Advertisement
Guest User

Untitled

a guest
Mar 27th, 2016
27
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\Jacek\Desktop\032716-9156-01\032716-9156-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 9600.18233.amd64fre.winblue_ltsb.160210-0600
  14. Machine Name:
  15. Kernel base = 0xfffff803`2c686000 PsLoadedModuleList = 0xfffff803`2c959630
  16. Debug session time: Sun Mar 27 05:53:17.196 2016 (UTC + 2:00)
  17. System Uptime: 0 days 1:08:14.831
  18. Loading Kernel Symbols
  19. .
  20.  
  21. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  22. Run !sym noisy before .reload to track down problems loading symbols.
  23.  
  24. ..............................................................
  25. ................................................................
  26. ................................................................
  27. ................
  28. Loading User Symbols
  29. Loading unloaded module list
  30. .........
  31. *******************************************************************************
  32. * *
  33. * Bugcheck Analysis *
  34. * *
  35. *******************************************************************************
  36.  
  37. Use !analyze -v to get detailed debugging information.
  38.  
  39. BugCheck 3B, {c0000005, fffff80115812d59, ffffd00029712fa0, 0}
  40.  
  41. *** WARNING: Unable to verify timestamp for epfwwfp.sys
  42. *** ERROR: Module load completed but symbols could not be loaded for epfwwfp.sys
  43. Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+59 )
  44.  
  45. Followup: MachineOwner
  46. ---------
  47.  
  48. 3: kd> !analyze -v
  49. *******************************************************************************
  50. * *
  51. * Bugcheck Analysis *
  52. * *
  53. *******************************************************************************
  54.  
  55. SYSTEM_SERVICE_EXCEPTION (3b)
  56. An exception happened while executing a system service routine.
  57. Arguments:
  58. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  59. Arg2: fffff80115812d59, Address of the instruction which caused the bugcheck
  60. Arg3: ffffd00029712fa0, Address of the context record for the exception that caused the bugcheck
  61. Arg4: 0000000000000000, zero.
  62.  
  63. Debugging Details:
  64. ------------------
  65.  
  66.  
  67. DUMP_CLASS: 1
  68.  
  69. DUMP_QUALIFIER: 400
  70.  
  71. BUILD_VERSION_STRING: 9600.18233.amd64fre.winblue_ltsb.160210-0600
  72.  
  73. SYSTEM_MANUFACTURER: ASUS
  74.  
  75. SYSTEM_PRODUCT_NAME: All Series
  76.  
  77. SYSTEM_SKU: All
  78.  
  79. SYSTEM_VERSION: System Version
  80.  
  81. BIOS_VENDOR: American Megatrends Inc.
  82.  
  83. BIOS_VERSION: 3003
  84.  
  85. BIOS_DATE: 10/28/2015
  86.  
  87. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  88.  
  89. BASEBOARD_PRODUCT: MAXIMUS VII HERO
  90.  
  91. BASEBOARD_VERSION: Rev 1.xx
  92.  
  93. DUMP_TYPE: 2
  94.  
  95. DUMP_FILE_ATTRIBUTES: 0x8
  96. Kernel Generated Triage Dump
  97.  
  98. BUGCHECK_P1: c0000005
  99.  
  100. BUGCHECK_P2: fffff80115812d59
  101.  
  102. BUGCHECK_P3: ffffd00029712fa0
  103.  
  104. BUGCHECK_P4: 0
  105.  
  106. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  107.  
  108. FAULTING_IP:
  109. NETIO!StreamInvokeCalloutAndNormalizeAction+59
  110. fffff801`15812d59 488b7008 mov rsi,qword ptr [rax+8]
  111.  
  112. CONTEXT: ffffd00029712fa0 -- (.cxr 0xffffd00029712fa0)
  113. rax=0000000000000000 rbx=ffffd00029713b58 rcx=ffffd00029713a70
  114. rdx=0000000000000000 rsi=0000000000000000 rdi=ffffe000ccc46be0
  115. rip=fffff80115812d59 rsp=ffffd000297139d0 rbp=000000000001433f
  116. r8=0000000000000000 r9=0000000000000000 r10=fffff80115865b80
  117. r11=ffffe000ccc46be0 r12=0000000000000000 r13=ffffe000c9ef4de0
  118. r14=ffffe000c9ef4de0 r15=ffffd00029713ec8
  119. iopl=0 nv up ei pl zr na po nc
  120. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  121. NETIO!StreamInvokeCalloutAndNormalizeAction+0x59:
  122. fffff801`15812d59 488b7008 mov rsi,qword ptr [rax+8] ds:002b:00000000`00000008=????????????????
  123. Resetting default scope
  124.  
  125. CPU_COUNT: 8
  126.  
  127. CPU_MHZ: f9e
  128.  
  129. CPU_VENDOR: GenuineIntel
  130.  
  131. CPU_FAMILY: 6
  132.  
  133. CPU_MODEL: 3c
  134.  
  135. CPU_STEPPING: 3
  136.  
  137. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
  138.  
  139. CUSTOMER_CRASH_COUNT: 1
  140.  
  141. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  142.  
  143. BUGCHECK_STR: 0x3B
  144.  
  145. PROCESS_NAME: ekrn.exe
  146.  
  147. CURRENT_IRQL: 0
  148.  
  149. ANALYSIS_SESSION_HOST: CRAPPY_PC
  150.  
  151. ANALYSIS_SESSION_TIME: 03-27-2016 09:41:40.0929
  152.  
  153. ANALYSIS_VERSION: 10.0.10586.567 amd64fre
  154.  
  155. LAST_CONTROL_TRANSFER: from fffff8011581280f to fffff80115812d59
  156.  
  157. STACK_TEXT:
  158. ffffd000`297139d0 fffff801`1581280f : 00000000`00000000 ffffe000`ccc46be0 ffffd000`29713b91 00000000`00000000 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x59
  159. ffffd000`29713aa0 fffff801`1581c9a2 : ffffe000`bcfd0014 fffff801`165811d0 ffffd000`00000002 ffffe000`bc4dd770 : NETIO!StreamProcessCallout+0x76f
  160. ffffd000`29713be0 fffff801`15803549 : ffffe000`c2f00014 ffffe000`bc4dd770 ffffe000`c0640e50 ffffd000`29714450 : NETIO!ProcessCallout+0x972
  161. ffffd000`29713d50 fffff801`15802250 : 00000000`00000000 ffffd000`29714050 ffffd000`297144a8 fffff801`19b81670 : NETIO!ArbitrateAndEnforce+0x2c9
  162. ffffd000`29713f50 fffff801`1584f4b0 : ffffe000`ccbcc140 ffffd000`297144e1 ffffe000`bd130e40 fffff801`15838bff : NETIO!KfdClassify+0x831
  163. ffffd000`29714410 fffff801`1584eee5 : 00000000`00000000 fffff801`15aaf300 ffffd000`297145b8 fffff801`15aaf350 : NETIO!StreamInternalClassify+0x110
  164. ffffd000`29714530 fffff801`1584bff8 : 00000000`00000014 ffffe000`cd304be0 00000000`00000000 00000000`00000126 : NETIO!StreamInject+0x1fd
  165. ffffd000`29714600 fffff801`15f6dace : ffffe000`cd304be0 00000000`00000126 00000000`00000000 ffffe000`bc7ffb00 : NETIO!FwppStreamInject+0x138
  166. ffffd000`29714690 fffff801`15fc5f56 : ffffe000`bc00a010 00000000`c0000017 00000000`00000005 ffffe000`cd5cb000 : fwpkclnt!FwpsStreamInjectAsync0+0xfa
  167. ffffd000`297146f0 ffffe000`bc00a010 : 00000000`c0000017 00000000`00000005 ffffe000`cd5cb000 00000000`00000126 : epfwwfp+0x2f56
  168. ffffd000`297146f8 00000000`c0000017 : 00000000`00000005 ffffe000`cd5cb000 00000000`00000126 00000000`00000014 : 0xffffe000`bc00a010
  169. ffffd000`29714700 00000000`00000005 : ffffe000`cd5cb000 00000000`00000126 00000000`00000014 00000000`00000005 : 0xc0000017
  170. ffffd000`29714708 ffffe000`cd5cb000 : 00000000`00000126 00000000`00000014 00000000`00000005 00000000`00000000 : 0x5
  171. ffffd000`29714710 00000000`00000126 : 00000000`00000014 00000000`00000005 00000000`00000000 00000000`00000000 : 0xffffe000`cd5cb000
  172. ffffd000`29714718 00000000`00000014 : 00000000`00000005 00000000`00000000 00000000`00000000 fffff801`15fc5d4c : 0x126
  173. ffffd000`29714720 00000000`00000005 : 00000000`00000000 00000000`00000000 fffff801`15fc5d4c 00000000`00000000 : 0x14
  174. ffffd000`29714728 00000000`00000000 : 00000000`00000000 fffff801`15fc5d4c 00000000`00000000 fffff801`15fc58e1 : 0x5
  175.  
  176.  
  177. THREAD_SHA1_HASH_MOD_FUNC: f0430f9e5509146cf0bea59c6331ab90090ea14c
  178.  
  179. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ab328cac885a929bb1e6e5997b48352e86e8ef7d
  180.  
  181. THREAD_SHA1_HASH_MOD: ca80a0aea2cbdafdbe1c47116de01beec9efe13a
  182.  
  183. FOLLOWUP_IP:
  184. NETIO!StreamInvokeCalloutAndNormalizeAction+59
  185. fffff801`15812d59 488b7008 mov rsi,qword ptr [rax+8]
  186.  
  187. FAULT_INSTR_CODE: 8708b48
  188.  
  189. SYMBOL_STACK_INDEX: 0
  190.  
  191. SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+59
  192.  
  193. FOLLOWUP_NAME: MachineOwner
  194.  
  195. MODULE_NAME: NETIO
  196.  
  197. IMAGE_NAME: NETIO.SYS
  198.  
  199. DEBUG_FLR_IMAGE_TIMESTAMP: 5681bedf
  200.  
  201. IMAGE_VERSION: 6.3.9600.18183
  202.  
  203. STACK_COMMAND: .cxr 0xffffd00029712fa0 ; kb
  204.  
  205. BUCKET_ID_FUNC_OFFSET: 59
  206.  
  207. FAILURE_BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  208.  
  209. BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  210.  
  211. PRIMARY_PROBLEM_CLASS: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
  212.  
  213. TARGET_TIME: 2016-03-27T03:53:17.000Z
  214.  
  215. OSBUILD: 9600
  216.  
  217. OSSERVICEPACK: 0
  218.  
  219. SERVICEPACK_NUMBER: 0
  220.  
  221. OS_REVISION: 0
  222.  
  223. SUITE_MASK: 272
  224.  
  225. PRODUCT_TYPE: 1
  226.  
  227. OSPLATFORM_TYPE: x64
  228.  
  229. OSNAME: Windows 8.1
  230.  
  231. OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
  232.  
  233. OS_LOCALE:
  234.  
  235. USER_LCID: 0
  236.  
  237. OSBUILD_TIMESTAMP: 2016-02-10 15:42:59
  238.  
  239. BUILDDATESTAMP_STR: 160210-0600
  240.  
  241. BUILDLAB_STR: winblue_ltsb
  242.  
  243. BUILDOSVER_STR: 6.3.9600.18233.amd64fre.winblue_ltsb.160210-0600
  244.  
  245. ANALYSIS_SESSION_ELAPSED_TIME: c23
  246.  
  247. ANALYSIS_SOURCE: KM
  248.  
  249. FAILURE_ID_HASH_STRING: km:0x3b_netio!streaminvokecalloutandnormalizeaction
  250.  
  251. FAILURE_ID_HASH: {5c8d1e60-d80c-cb2d-a65a-8d02e5eeeffd}
  252.  
  253. Followup: MachineOwner
  254. ---------
Advertisement
RAW Paste Data Copied
Advertisement