Darn, lost my reply which was in a lot of detail …
Thank you for patience on this. Now, let me see if I can recall what I wrote …
DV didn’t work for me, unfortunately. On rebooting, Windows would stay on for mere seconds before the BSODs came. The error was:
Stop code: DRIVER_VERIFIER_DETECTED_VIOLATION
What failed: avgntflt.sys
There were three dump files but I could never work fast enough to copy them or to archive them.
After a system restore, only one dump file remained.
I’m not au fait with what symbols mean, but they are missing from this output as well. I’ve created a ZIP file of the remaining dump file and the Windbg result is below. I’ve also run Sysnative again (I know it hasn’t been 24 hours yet).
I had better send this first and attach the files afterwards as I’m worried I’ll lose this message after ‘More Reply Options’.
Microsoft ® Windows Debugger Version 10.0.16299.15 AMD64
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\121317-5437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 16299 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff802`1d083000 PsLoadedModuleList = 0xfffff802`1d3e4ff0
Debug session time: Wed Dec 13 08:08:40.143 2017 (UTC + 0:00)
System Uptime: 0 days 0:00:34.873
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {e4, fffff80517e8f940, fffff40a9252c550, 0}
*** WARNING: Unable to verify timestamp for avgntflt.sys
*** ERROR: Module load completed but symbols could not be loaded for avgntflt.sys
Probably caused by : avgntflt.sys ( avgntflt+1f940 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 00000000000000e4, Kernel Zw API called with malformed UNICODE_STRING structure as parameter.
Arg2: fffff80517e8f940, Address inside the driver making the incorrect API call.
Arg3: fffff40a9252c550, Address of the incorrect UNICODE_STRING structure.
Arg4: 0000000000000000
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.16299.125 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1002
BIOS_DATE: 08/23/2011
BASEBOARD_MANUFACTURER: ASUSTeK Computer INC.
BASEBOARD_PRODUCT: P8H67-M LE
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: e4
BUGCHECK_P2: fffff80517e8f940
BUGCHECK_P3: fffff40a9252c550
BUGCHECK_P4: 0
BUGCHECK_STR: 0xc4_e4
FAULTING_IP:
avgntflt+1f940
fffff805`17e8f940 8bf0 mov esi,eax
FOLLOWUP_IP:
avgntflt+1f940
fffff805`17e8f940 8bf0 mov esi,eax
CPU_COUNT: 4
CPU_MHZ: cdd
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: avguard.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: GLADIATOR
ANALYSIS_SESSION_TIME: 12-13-2017 08:16:45.0931
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
STACK_TEXT:
fffff40a`9252c478 fffff802`1d82a2d3 : 00000000`000000c4 00000000`000000e4 fffff805`17e8f940 fffff40a`9252c550 : nt!KeBugCheckEx
fffff40a`9252c480 fffff802`1d844249 : fffff40a`9252c550 00000000`00000000 fffff805`17e8f940 fffffe8e`e2746ff0 : nt!VerifierBugCheckIfAppropriate+0xdf
fffff40a`9252c4c0 fffff802`1d843056 : fffff805`17e8f940 ffffffff`80002f18 fffff40a`9252c550 00000000`00000018 : nt!ViZwCheckUnicodeString+0x7d
fffff40a`9252c500 fffff805`17e8f940 : fffff40a`9252c610 fffff40a`9252c5b0 00000000`00000000 ffffa80c`421c3f90 : nt!VfZwQuerySymbolicLinkObject+0x36
fffff40a`9252c530 fffff40a`9252c610 : fffff40a`9252c5b0 00000000`00000000 ffffa80c`421c3f90 00000000`00010000 : avgntflt+0x1f940
fffff40a`9252c538 fffff40a`9252c5b0 : 00000000`00000000 ffffa80c`421c3f90 00000000`00010000 fffffe8e`e2746ff0 : 0xfffff40a`9252c610
fffff40a`9252c540 00000000`00000000 : ffffa80c`421c3f90 00000000`00010000 fffffe8e`e2746ff0 00000000`00000000 : 0xfffff40a`9252c5b0
THREAD_SHA1_HASH_MOD_FUNC: fd7dc5806bd5d6208d07925664ea305f53f4b7b5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0257ce16adda1aa35a2215d6dfc77d2ef3ab2299
THREAD_SHA1_HASH_MOD: b5a22253caa2b9d48baed56d35bf18ae97fca6d7
FAULT_INSTR_CODE: 43df08b
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: avgntflt+1f940
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: avgntflt
IMAGE_NAME: avgntflt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5a1d4d05
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1f940
FAILURE_BUCKET_ID: 0xc4_e4_VRF_avgntflt!unknown_function
BUCKET_ID: 0xc4_e4_VRF_avgntflt!unknown_function
PRIMARY_PROBLEM_CLASS: 0xc4_e4_VRF_avgntflt!unknown_function
TARGET_TIME: 2017-12-13T08:08:40.000Z
OSBUILD: 16299
OSSERVICEPACK: 125
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-12-07 21:55:32
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.16299.125
ANALYSIS_SESSION_ELAPSED_TIME: 17f4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc4_e4_vrf_avgntflt!unknown_function
FAILURE_ID_HASH: {ec770f2d-f5ed-d54b-4b12-e283685ebb98}
Followup: MachineOwner