Windows error 0x0000014C, 332

Detailed Error Information

SCRUB_DATA_DISABLED[1]

MessageScrub is disabled on the specified file.
Declared inwinerror.h

This appears to be a raw Win32 error. More information may be available in error 0x8007014C.

FATAL_ABNORMAL_RESET_ERROR[2]

This is a Blue Screen of Death stop code. More information is available in the Knowledge Base article Bug Check 0x14C: FATAL_ABNORMAL_RESET_ERROR.

HRESULT analysis[3]

This is probably not the correct interpretation of this error. The Win32 error above is more likely to indicate the actual problem.
FlagsSeveritySuccess

This code indicates success, rather than an error. This may not be the correct interpretation of this code, or possibly the program is handling errors incorrectly.

Reserved (R)false
OriginMicrosoft
NTSTATUSfalse
Reserved (X)false
FacilityCode0 (0x000)
NameFACILITY_NULL[3][1]
DescriptionThe default facility code.[3][1]
Error Code332 (0x014c)

Questions

1vote
0answers

Keep having an error when using static array which is not initialized

I am using 16bit microcontroller which uses gcc4.5 compiler, 32kbyte flash/1kbyte ram. compiling is fine without error, memory is reaching to it's limit but it has some vacancy on both flash/ram and works just fine However, when i define static array without initialization it causes system to die. I cannot [...] read more
c
1vote
0answers

C - Get File Bytes as Unsigned Int

I need the bytes of a BIN file converted to a unsigned int, in this format (JavaScript): p.write4(shellcode.add32(0x00000000), 0x00000be9); p.write4(shellcode.add32(0x00000004), 0x90909000); p.write4(shellcode.add32(0x00000008), 0x90909090); p.write4(shellcode.add32(0x0000000c), 0x90909090); p.write4(shellcode.add32(0x00000010), 0x0082b955); p.write4(shellcode.add32(0x00000014), 0x8948c000); p.write4(shellcode.add32(0x00000018), 0x415741e5); p.write4(shellcode.add32(0x0000001c), 0x41554156); p.write4(shellcode.add32(0x00000020), 0x83485354); p.write4(shellcode.add32(0x00000024), 0x320f18ec); p.write4(shellcode.add32(0x00000028), 0x89d58949); p.write4(shellcode.add32(0x0000002c), 0x64b948c0); p.write4(shellcode.add32(0x00000030), 0x77737069); p.write4(shellcode.add32(0x00000034), 0x49000000); p.write4(shellcode.add32(0x00000038), 0x4120e5c1); p.write4(shellcode.add32(0x0000003c), 0x000200bc); p.write4(shellcode.add32(0x00000040), [...] read more
c
0votes
1answer

Debugging Memory Leak on Azure Web App: Memory Analysis Fails

I'm trying to diagnose a memory leak on an Azure Web App. I use the Diagnose and Solve Problems > Diagnostic Tools > Collect Memory Dump (tool referenced here). This collects a dmp file and generates an analysis report. I can see the threads and other information in the Crash [...] read more
.net
memory-leaks
azure-web-app-service
.net-framework-4.8
0votes
0answers

Converting Assembler Byte Instruction to String

I have instructions which are like this pokeEnableMap = new byte[6]{ 233, 0, 0, 0, 0, 144}; and I'd like them like this: pokeEnable = @"call 0x{0:X} nop nop nop"; or this pokeCodeCave = @"movss [0x{0:X}],xmm0 fld dword [0x{0:X}] fld dword [0x{1:X}] faddp fstp dword [edi+0x0000014C] ret"; How can I [...] read more
c#
assembly
code-injection

Comments

Leave a comment

(plain text only)

Sources

  1. winerror.h from Windows SDK 10.0.14393.0
  2. https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/bug-check-code-reference2
  3. https://msdn.microsoft.com/en-us/library/cc231198.aspx

User contributions licensed under CC BY-SA 3.0