Anthrax50551
New member
- Oct 22, 2014
- 2
Please let me know what you guys think, Usually I can figure this stuff out but right now i cannot.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80290cbac8d, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
nt! ?? ::FNODOBFM::`string'+f174
fffff802`90cbac8d 498b04c6 mov rax,qword ptr [r14+rax*8]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80290f64168
GetUlongFromAddress: unable to read from fffff80290f641f8
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
BUGCHECK_STR: 0x1e_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80290de61cd to fffff80290c66540
CONTEXT: 1e75fff88348c20b -- (.cxr 0x1e75fff88348c20b)
Unable to read context, Win32 error 0n30
STACK_TEXT:
fffff880`009dae78 fffff802`90de61cd : 00000000`0000001e ffffffff`c0000005 fffff802`90cbac8d 00000000`00000000 : nt!KeBugCheckEx
fffff880`009dae80 fffff802`90c65942 : 00000000`00000000 00000000`0000002f 00000000`00000000 fffffa80`0f6e3a68 : nt! ?? ::FNODOBFM::`string'+0x1463f
fffff880`009db540 fffff802`90c63e4a : fffffa80`0ed12268 ffffffff`feced300 00000000`00000002 fffffa80`0ed12268 : nt!KiExceptionDispatch+0xc2
fffff880`009db720 fffff802`90cbac8d : fffff802`90cb9102 d4a21039`cf8359b8 00000000`00000000 fffffa80`0f6e3980 : nt!KiGeneralProtectionFault+0x10a
fffff880`009db8b8 ffffffff`00000000 : 00000000`00003980 00000000`01c07917 00000003`ffffffff fffffa80`00000078 : nt! ?? ::FNODOBFM::`string'+0xf174
fffff880`009db908 00000000`00003980 : 00000000`01c07917 00000003`ffffffff fffffa80`00000078 fffffa80`0f6e3b98 : 0xffffffff`00000000
fffff880`009db910 00000000`01c07917 : 00000003`ffffffff fffffa80`00000078 fffffa80`0f6e3b98 00000000`00000000 : 0x3980
fffff880`009db918 00000003`ffffffff : fffffa80`00000078 fffffa80`0f6e3b98 00000000`00000000 0000016d`7aa4ebdf : 0x1c07917
fffff880`009db920 fffffa80`00000078 : fffffa80`0f6e3b98 00000000`00000000 0000016d`7aa4ebdf 00000020`00000020 : 0x3`ffffffff
fffff880`009db928 fffffa80`0f6e3b98 : 00000000`00000000 0000016d`7aa4ebdf 00000020`00000020 00046240`643fed29 : 0xfffffa80`00000078
fffff880`009db930 00000000`00000000 : 0000016d`7aa4ebdf 00000020`00000020 00046240`643fed29 fffffa80`0f3d4800 : 0xfffffa80`0f6e3b98
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+f174
fffff802`90cbac8d 498b04c6 mov rax,qword ptr [r14+rax*8]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+f174
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 536464f4
STACK_COMMAND: .cxr 0x1e75fff88348c20b ; kb
FAILURE_BUCKET_ID: X64_0x1e_c0000005_nt!_??_::FNODOBFM::_string_+f174
BUCKET_ID: X64_0x1e_c0000005_nt!_??_::FNODOBFM::_string_+f174
Followup: MachineOwner
Last edited by a moderator: