jr9 :
That won't tell you anything. The Windows debugger blamed ntoskrnl.exe which tells you basically nothing. Since WhoCrashed works though that means the log files are there and you can access and upload some. We'd need a copy of the dmp file to have a chance at seeing what's going on by running them through a proper debugger. Sometimes WhoCrashed tells you the culprit but other times you have to dig deeper.
ok, i am trying to figure out how to find it and post it, sorry that it take time but it's hard for me.
is this right?
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See
http://www.osronline.com for more information
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.23796.amd64fre.win7sp1_ldr.170427-1518
Machine Name:
Kernel base = 0xfffff800`03052000 PsLoadedModuleList = 0xfffff800`03294730
Debug session time: Thu Mar 15 23:07:15.993 2018 (UTC - 4:00)
System Uptime: 0 days 13:02:13.789
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880017a0cd6, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fe100
GetUlongFromAddress: unable to read from fffff800032fe1c8
0000000000000028 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!NetioAdvanceNetBufferList+26
fffff880`017a0cd6 3b4828 cmp ecx,dword ptr [rax+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: vsserv.exe
TRAP_FRAME: fffff80000b9f930 -- (.trap 0xfffff80000b9f930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000030
rdx=0000000000000030 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880017a0cd6 rsp=fffff80000b9fac0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffffa800cfce280
r11=fffff80000b9fb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
NETIO!NetioAdvanceNetBufferList+0x26:
fffff880`017a0cd6 3b4828 cmp ecx,dword ptr [rax+28h] ds:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030c0a69 to fffff800030c14c0
STACK_TEXT:
fffff800`00b9f7e8 fffff800`030c0a69 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9f7f0 fffff800`030bf6e0 : 00000000`00000002 fffffa80`14a26280 fffff800`00b9fb30 fffffa80`12b63970 : nt!KiBugCheckDispatch+0x69
fffff800`00b9f930 fffff880`017a0cd6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff800`00b9fac0 fffff880`0189626b : fffffa80`12b63840 00000000`00000000 00000000`00000030 fffffa80`0e0cfd50 : NETIO!NetioAdvanceNetBufferList+0x26
fffff800`00b9faf0 fffff880`018847b7 : 00000000`00000000 fffffa80`0e0cfd50 fffffa80`0e0cfd50 00000000`00000001 : tcpip!WfpPreprocessInboundMcastBcastIndication+0x47
fffff800`00b9fb20 fffff880`0185f008 : fffffa80`00000011 fffff800`00b90017 fffffa80`1264eb14 00000000`00007ef6 : tcpip!WfpProcessInTransportStackIndication+0x207
fffff800`00b9fcb0 fffff880`01888bc9 : 00000000`00000028 fffffa80`0d037820 00000000`00000000 fffff880`018898b4 : tcpip!InetInspectReceiveDatagram+0x1d8
fffff800`00b9fd50 fffff880`018892d4 : fffffa80`0d1e5c60 fffffa80`124a4440 fffffa80`0d432a00 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x89
fffff800`00b9fe70 fffff880`018833de : fffffa80`0ca13000 00000000`00000028 fffffa80`00000000 fffff800`00b9ffa0 : tcpip!UdpDeliverDatagrams+0x2f4
fffff800`00b9ff50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x18f
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioAdvanceNetBufferList+26
fffff880`017a0cd6 3b4828 cmp ecx,dword ptr [rax+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!NetioAdvanceNetBufferList+26
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 58e3b357
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioAdvanceNetBufferList+26
BUCKET_ID: X64_0xD1_NETIO!NetioAdvanceNetBufferList+26
Followup: MachineOwner