I can't seem to figure out the pattern here with programs/actions despite the consistent crashing. Any help is appreciated. Thanks
My Computer
System One
-
- OS
- Windows 8.1
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, ffffd0002072aa20, ffffd0002072a978, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
Followup: MachineOwner
[COLOR=#3e3e3e][FONT=Arial]2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd0002072aa20, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd0002072a978, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Debugging Details:
------------------[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]
TRAP_FRAME: ffffd0002072aa20 -- (.trap 0xffffd0002072aa20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe0000046e8b0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014600095a rsp=ffffd0002072abb0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000002 r10=ffffd000206f9180
r11=ffffd0002072abe0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt! ?? ::FNODOBFM::`string'+0x2b7ba:
fffff801`4600095a cd29 int 29h
Resetting default scope[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]EXCEPTION_RECORD: ffffd0002072a978 -- (.exr 0xffffd0002072a978)
ExceptionAddress: fffff8014600095a (nt! ?? ::FNODOBFM::`string'+0x000000000002b7ba)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]CUSTOMER_CRASH_COUNT: 1[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BUGCHECK_STR: 0x139[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]PROCESS_NAME: explorer.exe[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]CURRENT_IRQL: 2[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]ERROR_CODE: (NTSTATUS) 0xc0000409 - Er is een bufferoverschrijdingsfout opgetreden voor stack-buffer in deze toepassing. Via deze overschrijdingsfout kan een kwaadwillige gebruiker de controle over deze toepassing verkrijgen.[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - Er is een bufferoverschrijdingsfout opgetreden voor stack-buffer in deze toepassing. Via deze overschrijdingsfout kan een kwaadwillige gebruiker de controle over deze toepassing verkrijgen.[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]EXCEPTION_PARAMETER1: 0000000000000003[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]DPC_STACK_BASE: FFFFD0002072AFB0[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]LAST_CONTROL_TRANSFER: from fffff80145fd07e9 to fffff80145fc4ca0[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]STACK_TEXT:
ffffd000`2072a6f8 fffff801`45fd07e9 : 00000000`00000139 00000000`00000003 ffffd000`2072aa20 ffffd000`2072a978 : nt!KeBugCheckEx
ffffd000`2072a700 fffff801`45fd0b10 : ffffd000`20780180 ffffd000`206f9180 fffff801`46116100 fffff801`45e0e627 : nt!KiBugCheckDispatch+0x69
ffffd000`2072a840 fffff801`45fcfd34 : ffffd000`2072aa38 00000000`00000000 fffffff6`00000002 00000001`ffffffff : nt!KiFastFailDispatch+0xd0
ffffd000`2072aa20 fffff801`4600095a : 00000000`00000000 ffffd000`206f9180 ffffe000`033ea9f0 00000000`00000008 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`2072abb0 fffff801`45f24fe3 : ffffe000`05d32400 ffffd000`00000001 ffffd000`2072ac89 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x2b7ba
ffffd000`2072ac10 fffff801`45f25478 : ffffe000`080b0a0b ffffd000`2072ad79 ffffe000`05c1c068 fffff801`46168ec0 : nt!KiProcessExpiredTimerList+0x257
ffffd000`2072acf0 fffff801`45f81478 : ffffd000`206f9180 00000000`0023ae8a ffffd000`0002f552 ffffd000`0002f56a : nt!KiExpireTimerTable+0x218
ffffd000`2072ad90 fffff801`45ed1abc : ffffe000`0ac41080 ffffd000`206f9180 00000000`00000008 0000000b`748c71db : nt!KiTimerExpiration+0x148
ffffd000`2072ae40 fffff801`45fc7dd5 : 80000000`00ac0121 ffffd000`206f9180 ffffd000`35638440 ffffe000`00400300 : nt!KiRetireDpcList+0x19c
ffffd000`2072afb0 fffff801`45fc7bd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffd000`35638380 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]
STACK_COMMAND: kb[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff801`45fd0b10 c644242000 mov byte ptr [rsp+20h],0[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]SYMBOL_STACK_INDEX: 2[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]SYMBOL_NAME: nt!KiFastFailDispatch+d0[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FOLLOWUP_NAME: MachineOwner[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]MODULE_NAME: nt[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]IMAGE_NAME: ntkrnlmp.exe[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]DEBUG_FLR_IMAGE_TIMESTAMP: 52718d9c[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]IMAGE_VERSION: 6.3.9600.16452[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BUCKET_ID_FUNC_OFFSET: d0[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAILURE_BUCKET_ID: 0x139_3_nt!KiFastFailDispatch[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BUCKET_ID: 0x139_3_nt!KiFastFailDispatch[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]ANALYSIS_SOURCE: KM[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAILURE_ID_HASH_STRING: km:0x139_3_nt!kifastfaildispatch[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAILURE_ID_HASH: {36173680-6f08-995f-065a-3d368c996911}[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Followup: MachineOwner
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Use !analyze -v to get detailed debugging information.[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BugCheck A, {ffffcf8003b16f98, 2, 1, fffff80255133a39}[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Probably caused by : ntkrnlmp.exe ( nt!KiProcessThreadWaitList+b9 )[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Followup: MachineOwner
---------[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffcf8003b16f98, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80255133a39, address which referenced memory[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Debugging Details:
------------------[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff802553d3150
GetUlongFromAddress: unable to read from fffff802553d3208
Unable to get PFN database address fffff802553d3100
ffffcf8003b16f98 [/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]CURRENT_IRQL: 2[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAULTING_IP:
nt!KiProcessThreadWaitList+b9
fffff802`55133a39 f00fba2f07 lock bts dword ptr [rdi],7[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]CUSTOMER_CRASH_COUNT: 1[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BUGCHECK_STR: AV[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]PROCESS_NAME: System[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]DPC_STACK_BASE: FFFFD000205AAFB0[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]TRAP_FRAME: ffffd000205a36d0 -- (.trap 0xffffd000205a36d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=08e45efc80f80000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80255133a39 rsp=ffffd000205a3860 rbp=0000000000000000
r8=0000000000000100 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiProcessThreadWaitList+0xb9:
fffff802`55133a39 f00fba2f07 lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
Resetting default scope[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]LAST_CONTROL_TRANSFER: from fffff802551df7e9 to fffff802551d3ca0[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]STACK_TEXT:
ffffd000`205a3588 fffff802`551df7e9 : 00000000`0000000a ffffcf80`03b16f98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`205a3590 fffff802`551de03a : 00000000`00000001 ffffe000`06d7e1c0 fffffff6`00000000 ffffd000`205a36d0 : nt!KiBugCheckDispatch+0x69
ffffd000`205a36d0 fffff802`55133a39 : 00000000`00000000 ffffd000`20579180 ffffe000`058f2b40 ffffd000`205a3939 : nt!KiPageFault+0x23a
ffffd000`205a3860 fffff802`55133fe3 : ffffe000`05e86b00 00000000`00000001 ffffd000`205a3939 00000000`00000002 : nt!KiProcessThreadWaitList+0xb9
ffffd000`205a38c0 fffff802`55134478 : 00000000`00000000 ffffe000`05cfb250 ffffd000`20579180 fffff802`553772c0 : nt!KiProcessExpiredTimerList+0x257
ffffd000`205a39a0 fffff802`55190478 : ffffd000`20579180 00000000`0023ae85 00000000`00011cf2 00000000`00011d0a : nt!KiExpireTimerTable+0x218
ffffd000`205a3a40 fffff802`550e0abc : ffffe000`00000000 00001f80`00000001 00000004`73ca7602 00000000`00000002 : nt!KiTimerExpiration+0x148
ffffd000`205a3af0 fffff802`551d77ea : ffffd000`20579180 ffffd000`20579180 00000000`00000000 ffffd000`20585240 : nt!KiRetireDpcList+0x19c
ffffd000`205a3c60 00000000`00000000 : ffffd000`205a4000 ffffd000`2059e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]
STACK_COMMAND: kb[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FOLLOWUP_IP:
nt!KiProcessThreadWaitList+b9
fffff802`55133a39 f00fba2f07 lock bts dword ptr [rdi],7[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]SYMBOL_STACK_INDEX: 3[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]SYMBOL_NAME: nt!KiProcessThreadWaitList+b9[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FOLLOWUP_NAME: MachineOwner[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]MODULE_NAME: nt[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]IMAGE_NAME: ntkrnlmp.exe[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]DEBUG_FLR_IMAGE_TIMESTAMP: 52718d9c[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]IMAGE_VERSION: 6.3.9600.16452[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BUCKET_ID_FUNC_OFFSET: b9[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAILURE_BUCKET_ID: AV_VRF_nt!KiProcessThreadWaitList[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BUCKET_ID: AV_VRF_nt!KiProcessThreadWaitList[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]ANALYSIS_SOURCE: KM[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAILURE_ID_HASH_STRING: km:av_vrf_nt!kiprocessthreadwaitlist[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAILURE_ID_HASH: {4c242e02-1262-7f60-009a-dfe44df4757f}[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Followup: MachineOwner
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Use !analyze -v to get detailed debugging information.[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BugCheck 1000007E, {ffffffffc0000005, fffff80002b79c38, ffffd0003839b208, ffffd0003839aa10}[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Probably caused by : AsusTP.sys ( AsusTP+1c38 )[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Followup: MachineOwner
---------[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002b79c38, The address that the exception occurred at
Arg3: ffffd0003839b208, Exception Record Address
Arg4: ffffd0003839aa10, Context Record Address[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Debugging Details:
------------------[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAULTING_IP:
AsusTP+1c38
fffff800`02b79c38 c783282d020005000000 mov dword ptr [rbx+22D28h],5[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]EXCEPTION_RECORD: ffffd0003839b208 -- (.exr 0xffffd0003839b208)
ExceptionAddress: fffff80002b79c38 (AsusTP+0x0000000000001c38)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000000022d28
Attempt to write to address 0000000000022d28[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]CONTEXT: ffffd0003839aa10 -- (.cxr 0xffffd0003839aa10;r)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd0003839b458
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffe00004a731d4
rip=fffff80002b79c38 rsp=ffffd0003839b440 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=fffff8018e397520
r11=ffffd0003839b400 r12=0000000000000003 r13=ffffd0003839b4b0
r14=00000000000000e6 r15=fffff8018deaf100
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010217
AsusTP+0x1c38:
fffff800`02b79c38 c783282d020005000000 mov dword ptr [rbx+22D28h],5 ds:002b:00000000`00022d28=????????
Last set context:
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd0003839b458
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffe00004a731d4
rip=fffff80002b79c38 rsp=ffffd0003839b440 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=fffff8018e397520
r11=ffffd0003839b400 r12=0000000000000003 r13=ffffd0003839b4b0
r14=00000000000000e6 r15=fffff8018deaf100
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010217
AsusTP+0x1c38:
fffff800`02b79c38 c783282d020005000000 mov dword ptr [rbx+22D28h],5 ds:002b:00000000`00022d28=????????
Resetting default scope[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]CUSTOMER_CRASH_COUNT: 1[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]PROCESS_NAME: System[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]CURRENT_IRQL: 0[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]ERROR_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]EXCEPTION_PARAMETER1: 0000000000000001[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]EXCEPTION_PARAMETER2: 0000000000022d28[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8018df5d150
GetUlongFromAddress: unable to read from fffff8018df5d208
0000000000022d28 Nonpaged pool[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FOLLOWUP_IP:
AsusTP+1c38
fffff800`02b79c38 c783282d020005000000 mov dword ptr [rbx+22D28h],5[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BUGCHECK_STR: AV[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002b79c38[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]STACK_TEXT:
ffffd000`3839b440 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : AsusTP+0x1c38[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]
SYMBOL_STACK_INDEX: 0[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]SYMBOL_NAME: AsusTP+1c38[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FOLLOWUP_NAME: MachineOwner[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]MODULE_NAME: AsusTP[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]IMAGE_NAME: AsusTP.sys[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]DEBUG_FLR_IMAGE_TIMESTAMP: 508ec9ba[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]STACK_COMMAND: .cxr 0xffffd0003839aa10 ; kb[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAILURE_BUCKET_ID: AV_AsusTP+1c38[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]BUCKET_ID: AV_AsusTP+1c38[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]ANALYSIS_SOURCE: KM[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAILURE_ID_HASH_STRING: km:av_asustp+1c38[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]FAILURE_ID_HASH: {48828ea3-34a3-2f8f-2a7d-2cff9a4f5485}[/FONT][/COLOR]
[COLOR=#3e3e3e][FONT=Arial]Followup: MachineOwner
[/FONT][/COLOR]
CPUID: "Intel(R) Core(TM) i7-3517U CPU @ 1.90GHz"
MaxSpeed: 1900
CurrentSpeed: 2395