Advertisement
Guest User

Untitled

a guest
Aug 12th, 2017
75
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.84 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
  8. This is a very common bugcheck. Usually the exception address pinpoints
  9. the driver/function that caused the problem. Always note this address
  10. as well as the link date of the driver/image that contains this address.
  11. Arguments:
  12. Arg1: c0000005, The exception code that was not handled
  13. Arg2: 829a4382, The address that the exception occurred at
  14. Arg3: 955525e0, Exception Record Address
  15. Arg4: 955521c0, Context Record Address
  16.  
  17. Debugging Details:
  18. ------------------
  19.  
  20. DBGHELP: c:\symbols\ntkrpamp.exe\4A5BC007410000\ntkrpamp.exe - OK
  21.  
  22. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
  23.  
  24. FAULTING_IP:
  25. nt!IopLoadDriver+448
  26. 829a4382 0fb74844 movzx ecx,word ptr [eax+44h]
  27.  
  28. EXCEPTION_RECORD: 955525e0 -- (.exr 0xffffffff955525e0)
  29. ExceptionAddress: 829a4382 (nt!IopLoadDriver+0x00000448)
  30. ExceptionCode: c0000005 (Access violation)
  31. ExceptionFlags: 00000000
  32. NumberParameters: 2
  33. Parameter[0]: 00000000
  34. Parameter[1]: 00000044
  35. Attempt to read from address 00000044
  36.  
  37. CONTEXT: 955521c0 -- (.cxr 0xffffffff955521c0)
  38. eax=00000000 ebx=00000000 ecx=aaccad00 edx=9b7f9000 esi=82967820 edi=00000000
  39. eip=829a4382 esp=955526a8 ebp=9555287c iopl=0 nv up ei pl nz ac po nc
  40. cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010212
  41. nt!IopLoadDriver+0x448:
  42. 829a4382 0fb74844 movzx ecx,word ptr [eax+44h] ds:0023:00000044=????
  43. Resetting default scope
  44.  
  45. PROCESS_NAME: System
  46.  
  47. CURRENT_IRQL: 2
  48.  
  49. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
  50.  
  51. EXCEPTION_PARAMETER1: 00000000
  52.  
  53. EXCEPTION_PARAMETER2: 00000044
  54.  
  55. READ_ADDRESS: 00000044
  56.  
  57. FOLLOWUP_IP:
  58. nt!IopLoadDriver+448
  59. 829a4382 0fb74844 movzx ecx,word ptr [eax+44h]
  60.  
  61. BUGCHECK_STR: 0x7E
  62.  
  63. DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
  64.  
  65. LOCK_ADDRESS: 82966f60 -- (!locks 82966f60)
  66.  
  67. Resource @ nt!PiEngineLock (0x82966f60) Exclusively owned
  68. Contention Count = 4
  69. Threads: 8fc98a68-01<*>
  70. 1 total locks, 1 locks currently held
  71.  
  72. PNP_TRIAGE:
  73. Lock address : 0x82966f60
  74. Thread Count : 1
  75. Thread address: 0x8fc98a68
  76. Thread wait : 0x36e1
  77.  
  78. LAST_CONTROL_TRANSFER: from 828dde71 to 8286c394
  79.  
  80. STACK_TEXT:
  81. 9555287c 829abfe7 00000000 00000000 955528a4 nt!IopLoadDriver+0x448
  82. 95552928 829f0e4e 9d1baba0 00000001 9d1bab94 nt!PipCallDriverAddDeviceQueryRoutine+0x34b
  83. 95552960 829f90a2 00000001 95552a2c c0000034 nt!RtlpCallQueryRegistryRoutine+0x2cd
  84. 955529cc 829a9108 40000000 8000051c 95552a48 nt!RtlQueryRegistryValues+0x31d
  85. 95552aa8 829a8876 9098c918 95552cd0 8f7a3490 nt!PipCallDriverAddDevice+0x383
  86. 95552ca4 829b1669 9098c918 8f7a3490 95552cd0 nt!PipProcessDevNodeTree+0x15d
  87. 95552cd8 82814f53 82964e80 8fc98a68 8293b5bc nt!PiRestartDevice+0x8a
  88. 95552d00 8286ef2b 00000000 00000000 8fc98a68 nt!PnpDeviceActionWorker+0x1fb
  89. 95552d50 82a0f66d 80000001 1c607815 00000000 nt!ExpWorkerThread+0x10d
  90. 95552d90 828c10d9 8286ee1e 80000001 00000000 nt!PspSystemThreadStartup+0x9e
  91. 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
  92.  
  93.  
  94. SYMBOL_STACK_INDEX: 0
  95.  
  96. SYMBOL_NAME: nt!IopLoadDriver+448
  97.  
  98. FOLLOWUP_NAME: MachineOwner
  99.  
  100. MODULE_NAME: nt
  101.  
  102. IMAGE_NAME: ntkrpamp.exe
  103.  
  104. DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
  105.  
  106. STACK_COMMAND: .cxr 0xffffffff955521c0 ; kb
  107.  
  108. FAILURE_BUCKET_ID: 0x7E_nt!IopLoadDriver+448
  109.  
  110. BUCKET_ID: 0x7E_nt!IopLoadDriver+448
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement