SHARE
TWEET

Untitled

a guest Aug 12th, 2017 46 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. *******************************************************************************
  2. *                                                                             *
  3. *                        Bugcheck Analysis                                    *
  4. *                                                                             *
  5. *******************************************************************************
  6.  
  7. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
  8. This is a very common bugcheck.  Usually the exception address pinpoints
  9. the driver/function that caused the problem.  Always note this address
  10. as well as the link date of the driver/image that contains this address.
  11. Arguments:
  12. Arg1: c0000005, The exception code that was not handled
  13. Arg2: 829a4382, The address that the exception occurred at
  14. Arg3: 955525e0, Exception Record Address
  15. Arg4: 955521c0, Context Record Address
  16.  
  17. Debugging Details:
  18. ------------------
  19.  
  20. DBGHELP: c:\symbols\ntkrpamp.exe\4A5BC007410000\ntkrpamp.exe - OK
  21.  
  22. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
  23.  
  24. FAULTING_IP:
  25. nt!IopLoadDriver+448
  26. 829a4382 0fb74844        movzx   ecx,word ptr [eax+44h]
  27.  
  28. EXCEPTION_RECORD:  955525e0 -- (.exr 0xffffffff955525e0)
  29. ExceptionAddress: 829a4382 (nt!IopLoadDriver+0x00000448)
  30.    ExceptionCode: c0000005 (Access violation)
  31.   ExceptionFlags: 00000000
  32. NumberParameters: 2
  33.    Parameter[0]: 00000000
  34.    Parameter[1]: 00000044
  35. Attempt to read from address 00000044
  36.  
  37. CONTEXT:  955521c0 -- (.cxr 0xffffffff955521c0)
  38. eax=00000000 ebx=00000000 ecx=aaccad00 edx=9b7f9000 esi=82967820 edi=00000000
  39. eip=829a4382 esp=955526a8 ebp=9555287c iopl=0         nv up ei pl nz ac po nc
  40. cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010212
  41. nt!IopLoadDriver+0x448:
  42. 829a4382 0fb74844        movzx   ecx,word ptr [eax+44h]   ds:0023:00000044=????
  43. Resetting default scope
  44.  
  45. PROCESS_NAME:  System
  46.  
  47. CURRENT_IRQL:  2
  48.  
  49. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
  50.  
  51. EXCEPTION_PARAMETER1:  00000000
  52.  
  53. EXCEPTION_PARAMETER2:  00000044
  54.  
  55. READ_ADDRESS:  00000044
  56.  
  57. FOLLOWUP_IP:
  58. nt!IopLoadDriver+448
  59. 829a4382 0fb74844        movzx   ecx,word ptr [eax+44h]
  60.  
  61. BUGCHECK_STR:  0x7E
  62.  
  63. DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
  64.  
  65. LOCK_ADDRESS:  82966f60 -- (!locks 82966f60)
  66.  
  67. Resource @ nt!PiEngineLock (0x82966f60)    Exclusively owned
  68.     Contention Count = 4
  69.      Threads: 8fc98a68-01<*>
  70. 1 total locks, 1 locks currently held
  71.  
  72. PNP_TRIAGE:
  73.     Lock address  : 0x82966f60
  74.     Thread Count  : 1
  75.     Thread address: 0x8fc98a68
  76.     Thread wait   : 0x36e1
  77.  
  78. LAST_CONTROL_TRANSFER:  from 828dde71 to 8286c394
  79.  
  80. STACK_TEXT:  
  81. 9555287c 829abfe7 00000000 00000000 955528a4 nt!IopLoadDriver+0x448
  82. 95552928 829f0e4e 9d1baba0 00000001 9d1bab94 nt!PipCallDriverAddDeviceQueryRoutine+0x34b
  83. 95552960 829f90a2 00000001 95552a2c c0000034 nt!RtlpCallQueryRegistryRoutine+0x2cd
  84. 955529cc 829a9108 40000000 8000051c 95552a48 nt!RtlQueryRegistryValues+0x31d
  85. 95552aa8 829a8876 9098c918 95552cd0 8f7a3490 nt!PipCallDriverAddDevice+0x383
  86. 95552ca4 829b1669 9098c918 8f7a3490 95552cd0 nt!PipProcessDevNodeTree+0x15d
  87. 95552cd8 82814f53 82964e80 8fc98a68 8293b5bc nt!PiRestartDevice+0x8a
  88. 95552d00 8286ef2b 00000000 00000000 8fc98a68 nt!PnpDeviceActionWorker+0x1fb
  89. 95552d50 82a0f66d 80000001 1c607815 00000000 nt!ExpWorkerThread+0x10d
  90. 95552d90 828c10d9 8286ee1e 80000001 00000000 nt!PspSystemThreadStartup+0x9e
  91. 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
  92.  
  93.  
  94. SYMBOL_STACK_INDEX:  0
  95.  
  96. SYMBOL_NAME:  nt!IopLoadDriver+448
  97.  
  98. FOLLOWUP_NAME:  MachineOwner
  99.  
  100. MODULE_NAME: nt
  101.  
  102. IMAGE_NAME:  ntkrpamp.exe
  103.  
  104. DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007
  105.  
  106. STACK_COMMAND:  .cxr 0xffffffff955521c0 ; kb
  107.  
  108. FAILURE_BUCKET_ID:  0x7E_nt!IopLoadDriver+448
  109.  
  110. BUCKET_ID:  0x7E_nt!IopLoadDriver+448
RAW Paste Data
Pastebin PRO Summer Special!
Get 40% OFF on Pastebin PRO accounts!
Top