System_Thread_Exception_not_handled - Windows 10 x64 BSOD

Update:
Juniper software (Downloads)
Kaspersky (check in this program if there is a newer version and upload it)
Windows 10 to version 1809
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\041919-18718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*
Symbol search path is: SRV*
Executable search path is:
Windows 10 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff802`52ea8000 PsLoadedModuleList = 0xfffff802`532552b0
Debug session time: Fri Apr 19 18:47:05.683 2019 (UTC + 2:00)
System Uptime: 5 days 21:05:23.503
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000002, fffff80252f774f8, ffffec0042580060, ffffec0042580100}

*** WARNING: Unable to verify timestamp for jnprns.sys
*** ERROR: Module load completed but symbols could not be loaded for jnprns.sys
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : jnprns.sys ( jnprns+12217 )

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000002, The exception code that was not handled
Arg2: fffff80252f774f8, The address that the exception occurred at
Arg3: ffffec0042580060, Exception Record Address
Arg4: ffffec0042580100, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  C5E15ES#AB8

SYSTEM_VERSION:  A1009002

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.67

BIOS_DATE:  05/30/2018

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.21

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000002

BUGCHECK_P2: fffff80252f774f8

BUGCHECK_P3: ffffec0042580060

BUGCHECK_P4: ffffec0042580100

EXCEPTION_CODE: (NTSTATUS) 0xc0000002 - {Not Implemented}  The requested operation is not implemented.

FAULTING_IP:
nt!RtlRaiseStatus+18
fffff802`52f774f8 488b8424b8010000 mov     rax,qword ptr [rsp+1B8h]

EXCEPTION_RECORD:  ffffec0042580060 -- (.exr 0xffffec0042580060)
ExceptionAddress: fffff80252f774f8 (nt!RtlRaiseStatus+0x0000000000000018)
   ExceptionCode: c0000002
  ExceptionFlags: 00000001
NumberParameters: 0

CONTEXT:  ffffec0042580100 -- (.cxr 0xffffec0042580100)
rax=0000000000000001 rbx=00000000c0000002 rcx=ffff958a00000000
rdx=ffffec0042580450 rsi=ffff958af8c83c28 rdi=ffffec0042580670
rip=fffff80252f774f8 rsp=ffffec0042580040 rbp=0000000000000000
 r8=0000000000000002  r9=0000000000000000 r10=ffffec0042580640
r11=ffffec0042580299 r12=0000000000000000 r13=ffff958af78934c0
r14=0000000000000003 r15=ffff958af78934d0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000282
nt!RtlRaiseStatus+0x18:
fffff802`52f774f8 488b8424b8010000 mov     rax,qword ptr [rsp+1B8h] ss:0018:ffffec00`425801f8=fffff80252f774f8
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: 893

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 20'00000000 (cache) 20'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000002 - {Not Implemented}  The requested operation is not implemented.

EXCEPTION_CODE_STR:  c0000002

ANALYSIS_SESSION_HOST:  MICHAL

ANALYSIS_SESSION_TIME:  04-19-2019 21:46:04.0334

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80253162ede to fffff80252f774f8

STACK_TEXT: 
ffffec00`42580040 fffff802`53162ede : ffff958a`f8c83c28 ffff958a`f8c83c28 ffff958a`f8c83ee0 00000000`00000000 : nt!RtlRaiseStatus+0x18
ffffec00`425805e0 fffff804`ca042217 : ffff958a`fbb415a0 00000000`00000000 00000000`00000002 fffff804`ca0555ac : nt!purecall+0xe
ffffec00`42580610 ffff958a`fbb415a0 : 00000000`00000000 00000000`00000002 fffff804`ca0555ac ffff958a`f8c83ad0 : jnprns+0x12217
ffffec00`42580618 00000000`00000000 : 00000000`00000002 fffff804`ca0555ac ffff958a`f8c83ad0 fffff804`ca04594a : 0xffff958a`fbb415a0


THREAD_SHA1_HASH_MOD_FUNC:  8de8c45802aa0609de5ec804c07bdc3de177e3d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  8d19daae8c42de5bb0fd71b81775fd30f040bbf0

THREAD_SHA1_HASH_MOD:  faf7af3820cc9fce2e1aeadf1605e542dab8e671

FOLLOWUP_IP:
jnprns+12217
fffff804`ca042217 ??              ???

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  jnprns+12217

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: jnprns

IMAGE_NAME:  jnprns.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5452859c

STACK_COMMAND:  .cxr 0xffffec0042580100 ; kb

BUCKET_ID_FUNC_OFFSET:  12217

FAILURE_BUCKET_ID:  AV_jnprns!unknown_function

BUCKET_ID:  AV_jnprns!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_jnprns!unknown_function

TARGET_TIME:  2019-04-19T16:47:05.000Z

OSBUILD:  17134

OSSERVICEPACK:  706

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-04-02 09:50:10

BUILDDATESTAMP_STR:  180410-1804

BUILDLAB_STR:  rs4_release

BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME:  3fcd

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_jnprns!unknown_function

FAILURE_ID_HASH:  {9ed7adcf-c04d-7954-5a67-be64dfa4fc67}

Followup:     MachineOwner
---------

0: kd> lmvm jnprns
Browse full module list
start             end                 module name
fffff804`ca030000 fffff804`ca0b6000   jnprns   T (no symbols)           
    Loaded symbol image file: jnprns.sys
    Image path: \SystemRoot\system32\DRIVERS\jnprns.sys
    Image name: jnprns.sys
    Browse all global symbols  functions  data
    Timestamp:        Thu Oct 30 10:38:20 2014 (5452859C)
    CheckSum:         00084241
    ImageSize:        00086000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
0: kd> .load pde
=========================================================================================
 PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
0: kd> !dpx
Start memory scan  : 0xffffec004257f868 ($csp)
End memory scan    : 0xffffec0042581000 (Kernel Stack Base)

               rsp : 0xffffec004257f868 : 0xfffff80253069456 : nt!PspSystemThreadStartup$filt$0+0x44
               r14 : 0xffffec004257f9f0 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec004257f868 : 0xfffff80253069456 : nt!PspSystemThreadStartup$filt$0+0x44
0xffffec004257f880 : 0xfffff80252f774f8 : nt!RtlRaiseStatus+0x18
0xffffec004257f8a8 : 0xfffff8025302ed5f : nt!_C_specific_handler+0x9f
0xffffec004257f8d8 : 0xfffff804c82095dd : FLTMGR!FltpGetStreamListCtrl+0x4d
0xffffec004257f8f8 : 0xfffff802532a5eb4 : "nt!Ports <PERF> (nt+0x3fdeb4)"
0xffffec004257f900 : 0xfffff802532a5eb4 : "nt!Ports <PERF> (nt+0x3fdeb4)"
0xffffec004257f908 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec004257f918 : 0xfffff8025305a94d : nt!RtlpExecuteHandlerForException+0xd
0xffffec004257f940 : 0xffffec004257f9f0 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec004257f948 : 0xfffff80252f66b16 : nt!RtlDispatchException+0x416
0xffffec004257f998 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257f9f0 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec004257f9f8 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257fa00 : 0xfffff802532a5eb4 : "nt!Ports <PERF> (nt+0x3fdeb4)"
0xffffec004257fa20 : 0xfffff8025302ecc0 : nt!_C_specific_handler
Unable to load image \SystemRoot\system32\DRIVERS\klif.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for klif.sys
*** ERROR: Module load completed but symbols could not be loaded for klif.sys
0xffffec004257faf8 : 0xffffec004257fb38 : 0xfffff80253059516 : nt!KiStartSystemThread+0x16
0xffffec004257fb20 : 0xfffff804c8228060 : FLTMGR!WPP_GLOBAL_Control
0xffffec004257fb38 : 0xfffff80253059516 : nt!KiStartSystemThread+0x16
0xffffec004257fb68 : 0xfffff804ca14a870 : Ntfs!NtfsExtendedCompleteRequestInternal+0x140
0xffffec004257fba8 : 0xfffff804c9515dec : tcpip!OlmUploadConnections+0x30c
0xffffec004257fc28 : 0xfffff804c82073c6 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x316
0xffffec004257fce8 : 0xffffec004257ff08 : 0xffffec00425800b8 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec004257fd48 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec004257fd60 : 0xfffff80253276080 : nt!MiSystemPartition
0xffffec004257fda8 : 0xfffff80252f3c757 : nt!ExAcquirePushLockSharedEx+0xe7
0xffffec004257fde8 : 0xfffff804c8209aa3 : FLTMGR!GetContextFromStreamList+0x163
0xffffec004257fe40 : 0xfffff804c8e66060 : Wof!Providers
0xffffec004257fe68 : 0xfffff80252eb5606 : nt!ExReleaseFastMutexUnsafe+0x26
0xffffec004257fe90 : 0xffffec004257ff28 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257fe98 : 0xfffff804c8e6d26c : Wof!WofPostCleanupCallback+0x15c
0xffffec004257fea0 : 0xffffec004257ff28 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257fed8 : 0xfffff804c8205d63 : FLTMGR!FltpPerformPostCallbacks+0x383
0xffffec004257ff08 : 0xffffec00425800b8 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec004257ff18 : 0xfffff80253162ed0 : nt!purecall
*** WARNING: Unable to verify timestamp for jnprns.sys
*** ERROR: Module load completed but symbols could not be loaded for jnprns.sys
0xffffec004257ff28 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257ff30 : 0xfffff802532be940 : "nt!Ports <PERF> (nt+0x416940)"
0xffffec004257ff38 : 0xfffff804ca030000 : jnprns
0xffffec004257ff48 : 0xfffff804ca030000 : jnprns
0xffffec004257ff58 : 0xfffff804ca030000 : jnprns
0xffffec004257ff68 : 0xfffff804ca030000 : jnprns
0xffffec004257ff78 : 0xfffff804ca030000 : jnprns
0xffffec004257ff88 : 0xfffff804ca030000 : jnprns
0xffffec004257ff98 : 0xfffff804ca030000 : jnprns
0xffffec004257ffa8 : 0xfffff804c9200000 : "ndis!ndisDataPathExpandStackCallback <PERF> (ndis+0x0)"
0xffffec004257ffb0 : 0xfffff804c92a2498 : "ndis!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (ndis+0xa2498)"
0xffffec004257ffb8 : 0xfffff804c9200000 : "ndis!ndisDataPathExpandStackCallback <PERF> (ndis+0x0)"
0xffffec004257ffc0 : 0xfffff804c92a6218 : "ndis!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (ndis+0xa6218)"
0xffffec004257ffc8 : 0xfffff804c9200000 : "ndis!ndisDataPathExpandStackCallback <PERF> (ndis+0x0)"
0xffffec004257ffd0 : 0xfffff804c92a248c : "ndis!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (ndis+0xa248c)"
0xffffec004257ffd8 : 0xfffff804c9200000 : "ndis!ndisDataPathExpandStackCallback <PERF> (ndis+0x0)"
0xffffec004257ffe0 : 0xfffff804c92a2bf4 : "ndis!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (ndis+0xa2bf4)"
0xffffec0042580038 : 0xfffff80252f7752e : nt!RtlRaiseStatus+0x4e
0xffffec0042580048 : 0xfffff80252f43d28 : nt!IopfCompleteRequest+0x718
0xffffec0042580070 : 0xfffff80252f774f8 : nt!RtlRaiseStatus+0x18
0xffffec00425800a8 : 0xfffff80252f3aecd : nt!ExReleaseResourceLite+0xdd
0xffffec00425800b8 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec0042580148 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec0042580168 : 0xfffff80252f435f7 : nt!IofCompleteRequest+0x17
0xffffec00425801f8 : 0xfffff80252f774f8 : nt!RtlRaiseStatus+0x18
0xffffec0042580228 : 0xfffff804ca14a870 : Ntfs!NtfsExtendedCompleteRequestInternal+0x140
0xffffec0042580268 : 0xfffff804c9515dec : tcpip!OlmUploadConnections+0x30c
0xffffec00425802c8 : 0xfffff80253059175 : nt!SwapContext+0x165
0xffffec00425803a0 : 0xfffff8025328a9c0 : nt!NonPagedPoolDescriptor
0xffffec00425803a8 : 0xfffff8025319236d : nt!ExDeferredFreePool+0x33d
0xffffec00425803e8 : 0xfffff8025328a9c8 : nt!NonPagedPoolDescriptor+0x8
0xffffec0042580410 : 0xfffff8025328a9c0 : nt!NonPagedPoolDescriptor
0xffffec0042580438 : 0xfffff80253193867 : nt!ExFreePoolWithTag+0x807
0xffffec0042580458 : 0xfffff80252f447cb : nt!KeSetEvent+0xab
0xffffec0042580468 : 0xfffff80252ed8d8c : nt!KiCancelTimer+0x19c
0xffffec0042580518 : 0xfffff804c92212b5 : ndis!NdisFreeMemory+0x15
0xffffec00425805d8 : 0xfffff80253162ede : nt!purecall+0xe
0xffffec00425806b8 : 0xfffff804c92be28a : ndis!Ndis::BindRules::UnbindIncompatibleDriversForMacChange+0x1da
0xffffec00425806c8 : 0xfffff804c92be28a : ndis!Ndis::BindRules::UnbindIncompatibleDriversForMacChange+0x1da
0xffffec00425806d8 : 0xfffff804c9208cea : ndis!NdisResetEvent+0xa
0xffffec00425807b8 : 0xfffff804c92b89c8 : ndis!NdisWatchdogState::NdisWatchdogState+0xdc
0xffffec00425807e8 : 0xfffff804c92af492 : ndis!ndisArmWatchdog+0x122
0xffffec0042580818 : 0xfffff804c92b3074 : ndis!ndisFInvokePause+0x54
0xffffec0042580858 : 0xfffff804c93029d7 : ndis!ndisPauseFilterInner+0x10f
0xffffec00425808a8 : 0xfffff802533b26ee : nt!MmLockPagableSectionByHandle+0xe
0xffffec0042580908 : 0xfffff804c92b2fba : ndis!ndisPauseFilter+0x6e
0xffffec0042580948 : 0xfffff804c92bc8bc : ndis!Ndis::BindEngine::Iterate+0x5d0
0xffffec0042580970 : 0xfffff80253311400 : nt!KiInitialThread
0xffffec0042580998 : 0xfffff80252f3f3f8 : nt!KiSwapThread+0x318
0xffffec0042580a18 : 0xfffff802533a5dc5 : nt!ObpFreeObject+0x195
0xffffec0042580aa0 : 0xfffff8025330f240 : nt!ExNode0
0xffffec0042580ac0 : 0xfffff804c92ca600 : "ndis!KWorkItemBase<Ndis::BindEngine,KWorkItem<Ndis::BindEngine> >::CallbackThunk"
0xffffec0042580ac8 : 0xfffff804c92bc263 : ndis!Ndis::BindEngine::UpdateBindings+0x7b
0xffffec0042580af8 : 0xfffff804c92bbf24 : ndis!Ndis::BindEngine::UpdateBindingsWorkItem+0x44
0xffffec0042580b08 : 0xfffff804c92ca600 : "ndis!KWorkItemBase<Ndis::BindEngine,KWorkItem<Ndis::BindEngine> >::CallbackThunk"
0xffffec0042580b48 : 0xfffff804c92ca612 : "ndis!KWorkItemBase<Ndis::BindEngine,KWorkItem<Ndis::BindEngine> >::CallbackThunk"+0x12
0xffffec0042580b58 : 0xfffff802532547c0 : nt!ObpRemoveObjectWorkItem
0xffffec0042580b68 : 0xfffff8025342c510 : nt!ObpProcessRemoveObjectQueue
0xffffec0042580b78 : 0xfffff80252f5db05 : nt!ExpWorkerThread+0xf5
0xffffec0042580b88 : 0xfffff8025342c500 : nt!MiCombinePageSortByHash+0x10
0xffffec0042580bb8 : 0xffff958af68451c0 : 0xffff958af68ad830 : 0xfffff80253276080 : nt!MiSystemPartition
0xffffec0042580bc8 : 0xfffff802533ec936 : nt!PspTerminateThreadByPointer+0x96
0xffffec0042580bd8 : 0xfffff8025335c707 : nt!PspDisablePrimaryTokenExchange+0x27
0xffffec0042580be8 : 0xfffff804c8228060 : FLTMGR!WPP_GLOBAL_Control
0xffffec0042580c00 : 0xfffff80252f5da10 : nt!ExpWorkerThread
0xffffec0042580c08 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec0042580c38 : 0xfffff80253164501 : nt!NtQueryInformationWorkerFactory+0x265
0xffffec0042580c58 : 0xfffff80253059516 : nt!KiStartSystemThread+0x16
0xffffec0042580c70 : 0xfffff80252fd8290 : nt!PspSystemThreadStartup

0: kd> lmvm klif
Browse full module list
start             end                 module name
fffff804`c9d80000 fffff804`c9e94000   klif     T (no symbols)           
    Loaded symbol image file: klif.sys
    Image path: \SystemRoot\system32\DRIVERS\klif.sys
    Image name: klif.sys
    Browse all global symbols  functions  data
    Timestamp:        Mon Oct 15 00:26:47 2018 (5BC44137)
    CheckSum:         0011B736
    ImageSize:        00114000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
 
I'm not on my personal computer at moment, so I won't be able to read the dump files, but could you please confirm that you have removed or updated the drivers in the above post?
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top