The computer has rebooted from a bugcheck

Hello everyone,

I recently got this error after rebooting my laptop, just while getting into windows the pc freeze on the desktop and reboots himself.

I found a critical error kernel-power41 (63)

+ System
- Provider
[ Name] Microsoft-Windows-Kernel-Power
[ Guid] {331C3B3A-2005-44C2-AC5E-77220C37D6B4}
EventID 41
Version 3
Level 1
Task 63
Opcode 0
Keywords 0x8000000000000002
- TimeCreated
[ SystemTime] 2015-06-03T00:06:28.573505800Z
EventRecordID 5809
Correlation
- Execution
[ ProcessID] 4
[ ThreadID] 8
Channel System
Computer Eternity
- Security
[ UserID] S-1-5-18
- EventData
BugcheckCode 59
BugcheckParameter1 0xc0000005
BugcheckParameter2 0xfffff8007c397ed9
BugcheckParameter3 0xffffd00025d7e060
BugcheckParameter4 0x0
SleepInProgress 0
PowerButtonTimestamp 0
BootAppStatus

0


also, I found a related error reporting that the computer has rebooted from a bugcheck.  The bugcheck was: 0x0000003b (0x00000000c0000005, 0xfffff8007c397ed9, 0xffffd00025d7e060, 0x0000000000000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 060315-18593-01.

I am currently uploading the DMP file and will link it asap, if anyone can help I would really appreciate it.

edit:

Here's the link to the dump

https://onedrive.live.com/redir?resid=71CA32AA89F08595!1073&authkey=!AKOU3BxHGUxsOHc&ithint=file%2cDMP

  • Edited by Sh4sh 17 hours 31 minutes ago
June 3rd, 2015 9:16am

  We do need the actual log files (called a DMP files) as they contain the only record of the sequence of events leading up to the crash, what drivers were loaded, and what was responsible.  

Please follow our instructions for finding and uploading the files we need to help you fix your computer. They can be found here If you have any questions about the procedure please ask
Free Windows Admin Tool Kit Click here and download it now
June 3rd, 2015 9:47am

Here's the link to the dump

https://onedrive.live.com/redir?resid=71CA32AA89F08595!1073&authkey=!AKOU3BxHGUxsOHc&ithint=file%2cDMP

please let me know if you can access the link


  • Edited by Sh4sh 17 hours 37 minutes ago
June 3rd, 2015 9:47am

This was related to your nfc_driver.sys (Network Flow Control SDK WFP Driver (WPP), Titan ARC Corp.).  Completely remove the current driver and install the newest driver available

Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\zigza\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available

************************************************************
WARNING: Dump file has been truncated.  Data may be missing.
************************************************************

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*D:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*D:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17736.amd64fre.winblue_r9.150322-1500
Machine Name:
Kernel base = 0xfffff800`a100f000 PsLoadedModuleList = 0xfffff800`a12e8850
Debug session time: Tue Jun  2 20:05:55.500 2015 (UTC - 4:00)
System Uptime: 0 days 0:08:14.278
Loading Kernel Symbols
...............................................................
................................................................
.........Page 114b35 not present in the dump file. Type ".hh dbgerr004" for details
..........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7e8da018).  Type ".hh dbgerr001" for details
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8007c397ed9, ffffd00025d7e060, 0}

*** ERROR: Module load completed but symbols could not be loaded for NFC_Driver.sys
Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+59 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8007c397ed9, Address of the instruction which caused the bugcheck
Arg3: ffffd00025d7e060, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

FAULTING_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+59
fffff800`7c397ed9 488b7008        mov     rsi,qword ptr [rax+8]

CONTEXT:  ffffd00025d7e060 -- (.cxr 0xffffd00025d7e060;r)
rax=0000000000000000 rbx=ffffd00025d7ec18 rcx=ffffd00025d7eb30
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffe00172b41be0
rip=fffff8007c397ed9 rsp=ffffd00025d7ea90 rbp=0000000000000027
 r8=0000000000000000  r9=0000000000000000 r10=fffff8007c3ebb80
r11=ffffe00172b41be0 r12=0000000000000000 r13=ffffe00172ae9af0
r14=ffffe00172ae9af0 r15=ffffd00025d7ef88
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
NETIO!StreamInvokeCalloutAndNormalizeAction+0x59:
fffff800`7c397ed9 488b7008        mov     rsi,qword ptr [rax+8] ds:002b:00000000`00000008=????????????????
Last set context:
rax=0000000000000000 rbx=ffffd00025d7ec18 rcx=ffffd00025d7eb30
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffe00172b41be0
rip=fffff8007c397ed9 rsp=ffffd00025d7ea90 rbp=0000000000000027
 r8=0000000000000000  r9=0000000000000000 r10=fffff8007c3ebb80
r11=ffffe00172b41be0 r12=0000000000000000 r13=ffffe00172ae9af0
r14=ffffe00172ae9af0 r15=ffffd00025d7ef88
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
NETIO!StreamInvokeCalloutAndNormalizeAction+0x59:
fffff800`7c397ed9 488b7008        mov     rsi,qword ptr [rax+8] ds:002b:00000000`00000008=????????????????
Resetting default scope

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  AsusGameFirstS

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff8007c39798f to fffff8007c397ed9

STACK_TEXT:  
ffffd000`25d7ea90 fffff800`7c39798f : 00000000`00000000 ffffe001`72b41be0 ffffd000`25d7ec51 00000000`00000000 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x59
ffffd000`25d7eb60 fffff800`7c3a20c2 : ffffe001`74300014 fffff800`7d143e9c ffffd000`00000001 ffffe001`72bfd6f0 : NETIO!StreamProcessCallout+0x76f
ffffd000`25d7eca0 fffff800`7c388569 : ffffe001`7b030014 ffffe001`72bfd6f0 ffffe001`7b2f1c30 ffffd000`25d7f510 : NETIO!ProcessCallout+0x972
ffffd000`25d7ee10 fffff800`7c387270 : 00000000`00000000 ffffd000`25d7f110 ffffd000`25d7f568 ffffe001`7bcb7210 : NETIO!ArbitrateAndEnforce+0x2c9
ffffd000`25d7f010 fffff800`7c3d4f00 : ffffe001`7c17eda0 ffffd000`25d7f5a1 ffffe001`7598a400 fffff800`7c3ab179 : NETIO!KfdClassify+0x831
ffffd000`25d7f4d0 fffff800`7c3d4935 : 00000000`00000000 fffff800`a104c700 ffffd000`25d7f678 fffff800`7c26f350 : NETIO!StreamInternalClassify+0x110
ffffd000`25d7f5f0 fffff800`7c3d1a48 : 00000000`00000014 ffffe001`72b4c9c0 00000000`00000000 00000000`00000105 : NETIO!StreamInject+0x1fd
ffffd000`25d7f6c0 fffff800`7c6b5ad6 : ffffe001`72b4c9c0 00000000`00000105 00000000`00000000 ffffe001`7bd5a601 : NETIO!FwppStreamInject+0x138
ffffd000`25d7f750 fffff800`7d1416e4 : ffffd000`219e0000 ffffe001`7882ed00 ffffd000`219e0000 ffffe001`7883a8f0 : fwpkclnt!FwpsStreamInjectAsync0+0xfa
ffffd000`25d7f7b0 fffff800`7d142475 : ffffe001`00000000 ffffe001`7bd5a620 ffffd000`219e0000 00000000`00000000 : NFC_Driver+0x46e4
ffffd000`25d7f850 fffff800`7d1428c4 : ffffe001`7bcb7210 ffffd000`25d7f941 00000000`00000008 ffffe001`7bcb7210 : NFC_Driver+0x5475
ffffd000`25d7f880 fffff800`a13b1578 : 00000000`00000001 ffffe001`7b5d0f20 ffffe001`7b5d0f20 0000000c`001f0003 : NFC_Driver+0x58c4
ffffd000`25d7f8c0 fffff800`a13b24e2 : 00000000`00000001 00000000`00000001 ffffe001`00000000 ffffe001`7bcb7210 : nt!IopSynchronousServiceTail+0x170
ffffd000`25d7f990 fffff800`a116b4b3 : 00000000`00000102 00000000`000000c8 00000000`00000001 00000000`00f1f850 : nt!NtWriteFile+0x682
ffffd000`25d7fa90 00000000`77042352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00cfe988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77042352


FOLLOWUP_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+59
fffff800`7c397ed9 488b7008        mov     rsi,qword ptr [rax+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  NETIO!StreamInvokeCalloutAndNormalizeAction+59

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  546029c5

STACK_COMMAND:  .cxr 0xffffd00025d7e060 ; kb

BUCKET_ID_FUNC_OFFSET:  59

FAILURE_BUCKET_ID:  0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction

BUCKET_ID:  0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_netio!streaminvokecalloutandnormalizeaction

FAILURE_ID_HASH:  {5c8d1e60-d80c-cb2d-a65a-8d02e5eeeffd}

Followup: MachineOwner
---------


Free Windows Admin Tool Kit Click here and download it now
June 3rd, 2015 9:55am

Many thanks for the help and the quick response!

I will check this and post results :)

June 3rd, 2015 10:17am

Good Luck
Free Windows Admin Tool Kit Click here and download it now
June 3rd, 2015 10:21am

I found out this driver comes from the application ROG Game First III.

I couldn't care less about it so I fully removed the application. Now it's clean, I will update if I find anything else.

Again, many thanks for the help, you guys are great!

June 3rd, 2015 11:42am

Thanks for letting us know & happy to help (its why I volunteer here)  Good luck
Free Windows Admin Tool Kit Click here and download it now
June 3rd, 2015 11:48am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics