Update:
Aten usb to serial bridge driver (check in Snappy Driver Download)
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\011817-25328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*
Symbol search path is: SRV*
Executable search path is:
Windows 10 Kernel Version 14393 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 14393.576.amd64fre.rs1_release_inmarket.161208-2252
Machine Name:
Kernel base = 0xfffff803`dae8d000 PsLoadedModuleList = 0xfffff803`db192060
Debug session time: Wed Jan 18 14:03:03.300 2017 (UTC + 2:00)
System Uptime: 1 days 19:18:16.017
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
............................
*** WARNING: Unable to verify timestamp for ser2at64.sys
*** ERROR: Module load completed but symbols could not be loaded for ser2at64.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff8084b4f810b, ffff8001d0ad4f08, ffff8001d0ad4730}
Probably caused by : ser2at64.sys ( ser2at64+810b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8084b4f810b, The address that the exception occurred at
Arg3: ffff8001d0ad4f08, Exception Record Address
Arg4: ffff8001d0ad4730, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 14393.576.amd64fre.rs1_release_inmarket.161208-2252
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP Pro 3400 Series MT
SYSTEM_SKU: LH128EA#AB9
BIOS_VENDOR: AMI
BIOS_VERSION: 7.16
BIOS_DATE: 03/23/2012
BASEBOARD_MANUFACTURER: Foxconn
BASEBOARD_PRODUCT: 2ABF
BASEBOARD_VERSION: 1.30
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8084b4f810b
BUGCHECK_P3: ffff8001d0ad4f08
BUGCHECK_P4: ffff8001d0ad4730
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
ser2at64+810b
fffff808`4b4f810b 4129825c010000 sub dword ptr [r10+15Ch],eax
EXCEPTION_RECORD: ffff8001d0ad4f08 -- (.exr 0xffff8001d0ad4f08)
ExceptionAddress: fffff8084b4f810b (ser2at64+0x000000000000810b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 000000000000015c
Attempt to write to address 000000000000015c
CONTEXT: ffff8001d0ad4730 -- (.cxr 0xffff8001d0ad4730)
rax=0000000000000009 rbx=ffffcc864186fe40 rcx=0000000000000004
rdx=0000000000000010 rsi=ffffcc86425e9890 rdi=00003379be790358
rip=fffff8084b4f810b rsp=ffff8001d0ad5140 rbp=ffffcc86425e9960
r8=fffff8084b500fa0 r9=0000000000000004 r10=0000000000000000
r11=ffff8001d0ad5150 r12=ffffcc86418645b0 r13=0000000000000000
r14=ffff8001d0ad52b8 r15=00003379bda16888
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
ser2at64+0x810b:
fffff808`4b4f810b 4129825c010000 sub dword ptr [r10+15Ch],eax ds:002b:00000000`0000015c=????????
Resetting default scope
CPU_COUNT: 2
CPU_MHZ: a86
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
ser2at64+810b
fffff808`4b4f810b 4129825c010000 sub dword ptr [r10+15Ch],eax
BUGCHECK_STR: AV
WRITE_ADDRESS: fffff803db234338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000015c
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 000000000000015c
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 05-22-2019 15:46:04.0415
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
LAST_CONTROL_TRANSFER: from 00003379be790358 to fffff8084b4f810b
STACK_TEXT:
ffff8001`d0ad5140 00003379`be790358 : 00000000`00000000 00000000`00000001 00000000`00000004 ffffcc86`425e9770 : ser2at64+0x810b
ffff8001`d0ad5148 00000000`00000000 : 00000000`00000001 00000000`00000004 ffffcc86`425e9770 fffff808`481d0550 : 0x00003379`be790358
THREAD_SHA1_HASH_MOD_FUNC: 8c544ad4fe9b4fc6d2cd7d0e445d7afa72a523d1
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8979d2efda7cc29c9c8eecf3b0a668edff2272b4
THREAD_SHA1_HASH_MOD: 8c544ad4fe9b4fc6d2cd7d0e445d7afa72a523d1
FAULT_INSTR_CODE: 5c822941
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: ser2at64+810b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ser2at64
IMAGE_NAME: ser2at64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ad6e7c6
STACK_COMMAND: .cxr 0xffff8001d0ad4730 ; kb
BUCKET_ID_FUNC_OFFSET: 810b
FAILURE_BUCKET_ID: AV_ser2at64!unknown_function
BUCKET_ID: AV_ser2at64!unknown_function
PRIMARY_PROBLEM_CLASS: AV_ser2at64!unknown_function
TARGET_TIME: 2017-01-18T12:03:03.000Z
OSBUILD: 14393
OSSERVICEPACK: 576
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-12-09 10:23:02
BUILDDATESTAMP_STR: 161208-2252
BUILDLAB_STR: rs1_release_inmarket
BUILDOSVER_STR: 10.0.14393.576.amd64fre.rs1_release_inmarket.161208-2252
ANALYSIS_SESSION_ELAPSED_TIME: 991
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_ser2at64!unknown_function
FAILURE_ID_HASH: {728bb753-11fc-63ee-baf1-e1dcde7e693e}
Followup: MachineOwner
---------
0: kd> lmvm ser2at64
Browse full module list
start end module name
fffff808`4b4f0000 fffff808`4b510000 ser2at64 T (no symbols)
Loaded symbol image file: ser2at64.sys
Image path: ser2at64.sys
Image name: ser2at64.sys
Browse all global symbols functions data
Timestamp: Thu Oct 15 02:13:42 2009 (4AD6E7C6)
CheckSum: 000270B3
ImageSize: 00020000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
0: kd> .load pde
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
0: kd> !dpx
Start memory scan : 0xffff8001d0ad5140 ($csp)
End memory scan : 0xffff8001d0ad6000 (Kernel Stack Base)
r14 : 0xffff8001d0ad52b8 : 0xfffff808481e4600 : Wdf01000!WPP_PowerStateMachine_cpp_Traceguids
0xffff8001d0ad5168 : 0xfffff808481d0550 : Wdf01000!FxIoQueue::ProcessCancelledRequestsOnQueue+0x12c
0xffff8001d0ad5190 : 0xfffff808481e46c0 : Wdf01000!WPP_FxIoQueue_cpp_Traceguids
0xffff8001d0ad51f8 : 0xfffff808481dfe10 : Wdf01000!FxPowerIdleMachine::m_StateTable
0xffff8001d0ad5218 : 0xfffff808481e3290 : Wdf01000!FxPkgPnp::m_WdfPnpStates
0xffff8001d0ad5238 : 0xfffff8084814a386 : Wdf01000!FxIFR+0x156
0xffff8001d0ad5270 : 0xfffff808481e4610 : Wdf01000!WPP_PnpStateMachine_cpp_Traceguids
0xffff8001d0ad52a0 : 0xfffff808481e4600 : Wdf01000!WPP_PowerStateMachine_cpp_Traceguids
0xffff8001d0ad52a8 : 0xfffff8084815220c : Wdf01000!FxIoQueue::CancelForQueue+0xdc
0xffff8001d0ad52b8 : 0xfffff808481e4600 : Wdf01000!WPP_PowerStateMachine_cpp_Traceguids
0xffff8001d0ad5308 : 0xfffff8084815243c : Wdf01000!FxIoQueue::QueuePurge+0x1b8
0xffff8001d0ad5318 : 0xfffff808481e46c0 : Wdf01000!WPP_FxIoQueue_cpp_Traceguids
0xffff8001d0ad5330 : 0xfffff808481e46c0 : Wdf01000!WPP_FxIoQueue_cpp_Traceguids
0xffff8001d0ad5348 : 0xfffff8084814ccbf : Wdf01000!FxNonPagedObject::Lock+0x1f
0xffff8001d0ad53b8 : 0xfffff8084815cc48 : Wdf01000!FxPkgIo::StopProcessingForPower+0x138
0xffff8001d0ad53f8 : 0xfffff808481b8fc5 : Wdf01000!FxDevice::DeleteSymbolicLink+0x39
0xffff8001d0ad5410 : 0xfffff808481e3290 : Wdf01000!FxPkgPnp::m_WdfPnpStates
0xffff8001d0ad5428 : 0xfffff808481d28d4 : Wdf01000!FxPkgPnp::PnpCleanupForRemove+0x90
0xffff8001d0ad5458 : 0xfffff808481d2960 : Wdf01000!FxPkgPnp::PnpEventFailed+0x10
0xffff8001d0ad5488 : 0xfffff80848166a79 : Wdf01000!FxPkgPnp::PnpProcessEventInner+0x1c9
0xffff8001d0ad54a8 : 0xfffff808481e3290 : Wdf01000!FxPkgPnp::m_WdfPnpStates
0xffff8001d0ad54b0 : 0xfffff808481e4610 : Wdf01000!WPP_PnpStateMachine_cpp_Traceguids
0xffff8001d0ad5538 : 0xfffff808481641a8 : Wdf01000!FxPkgPnp::PnpProcessEvent+0x158
0xffff8001d0ad5578 : 0xfffff808481743ef : Wdf01000!WPP_IFR_SF_qqcq+0xdb
0xffff8001d0ad55d8 : 0xfffff808481d7aa5 : Wdf01000!FxPkgPnp::PnpSurpriseRemoval+0x25
0xffff8001d0ad5608 : 0xfffff80848143e7f : Wdf01000!FxPkgPnp::Dispatch+0xef
0xffff8001d0ad5630 : 0xfffff808481e45c0 : Wdf01000!WPP_FxPkgPnp_cpp_Traceguids
0xffff8001d0ad5688 : 0xfffff803db0f3f40 : nt!DEVPKEY_Device_DevNodeStatusStarted
0xffff8001d0ad56a8 : 0xfffff808481434f5 : Wdf01000!FxDevice::DispatchWithLock+0x155
0xffff8001d0ad56d8 : 0xfffff803db28d34d : nt!PnpNotifyDerivedKeys+0xc9
0xffff8001d0ad5728 : 0xfffff803db28d019 : nt!PnpDeviceRaisePropertyChangeEventWorker+0x135
0xffff8001d0ad5730 : 0xfffff803db0f3f40 : nt!DEVPKEY_Device_DevNodeStatusStarted
0xffff8001d0ad5740 : 0xfffff803db28bf58 : nt!PiPnpRtlObjectEventCallback
0xffff8001d0ad5750 : 0xfffff803db0dcc70 : nt!PlugPlayHandlerTable+0x710
0xffff8001d0ad5798 : 0xfffff8084bca7458 : serenum!Serenum_FDO_PnP+0x218
0xffff8001d0ad57b0 : 0xfffff803db1a9e20 : nt!PiPnpRtlActiveOperationsLock
0xffff8001d0ad57b8 : 0xfffff803daf716d4 : nt!ExAcquireResourceSharedLite+0x394
0xffff8001d0ad57c8 : 0xfffff803daef958b : nt!IopAllocateIrpPrivate+0x19b
0xffff8001d0ad57e8 : 0xfffff803db1a9e80 : nt!PiPnpRtlActiveOperationsLock+0x60
0xffff8001d0ad57f8 : 0xfffff803db1a9e80 : nt!PiPnpRtlActiveOperationsLock+0x60
0xffff8001d0ad5818 : 0xfffff8084bca722c : serenum!Serenum_PnP+0x3c
0xffff8001d0ad5848 : 0xfffff803db28c7d0 : nt!IopSynchronousCall+0xd8
0xffff8001d0ad5878 : 0xfffff803db2884aa : nt!PiPnpRtlBeginOperation+0x32
0xffff8001d0ad58b8 : 0xfffff803db37d404 : nt!IopRemoveDevice+0xdc
0xffff8001d0ad58e8 : 0xfffff803db0da29f : nt!ExAllocatePoolWithTag+0x85f
0xffff8001d0ad5968 : 0xfffff803db2bf957 : nt!PnpSurpriseRemoveLockedDeviceNode+0xb3
0xffff8001d0ad59c8 : 0xfffff803db37e99b : nt!PnpDeleteLockedDeviceNode+0x8b
0xffff8001d0ad59f8 : 0xfffff803db37eb2b : nt!PnpAllocateCriticalMemory+0x2b
0xffff8001d0ad5a08 : 0xfffff803db37e6be : nt!PnpDeleteLockedDeviceNodes+0xbe
0xffff8001d0ad5a78 : 0xfffff803db37dbc9 : nt!PnpProcessQueryRemoveAndEject+0x1e5
0xffff8001d0ad5ac0 : 0xfffff803db1a9e50 : nt!PiPnpRtlActiveOperationsLock+0x30
0xffff8001d0ad5ae8 : 0xfffff803daf712ae : nt!ExAcquireResourceExclusiveLite+0x41e
0xffff8001d0ad5b08 : 0xffff8001d0ad5c00 : 0xffff8001d0ad5c60 : 0xfffff803db24a100 : nt!ExNode0
0xffff8001d0ad5ba8 : 0xfffff803db384cc9 : nt!PnpProcessTargetDeviceEvent+0xd9
0xffff8001d0ad5bc0 : 0xffff8001d0ad5c00 : 0xffff8001d0ad5c60 : 0xfffff803db24a100 : nt!ExNode0
0xffff8001d0ad5be8 : 0xfffff803db384f84 : nt!PnpDeviceEventWorker+0x294
0xffff8001d0ad5c00 : 0xffff8001d0ad5c60 : 0xfffff803db24a100 : nt!ExNode0
0xffff8001d0ad5c38 : 0xfffff803db24a100 : nt!ExNode0
0xffff8001d0ad5c58 : 0xfffff803db24a280 : nt!ExNode0+0x180
0xffff8001d0ad5c60 : 0xfffff803db24a100 : nt!ExNode0
0xffff8001d0ad5c70 : 0xfffff803db384cf0 : nt!PnpDeviceEventWorker
0xffff8001d0ad5c78 : 0xfffff803daf241b9 : nt!ExpWorkerThread+0xe9
0xffff8001d0ad5c80 : 0xfffff803db24a100 : nt!ExNode0
0xffff8001d0ad5c98 : 0xfffff803db24a280 : nt!ExNode0+0x180
0xffff8001d0ad5cf8 : 0xfffff803db24a280 : nt!ExNode0+0x180
0xffff8001d0ad5d00 : 0xfffff803daf240d0 : nt!ExpWorkerThread
0xffff8001d0ad5d08 : 0xfffff803dae8f729 : nt!PspSystemThreadStartup+0x41
0xffff8001d0ad5d58 : 0xfffff803dafdcbb6 : nt!KiStartSystemThread+0x16
0xffff8001d0ad5d70 : 0xfffff803dae8f6e8 : nt!PspSystemThreadStartup
*** WARNING: Unable to verify timestamp for ser2at64.sys
*** ERROR: Module load completed but symbols could not be loaded for ser2at64.sys