEXT:  
  81. 9555287c 829abfe7 00000000 00000000 955528a4 nt!IopLoadDriver+0x448
  82. 95552928 829f0e4e 9d1baba0 00000001 9d1bab94 nt!PipCallDriverAddDeviceQueryRoutine+0x34b
  83. 95552960 829f90a2 00000001 95552a2c c0000034 nt!RtlpCallQueryRegistryRoutine+0x2cd
  84. 955529cc 829a9108 40000000 8000051c 95552a48 nt!RtlQueryRegistryValues+0x31d
  85. 95552aa8 829a8876 9098c918 95552cd0 8f7a3490 nt!PipCallDriverAddDevice+0x383
  86. 95552ca4 829b1669 9098c918 8f7a3490 95552cd0 nt!PipProcessDevNodeTree+0x15d
  87. 95552cd8 82814f53 82964e80 8fc98a68 8293b5bc nt!PiRestartDevice+0x8a
  88. 95552d00 8286ef2b 00000000 00000000 8fc98a68 nt!PnpDeviceActionWorker+0x1fb
  89. 95552d50 82a0f66d 80000001 1c607815 00000000 nt!ExpWorkerThread+0x10d
  90. 95552d90 828c10d9 8286ee1e 80000001 00000000 nt!PspSystemThreadStartup+0x9e
  91. 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
  92.  
  93.  
  94. SYMBOL_STACK_INDEX:  0
  95.  
  96. SYMBOL_NAME:  nt!IopLoadDriver+448
  97.  
  98. FOLLOWUP_NAME:  MachineOwner
  99.  
  100. MODULE_NAME: nt
  101.  
  102. IMAGE_NAME:  ntkrpamp.exe
  103.  
  104. DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007
  105.  
  106. STACK_COMMAND:  .cxr 0xffffffff955521c0 ; kb
  107.  
  108. FAILURE_BUCKET_ID:  0x7E_nt!IopLoadDriver+448
  109.  
  110. BUCKET_ID:  0x7E_nt!IopLoadDriver+448
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top