Oops! My apologies, I never noticed the DV crash dump was posted.
-- Edit, I also just read the driver that verifier detected in violation may have been/be a trojan, so if that has already been taken care of, ignore the Mionet recommendation.
Right, so it's of the
DRIVER_VERIFIER_DETECTED_VIOLATION (c4) bug check.
This is the general bug check code for fatal errors found by Driver Verifier.
Code:
0: kd> kv
Child-SP RetAddr : Args to Child : Call Site
fffff880`09f827c8 fffff800`03d504ec : 00000000`000000c4 00000000`00000040 00000000`00000000 fffff980`0a3d8c60 : nt!KeBugCheckEx
fffff880`09f827d0 fffff800`03d612bf : 00000000`00000002 fffffa80`069a03e8 00000000`00000000 fffff800`03d5e69b : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`09f82810 fffff880`03f57726 : fffffa80`0ad41bc0 fffff980`0a3d8c10 fffffa80`0a41c450 fffff880`09f828d8 : [COLOR=#4b0082]nt!VerifierKeAcquireSpinLockAtDpcLevel+0xa0[/COLOR]
fffff880`09f82870 fffffa80`0ad41bc0 : fffff980`0a3d8c10 fffffa80`0a41c450 fffff880`09f828d8 00000000`00000000 : [COLOR=#ff0000]ndisrd+0x2726[/COLOR]
fffff880`09f82878 fffff980`0a3d8c10 : fffffa80`0a41c450 fffff880`09f828d8 00000000`00000000 fffff880`03f58ba9 : 0xfffffa80`0ad41bc0
fffff880`09f82880 fffffa80`0a41c450 : fffff880`09f828d8 00000000`00000000 fffff880`03f58ba9 00000000`00010001 : 0xfffff980`0a3d8c10
fffff880`09f82888 fffff880`09f828d8 : 00000000`00000000 fffff880`03f58ba9 00000000`00010001 fffffa80`0ad41bc0 : 0xfffffa80`0a41c450
fffff880`09f82890 00000000`00000000 : fffff880`03f58ba9 00000000`00010001 fffffa80`0ad41bc0 00000000`00000000 : 0xfffff880`09f828d8
We can see that
ndisrd.sys (Mionet driver/WinpkFilter high performance packet filtering framework) called into
nt!VerifierKeAcquireSpinLockAtDpcLevel.
If a driver is running at IRQL <= APC_LEVEL, it should call
KeAcquireSpinLock to have IRQL raised by that routine.
KeAcquireSpinLockAtDpcLevel assumes the caller is already running at IRQL >= DISPATCH_LEVEL, so no raise is necessary. What appears (or is likely) ocurring here is
ndisrd.sys is holding a spin lock, but is also at the same time trying to call a routine(s) that hold(s) pageable data. Drivers themselves can call certain support routines that access pageable data if/and
only if their calls occur while executing at an IRQL strictly less than DISPATCH_LEVEL.
BugCheck C4, {
40, 0, fffff9800a3d8c60, 0}
^^ Our 1st parameter bug check = 0x40. 0x40 = Acquiring a spinlock at IRQL DISPATCH_LEVEL.
Overall, this is causing corruption and then you get your bugcheck. Verifier caught
ndisrd.sys doing this, and that's why it's mentioned.
1. Uninstall whatever software you have installed related to MioNet (if you do) -
MioNet| Your personal private network for PC remote access, webcam access software, backup, and file sharing
2. PROCESS_NAME:
NetSvcHelp.exe
^^ Asus Network Service Help (sometimes known as Asus Network iControl). I'd remove this ASAP. If you cannot find it standalone to uninstall, it's probably bundled with Asus' AI Suite which I see you have installed.
3. RTCore64.sys is listed and loaded which is the RivaTuner/EVGA Precision/MSI Afterburner driver (known to cause BSOD's). Uninstall ASAP, please.
Regards,
Patrick