![]() Some register values may be zeroed or incorrect. NOTE: The trap frame does not contain all registers. SYSTEM_MANUFACTURER: MICRO-STAR INTERNATIONAL CO., LTDīASEBOARD_MANUFACTURER: MICRO-STAR INTERNATIONAL CO., LTD If kernel debugger is available get stack backtrace.Īrg1: 000000000000000c, memory referencedĪrg3: 0000000000000000, value 0 = read operation, 1 = write operationĪrg4: fffff800361c46ba, address which referenced memoryīUILD_VERSION_STRING: _ltsb.151121-0600 This is usuallyĬaused by drivers using improper addresses. Interrupt request level (IRQL) that is too high. Probably caused by : wfplwfs.sys ( wfplwfs!L2802_3ParseMacHeader+6e )Īn attempt was made to access a pageable (or completely invalid) address at an *** ERROR: Module load completed but symbols could not be loaded for bwcW8圆4.sys *** WARNING: Unable to verify timestamp for bwcW8圆4.sys Use !analyze -v to get detailed debugging information. reload to track down problems loading symbols. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Product: WinNt, suite: TerminalServer SingleUserTS Personalīuilt by: _ltsb.151121-0600 Windows 8.1 Kernel Version 9600 MP (8 procs) Free 圆4 ![]() Mini Kernel Dump File: Only registers and stack trace are available Symantec is known for this type of problem Microsoft (R) Windows Debugger Version 6.567 AMD64Ĭopyright (c) Microsoft Corporation. If you continue to crash I would remove Symantec and use the built in defender in its place.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |