Macieeek Opublikowano 19 Grudnia 2018 Zgłoś Udostępnij Opublikowano 19 Grudnia 2018 ================================================== Dump File : 121918-29078-01.dmp Crash Time : 2018-12-19 18:04:55 Bug Check String : DRIVER_IRQL_NOT_LESS_OR_EQUAL Bug Check Code : 0x000000d1 Parameter 1 : 00000000`0000002c Parameter 2 : 00000000`00000002 Parameter 3 : 00000000`00000001 Parameter 4 : fffff880`05aad7fe Caused By Driver : NETwNs64.sys Caused By Address : NETwNs64.sys+2177fe File Description : Intel® Wireless WiFi Link Driver Product Name : Intel® Wireless WiFi Link Adapter Company : Intel Corporation File Version : 14.1.1.3 Processor : x64 Crash Address : ntoskrnl.exe+939a0 Stack Address 1 : Stack Address 2 : Stack Address 3 : Computer Name : Full Path : C:\windows\Minidump\121918-29078-01.dmp Processors Count : 4 Major Version : 15 Minor Version : 7601 Dump File Size : 262 144 Dump File Time : 2018-12-19 18:05:51 ================================================== Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Summary Dump File: Kernel address space is available, User address space may not be available. Symbol search path is: srv* Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429 Machine Name: Kernel base = 0xfffff800`0305b000 PsLoadedModuleList = 0xfffff800`03294c90 Debug session time: Wed Dec 19 18:04:55.271 2018 (UTC + 1:00) System Uptime: 0 days 0:18:14.692 Loading Kernel Symbols ............................Page 200003eb8 too large to be in the dump file. ....Page 200003fb7 too large to be in the dump file. ......Page 200004382 too large to be in the dump file. ..................Page 20009e9c0 too large to be in the dump file. ....... ..Page 20009db80 too large to be in the dump file. .............................................................. .................................................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {2c, 2, 1, fffff88005aad7fe} *** ERROR: Module load completed but symbols could not be loaded for NETwNs64.sys Probably caused by : NETwNs64.sys ( NETwNs64+2177fe ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 000000000000002c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88005aad7fe, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429 SYSTEM_MANUFACTURER: SAMSUNG ELECTRONICS CO., LTD. SYSTEM_PRODUCT_NAME: 300E4A/300E5A/300E7A SYSTEM_SKU: System SKUNumber SYSTEM_VERSION: 0.1 BIOS_VENDOR: Phoenix Technologies Ltd. BIOS_VERSION: 01QA BIOS_DATE: 09/05/2011 BASEBOARD_MANUFACTURER: SAMSUNG ELECTRONICS CO., LTD. BASEBOARD_PRODUCT: 300E4A/300E5A/300E7A BASEBOARD_VERSION: FAB1 DUMP_TYPE: 1 BUGCHECK_P1: 2c BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff88005aad7fe WRITE_ADDRESS: 000000000000002c CURRENT_IRQL: 2 FAULTING_IP: NETwNs64+2177fe fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi CPU_COUNT: 4 CPU_MHZ: 893 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 2a CPU_STEPPING: 7 CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 1A'00000000 (cache) 1A'00000000 (init) DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System ANALYSIS_SESSION_HOST: EWUSKA-KOMPUTER ANALYSIS_SESSION_TIME: 12-19-2018 18:54:25.0682 ANALYSIS_VERSION: 10.0.17763.132 amd64fre TRAP_FRAME: fffff8800d195200 -- (.trap 0xfffff8800d195200) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff880016ef110 rbx=0000000000000000 rcx=fffff880016f2ec0 rdx=fffff800032cbf90 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88005aad7fe rsp=fffff8800d195390 rbp=fffffa80073f2c88 r8=0000000000000000 r9=0000000000000000 r10=0020004e002d0073 r11=fffffa80042413d8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc NETwNs64+0x2177fe: fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi ds:00000000`0000002c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030fcd69 to fffff800030ee9a0 STACK_TEXT: fffff880`0d1950b8 fffff800`030fcd69 : 00000000`0000000a 00000000`0000002c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`0d1950c0 fffff800`030fab88 : 00000000`00000001 00000000`0000002c fffff800`03255a00 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`0d195200 fffff880`05aad7fe : 00000000`00000000 fffffa80`073f2c88 fffffa80`00000002 00000000`000000c0 : nt!KiPageFault+0x448 fffff880`0d195390 fffff880`05aab24e : fffffa80`078595c0 00000000`80000000 fffffa80`073f2c88 00000000`00000000 : NETwNs64+0x2177fe fffff880`0d1953d0 fffff880`05aa1d4f : fffffa80`00000000 fffffa80`07858000 fffffa80`0c035090 fffffa80`0492ef30 : NETwNs64+0x21524e fffff880`0d195430 fffff880`058ac384 : fffffa80`00000001 fffff880`05aa18c0 fffffa80`073f2c88 fffffa80`073f2c88 : NETwNs64+0x20bd4f fffff880`0d1954f0 fffff880`058a9a9f : 00000000`00000018 fffffa80`0492efe0 fffffa80`0447b340 fffffa80`07386770 : NETwNs64+0x16384 fffff880`0d195550 fffff880`05a6fea7 : fffffa80`0ba4d170 00000000`00000000 fffff880`060a5540 fffffa80`07127d60 : NETwNs64+0x13a9f fffff880`0d1955a0 fffff880`05a6ebb4 : 00000000`00000004 00000000`00000000 fffff880`060a5540 fffffa80`07ad5900 : NETwNs64+0x1d9ea7 fffff880`0d195600 fffff880`05a6a9ad : fffff880`00000000 fffff880`06a0608c 00000000`00000000 fffffa80`07ad5910 : NETwNs64+0x1d8bb4 fffff880`0d195690 fffff880`05a69e2d : fffffa80`07a57d60 00000000`00000000 00000000`0000020c fffffa80`0ba4d170 : NETwNs64+0x1d49ad fffff880`0d1956f0 fffff880`058d9bd1 : 00000000`00000059 fffffa80`077fe110 00000000`000000ff fffffa80`07a57d60 : NETwNs64+0x1d3e2d fffff880`0d195890 fffff880`058d953c : fffffa80`07a30900 00000000`8be7cddf fffffa80`077fe110 00000000`8be7cdff : NETwNs64+0x43bd1 fffff880`0d195920 fffff880`058ce6a2 : fffffa80`07a30901 fffffa80`06c5e101 fffff880`0d1959f0 fffffa80`06c5e101 : NETwNs64+0x4353c fffff880`0d1959c0 fffff880`05bf7ba2 : fffffa80`0483a200 fffffa80`06c5e1a0 fffffa80`06c5e1a0 fffffa80`0483a160 : NETwNs64+0x386a2 fffff880`0d195a30 fffff880`01717792 : fffff880`016ef110 00000000`00000000 fffffa80`06c5e1a0 fffffa80`06c5ef68 : NETwNs64+0x361ba2 fffff880`0d195a60 fffff880`016a07ad : 00000000`00000002 00000000`0000000a 00000000`00000000 00000000`00000000 : ndis!ndisMiniportDpc+0xe2 fffff880`0d195ad0 fffff880`016c66bd : 00000000`00000002 00000000`00000002 00000000`00000000 fffffa80`07a6aeb8 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd fffff880`0d195b70 fffff800`0339cd10 : fffffa80`00000000 fffff800`0323f180 00000000`00000080 fffff880`00000001 : ndis!ndisReceiveWorkerThread+0x1bd fffff880`0d195c00 fffff800`030f49a6 : fffff800`0323f180 fffffa80`0483a160 fffffa80`04affb50 00000000`00000000 : nt!PspSystemThreadStartup+0x194 fffff880`0d195c40 00000000`00000000 : fffff880`0d196000 fffff880`0d190000 fffff880`0d1958c0 00000000`00000000 : nt!KiStartSystemThread+0x16 THREAD_SHA1_HASH_MOD_FUNC: 0647087028e6e71cd75256c30a872296373cae94 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0b5285fc44d8d2a3bec8bf3d60533adf037b5d05 THREAD_SHA1_HASH_MOD: a65722aa938c7de6f2cd751638764549477dc160 FOLLOWUP_IP: NETwNs64+2177fe fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi FAULT_INSTR_CODE: f2c7389 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: NETwNs64+2177fe FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETwNs64 IMAGE_NAME: NETwNs64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4dbdd18d STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xD1_NETwNs64+2177fe BUCKET_ID: X64_0xD1_NETwNs64+2177fe PRIMARY_PROBLEM_CLASS: X64_0xD1_NETwNs64+2177fe TARGET_TIME: 2018-12-19T17:04:55.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-11-11 01:44:59 BUILDDATESTAMP_STR: 181110-1429 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429 ANALYSIS_SESSION_ELAPSED_TIME: 23fc ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xd1_netwns64+2177fe FAILURE_ID_HASH: {ddc7bf63-c01f-b70a-adf6-6eafbdb49df4} Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 000000000000002c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88005aad7fe, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429 SYSTEM_MANUFACTURER: SAMSUNG ELECTRONICS CO., LTD. SYSTEM_PRODUCT_NAME: 300E4A/300E5A/300E7A SYSTEM_SKU: System SKUNumber SYSTEM_VERSION: 0.1 BIOS_VENDOR: Phoenix Technologies Ltd. BIOS_VERSION: 01QA BIOS_DATE: 09/05/2011 BASEBOARD_MANUFACTURER: SAMSUNG ELECTRONICS CO., LTD. BASEBOARD_PRODUCT: 300E4A/300E5A/300E7A BASEBOARD_VERSION: FAB1 DUMP_TYPE: 1 BUGCHECK_P1: 2c BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff88005aad7fe WRITE_ADDRESS: 000000000000002c CURRENT_IRQL: 2 FAULTING_IP: NETwNs64+2177fe fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi CPU_COUNT: 4 CPU_MHZ: 893 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 2a CPU_STEPPING: 7 CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 1A'00000000 (cache) 1A'00000000 (init) DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System ANALYSIS_SESSION_HOST: EWUSKA-KOMPUTER ANALYSIS_SESSION_TIME: 12-19-2018 18:54:36.0688 ANALYSIS_VERSION: 10.0.17763.132 amd64fre TRAP_FRAME: fffff8800d195200 -- (.trap 0xfffff8800d195200) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff880016ef110 rbx=0000000000000000 rcx=fffff880016f2ec0 rdx=fffff800032cbf90 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88005aad7fe rsp=fffff8800d195390 rbp=fffffa80073f2c88 r8=0000000000000000 r9=0000000000000000 r10=0020004e002d0073 r11=fffffa80042413d8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc NETwNs64+0x2177fe: fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi ds:00000000`0000002c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030fcd69 to fffff800030ee9a0 STACK_TEXT: fffff880`0d1950b8 fffff800`030fcd69 : 00000000`0000000a 00000000`0000002c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`0d1950c0 fffff800`030fab88 : 00000000`00000001 00000000`0000002c fffff800`03255a00 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`0d195200 fffff880`05aad7fe : 00000000`00000000 fffffa80`073f2c88 fffffa80`00000002 00000000`000000c0 : nt!KiPageFault+0x448 fffff880`0d195390 fffff880`05aab24e : fffffa80`078595c0 00000000`80000000 fffffa80`073f2c88 00000000`00000000 : NETwNs64+0x2177fe fffff880`0d1953d0 fffff880`05aa1d4f : fffffa80`00000000 fffffa80`07858000 fffffa80`0c035090 fffffa80`0492ef30 : NETwNs64+0x21524e fffff880`0d195430 fffff880`058ac384 : fffffa80`00000001 fffff880`05aa18c0 fffffa80`073f2c88 fffffa80`073f2c88 : NETwNs64+0x20bd4f fffff880`0d1954f0 fffff880`058a9a9f : 00000000`00000018 fffffa80`0492efe0 fffffa80`0447b340 fffffa80`07386770 : NETwNs64+0x16384 fffff880`0d195550 fffff880`05a6fea7 : fffffa80`0ba4d170 00000000`00000000 fffff880`060a5540 fffffa80`07127d60 : NETwNs64+0x13a9f fffff880`0d1955a0 fffff880`05a6ebb4 : 00000000`00000004 00000000`00000000 fffff880`060a5540 fffffa80`07ad5900 : NETwNs64+0x1d9ea7 fffff880`0d195600 fffff880`05a6a9ad : fffff880`00000000 fffff880`06a0608c 00000000`00000000 fffffa80`07ad5910 : NETwNs64+0x1d8bb4 fffff880`0d195690 fffff880`05a69e2d : fffffa80`07a57d60 00000000`00000000 00000000`0000020c fffffa80`0ba4d170 : NETwNs64+0x1d49ad fffff880`0d1956f0 fffff880`058d9bd1 : 00000000`00000059 fffffa80`077fe110 00000000`000000ff fffffa80`07a57d60 : NETwNs64+0x1d3e2d fffff880`0d195890 fffff880`058d953c : fffffa80`07a30900 00000000`8be7cddf fffffa80`077fe110 00000000`8be7cdff : NETwNs64+0x43bd1 fffff880`0d195920 fffff880`058ce6a2 : fffffa80`07a30901 fffffa80`06c5e101 fffff880`0d1959f0 fffffa80`06c5e101 : NETwNs64+0x4353c fffff880`0d1959c0 fffff880`05bf7ba2 : fffffa80`0483a200 fffffa80`06c5e1a0 fffffa80`06c5e1a0 fffffa80`0483a160 : NETwNs64+0x386a2 fffff880`0d195a30 fffff880`01717792 : fffff880`016ef110 00000000`00000000 fffffa80`06c5e1a0 fffffa80`06c5ef68 : NETwNs64+0x361ba2 fffff880`0d195a60 fffff880`016a07ad : 00000000`00000002 00000000`0000000a 00000000`00000000 00000000`00000000 : ndis!ndisMiniportDpc+0xe2 fffff880`0d195ad0 fffff880`016c66bd : 00000000`00000002 00000000`00000002 00000000`00000000 fffffa80`07a6aeb8 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd fffff880`0d195b70 fffff800`0339cd10 : fffffa80`00000000 fffff800`0323f180 00000000`00000080 fffff880`00000001 : ndis!ndisReceiveWorkerThread+0x1bd fffff880`0d195c00 fffff800`030f49a6 : fffff800`0323f180 fffffa80`0483a160 fffffa80`04affb50 00000000`00000000 : nt!PspSystemThreadStartup+0x194 fffff880`0d195c40 00000000`00000000 : fffff880`0d196000 fffff880`0d190000 fffff880`0d1958c0 00000000`00000000 : nt!KiStartSystemThread+0x16 THREAD_SHA1_HASH_MOD_FUNC: 0647087028e6e71cd75256c30a872296373cae94 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0b5285fc44d8d2a3bec8bf3d60533adf037b5d05 THREAD_SHA1_HASH_MOD: a65722aa938c7de6f2cd751638764549477dc160 FOLLOWUP_IP: NETwNs64+2177fe fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi FAULT_INSTR_CODE: f2c7389 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: NETwNs64+2177fe FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETwNs64 IMAGE_NAME: NETwNs64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4dbdd18d STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xD1_NETwNs64+2177fe BUCKET_ID: X64_0xD1_NETwNs64+2177fe PRIMARY_PROBLEM_CLASS: X64_0xD1_NETwNs64+2177fe TARGET_TIME: 2018-12-19T17:04:55.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-11-11 01:44:59 BUILDDATESTAMP_STR: 181110-1429 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429 ANALYSIS_SESSION_ELAPSED_TIME: 247c ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xd1_netwns64+2177fe FAILURE_ID_HASH: {ddc7bf63-c01f-b70a-adf6-6eafbdb49df4} Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 000000000000002c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88005aad7fe, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429 SYSTEM_MANUFACTURER: SAMSUNG ELECTRONICS CO., LTD. SYSTEM_PRODUCT_NAME: 300E4A/300E5A/300E7A SYSTEM_SKU: System SKUNumber SYSTEM_VERSION: 0.1 BIOS_VENDOR: Phoenix Technologies Ltd. BIOS_VERSION: 01QA BIOS_DATE: 09/05/2011 BASEBOARD_MANUFACTURER: SAMSUNG ELECTRONICS CO., LTD. BASEBOARD_PRODUCT: 300E4A/300E5A/300E7A BASEBOARD_VERSION: FAB1 DUMP_TYPE: 1 BUGCHECK_P1: 2c BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff88005aad7fe WRITE_ADDRESS: 000000000000002c CURRENT_IRQL: 2 FAULTING_IP: NETwNs64+2177fe fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi CPU_COUNT: 4 CPU_MHZ: 893 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 2a CPU_STEPPING: 7 CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 1A'00000000 (cache) 1A'00000000 (init) DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System ANALYSIS_SESSION_HOST: EWUSKA-KOMPUTER ANALYSIS_SESSION_TIME: 12-19-2018 18:54:46.0034 ANALYSIS_VERSION: 10.0.17763.132 amd64fre TRAP_FRAME: fffff8800d195200 -- (.trap 0xfffff8800d195200) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff880016ef110 rbx=0000000000000000 rcx=fffff880016f2ec0 rdx=fffff800032cbf90 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88005aad7fe rsp=fffff8800d195390 rbp=fffffa80073f2c88 r8=0000000000000000 r9=0000000000000000 r10=0020004e002d0073 r11=fffffa80042413d8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc NETwNs64+0x2177fe: fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi ds:00000000`0000002c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030fcd69 to fffff800030ee9a0 STACK_TEXT: fffff880`0d1950b8 fffff800`030fcd69 : 00000000`0000000a 00000000`0000002c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`0d1950c0 fffff800`030fab88 : 00000000`00000001 00000000`0000002c fffff800`03255a00 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`0d195200 fffff880`05aad7fe : 00000000`00000000 fffffa80`073f2c88 fffffa80`00000002 00000000`000000c0 : nt!KiPageFault+0x448 fffff880`0d195390 fffff880`05aab24e : fffffa80`078595c0 00000000`80000000 fffffa80`073f2c88 00000000`00000000 : NETwNs64+0x2177fe fffff880`0d1953d0 fffff880`05aa1d4f : fffffa80`00000000 fffffa80`07858000 fffffa80`0c035090 fffffa80`0492ef30 : NETwNs64+0x21524e fffff880`0d195430 fffff880`058ac384 : fffffa80`00000001 fffff880`05aa18c0 fffffa80`073f2c88 fffffa80`073f2c88 : NETwNs64+0x20bd4f fffff880`0d1954f0 fffff880`058a9a9f : 00000000`00000018 fffffa80`0492efe0 fffffa80`0447b340 fffffa80`07386770 : NETwNs64+0x16384 fffff880`0d195550 fffff880`05a6fea7 : fffffa80`0ba4d170 00000000`00000000 fffff880`060a5540 fffffa80`07127d60 : NETwNs64+0x13a9f fffff880`0d1955a0 fffff880`05a6ebb4 : 00000000`00000004 00000000`00000000 fffff880`060a5540 fffffa80`07ad5900 : NETwNs64+0x1d9ea7 fffff880`0d195600 fffff880`05a6a9ad : fffff880`00000000 fffff880`06a0608c 00000000`00000000 fffffa80`07ad5910 : NETwNs64+0x1d8bb4 fffff880`0d195690 fffff880`05a69e2d : fffffa80`07a57d60 00000000`00000000 00000000`0000020c fffffa80`0ba4d170 : NETwNs64+0x1d49ad fffff880`0d1956f0 fffff880`058d9bd1 : 00000000`00000059 fffffa80`077fe110 00000000`000000ff fffffa80`07a57d60 : NETwNs64+0x1d3e2d fffff880`0d195890 fffff880`058d953c : fffffa80`07a30900 00000000`8be7cddf fffffa80`077fe110 00000000`8be7cdff : NETwNs64+0x43bd1 fffff880`0d195920 fffff880`058ce6a2 : fffffa80`07a30901 fffffa80`06c5e101 fffff880`0d1959f0 fffffa80`06c5e101 : NETwNs64+0x4353c fffff880`0d1959c0 fffff880`05bf7ba2 : fffffa80`0483a200 fffffa80`06c5e1a0 fffffa80`06c5e1a0 fffffa80`0483a160 : NETwNs64+0x386a2 fffff880`0d195a30 fffff880`01717792 : fffff880`016ef110 00000000`00000000 fffffa80`06c5e1a0 fffffa80`06c5ef68 : NETwNs64+0x361ba2 fffff880`0d195a60 fffff880`016a07ad : 00000000`00000002 00000000`0000000a 00000000`00000000 00000000`00000000 : ndis!ndisMiniportDpc+0xe2 fffff880`0d195ad0 fffff880`016c66bd : 00000000`00000002 00000000`00000002 00000000`00000000 fffffa80`07a6aeb8 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd fffff880`0d195b70 fffff800`0339cd10 : fffffa80`00000000 fffff800`0323f180 00000000`00000080 fffff880`00000001 : ndis!ndisReceiveWorkerThread+0x1bd fffff880`0d195c00 fffff800`030f49a6 : fffff800`0323f180 fffffa80`0483a160 fffffa80`04affb50 00000000`00000000 : nt!PspSystemThreadStartup+0x194 fffff880`0d195c40 00000000`00000000 : fffff880`0d196000 fffff880`0d190000 fffff880`0d1958c0 00000000`00000000 : nt!KiStartSystemThread+0x16 THREAD_SHA1_HASH_MOD_FUNC: 0647087028e6e71cd75256c30a872296373cae94 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0b5285fc44d8d2a3bec8bf3d60533adf037b5d05 THREAD_SHA1_HASH_MOD: a65722aa938c7de6f2cd751638764549477dc160 FOLLOWUP_IP: NETwNs64+2177fe fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi FAULT_INSTR_CODE: f2c7389 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: NETwNs64+2177fe FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETwNs64 IMAGE_NAME: NETwNs64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4dbdd18d STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xD1_NETwNs64+2177fe BUCKET_ID: X64_0xD1_NETwNs64+2177fe PRIMARY_PROBLEM_CLASS: X64_0xD1_NETwNs64+2177fe TARGET_TIME: 2018-12-19T17:04:55.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-11-11 01:44:59 BUILDDATESTAMP_STR: 181110-1429 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429 ANALYSIS_SESSION_ELAPSED_TIME: 240d ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xd1_netwns64+2177fe FAILURE_ID_HASH: {ddc7bf63-c01f-b70a-adf6-6eafbdb49df4} Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 000000000000002c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88005aad7fe, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429 SYSTEM_MANUFACTURER: SAMSUNG ELECTRONICS CO., LTD. SYSTEM_PRODUCT_NAME: 300E4A/300E5A/300E7A SYSTEM_SKU: System SKUNumber SYSTEM_VERSION: 0.1 BIOS_VENDOR: Phoenix Technologies Ltd. BIOS_VERSION: 01QA BIOS_DATE: 09/05/2011 BASEBOARD_MANUFACTURER: SAMSUNG ELECTRONICS CO., LTD. BASEBOARD_PRODUCT: 300E4A/300E5A/300E7A BASEBOARD_VERSION: FAB1 DUMP_TYPE: 1 BUGCHECK_P1: 2c BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff88005aad7fe WRITE_ADDRESS: 000000000000002c CURRENT_IRQL: 2 FAULTING_IP: NETwNs64+2177fe fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi CPU_COUNT: 4 CPU_MHZ: 893 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 2a CPU_STEPPING: 7 CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 1A'00000000 (cache) 1A'00000000 (init) DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System ANALYSIS_SESSION_HOST: EWUSKA-KOMPUTER ANALYSIS_SESSION_TIME: 12-19-2018 18:54:55.0268 ANALYSIS_VERSION: 10.0.17763.132 amd64fre TRAP_FRAME: fffff8800d195200 -- (.trap 0xfffff8800d195200) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff880016ef110 rbx=0000000000000000 rcx=fffff880016f2ec0 rdx=fffff800032cbf90 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88005aad7fe rsp=fffff8800d195390 rbp=fffffa80073f2c88 r8=0000000000000000 r9=0000000000000000 r10=0020004e002d0073 r11=fffffa80042413d8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc NETwNs64+0x2177fe: fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi ds:00000000`0000002c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030fcd69 to fffff800030ee9a0 STACK_TEXT: fffff880`0d1950b8 fffff800`030fcd69 : 00000000`0000000a 00000000`0000002c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`0d1950c0 fffff800`030fab88 : 00000000`00000001 00000000`0000002c fffff800`03255a00 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`0d195200 fffff880`05aad7fe : 00000000`00000000 fffffa80`073f2c88 fffffa80`00000002 00000000`000000c0 : nt!KiPageFault+0x448 fffff880`0d195390 fffff880`05aab24e : fffffa80`078595c0 00000000`80000000 fffffa80`073f2c88 00000000`00000000 : NETwNs64+0x2177fe fffff880`0d1953d0 fffff880`05aa1d4f : fffffa80`00000000 fffffa80`07858000 fffffa80`0c035090 fffffa80`0492ef30 : NETwNs64+0x21524e fffff880`0d195430 fffff880`058ac384 : fffffa80`00000001 fffff880`05aa18c0 fffffa80`073f2c88 fffffa80`073f2c88 : NETwNs64+0x20bd4f fffff880`0d1954f0 fffff880`058a9a9f : 00000000`00000018 fffffa80`0492efe0 fffffa80`0447b340 fffffa80`07386770 : NETwNs64+0x16384 fffff880`0d195550 fffff880`05a6fea7 : fffffa80`0ba4d170 00000000`00000000 fffff880`060a5540 fffffa80`07127d60 : NETwNs64+0x13a9f fffff880`0d1955a0 fffff880`05a6ebb4 : 00000000`00000004 00000000`00000000 fffff880`060a5540 fffffa80`07ad5900 : NETwNs64+0x1d9ea7 fffff880`0d195600 fffff880`05a6a9ad : fffff880`00000000 fffff880`06a0608c 00000000`00000000 fffffa80`07ad5910 : NETwNs64+0x1d8bb4 fffff880`0d195690 fffff880`05a69e2d : fffffa80`07a57d60 00000000`00000000 00000000`0000020c fffffa80`0ba4d170 : NETwNs64+0x1d49ad fffff880`0d1956f0 fffff880`058d9bd1 : 00000000`00000059 fffffa80`077fe110 00000000`000000ff fffffa80`07a57d60 : NETwNs64+0x1d3e2d fffff880`0d195890 fffff880`058d953c : fffffa80`07a30900 00000000`8be7cddf fffffa80`077fe110 00000000`8be7cdff : NETwNs64+0x43bd1 fffff880`0d195920 fffff880`058ce6a2 : fffffa80`07a30901 fffffa80`06c5e101 fffff880`0d1959f0 fffffa80`06c5e101 : NETwNs64+0x4353c fffff880`0d1959c0 fffff880`05bf7ba2 : fffffa80`0483a200 fffffa80`06c5e1a0 fffffa80`06c5e1a0 fffffa80`0483a160 : NETwNs64+0x386a2 fffff880`0d195a30 fffff880`01717792 : fffff880`016ef110 00000000`00000000 fffffa80`06c5e1a0 fffffa80`06c5ef68 : NETwNs64+0x361ba2 fffff880`0d195a60 fffff880`016a07ad : 00000000`00000002 00000000`0000000a 00000000`00000000 00000000`00000000 : ndis!ndisMiniportDpc+0xe2 fffff880`0d195ad0 fffff880`016c66bd : 00000000`00000002 00000000`00000002 00000000`00000000 fffffa80`07a6aeb8 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd fffff880`0d195b70 fffff800`0339cd10 : fffffa80`00000000 fffff800`0323f180 00000000`00000080 fffff880`00000001 : ndis!ndisReceiveWorkerThread+0x1bd fffff880`0d195c00 fffff800`030f49a6 : fffff800`0323f180 fffffa80`0483a160 fffffa80`04affb50 00000000`00000000 : nt!PspSystemThreadStartup+0x194 fffff880`0d195c40 00000000`00000000 : fffff880`0d196000 fffff880`0d190000 fffff880`0d1958c0 00000000`00000000 : nt!KiStartSystemThread+0x16 THREAD_SHA1_HASH_MOD_FUNC: 0647087028e6e71cd75256c30a872296373cae94 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0b5285fc44d8d2a3bec8bf3d60533adf037b5d05 THREAD_SHA1_HASH_MOD: a65722aa938c7de6f2cd751638764549477dc160 FOLLOWUP_IP: NETwNs64+2177fe fffff880`05aad7fe 89732c mov dword ptr [rbx+2Ch],esi FAULT_INSTR_CODE: f2c7389 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: NETwNs64+2177fe FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETwNs64 IMAGE_NAME: NETwNs64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4dbdd18d STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xD1_NETwNs64+2177fe BUCKET_ID: X64_0xD1_NETwNs64+2177fe PRIMARY_PROBLEM_CLASS: X64_0xD1_NETwNs64+2177fe TARGET_TIME: 2018-12-19T17:04:55.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-11-11 01:44:59 BUILDDATESTAMP_STR: 181110-1429 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429 ANALYSIS_SESSION_ELAPSED_TIME: 2450 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xd1_netwns64+2177fe FAILURE_ID_HASH: {ddc7bf63-c01f-b70a-adf6-6eafbdb49df4} Followup: MachineOwner --------- Podpis problemu: Nazwa zdarzenia problemu: BlueScreen Wersja systemu operacyjnego: 6.1.7601.2.1.0.768.3 Identyfikator ustawie� regionalnych: 1045 Dodatkowe informacje o problemie: BCCode: d1 BCP1: 000000000000002C BCP2: 0000000000000002 BCP3: 0000000000000001 BCP4: FFFFF88005AAD7FE OS Version: 6_1_7601 Service Pack: 1_0 Product: 768_1 Pliki pomagaj�ce opisa� problem: C:\Windows\Minidump\121918-29078-01.dmp C:\Users\ewu�ka\AppData\Local\Temp\WER-143552-0.sysdata.xml Przeczytaj w trybie online nasze zasady zachowania poufno�ci informacji: http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0415 Je�li zasady zachowania poufno�ci informacji w trybie online nie s� dost�pne, przeczytaj nasze zasady zachowania poufno�ci informacji w trybie offline: C:\windows\system32\pl-PL\erofflps.txt Cześć, mam problem z BSOD wyskakującym niezbyt zależnie od tego co robię, tak mi się wydaję. Najczęściej pojawia się podczas korzystania z internetu. Pojawił się też gdy skanowałem adwcleanerem czy też gdy odpaliłem GMERa(wyłączyłem zaporę i avasta). Co ciekawe problem ten nie występuje gdy jestem w Niemczech i korzystam z tamtejszego internetu. Bluescreen wyskakuje tylko w Polsce. W spoilerze zamieściłem diagnozę z poradnika. Proszę i z góry dziękuję za pomoc Addition.txt FRST.txt Shortcut.txt Odnośnik do komentarza
jessica Opublikowano 20 Grudnia 2018 Zgłoś Udostępnij Opublikowano 20 Grudnia 2018 W logach FRST nie widzę żadnej infekcji. Tylko kosmetyka: Uruchom FRST. Na klawiaturze naciśnij jednocześnie CTRL+Y. Otworzy się Notatnik - wklej do niego: Spoiler Toolbar: HKU\S-1-5-21-1480235242-2075340924-4091109271-1001 -> Brak nazwy - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - Brak pliku HKLM-x32\...\Run: [] => [X] HKLM\SOFTWARE\Policies\Microsoft\Windows Defender: Ograniczenia <==== UWAGA HKU\S-1-5-21-1480235242-2075340924-4091109271-1001\...\Run: [BingSvc] => C:\Users\ewuśka\AppData\Local\Microsoft\BingSvc\BingSvc.exe [144008 2015-11-05] (© 2015 Microsoft Corporation) HKU\S-1-5-18\...\Run: [Norton Download Manager{NIS2250215-SHPD-FSD51083}] => C:\Users\Public\Downloads\Norton\{NIS2250215-SHPD-FSD51083}\FSDUI_Custom.exe [1110856 2015-09-07] (Symantec Corporation) SearchScopes: HKU\S-1-5-21-1480235242-2075340924-4091109271-1001 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = FF Plugin-x32: @adobe.com/ShockwavePlayer -> C:\windows\system32\Adobe\Director\np32dsw.dll [Brak pliku] Task: {BB9A67E9-7418-4209-AF9B-4F5D4EAC9250} - System32\Tasks\Remediation\AntimalwareMigrationTask => C:\Program Files\Common Files\AV\Norton Internet Security\Upgrade.exe [2015-08-06] (Symantec Corporation) EmptyTemp: Na klawiaturze naciśnij jednocześnie CTRL+S. W FRST kliknij na Fix (NAPRAW). =========== Spoiler 0x000000d1 Patrzyłam w necie, szukając rozwiązań mających ten sam błąd, co u Ciebie. Rozwiązań jest tak dużo, że trudno wybrać coś pasującego do Twego komputera. Ja stawiam na problem z routerem, lub z wi-fi. Ale to tylko moje domysły, nie jestem fachowcem w sprawach sprzętowych. jessi Odnośnik do komentarza
Rekomendowane odpowiedzi
Jeśli chcesz dodać odpowiedź, zaloguj się lub zarejestruj nowe konto
Jedynie zarejestrowani użytkownicy mogą komentować zawartość tej strony.
Zarejestruj nowe konto
Załóż nowe konto. To bardzo proste!
Zarejestruj sięZaloguj się
Posiadasz już konto? Zaloguj się poniżej.
Zaloguj się