Netwtw04.sys driver download - phrase
Result of !analyze -v
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80c82926304, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
Unable to load image Netwtw04.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Netwtw04.sys
*** ERROR: Module load completed but symbols could not be loaded for Netwtw04.sys
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
FAULTING_MODULE: fffff802cca92000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
Netwtw04+36304
fffff80c`82926304 8b8098000000 mov eax,dword ptr [rax+98h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
ffffffffffffffff
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: 135c8
LAST_CONTROL_TRANSFER: from fffff802ccc5ff52 to fffff802ccbe07c0
STACK_TEXT:
fffff802`cf05d118 fffff802`ccc5ff52 : 00000000`0000001e ffffffff`c0000005 fffff80c`82926304 00000000`00000000 : nt+0x14e7c0
fffff802`cf05d120 00000000`0000001e : ffffffff`c0000005 fffff80c`82926304 00000000`00000000 ffffffff`ffffffff : nt+0x1cdf52
fffff802`cf05d128 ffffffff`c0000005 : fffff80c`82926304 00000000`00000000 ffffffff`ffffffff fffff80c`82a1da55 : 0x1e
fffff802`cf05d130 fffff80c`82926304 : 00000000`00000000 ffffffff`ffffffff fffff80c`82a1da55 fffff802`cf05d290 : 0xffffffff`c0000005
fffff802`cf05d138 00000000`00000000 : ffffffff`ffffffff fffff80c`82a1da55 fffff802`cf05d290 fffff802`ccbe6bbd : Netwtw04+0x36304
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
---------
*** Memory manager detected 79304 instance(s) of page corruption, target is likely to have memory corruption.
-
-
-