Skip to content

Instantly share code, notes, and snippets.

@ZJPat
Created November 20, 2014 16:24
Show Gist options
  • Select an option

  • Save ZJPat/094aa9e8fedf3bed55a5 to your computer and use it in GitHub Desktop.

Select an option

Save ZJPat/094aa9e8fedf3bed55a5 to your computer and use it in GitHub Desktop.
FAULTING_IP:
+8d8ee91ba0
00000000`00000000 ?? ???
EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 0000000000000000
ExceptionCode: 80000007 (Wake debugger)
ExceptionFlags: 00000001
NumberParameters: 0
CONTEXT: 0000000000000000 -- (.cxr 0x0;r)
rax=0000000000000004 rbx=00000000776745e8 rcx=0000000002bdaa10
rdx=0000000003e147ea rsi=00000000776745c0 rdi=0000000000130b40
rip=00000000775c2bba rsp=00000000013df608 rbp=0000000000000000
r8=000000000455c6d0 r9=000000000186b2da r10=000007fee4324f20
r11=00000000013ddd30 r12=000000000000ffff r13=0000000000000000
r14=000000000000ffff r15=0000000077674610
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000202
ntdll!NtWaitForWorkViaWorkerFactory+0xa:
00000000`775c2bba c3 ret
BUGCHECK_STR: 80000007
DEFAULT_BUCKET_ID: APPLICATION_HANG
PROCESS_NAME: TrustedInstaller.exe
ERROR_CODE: (NTSTATUS) 0x80000007 - {Kernel Debugger Awakened} the system debugger was awakened by an interrupt.
EXCEPTION_CODE: (HRESULT) 0x80000007 (2147483655) - Operation aborted
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
APP: trustedinstaller.exe
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
DERIVED_WAIT_CHAIN:
Dl Eid Cid WaitType
-- --- ------- --------------------------
6 1018.1344 Speculated (Triage) -->
0 1018.101c Idle Thread
WAIT_CHAIN_COMMAND: ~6s;k;;~0s;k;;
BLOCKING_THREAD: 000000000000101c
PRIMARY_PROBLEM_CLASS: APPLICATION_HANG
LAST_CONTROL_TRANSFER: from 000007fefd3810dc to 00000000775c12fa
FAULTING_THREAD: 0000000000000000
STACK_TEXT:
00000000`0010f958 000007fe`fd3810dc : 00000000`001102c8 00000000`775c592e 00000000`00000000 00000000`0010fab8 : ntdll!NtWaitForSingleObject+0xa
00000000`0010f960 000007fe`fe22affb : 00000000`ffffffff 000007fe`fe22344c 00000000`00000000 00000000`00000080 : KERNELBASE!WaitForSingleObjectEx+0x79
00000000`0010fa00 000007fe`fe229d61 : 00000000`0012b500 00000000`00000080 00000000`00000000 00000000`00000000 : sechost!ScSendResponseReceiveControls+0x13b
00000000`0010faf0 000007fe`fe229c16 : 00000000`0010fc58 00000000`000004d3 00000000`00000001 00000000`00000000 : sechost!ScDispatcherLoop+0x121
00000000`0010fc00 00000000`ffeadd46 : 00000000`00000000 00000000`00128370 00000000`00000001 00000000`00000000 : sechost!StartServiceCtrlDispatcherW+0x14e
00000000`0010fc50 00000000`ffebd7c5 : 00000000`00000000 00000000`ffe913b0 01d00342`88387bff 000003c2`adf1957f : TrustedInstaller!wmain+0xc2
00000000`0010fcb0 00000000`774659ed : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : TrustedInstaller!TextizeJetErrorHresult+0x193d
00000000`0010fcf0 00000000`7759c541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0010fd20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
FOLLOWUP_IP:
sechost!ScSendResponseReceiveControls+13b
000007fe`fe22affb 85c0 test eax,eax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: sechost!ScSendResponseReceiveControls+13b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: sechost
IMAGE_NAME: sechost.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5be05e
STACK_COMMAND: ~0s ; kb
BUCKET_ID: X64_80000007_sechost!ScSendResponseReceiveControls+13b
FAILURE_BUCKET_ID: APPLICATION_HANG_80000007_sechost.dll!ScSendResponseReceiveControls
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:application_hang_80000007_sechost.dll!scsendresponsereceivecontrols
FAILURE_ID_HASH: {7acbc6e0-a9f8-16a0-6e8c-4c07dfaac454}
Followup: MachineOwner
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment