*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 000000000002001f, ID of the 'IrqlZwPassive' rule that was violated.
Arg2: fffff8083fbfc9d0, A pointer to the string describing the violated rule condition.
Arg3: 0000000000000000, Reserved (unused).
Arg4: 0000000000000000, Reserved (unused).
Debugging Details:
------------------
Page 21437c not present in the dump file. Type ".hh dbgerr004" for details
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 14393.693.amd64fre.rs1_release.161220-1747
SYSTEM_MANUFACTURER: LENOVO
SYSTEM_PRODUCT_NAME: 10HYCTO1WW
SYSTEM_SKU: LENOVO_MT_10HY_BU_LENOVO_FM_ThinkCentre M700
SYSTEM_VERSION: ThinkCentre M700
BIOS_VENDOR: LENOVO
BIOS_VERSION: FWKT5FA
BIOS_DATE: 11/08/2016
BASEBOARD_MANUFACTURER: LENOVO
BASEBOARD_PRODUCT: 30D2
BASEBOARD_VERSION: SDK0J40697 WIN 3305029749446
DUMP_TYPE: 1
BUGCHECK_P1: 2001f
BUGCHECK_P2: fffff8083fbfc9d0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
DV_VIOLATED_CONDITION: ZwClose should only be called at IRQL = PASSIVE_LEVEL.
DV_RULE_INFO: 0x2001F
BUGCHECK_STR: 0xc4_IrqlZwPassive_XDV
CPU_COUNT: 4
CPU_MHZ: 8a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 9E'00000000 (cache) 9E'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Procmon64.exe
CURRENT_IRQL: 1
ANALYSIS_SESSION_HOST: SHODAN
ANALYSIS_SESSION_TIME: 03-10-2017 11:23:01.0946
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
LAST_CONTROL_TRANSFER: from fffff8083fbf1f13 to fffff803623c76f0
STACK_TEXT:
ffffe780`97c38d18 fffff808`3fbf1f13 : 00000000`000000c4 00000000`0002001f fffff808`3fbfc9d0 00000000`00000000 : nt!KeBugCheckEx
ffffe780`97c38d20 fffff808`3fbe1505 : ffffffff`80001480 ffffe780`97c38ec0 ffffffff`80001480 ffffe780`97c38ec0 : VerifierExt!SLIC_abort+0x193
ffffe780`97c38d60 fffff808`3fbe152a : 00000000`00000010 00000000`00000082 ffffe780`97c38db8 00000000`00000000 : VerifierExt!ZwCreateKey_wrapper+0x75
ffffe780`97c38d90 fffff808`41977356 : 00000000`00000103 ffffe780`97c38ec0 ffffffff`80001480 ffffbb0b`da626fd8 : VerifierExt!ZwClose_wrapper+0x1a
ffffe780`97c38dc0 fffff808`419722f2 : ffff8801`bb582400 00000000`00000000 ffff8801`bbd935f8 ffffe780`954d1000 : PROCMON23+0x7356
ffffe780`97c39080 fffff808`41972fbf : ffff8801`00000002 00000000`0000057c ffff8801`bc9a7130 ffff8801`bb582400 : PROCMON23+0x22f2
ffffe780`97c390c0 fffff808`3f9210a3 : ffffe780`00000001 00000000`00000010 ffffd683`8c0926d0 00000000`00000000 : PROCMON23+0x2fbf
ffffe780`97c390f0 fffff808`3f90f560 : 00000000`00000000 ffffe780`97c39350 ffff8801`bb582400 ffff8801`bc9a7130 : FLTMGR!FltpvConnectionNotify+0x83
ffffe780`97c39150 fffff808`3f903475 : ffffbb0b`dba8cf70 00000000`00000000 00000000`00000004 ffff8801`00000007 : FLTMGR!FltpOpenClientPort+0x44c
ffffe780`97c39260 fffff808`3f9041f2 : ffffbb0b`dba8cea0 ffffe780`97c39350 ffff8801`b6fec260 ffff8801`bc91ef40 : FLTMGR!FltpMsgDispatch+0x175
ffffe780`97c392d0 fffff803`6297dd26 : ffffbb0b`dba8ce00 ffff8801`b6fec260 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x482
ffffe780`97c39380 fffff803`622e9272 : 00000000`00000025 ffffe780`97c396d0 ffff8801`b6fec260 ffff8801`bc91ef40 : nt!IovCallDriver+0x252
ffffe780`97c393c0 fffff803`626feb94 : 00000000`00000025 ffffe780`97c396d0 ffff8801`b6fec260 00000000`00000001 : nt!IofCallDriver+0x72
ffffe780`97c39400 fffff803`62750022 : fffff803`626fe1d0 fffff803`626fe1d0 ffffe780`00000002 ffff8801`b6fec230 : nt!IopParseDevice+0x9c4
ffffe780`97c395d0 fffff803`62702cdd : ffff8801`bbf19b01 ffffe780`97c39830 00000000`00000040 ffff8801`b54d56e0 : nt!ObpLookupObjectName+0x8b2
ffffe780`97c397a0 fffff803`626e5ae9 : 00000000`00000001 ffff8801`bc8c22d8 00000043`f3cff050 00000000`00000028 : nt!ObOpenObjectByNameEx+0x1dd
ffffe780`97c398e0 fffff803`626e56f9 : 00000043`f3cff020 ffffd683`8c01a9f0 00000043`f3cff050 00000043`f3cff090 : nt!IopCreateFile+0x3d9
ffffe780`97c39980 fffff803`623d2393 : ffff8743`9ffed760 ffff8743`a1cfff68 ffff8743`a1d0e7f8 ffffc02c`26948447 : nt!NtCreateFile+0x79
ffffe780`97c39a10 00007ffb`62f86b74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000043`f3cfeeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`62f86b74
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 56ea485fb9b85cfae89c725908902253570559a5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1ccba113cf65a8f12042ddbc5e2b15553fc66c40
THREAD_SHA1_HASH_MOD: 72510b3f4d8a46ba20ecf271f08bd1b227805646
FOLLOWUP_IP:
PROCMON23+7356
fffff808`41977356 85db test ebx,ebx
FAULT_INSTR_CODE: 7578db85
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: PROCMON23+7356
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: PROCMON23
IMAGE_NAME: PROCMON23.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5898d66f
BUCKET_ID_FUNC_OFFSET: 7356
FAILURE_BUCKET_ID: 0xc4_IrqlZwPassive_XDV_VRF_PROCMON23!Unknown_Function
BUCKET_ID: 0xc4_IrqlZwPassive_XDV_VRF_PROCMON23!Unknown_Function
PRIMARY_PROBLEM_CLASS: 0xc4_IrqlZwPassive_XDV_VRF_PROCMON23!Unknown_Function
TARGET_TIME: 2017-03-09T22:48:23.000Z
OSBUILD: 14393
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-12-21 17:50:57
BUILDDATESTAMP_STR: 161220-1747
BUILDLAB_STR: rs1_release
BUILDOSVER_STR: 10.0.14393.693.amd64fre.rs1_release.161220-1747