Instant Online Crash Analysis, brought to you by OSR Open Systems Resources, Inc.
Show DivPrimary Analysis
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (
http://www.osr.com)
Online Crash Dump Analysis Service
See
OSR Online - The Home Page for Windows Driver Developers for more information
Windows 8 Kernel Version 16299 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff801`90009000 PsLoadedModuleList = 0xfffff801`9036aff0
Debug session time: Wed Dec 20 08:14:04.438 2017 (UTC - 5:00)
System Uptime: 6 days 13:56:53.503
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80ed66e0bc0, Address of the instruction which caused the bugcheck
Arg3: ffffab817218c790, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+218
fffff80e`d66e0bc0 4183795003 cmp dword ptr [r9+50h],3
CONTEXT: ffffab817218c790 -- (.cxr 0xffffab817218c790)
rax=0000000000001001 rbx=ffffab817218d308 rcx=ffffd306c3f8fb00
rdx=0000000000001001 rsi=ffffab817218d2d8 rdi=ffffd306c3f8fbe0
rip=fffff80ed66e0bc0 rsp=ffffab817218d180 rbp=ffffab817218d209
r8=0000000000033176 r9=0000000000000000 r10=000000000000012c
r11=0000000000003000 r12=ffffab817218d658 r13=fffff80ed673f000
r14=0000000000000000 r15=0000000000001000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
NETIO!StreamInvokeCalloutAndNormalizeAction+0x218:
fffff80e`d66e0bc0 4183795003 cmp dword ptr [r9+50h],3 ds:002b:00000000`00000050=????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: AVGSvc.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80ed66e094f to fffff80ed66e0bc0
STACK_TEXT:
ffffab81`7218d180 fffff80e`d66e094f : ffffd306`c3f8fb00 ffffd306`c3f8fbe0 ffffab81`7218d658 ffffd306`c3f8fbe0 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x218
ffffab81`7218d260 fffff80e`d66dfeda : ffffd306`bc900014 fffff80e`e18c2390 ffffd306`00000001 ffffd306`c500dea0 : NETIO!StreamProcessCallout+0x66b
ffffab81`7218d390 fffff80e`d66de9e7 : ffffab81`72180014 ffffd306`c500dea0 ffffd306`bc8e7330 ffffab81`7218db50 : NETIO!ProcessCallout+0x97a
ffffab81`7218d510 fffff80e`d66dc6fa : 00000000`00000005 ffffab81`7218d7e0 00000000`00000000 00001481`deb514f2 : NETIO!ArbitrateAndEnforce+0x487
ffffab81`7218d6e0 fffff80e`d672418b : ffffd306`bc965680 fffff80e`d6722574 00000000`00000000 00000000`00000000 : NETIO!KfdClassify+0x30a
ffffab81`7218db00 fffff80e`d6723bd6 : 00000000`00000000 ffffab81`7218dca1 00000000`00000000 00000000`00000000 : NETIO!StreamInternalClassify+0x107
ffffab81`7218dc20 fffff80e`d6720b35 : 00000000`00000014 ffffd306`bc8e7180 00000000`00000000 00000000`00000000 : NETIO!StreamInject+0x23a
ffffab81`7218dcf0 fffff80e`d9c17d4d : ffffd306`bc8e7180 00000000`0000010e 00000000`00000000 fffff801`00000005 : NETIO!FwppStreamInject+0x135
ffffab81`7218dd80 fffff801`9b95ba0c : ffffd306`d3c5e010 00000000`00000000 ffffd306`c5f10e90 00000000`00000005 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
ffffab81`7218dde0 ffffd306`d3c5e010 : 00000000`00000000 ffffd306`c5f10e90 00000000`00000005 00000001`0000010e : avgStm+0xba0c
ffffab81`7218dde8 00000000`00000000 : ffffd306`c5f10e90 00000000`00000005 00000001`0000010e 00000000`00000014 : 0xffffd306`d3c5e010
FOLLOWUP_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+218
fffff80e`d66e0bc0 4183795003 cmp dword ptr [r9+50h],3
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+218
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 302c3e5d
STACK_COMMAND: .cxr 0xffffab817218c790 ; kb
FAILURE_BUCKET_ID: X64_0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction+218
BUCKET_ID: OLD_IMAGE_NETIO.SYS
Followup: MachineOwner
---------
This free analysis is provided by OSR Open Systems Resources, Inc.
Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
Show DivCrash Code Links
Show DivLoaded Module List
Show DivRaw Stack Contents
Show DivDump Header Information
Show DivStrings