Advertisement
Guest User

Untitled

a guest
Mar 27th, 2016
44
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.70 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\Jacek\Desktop\032716-9156-01\032716-9156-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 9600.18233.amd64fre.winblue_ltsb.160210-0600
  14. Machine Name:
  15. Kernel base = 0xfffff803`2c686000 PsLoadedModuleList = 0xfffff803`2c959630
  16. Debug session time: Sun Mar 27 05:53:17.196 2016 (UTC + 2:00)
  17. System Uptime: 0 days 1:08:14.831
  18. Loading Kernel Symbols
  19. .
  20.  
  21. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  22. Run !sym noisy before .reload to track down problems loading symbols.
  23.  
  24. ..............................................................
  25. ................................................................
  26. ................................................................
  27. ................
  28. Loading User Symbols
  29. Loading unloaded module list
  30. .........
  31. *******************************************************************************
  32. * *
  33. * Bugcheck Analysis *
  34. * *
  35. *******************************************************************************
  36.  
  37. Use !analyze -v to get detailed debugging information.
  38.  
  39. BugCheck 3B, {c0000005, fffff80115812d59, ffffd00029712fa0, 0}
  40.  
  41. *** WARNING: Unable to verify timestamp for epfwwfp.sys
  42. *** ERROR: Module load completed but symbols could not be loaded for epfwwfp.sys
  43. Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+59 )
  44.  
  45. Followup: MachineOwner
  46. ---------
  47.  
  48. 3: kd> !analyze -v
  49. *******************************************************************************
  50. * *
  51. * Bugcheck Analysis *
  52. * *
  53. *******************************************************************************
  54.  
  55. SYSTEM_SERVICE_EXCEPTION (3b)
  56. An exception happened while executing a system service routine.
  57. Arguments:
  58. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  59. Arg2: fffff80115812d59, Address of the instruction which caused the bugcheck
  60. Arg3: ffffd00029712fa0, Address of the context record for the exception that caused the bugcheck
  61. Arg4: 0000000000000000, zero.
  62.  
  63. Debugging Details:
  64. ------------------
  65.  
  66.  
  67. DUMP_CLASS: 1
  68.  
  69. DUMP_QUALIFIER: 400
  70.  
  71. BUILD_VERSION_STRING: 9600.18233.amd64fre.winblue_ltsb.160210-0600
  72.  
  73. SYSTEM_MANUFACTURER: ASUS
  74.  
  75. SYSTEM_PRODUCT_NAME: All Series
  76.  
  77. SYSTEM_SKU: All
  78.  
  79. SYSTEM_VERSION: System Version
  80.  
  81. BIOS_VENDOR: American Megatrends Inc.
  82.  
  83. BIOS_VERSION: 3003
  84.  
  85. BIOS_DATE: 10/28/2015
  86.  
  87. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  88.  
  89. BASEBOARD_PRODUCT: MAXIMUS VII HERO
  90.  
  91. BASEBOARD_VERSION: Rev 1.xx
  92.  
  93. DUMP_TYPE: 2
  94.  
  95. DUMP_FILE_ATTRIBUTES: 0x8
  96. Kernel Generated Triage Dump
  97.  
  98. BUGCHECK_P1: c0000005
  99.  
  100. BUGCHECK_P2: fffff80115812d59
  101.  
  102. BUGCHECK_P3: ffffd00029712fa0
  103.  
  104. BUGCHECK_P4: 0
  105.  
  106. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  107.  
  108. FAULTING_IP:
  109. NETIO!StreamInvokeCalloutAndNormalizeAction+59
  110. fffff801`15812d59 488b7008 mov rsi,qword ptr [rax+8]
  111.  
  112. CONTEXT: ffffd00029712fa0 -- (.cxr 0xffffd00029712fa0)
  113. rax=0000000000000000 rbx=ffffd00029713b58 rcx=ffffd00029713a70
  114. rdx=0000000000000000 rsi=0000000000000000 rdi=ffffe000ccc46be0
  115. rip=fffff80115812d59 rsp=ffffd000297139d0 rbp=000000000001433f
  116. r8=0000000000000000 r9=0000000000000000 r10=fffff80115865b80
  117. r11=ffffe000ccc46be0 r12=0000000000000000 r13=ffffe000c9ef4de0
  118. r14=ffffe000c9ef4de0 r15=ffffd00029713ec8
  119. iopl=0 nv up ei pl zr na po nc
  120. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  121. NETIO!StreamInvokeCalloutAndNormalizeAction+0x59:
  122. fffff801`15812d59 488b7008 mov rsi,qword ptr [rax+8] ds:002b:00000000`00000008=????????????????
  123. Resetting default scope
  124.  
  125. CPU_COUNT: 8
  126.  
  127. CPU_MHZ: f9e
  128.  
  129. CPU_VENDOR: GenuineIntel
  130.  
  131. CPU_FAMILY: 6
  132.  
  133. CPU_MODEL: 3c
  134.  
  135. CPU_STEPPING: 3
  136.  
  137. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
  138.  
  139. CUSTOMER_CRASH_COUNT: 1
  140.  
  141. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  142.  
  143. BUGCHECK_STR: 0x3B
  144.  
  145. PROCESS_NAME: ekrn.exe
  146.  
  147. CURRENT_IRQL: 0
  148.  
  149. ANALYSIS_SESSION_HOST: CRAPPY_PC
  150.  
  151. ANALYSIS_SESSION_TIME: 03-27-2016 09:41:40.0929
  152.  
  153. ANALYSIS_VERSION: 10.0.10586.567 amd64fre
  154.  
  155. LAST_CONTROL_TRANSFER: from fffff8011581280f to fffff80115812d59
  156.  
  157. STACK_TEXT:
  158. ffffd000`297139d0 fffff801`1581280f : 00000000`00000000 ffffe000`ccc46be0 ffffd000`29713b91 00000000`00000000 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x59
  159. ffffd000`29713aa0 fffff801`1581c9a2 : ffffe000`bcfd0014 fffff801`165811d0 ffffd000`00000002 ffffe000`bc4dd770 : NETIO!StreamProcessCallout+0x76f
  160. ffffd000`29713be0 fffff801`15803549 : ffffe000`c2f00014 ffffe000`bc4dd770 ffffe000`c0640e50 ffffd000`29714450 : NETIO!ProcessCallout+0x972
  161. ffffd000`29713d50 fffff801`15802250 : 00000000`00000000 ffffd000`29714050 ffffd000`297144a8 fffff801`19b81670 : NETIO!ArbitrateAndEnforce+0x2c9
  162. ffffd000`29713f50 fffff801`1584f4b0 : ffffe000`ccbcc140 ffffd000`297144e1 ffffe000`bd130e40 fffff801`15838bff : NETIO!KfdClassify+0x831
  163. ffffd000`29714410 fffff801`1584eee5 : 00000000`00000000 fffff801`15aaf300 ffffd000`297145b8 fffff801`15aaf350 : NETIO!StreamInternalClassify+0x110
  164. ffffd000`29714530 fffff801`1584bff8 : 00000000`00000014 ffffe000`cd304be0 00000000`00000000 00000000`00000126 : NETIO!StreamInject+0x1fd
  165. ffffd000`29714600 fffff801`15f6dace : ffffe000`cd304be0 00000000`00000126 00000000`00000000 ffffe000`bc7ffb00 : NETIO!FwppStreamInject+0x138
  166. ffffd000`29714690 fffff801`15fc5f56 : ffffe000`bc00a010 00000000`c0000017 00000000`00000005 ffffe000`cd5cb000 : fwpkclnt!FwpsStreamInjectAsync0+0xfa
  167. ffffd000`297146f0 ffffe000`bc00a010 : 00000000`c0000017 00000000`00000005 ffffe000`cd5cb000 00000000`00000126 : epfwwfp+0x2f56
  168. ffffd000`297146f8 00000000`c0000017 : 00000000`00000005 ffffe000`cd5cb000 00000000`00000126 00000000`00000014 : 0xffffe000`bc00a010
  169. ffffd000`29714700 00000000`00000005 : ffffe000`cd5cb000 00000000`00000126 00000000`00000014 00000000`00000005 : 0xc0000017
  170. ffffd000`29714708 ffffe000`cd5cb000 : 00000000`00000126 00000000`00000014 00000000`00000005 00000000`00000000 : 0x5
  171. ffffd000`29714710 00000000`00000126 : 00000000`00000014 00000000`00000005 00000000`00000000 00000000`00000000 : 0xffffe000`cd5cb000
  172. ffffd000`29714718 00000000`00000014 : 00000000`00000005 00000000`00000000 00000000`00000000 fffff801`15fc5d4c : 0x126
  173. ffffd000`29714720 00000000`00000005 : 00000000`00000000 00000000`00000000 fffff801`15fc5d4c 00000000`00000000 : 0x14
  174. ffffd000`29714728 00000000`00000000 : 00000000`00000000 fffff801`15fc5d4c 00000000`00000000 fffff801`15fc58e1 : 0x5
  175.  
  176.  
  177. THREAD_SHA1_HASH_MOD_FUNC: f0430f9e5509146cf0bea59c6331ab90090ea14c
  178.  
  179. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ab328cac885a929bb1e6e5997b48352e86e8ef7d
  180.  
  181. THREAD_SHA1_HASH_MOD: ca80a0aea2cbdafdbe1c47116de01beec9efe13a
  182.  
  183. FOLLOWUP_IP:
  184. NETIO!StreamInvokeCalloutAndNormalizeAction+59
  185. fffff801`15812d59 488b7008 mov rsi,qword ptr [rax+8]
  186.  
  187. FAULT_INSTR_CODE: 8708b48
  188.  
  189. SYMBOL_STACK_INDEX: 0
  190.  
  191. SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+59
  192.  
  193. FOLLOWUP_NAME: MachineOwner
  194.  
  195. MODULE_NAME: NETIO
  196.  
  197. IMAGE_NAME: NETIO.SYS
  198.  
  199. DEBUG_FLR_IMAGE_TIMESTAMP: 5681bedf
  200.  
  201. IMAGE_VERSION: 6.3.9600.18183
  202.  
  203. STACK_COMMAND: .cxr 0xffffd00029712fa0 ; kb
  204.  
  205. BUCKET_ID_FUNC_OFFSET: 59
  206.  
  207. FAILURE_BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  208.  
  209. BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  210.  
  211. PRIMARY_PROBLEM_CLASS: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  212.  
  213. TARGET_TIME: 2016-03-27T03:53:17.000Z
  214.  
  215. OSBUILD: 9600
  216.  
  217. OSSERVICEPACK: 0
  218.  
  219. SERVICEPACK_NUMBER: 0
  220.  
  221. OS_REVISION: 0
  222.  
  223. SUITE_MASK: 272
  224.  
  225. PRODUCT_TYPE: 1
  226.  
  227. OSPLATFORM_TYPE: x64
  228.  
  229. OSNAME: Windows 8.1
  230.  
  231. OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
  232.  
  233. OS_LOCALE:
  234.  
  235. USER_LCID: 0
  236.  
  237. OSBUILD_TIMESTAMP: 2016-02-10 15:42:59
  238.  
  239. BUILDDATESTAMP_STR: 160210-0600
  240.  
  241. BUILDLAB_STR: winblue_ltsb
  242.  
  243. BUILDOSVER_STR: 6.3.9600.18233.amd64fre.winblue_ltsb.160210-0600
  244.  
  245. ANALYSIS_SESSION_ELAPSED_TIME: c23
  246.  
  247. ANALYSIS_SOURCE: KM
  248.  
  249. FAILURE_ID_HASH_STRING: km:0x3b_netio!streaminvokecalloutandnormalizeaction
  250.  
  251. FAILURE_ID_HASH: {5c8d1e60-d80c-cb2d-a65a-8d02e5eeeffd}
  252.  
  253. Followup: MachineOwner
  254. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement