When I analyze those DMP files in WinDBG I get an error on NETIO.SYS, Google research comes up with ethernet driver issues. But I am sure ZigZag will be along here shortly to correct me :D
Heres what I found in WinDBG:
.
.
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, ffffd0011a3de2c0, ffffd0011a3de218, 0}
Probably caused by : NETIO.SYS ( NETIO!NsiGetParameterEx+222 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd0011a3de2c0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd0011a3de218, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
TRAP_FRAME: ffffd0011a3de2c0 -- (.trap 0xffffd0011a3de2c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe00043ecd4e0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe000441124e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001a88dacd rsp=ffffd0011a3de450 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000002 r10=ffffe00043b96bf0
r11=ffffe00043ecd010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
ndis!ndisNsiGetInterfaceInformation+0x21b8d:
fffff800`1a88dacd cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd0011a3de218 -- (.exr 0xffffd0011a3de218)
ExceptionAddress: fffff8001a88dacd (ndis!ndisNsiGetInterfaceInformation+0x0000000000021b8d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
BUGCHECK_STR: 0x139
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_PARAMETER1: 0000000000000003
LAST_CONTROL_TRANSFER: from fffff801cf1e17e9 to fffff801cf1d5ca0
STACK_TEXT:
ffffd001`1a3ddf98 fffff801`cf1e17e9 : 00000000`00000139 00000000`00000003 ffffd001`1a3de2c0 ffffd001`1a3de218 : nt!KeBugCheckEx
ffffd001`1a3ddfa0 fffff801`cf1e1b10 : 00000000`00000000 00000000`00000001 ffffd001`1a3de188 fffff801`00000000 : nt!KiBugCheckDispatch+0x69
ffffd001`1a3de0e0 fffff801`cf1e0d34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd001`1a3de2c0 fffff800`1a88dacd : 00000000`ffffe000 00000000`00000000 ffffd001`1a3de5c0 00000000`00000004 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd001`1a3de450 fffff800`1a984572 : ffffd001`1a3de5c0 ffffe000`4966bc02 ffffe000`4966bc00 00000000`00000000 : ndis!ndisNsiGetInterfaceInformation+0x21b8d
ffffd001`1a3de500 fffff800`1b7b0a25 : 00000000`00000050 ffffd001`00000050 ffffe000`4374bec0 00000000`00000000 : NETIO!NsiGetParameterEx+0x222
ffffd001`1a3de660 fffff800`1b7b0be3 : 00000000`00000000 ffffcf81`a3b2ef70 ffffcf81`a3b2eea0 ffffe000`46639de0 : nsiproxy!NsippGetParameter+0x195
ffffd001`1a3de7f0 fffff801`cf6fe911 : ffffcf81`a3b2eea0 00000000`00000002 ffffe000`41b158f0 fffff801`cf328701 : nsiproxy!NsippDispatch+0x53
ffffd001`1a3de830 fffff801`cf4aa77f : 00000000`00000000 ffffd001`1a3deb80 ffffcf81`a3b2eea0 ffffe000`46639d40 : nt!IovCallDriver+0x3cd
ffffd001`1a3de880 fffff801`cf4a9d22 : ffffd001`1a3dea38 00007ffa`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xa4f
ffffd001`1a3dea20 fffff801`cf1e14b3 : ffffe000`458f5080 000000f4`001f0003 000000f4`4465e438 fffff801`00000001 : nt!NtDeviceIoControlFile+0x56
ffffd001`1a3dea90 00007ffa`c9ba123a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000f4`4465e4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`c9ba123a
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NsiGetParameterEx+222
fffff800`1a984572 8bd8 mov ebx,eax
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: NETIO!NsiGetParameterEx+222
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 546029c5
BUCKET_ID_FUNC_OFFSET: 222
FAILURE_BUCKET_ID: 0x139_3_NETIO!NsiGetParameterEx
BUCKET_ID: 0x139_3_NETIO!NsiGetParameterEx
Followup: MachineOwner
-
Edited by
Acreed02
13 hours 43 minutes ago