AF
These were Related to NETwew00.sys Intel Wireless WiFi Link Driver from Intel Corporation. I would remove the current driver and install the newest driver available. If you continue to crash I would also remove Kaspersky
Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ken\Desktop\092914-52890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*C:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: srv*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17238.amd64fre.winblue_gdr.140723-2018
Machine Name:
Kernel base = 0xfffff802`67c05000 PsLoadedModuleList = 0xfffff802`67ecf350
Debug session time: Mon Sep 29 13:06:35.113 2014 (UTC - 4:00)
System Uptime: 0 days 4:06:06.913
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {2, ffffd000263d8610, ffffd000263d8568, 0}
*** WARNING: Unable to verify timestamp for NETwew00.sys
*** ERROR: Module load completed but symbols could not be loaded for NETwew00.sys
Probably caused by : NETwew00.sys ( NETwew00+e3ad )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffd000263d8610, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000263d8568, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
TRAP_FRAME: ffffd000263d8610 -- (.trap 0xffffd000263d8610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=00000001808958b2 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800922fc3ad rsp=ffffd000263d87a8 rbp=ffffd001a6c6e0a4
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffffd000263d87f4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
NETwew00+0xe3ad:
fffff800`922fc3ad ?? ???
Resetting default scope
EXCEPTION_RECORD: ffffd000263d8568 -- (.exr 0xffffd000263d8568)
ExceptionAddress: fffff800922fc3ad (NETwew00+0x000000000000e3ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_PARAMETER1: 0000000000000002
DEFAULT_BUCKET_ID: STACK_COOKIE_CHECK_FAILURE
ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
LAST_CONTROL_TRANSFER: from fffff80267d647e9 to fffff80267d58ca0
STACK_TEXT:
ffffd000`263d82e8 fffff802`67d647e9 : 00000000`00000139 00000000`00000002 ffffd000`263d8610 ffffd000`263d8568 : nt!KeBugCheckEx
ffffd000`263d82f0 fffff802`67d64b10 : ffffe001`f0b122b8 ffffd000`263d84c0 ffffe001`ec1201a0 ffffe001`ebfeb3f8 : nt!KiBugCheckDispatch+0x69
ffffd000`263d8430 fffff802`67d63d34 : ffffe001`f0e78810 00000000`00000000 00000000`00000000 fffff800`8fb2b3f0 : nt!KiFastFailDispatch+0xd0
ffffd000`263d8610 fffff800`922fc3ad : fffff800`923fba39 ffffe001`f0e78800 ffffd000`263d8880 ffffe001`f0e5c160 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`263d87a8 fffff800`923fba39 : ffffe001`f0e78800 ffffd000`263d8880 ffffe001`f0e5c160 ffffd000`263d8849 : NETwew00+0xe3ad
ffffd000`263d87b0 ffffe001`f0e78800 : ffffd000`263d8880 ffffe001`f0e5c160 ffffd000`263d8849 ffffe001`f0b69710 : NETwew00+0x10da39
ffffd000`263d87b8 ffffd000`263d8880 : ffffe001`f0e5c160 ffffd000`263d8849 ffffe001`f0b69710 fffff800`924a8c00 : 0xffffe001`f0e78800
ffffd000`263d87c0 ffffe001`f0e5c160 : ffffd000`263d8849 ffffe001`f0b69710 fffff800`924a8c00 00000000`00000000 : 0xffffd000`263d8880
ffffd000`263d87c8 ffffd000`263d8849 : ffffe001`f0b69710 fffff800`924a8c00 00000000`00000000 00000000`00000000 : 0xffffe001`f0e5c160
ffffd000`263d87d0 ffffe001`f0b69710 : fffff800`924a8c00 00000000`00000000 00000000`00000000 45545445`00000043 : 0xffffd000`263d8849
ffffd000`263d87d8 fffff800`924a8c00 : 00000000`00000000 00000000`00000000 45545445`00000043 00000000`00004550 : 0xffffe001`f0b69710
ffffd000`263d87e0 00000000`00000000 : 00000000`00000000 45545445`00000043 00000000`00004550 00000000`00000000 : NETwew00+0x1bac00
STACK_COMMAND: kb
FOLLOWUP_IP:
NETwew00+e3ad
fffff800`922fc3ad ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETwew00+e3ad
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETwew00
IMAGE_NAME: NETwew00.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 51c9f0ae
FAILURE_BUCKET_ID: 0x139_2_NETwew00+e3ad
BUCKET_ID: 0x139_2_NETwew00+e3ad
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_2_netwew00+e3ad
FAILURE_ID_HASH: {3a8bcebc-b629-57de-3ff9-020d5f3d499f}
Followup: MachineOwner
---------