Advertisement
Guest User

Untitled

a guest
Mar 25th, 2016
26
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\032616-23546-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 10586 MP (2 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 10586.162.amd64fre.th2_release_sec.160223-1728
  14. Machine Name:
  15. Kernel base = 0xfffff800`e8c89000 PsLoadedModuleList = 0xfffff800`e8f67cd0
  16. Debug session time: Sat Mar 26 00:14:39.482 2016 (UTC + 1:00)
  17. System Uptime: 6 days 4:38:58.532
  18. Loading Kernel Symbols
  19. .
  20.  
  21. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  22. Run !sym noisy before .reload to track down problems loading symbols.
  23.  
  24. ..............................................................
  25. ................................................................
  26. ................................................
  27. Loading User Symbols
  28. Loading unloaded module list
  29. .................................
  30. *******************************************************************************
  31. * *
  32. * Bugcheck Analysis *
  33. * *
  34. *******************************************************************************
  35.  
  36. Use !analyze -v to get detailed debugging information.
  37.  
  38. BugCheck 3B, {c0000005, fffff801282d0e28, ffffd000239220c0, 0}
  39.  
  40. *** WARNING: Unable to verify timestamp for epfwwfp.sys
  41. *** ERROR: Module load completed but symbols could not be loaded for epfwwfp.sys
  42. Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+60 )
  43.  
  44. Followup: MachineOwner
  45. ---------
  46.  
  47. 1: kd> !analyze -v
  48. *******************************************************************************
  49. * *
  50. * Bugcheck Analysis *
  51. * *
  52. *******************************************************************************
  53.  
  54. SYSTEM_SERVICE_EXCEPTION (3b)
  55. An exception happened while executing a system service routine.
  56. Arguments:
  57. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  58. Arg2: fffff801282d0e28, Address of the instruction which caused the bugcheck
  59. Arg3: ffffd000239220c0, Address of the context record for the exception that caused the bugcheck
  60. Arg4: 0000000000000000, zero.
  61.  
  62. Debugging Details:
  63. ------------------
  64.  
  65.  
  66. DUMP_CLASS: 1
  67.  
  68. DUMP_QUALIFIER: 400
  69.  
  70. BUILD_VERSION_STRING: 10586.162.amd64fre.th2_release_sec.160223-1728
  71.  
  72. SYSTEM_MANUFACTURER: ASUSTeK Computer INC.
  73.  
  74. SYSTEM_PRODUCT_NAME: 1215B
  75.  
  76. SYSTEM_SKU: 1215B
  77.  
  78. SYSTEM_VERSION: x.x
  79.  
  80. BIOS_VENDOR: American Megatrends Inc.
  81.  
  82. BIOS_VERSION: 0503
  83.  
  84. BIOS_DATE: 11/30/2011
  85.  
  86. BASEBOARD_MANUFACTURER: ASUSTeK Computer INC.
  87.  
  88. BASEBOARD_PRODUCT: 1215B
  89.  
  90. BASEBOARD_VERSION: x.xx
  91.  
  92. DUMP_TYPE: 2
  93.  
  94. BUGCHECK_P1: c0000005
  95.  
  96. BUGCHECK_P2: fffff801282d0e28
  97.  
  98. BUGCHECK_P3: ffffd000239220c0
  99.  
  100. BUGCHECK_P4: 0
  101.  
  102. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  103.  
  104. FAULTING_IP:
  105. NETIO!StreamInvokeCalloutAndNormalizeAction+60
  106. fffff801`282d0e28 488b7008 mov rsi,qword ptr [rax+8]
  107.  
  108. CONTEXT: ffffd000239220c0 -- (.cxr 0xffffd000239220c0)
  109. rax=0000000000000000 rbx=ffffd00023922c78 rcx=ffffd00023922b40
  110. rdx=0000000000000000 rsi=ffffd00023922fe0 rdi=ffffe0010a8ee2f0
  111. rip=fffff801282d0e28 rsp=ffffd00023922ae0 rbp=ffffd00023922b69
  112. r8=0000000000000040 r9=0000000000000000 r10=0000000000000000
  113. r11=ffffe0010a8ee2f0 r12=0000000000000000 r13=0000000000000000
  114. r14=00000000000000d7 r15=ffffe0010ef2c820
  115. iopl=0 nv up ei pl zr na po nc
  116. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  117. NETIO!StreamInvokeCalloutAndNormalizeAction+0x60:
  118. fffff801`282d0e28 488b7008 mov rsi,qword ptr [rax+8] ds:002b:00000000`00000008=????????????????
  119. Resetting default scope
  120.  
  121. CPU_COUNT: 2
  122.  
  123. CPU_MHZ: 66e
  124.  
  125. CPU_VENDOR: AuthenticAMD
  126.  
  127. CPU_FAMILY: 14
  128.  
  129. CPU_MODEL: 2
  130.  
  131. CPU_STEPPING: 0
  132.  
  133. CUSTOMER_CRASH_COUNT: 1
  134.  
  135. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  136.  
  137. BUGCHECK_STR: 0x3B
  138.  
  139. PROCESS_NAME: ekrn.exe
  140.  
  141. CURRENT_IRQL: 0
  142.  
  143. ANALYSIS_SESSION_HOST: CRAPPY_PC
  144.  
  145. ANALYSIS_SESSION_TIME: 03-26-2016 00:32:19.0557
  146.  
  147. ANALYSIS_VERSION: 10.0.10586.567 amd64fre
  148.  
  149. LAST_CONTROL_TRANSFER: from fffff801282d0d01 to fffff801282d0e28
  150.  
  151. STACK_TEXT:
  152. ffffd000`23922ae0 fffff801`282d0d01 : ffffe001`0ef2c820 ffffe001`0a8ee2f0 00000000`00000000 ffffd000`23922fe0 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x60
  153. ffffd000`23922bc0 fffff801`282cf1ca : ffffe001`06670014 fffff801`28ea31d0 ffffd000`00000002 ffffe001`089dd260 : NETIO!StreamProcessCallout+0x711
  154. ffffd000`23922d00 fffff801`282ce060 : 00000000`00000014 ffffe001`089dd260 ffffe001`0ef33d90 ffffd000`23923500 : NETIO!ProcessCallout+0x6ba
  155. ffffd000`23922e70 fffff801`282ccc0f : d073f008`05e3c874 ffffd000`23923160 00000000`00000000 fffff800`00000001 : NETIO!ArbitrateAndEnforce+0x4a0
  156. ffffd000`23923060 fffff801`2830ec60 : 00000000`00000005 00000000`00000000 ffffe001`06a755c0 fffff801`282c1ee5 : NETIO!KfdClassify+0x32f
  157. ffffd000`239234b0 fffff801`2830e6fc : 00000000`00000000 ffffd000`23923661 00000000`00000000 00000000`00000000 : NETIO!StreamInternalClassify+0x110
  158. ffffd000`239235e0 fffff801`2830be15 : 00000000`00000014 ffffe001`0ef33be0 00000000`00000000 00000000`00000000 : NETIO!StreamInject+0x214
  159. ffffd000`239236b0 fffff801`293067dd : ffffe001`0ef33be0 00000000`00000126 00000000`00000000 ffffd000`00000005 : NETIO!FwppStreamInject+0x135
  160. ffffd000`23923740 fffff801`29363f8e : ffffe001`0d8ba2e0 00000000`c0000017 00000000`00000005 00007fff`ffff0000 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
  161. ffffd000`239237a0 ffffe001`0d8ba2e0 : 00000000`c0000017 00000000`00000005 00007fff`ffff0000 00000000`00000126 : epfwwfp+0x3f8e
  162. ffffd000`239237a8 00000000`c0000017 : 00000000`00000005 00007fff`ffff0000 00000000`00000126 ffffd000`23920014 : 0xffffe001`0d8ba2e0
  163. ffffd000`239237b0 00000000`00000005 : 00007fff`ffff0000 00000000`00000126 ffffd000`23920014 00000000`00000005 : 0xc0000017
  164. ffffd000`239237b8 00007fff`ffff0000 : 00000000`00000126 ffffd000`23920014 00000000`00000005 00000000`00000000 : 0x5
  165. ffffd000`239237c0 00000000`00000126 : ffffd000`23920014 00000000`00000005 00000000`00000000 00000000`00000000 : 0x00007fff`ffff0000
  166. ffffd000`239237c8 ffffd000`23920014 : 00000000`00000005 00000000`00000000 00000000`00000000 fffff801`29363d84 : 0x126
  167. ffffd000`239237d0 00000000`00000005 : 00000000`00000000 00000000`00000000 fffff801`29363d84 00000000`00000000 : 0xffffd000`23920014
  168. ffffd000`239237d8 00000000`00000000 : 00000000`00000000 fffff801`29363d84 00000000`00000000 fffff801`293637f1 : 0x5
  169.  
  170.  
  171. THREAD_SHA1_HASH_MOD_FUNC: f0430f9e5509146cf0bea59c6331ab90090ea14c
  172.  
  173. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 148008dcb284604b9b614250c41bab799e29fd9e
  174.  
  175. THREAD_SHA1_HASH_MOD: ca80a0aea2cbdafdbe1c47116de01beec9efe13a
  176.  
  177. FOLLOWUP_IP:
  178. NETIO!StreamInvokeCalloutAndNormalizeAction+60
  179. fffff801`282d0e28 488b7008 mov rsi,qword ptr [rax+8]
  180.  
  181. FAULT_INSTR_CODE: 8708b48
  182.  
  183. SYMBOL_STACK_INDEX: 0
  184.  
  185. SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+60
  186.  
  187. FOLLOWUP_NAME: MachineOwner
  188.  
  189. MODULE_NAME: NETIO
  190.  
  191. IMAGE_NAME: NETIO.SYS
  192.  
  193. DEBUG_FLR_IMAGE_TIMESTAMP: 5632d715
  194.  
  195. IMAGE_VERSION: 10.0.10586.0
  196.  
  197. STACK_COMMAND: .cxr 0xffffd000239220c0 ; kb
  198.  
  199. BUCKET_ID_FUNC_OFFSET: 60
  200.  
  201. FAILURE_BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  202.  
  203. BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  204.  
  205. PRIMARY_PROBLEM_CLASS: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  206.  
  207. TARGET_TIME: 2016-03-25T23:14:39.000Z
  208.  
  209. OSBUILD: 10586
  210.  
  211. OSSERVICEPACK: 0
  212.  
  213. SERVICEPACK_NUMBER: 0
  214.  
  215. OS_REVISION: 0
  216.  
  217. SUITE_MASK: 272
  218.  
  219. PRODUCT_TYPE: 1
  220.  
  221. OSPLATFORM_TYPE: x64
  222.  
  223. OSNAME: Windows 10
  224.  
  225. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  226.  
  227. OS_LOCALE:
  228.  
  229. USER_LCID: 0
  230.  
  231. OSBUILD_TIMESTAMP: 2016-02-24 06:48:00
  232.  
  233. BUILDDATESTAMP_STR: 160223-1728
  234.  
  235. BUILDLAB_STR: th2_release_sec
  236.  
  237. BUILDOSVER_STR: 10.0.10586.162.amd64fre.th2_release_sec.160223-1728
  238.  
  239. ANALYSIS_SESSION_ELAPSED_TIME: 2f45a
  240.  
  241. ANALYSIS_SOURCE: KM
  242.  
  243. FAILURE_ID_HASH_STRING: km:0x3b_netio!streaminvokecalloutandnormalizeaction
  244.  
  245. FAILURE_ID_HASH: {5c8d1e60-d80c-cb2d-a65a-8d02e5eeeffd}
  246.  
  247. Followup: MachineOwner
  248. ---------
Advertisement
RAW Paste Data Copied
Advertisement