We need the dump files for a better analysis of the problem. Instructions can be found here:
Multiple BSODs daily since Creators fall update—DRIVER_IRQL_NOT_LESS_OR_EQUAL, error in tcpip.sys
This has gone on for a month now, and my patience has worn thin.
Since Creators fall, my PC BSODs multiple times a day—between three and six is the norm. I had hoped that with the seriousness of this bug—one where I have lost hours of work—one of your subsequent updates would address it. That has not happened.
The error is DRIVER_IRQL_NOT_LESS_OR_EQUAL, and the error is in tcpip.sys.
I have tried the usual SFC scannow and the routine copy-and-paste stuff I see on this forum. Drivers are all up to date and I have even gone to individual manufacturers’ sites to download theirs.
My suspicion is that there is some USB incompatibility between Windows 10 Creators fall update and the Asus motherboard I have, but Asus has no new drivers.
I say this as the system BSODs often when I use Explorer to browse files. The moment Explorer tries to access other hard drives, it can BSOD. One time my partner unplugged her phone and managed to BSOD the PC.
I have made sure that in the power settings, none of the drives are on a power-saving mode, but that has made no difference.
After running Windbg on the dump file, I get this:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {3c, 2, 1, fffff8042c893f90}
Probably caused by : NETIO.SYS ( NETIO!StreamInjectRequestsToStack+239 )
Followup: MachineOwner
In more depth:
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000003c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80a5f3a3f90, address which referenced memory
Debugging Details:
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.16299.98 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1002
BIOS_DATE: 08/23/2011
BASEBOARD_MANUFACTURER: ASUSTeK Computer INC.
BASEBOARD_PRODUCT: P8H67-M LE
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 3c
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80a5f3a3f90
WRITE_ADDRESS: fffff8035de7d380: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000003c
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+2c0
fffff80a`5f3a3f90 f0ff403c lock inc dword ptr [rax+3Ch]
CPU_COUNT: 4
CPU_MHZ: cdd
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: GLADIATOR
ANALYSIS_SESSION_TIME: 12-11-2017 22:13:31.0160
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
TRAP_FRAME: ffffee875b741090 -- (.trap 0xffffee875b741090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000f9cf9bc2
rdx=ffffb28e04104530 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80a5f3a3f90 rsp=ffffee875b741220 rbp=ffffee875b741320
r8=0000000000000000 r9=ffffb28e04104470 r10=ffffb28e04104470
r11=ffffee875b7411c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x2c0:
fffff80a5f3a3f90 f0ff403c lock inc dword ptr [rax+3Ch] ds:000000000000003c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8035dbf49e9 to fffff8035dbe90e0
STACK_TEXT:
ffffee875b740f48 fffff8035dbf49e9 : 000000000000000a 000000000000003c 0000000000000002 0000000000000001 : nt!KeBugCheckEx
ffffee875b740f50 fffff8035dbf2d7d : 0000000000000014 ffffb28e041f0798 fffff80a5f514000 0000000000000000 : nt!KiBugCheckDispatch+0x69
ffffee875b741090 fffff80a5f3a3f90 : 0000000000000001 ffffb28e04195cc0 ffffb28dfb86cb2c ffffb28e00000014 : nt!KiPageFault+0x23d
ffffee875b741220 fffff80a5f3a2fcd : ffffb28e00e96000 ffffee875b7416f0 fffff80a5f514000 0000000000000000 : tcpip!TcpBeginTcbSend+0x2c0
ffffee875b7414a0 fffff80a5f3a2c05 : ffffb28e04195cc0 0000000000000001 00000000000002bb ffffb28dfbb2a280 : tcpip!TcpTcbSend+0x2fd
ffffee875b741820 fffff80a5f3a28b7 : 00000000009a2b39 ffffee875b741a00 000000000031100b 0000000000000000 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0xc5
ffffee875b741850 fffff80a5f44dee8 : ffffb28dfec27080 0000000000000000 0000000000004000 ffffb28e04069440 : tcpip!TcpEnqueueTcbSend+0x2b7
ffffee875b741960 fffff80a5e391201 : fffff80a00000002 0000000000000000 ffffee875b741a78 fffff80a5f514000 : tcpip!InetInspectInjectSend+0x18
ffffee875b741990 fffff80a5e391833 : ffffb28dfbfb9970 ffffb28e04195cc0 0000000000000000 00000000000000cd : NETIO!StreamInjectRequestsToStack+0x239
ffffee875b741a70 fffff80a5e391966 : 0000000000000000 ffffb28e00a9f770 0000000000000002 ffffb28e04069440 : NETIO!StreamPermitDataHelper+0x5f
ffffee875b741aa0 fffff8035db8114b : ffffb28e010374f0 ffffb28e01037400 ffffb28dfc1fba70 ffffb28e0132b080 : NETIO!StreamPermitRemoveDataWorkerRoutine+0xe6
ffffee875b741b10 fffff8035dac1e05 : ffffb28dfaede2b0 ffffb28e04069300 fffff8035db81050 0000000000000000 : nt!IopProcessWorkItem+0xfb
ffffee875b741b80 fffff8035daadf87 : 0000000000000000 0000000000000080 ffffb28dfaed6040 ffffb28e04069300 : nt!ExpWorkerThread+0xf5
ffffee875b741c10 fffff8035dbee676 : ffffc38167c9d180 ffffb28e04069300 fffff8035daadf40 0000000000000246 : nt!PspSystemThreadStartup+0x47
ffffee875b741c60 0000000000000000 : ffffee875b742000 ffffee875b73c000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 4e774be22ad200b119eaec04d36c9254793a847f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 780a68c2aa88c766cab280656d1c86148905a881
THREAD_SHA1_HASH_MOD: ca9ed088408d7268e0908bb3357cdf1d0f735a18
FOLLOWUP_IP:
NETIO!StreamInjectRequestsToStack+239
fffff80a`5e391201 8bf0 mov esi,eax
FAULT_INSTR_CODE: 33df08b
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: NETIO!StreamInjectRequestsToStack+239
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 302c3e5d
IMAGE_VERSION: 10.0.16299.64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 239
FAILURE_BUCKET_ID: AV_NETIO!StreamInjectRequestsToStack
BUCKET_ID: AV_NETIO!StreamInjectRequestsToStack
PRIMARY_PROBLEM_CLASS: AV_NETIO!StreamInjectRequestsToStack
TARGET_TIME: 2017-12-11T22:04:40.000Z
OSBUILD: 16299
OSSERVICEPACK: 98
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-11-26 11:49:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.16299.98
ANALYSIS_SESSION_ELAPSED_TIME: d91
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_netio!streaminjectrequeststostack
FAILURE_ID_HASH: {c1b2a924-d392-26d5-b3a7-c0515a6a6bac}
Followup: MachineOwner
I believe there is a serious bug here, one that did not exist with Creators spring, which worked reasonably well. I honestly have not seen this number of BSODs per day since a faulty machine was running Vista. This far exceeds anything I have experienced with 3·1, 95, 2000, XP or 7.
Indeed, going back through the number of posts I have made since 10 was released, I have to conclude this OS has been a real lemon. Please fix this—whatever you did with fall and the USB control, change it back!
Windows for home | Windows 10 | Performance and system failures
Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question.
28 answers
Sort by: Most helpful
-
-
Anonymous
2018-01-03T10:28:19+00:00 Thank you, Sumit.
Here is the Speccy output:
http://speccy.piriform.com/results/nXXDEIWOoo0UCVix1QLbHyP
The computer BSODed during compilation of the msinfo32 but I managed to get that NFO file after it rebooted:
http://www.filedropper.com/computer\_4
The dumps are here:
http://www.filedropper.com/010318-6765-01
Hope you can spot something among these.
-
Sumit 42,776 Reputation points Volunteer Moderator
2018-01-03T10:55:39+00:00 Looks like it is something related to the Network driver.
First of all, a newer version of BIOS is available is here:
https://www.asus.com/Motherboards/P8H67M_LE/HelpDesk_BIOS/
After updating that,
No drivers were named in the crashes, so our next step would be to find the offending driver if any.
Enable Driver Verifier:
Upload the newer dumps when you get Driver_Verifier_detected_voilation.
Please note that the system might crash before you reach the desktop-if it does please let us know so that we can guide you to disable Verifier.
-
Anonymous
2018-01-03T11:04:50+00:00 Thank you, Sumit. I see the BIOS update is from 2014. Unless you’ve seen something to the contrary, I have had this done at the computer shop where I bought the PC (an earlier Windows 10 update bricked this computer).
I will run the driver verifier when I get some time and report back. An earlier attempt at running it caused this:
Stop code: DRIVER_VERIFIER_DETECTED_VIOLATION
What failed: avgntflt.sys
I understand this is an Avira file. I have removed it before, then reinstalled.
Things may have changed since I ran driver verifier in December—I will come back when I have more.
-
Anonymous
2018-01-16T22:33:02+00:00 Hi Sumit, here is the dump file from the driver verifier. The PC actually crashed twice on start-up after verifier was turned on, but only one dump file from that time can be found. (However, there are six dump files from today alone, which gives you an idea of the frequency of BSODs since the fall update. I am happy to supply all six if required.)
In case this helps, Sumit, here is what Windbg reveals. I have never heard of Mozy Change Monitor Filter Driver and don’t know what it would have come with.
Microsoft (R) Windows Debugger Version 10.0.16299.15 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\011618-9765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 16299 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff801
98815000 PsLoadedModuleList = 0xfffff80198b7bfd0Debug session time: Tue Jan 16 22:17:59.913 2018 (UTC + 0:00)
System Uptime: 0 days 0:00:02.645
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
.......
Loading User Symbols
Loading unloaded module list
.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {2000, fffff80b80a42252, 0, 726c5346}
*** WARNING: Unable to verify timestamp for MOBK.sys
*** ERROR: Module load completed but symbols could not be loaded for MOBK.sys
Probably caused by : MOBK.sys ( MOBK+12252 )
Followup: MachineOwner
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000002000, Code Integrity Issue: The caller specified an executable pool type. (Expected: NonPagedPoolNx)
Arg2: fffff80b80a42252, The address in the driver's code where the error was detected.
Arg3: 0000000000000000, Pool Type.
Arg4: 00000000726c5346, Pool Tag (if provided).
Debugging Details:
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.16299.192 (WinBuild.160101.0800)
DUMP_TYPE: 2
BUGCHECK_P1: 2000
BUGCHECK_P2: fffff80b80a42252
BUGCHECK_P3: 0
BUGCHECK_P4: 726c5346
BUGCHECK_STR: 0xc4_2000
CPU_COUNT: 4
CPU_MHZ: cdd
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: GLADIATOR
ANALYSIS_SESSION_TIME: 01-16-2018 22:34:36.0934
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
LAST_CONTROL_TRANSFER: from fffff80198fbf2d3 to fffff8019898a6e0
STACK_TEXT:
ffffc089
2ca05f88 fffff80198fbf2d3 : 00000000000000c4 0000000000002000 fffff80b80a42252 0000000000000000 : nt!KeBugCheckExffffc089
2ca05f90 fffff80198a8910f : fffff80198b6ba7c 0000000000002000 fffff80b80a42252 0000000000000000 : nt!VerifierBugCheckIfAppropriate+0xdfffffc089
2ca05fd0 fffff80198fb740c : 00000000726c5346 fffff80198b6ba7c fffff80b80a42252 fffff80198a2bd1e : nt!VfReportIssueWithOptions+0x103ffffc089
2ca06020 fffff80198fcda7a : 0000000000000000 0000000000000001 0000000000000460 ffffc0892ca060c0 : nt!VfCheckPoolType+0x90ffffc089
2ca06060 fffff80b80a42252 : 0000000000000001 ffffc0892ca06a40 ffffaf87aa767ce0 0000000000000000 : nt!VerifierExInitializeNPagedLookasideList+0x5affffc089
2ca060e0 0000000000000001 : ffffc0892ca06a40 ffffaf87aa767ce0 0000000000000000 0000000000000460 : MOBK+0x12252ffffc089
2ca060e8 ffffc0892ca06a40 : ffffaf87aa767ce0 0000000000000000 0000000000000460 00000000726c5346 : 0x1ffffc089
2ca060f0 ffffaf87aa767ce0 : 0000000000000000 0000000000000460 00000000726c5346 0000000000000064 : 0xffffc089`2ca06a40ffffc089
2ca060f8 0000000000000000 : 0000000000000460 00000000726c5346 0000000000000064 0000000000000000 : 0xffffaf87`aa767ce0THREAD_SHA1_HASH_MOD_FUNC: 4af57eff14eb5f6ed77f2a21c16c6886750edd88
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8f533416cdd906c8ba031562452fe0cb710b2d56
THREAD_SHA1_HASH_MOD: 40d8abd062b06340b37b690972941c25cdbae66b
FOLLOWUP_IP:
MOBK+12252
fffff80b`80a42252 4c8d442440 lea r8,[rsp+40h]
FAULT_INSTR_CODE: 24448d4c
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: MOBK+12252
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: MOBK
IMAGE_NAME: MOBK.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b3d69e7
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12252
FAILURE_BUCKET_ID: 0xc4_2000_VRF_MOBK!unknown_function
BUCKET_ID: 0xc4_2000_VRF_MOBK!unknown_function
PRIMARY_PROBLEM_CLASS: 0xc4_2000_VRF_MOBK!unknown_function
TARGET_TIME: 2018-01-16T22:17:59.000Z
OSBUILD: 16299
OSSERVICEPACK: 192
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-01-01 11:07:05
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.16299.192
ANALYSIS_SESSION_ELAPSED_TIME: 10ba
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc4_2000_vrf_mobk!unknown_function
FAILURE_ID_HASH: {2b8fe052-f36b-2dfc-2f57-77a628de46d8}
Followup: MachineOwner
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000002000, Code Integrity Issue: The caller specified an executable pool type. (Expected: NonPagedPoolNx)
Arg2: fffff80b80a42252, The address in the driver's code where the error was detected.
Arg3: 0000000000000000, Pool Type.
Arg4: 00000000726c5346, Pool Tag (if provided).
Debugging Details:
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.16299.192 (WinBuild.160101.0800)
DUMP_TYPE: 2
BUGCHECK_P1: 2000
BUGCHECK_P2: fffff80b80a42252
BUGCHECK_P3: 0
BUGCHECK_P4: 726c5346
BUGCHECK_STR: 0xc4_2000
CPU_COUNT: 4
CPU_MHZ: cdd
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: GLADIATOR
ANALYSIS_SESSION_TIME: 01-16-2018 22:34:41.0220
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
LAST_CONTROL_TRANSFER: from fffff80198fbf2d3 to fffff8019898a6e0
STACK_TEXT:
ffffc089
2ca05f88 fffff80198fbf2d3 : 00000000000000c4 0000000000002000 fffff80b80a42252 0000000000000000 : nt!KeBugCheckExffffc089
2ca05f90 fffff80198a8910f : fffff80198b6ba7c 0000000000002000 fffff80b80a42252 0000000000000000 : nt!VerifierBugCheckIfAppropriate+0xdfffffc089
2ca05fd0 fffff80198fb740c : 00000000726c5346 fffff80198b6ba7c fffff80b80a42252 fffff80198a2bd1e : nt!VfReportIssueWithOptions+0x103ffffc089
2ca06020 fffff80198fcda7a : 0000000000000000 0000000000000001 0000000000000460 ffffc0892ca060c0 : nt!VfCheckPoolType+0x90ffffc089
2ca06060 fffff80b80a42252 : 0000000000000001 ffffc0892ca06a40 ffffaf87aa767ce0 0000000000000000 : nt!VerifierExInitializeNPagedLookasideList+0x5affffc089
2ca060e0 0000000000000001 : ffffc0892ca06a40 ffffaf87aa767ce0 0000000000000000 0000000000000460 : MOBK+0x12252ffffc089
2ca060e8 ffffc0892ca06a40 : ffffaf87aa767ce0 0000000000000000 0000000000000460 00000000726c5346 : 0x1ffffc089
2ca060f0 ffffaf87aa767ce0 : 0000000000000000 0000000000000460 00000000726c5346 0000000000000064 : 0xffffc089`2ca06a40ffffc089
2ca060f8 0000000000000000 : 0000000000000460 00000000726c5346 0000000000000064 0000000000000000 : 0xffffaf87`aa767ce0THREAD_SHA1_HASH_MOD_FUNC: 4af57eff14eb5f6ed77f2a21c16c6886750edd88
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8f533416cdd906c8ba031562452fe0cb710b2d56
THREAD_SHA1_HASH_MOD: 40d8abd062b06340b37b690972941c25cdbae66b
FOLLOWUP_IP:
MOBK+12252
fffff80b`80a42252 4c8d442440 lea r8,[rsp+40h]
FAULT_INSTR_CODE: 24448d4c
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: MOBK+12252
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: MOBK
IMAGE_NAME: MOBK.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b3d69e7
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12252
FAILURE_BUCKET_ID: 0xc4_2000_VRF_MOBK!unknown_function
BUCKET_ID: 0xc4_2000_VRF_MOBK!unknown_function
PRIMARY_PROBLEM_CLASS: 0xc4_2000_VRF_MOBK!unknown_function
TARGET_TIME: 2018-01-16T22:17:59.000Z
OSBUILD: 16299
OSSERVICEPACK: 192
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-01-01 11:07:05
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.16299.192
ANALYSIS_SESSION_ELAPSED_TIME: 11a4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc4_2000_vrf_mobk!unknown_function
FAILURE_ID_HASH: {2b8fe052-f36b-2dfc-2f57-77a628de46d8}
Followup: MachineOwner