Advertisement
Guest User

Untitled

a guest
Mar 25th, 2016
42
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.55 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\032616-23546-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 10586 MP (2 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 10586.162.amd64fre.th2_release_sec.160223-1728
  14. Machine Name:
  15. Kernel base = 0xfffff800`e8c89000 PsLoadedModuleList = 0xfffff800`e8f67cd0
  16. Debug session time: Sat Mar 26 00:14:39.482 2016 (UTC + 1:00)
  17. System Uptime: 6 days 4:38:58.532
  18. Loading Kernel Symbols
  19. .
  20.  
  21. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  22. Run !sym noisy before .reload to track down problems loading symbols.
  23.  
  24. ..............................................................
  25. ................................................................
  26. ................................................
  27. Loading User Symbols
  28. Loading unloaded module list
  29. .................................
  30. *******************************************************************************
  31. * *
  32. * Bugcheck Analysis *
  33. * *
  34. *******************************************************************************
  35.  
  36. Use !analyze -v to get detailed debugging information.
  37.  
  38. BugCheck 3B, {c0000005, fffff801282d0e28, ffffd000239220c0, 0}
  39.  
  40. *** WARNING: Unable to verify timestamp for epfwwfp.sys
  41. *** ERROR: Module load completed but symbols could not be loaded for epfwwfp.sys
  42. Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+60 )
  43.  
  44. Followup: MachineOwner
  45. ---------
  46.  
  47. 1: kd> !analyze -v
  48. *******************************************************************************
  49. * *
  50. * Bugcheck Analysis *
  51. * *
  52. *******************************************************************************
  53.  
  54. SYSTEM_SERVICE_EXCEPTION (3b)
  55. An exception happened while executing a system service routine.
  56. Arguments:
  57. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  58. Arg2: fffff801282d0e28, Address of the instruction which caused the bugcheck
  59. Arg3: ffffd000239220c0, Address of the context record for the exception that caused the bugcheck
  60. Arg4: 0000000000000000, zero.
  61.  
  62. Debugging Details:
  63. ------------------
  64.  
  65.  
  66. DUMP_CLASS: 1
  67.  
  68. DUMP_QUALIFIER: 400
  69.  
  70. BUILD_VERSION_STRING: 10586.162.amd64fre.th2_release_sec.160223-1728
  71.  
  72. SYSTEM_MANUFACTURER: ASUSTeK Computer INC.
  73.  
  74. SYSTEM_PRODUCT_NAME: 1215B
  75.  
  76. SYSTEM_SKU: 1215B
  77.  
  78. SYSTEM_VERSION: x.x
  79.  
  80. BIOS_VENDOR: American Megatrends Inc.
  81.  
  82. BIOS_VERSION: 0503
  83.  
  84. BIOS_DATE: 11/30/2011
  85.  
  86. BASEBOARD_MANUFACTURER: ASUSTeK Computer INC.
  87.  
  88. BASEBOARD_PRODUCT: 1215B
  89.  
  90. BASEBOARD_VERSION: x.xx
  91.  
  92. DUMP_TYPE: 2
  93.  
  94. BUGCHECK_P1: c0000005
  95.  
  96. BUGCHECK_P2: fffff801282d0e28
  97.  
  98. BUGCHECK_P3: ffffd000239220c0
  99.  
  100. BUGCHECK_P4: 0
  101.  
  102. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  103.  
  104. FAULTING_IP:
  105. NETIO!StreamInvokeCalloutAndNormalizeAction+60
  106. fffff801`282d0e28 488b7008 mov rsi,qword ptr [rax+8]
  107.  
  108. CONTEXT: ffffd000239220c0 -- (.cxr 0xffffd000239220c0)
  109. rax=0000000000000000 rbx=ffffd00023922c78 rcx=ffffd00023922b40
  110. rdx=0000000000000000 rsi=ffffd00023922fe0 rdi=ffffe0010a8ee2f0
  111. rip=fffff801282d0e28 rsp=ffffd00023922ae0 rbp=ffffd00023922b69
  112. r8=0000000000000040 r9=0000000000000000 r10=0000000000000000
  113. r11=ffffe0010a8ee2f0 r12=0000000000000000 r13=0000000000000000
  114. r14=00000000000000d7 r15=ffffe0010ef2c820
  115. iopl=0 nv up ei pl zr na po nc
  116. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  117. NETIO!StreamInvokeCalloutAndNormalizeAction+0x60:
  118. fffff801`282d0e28 488b7008 mov rsi,qword ptr [rax+8] ds:002b:00000000`00000008=????????????????
  119. Resetting default scope
  120.  
  121. CPU_COUNT: 2
  122.  
  123. CPU_MHZ: 66e
  124.  
  125. CPU_VENDOR: AuthenticAMD
  126.  
  127. CPU_FAMILY: 14
  128.  
  129. CPU_MODEL: 2
  130.  
  131. CPU_STEPPING: 0
  132.  
  133. CUSTOMER_CRASH_COUNT: 1
  134.  
  135. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  136.  
  137. BUGCHECK_STR: 0x3B
  138.  
  139. PROCESS_NAME: ekrn.exe
  140.  
  141. CURRENT_IRQL: 0
  142.  
  143. ANALYSIS_SESSION_HOST: CRAPPY_PC
  144.  
  145. ANALYSIS_SESSION_TIME: 03-26-2016 00:32:19.0557
  146.  
  147. ANALYSIS_VERSION: 10.0.10586.567 amd64fre
  148.  
  149. LAST_CONTROL_TRANSFER: from fffff801282d0d01 to fffff801282d0e28
  150.  
  151. STACK_TEXT:
  152. ffffd000`23922ae0 fffff801`282d0d01 : ffffe001`0ef2c820 ffffe001`0a8ee2f0 00000000`00000000 ffffd000`23922fe0 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x60
  153. ffffd000`23922bc0 fffff801`282cf1ca : ffffe001`06670014 fffff801`28ea31d0 ffffd000`00000002 ffffe001`089dd260 : NETIO!StreamProcessCallout+0x711
  154. ffffd000`23922d00 fffff801`282ce060 : 00000000`00000014 ffffe001`089dd260 ffffe001`0ef33d90 ffffd000`23923500 : NETIO!ProcessCallout+0x6ba
  155. ffffd000`23922e70 fffff801`282ccc0f : d073f008`05e3c874 ffffd000`23923160 00000000`00000000 fffff800`00000001 : NETIO!ArbitrateAndEnforce+0x4a0
  156. ffffd000`23923060 fffff801`2830ec60 : 00000000`00000005 00000000`00000000 ffffe001`06a755c0 fffff801`282c1ee5 : NETIO!KfdClassify+0x32f
  157. ffffd000`239234b0 fffff801`2830e6fc : 00000000`00000000 ffffd000`23923661 00000000`00000000 00000000`00000000 : NETIO!StreamInternalClassify+0x110
  158. ffffd000`239235e0 fffff801`2830be15 : 00000000`00000014 ffffe001`0ef33be0 00000000`00000000 00000000`00000000 : NETIO!StreamInject+0x214
  159. ffffd000`239236b0 fffff801`293067dd : ffffe001`0ef33be0 00000000`00000126 00000000`00000000 ffffd000`00000005 : NETIO!FwppStreamInject+0x135
  160. ffffd000`23923740 fffff801`29363f8e : ffffe001`0d8ba2e0 00000000`c0000017 00000000`00000005 00007fff`ffff0000 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
  161. ffffd000`239237a0 ffffe001`0d8ba2e0 : 00000000`c0000017 00000000`00000005 00007fff`ffff0000 00000000`00000126 : epfwwfp+0x3f8e
  162. ffffd000`239237a8 00000000`c0000017 : 00000000`00000005 00007fff`ffff0000 00000000`00000126 ffffd000`23920014 : 0xffffe001`0d8ba2e0
  163. ffffd000`239237b0 00000000`00000005 : 00007fff`ffff0000 00000000`00000126 ffffd000`23920014 00000000`00000005 : 0xc0000017
  164. ffffd000`239237b8 00007fff`ffff0000 : 00000000`00000126 ffffd000`23920014 00000000`00000005 00000000`00000000 : 0x5
  165. ffffd000`239237c0 00000000`00000126 : ffffd000`23920014 00000000`00000005 00000000`00000000 00000000`00000000 : 0x00007fff`ffff0000
  166. ffffd000`239237c8 ffffd000`23920014 : 00000000`00000005 00000000`00000000 00000000`00000000 fffff801`29363d84 : 0x126
  167. ffffd000`239237d0 00000000`00000005 : 00000000`00000000 00000000`00000000 fffff801`29363d84 00000000`00000000 : 0xffffd000`23920014
  168. ffffd000`239237d8 00000000`00000000 : 00000000`00000000 fffff801`29363d84 00000000`00000000 fffff801`293637f1 : 0x5
  169.  
  170.  
  171. THREAD_SHA1_HASH_MOD_FUNC: f0430f9e5509146cf0bea59c6331ab90090ea14c
  172.  
  173. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 148008dcb284604b9b614250c41bab799e29fd9e
  174.  
  175. THREAD_SHA1_HASH_MOD: ca80a0aea2cbdafdbe1c47116de01beec9efe13a
  176.  
  177. FOLLOWUP_IP:
  178. NETIO!StreamInvokeCalloutAndNormalizeAction+60
  179. fffff801`282d0e28 488b7008 mov rsi,qword ptr [rax+8]
  180.  
  181. FAULT_INSTR_CODE: 8708b48
  182.  
  183. SYMBOL_STACK_INDEX: 0
  184.  
  185. SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+60
  186.  
  187. FOLLOWUP_NAME: MachineOwner
  188.  
  189. MODULE_NAME: NETIO
  190.  
  191. IMAGE_NAME: NETIO.SYS
  192.  
  193. DEBUG_FLR_IMAGE_TIMESTAMP: 5632d715
  194.  
  195. IMAGE_VERSION: 10.0.10586.0
  196.  
  197. STACK_COMMAND: .cxr 0xffffd000239220c0 ; kb
  198.  
  199. BUCKET_ID_FUNC_OFFSET: 60
  200.  
  201. FAILURE_BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  202.  
  203. BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  204.  
  205. PRIMARY_PROBLEM_CLASS: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  206.  
  207. TARGET_TIME: 2016-03-25T23:14:39.000Z
  208.  
  209. OSBUILD: 10586
  210.  
  211. OSSERVICEPACK: 0
  212.  
  213. SERVICEPACK_NUMBER: 0
  214.  
  215. OS_REVISION: 0
  216.  
  217. SUITE_MASK: 272
  218.  
  219. PRODUCT_TYPE: 1
  220.  
  221. OSPLATFORM_TYPE: x64
  222.  
  223. OSNAME: Windows 10
  224.  
  225. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  226.  
  227. OS_LOCALE:
  228.  
  229. USER_LCID: 0
  230.  
  231. OSBUILD_TIMESTAMP: 2016-02-24 06:48:00
  232.  
  233. BUILDDATESTAMP_STR: 160223-1728
  234.  
  235. BUILDLAB_STR: th2_release_sec
  236.  
  237. BUILDOSVER_STR: 10.0.10586.162.amd64fre.th2_release_sec.160223-1728
  238.  
  239. ANALYSIS_SESSION_ELAPSED_TIME: 2f45a
  240.  
  241. ANALYSIS_SOURCE: KM
  242.  
  243. FAILURE_ID_HASH_STRING: km:0x3b_netio!streaminvokecalloutandnormalizeaction
  244.  
  245. FAILURE_ID_HASH: {5c8d1e60-d80c-cb2d-a65a-8d02e5eeeffd}
  246.  
  247. Followup: MachineOwner
  248. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement