DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc28f00000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff807342efc4e, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 90761
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffc28f00000000
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807342efc4e
READ_ADDRESS: fffff807222fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8072220f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8072220f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffc28f00000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80727e6b0c0 -- (.trap 0xfffff80727e6b0c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc28f00000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807342efc4e rsp=fffff80727e6b250 rbp=ffffc28f8daa88f0
r8=fffff80727e6b2f0 r9=0000000000000000 r10=ffffc28f988f1000
r11=fffff80727e6b270 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nvlddmkm+0x11fc4e:
fffff807`342efc4e 488b0cc8 mov rcx,qword ptr [rax+rcx*8] ds:ffffc28f`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff807`27e6af78 fffff807`21a05e69 : 00000000`0000000a ffffc28f`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff807`27e6af80 fffff807`21a02169 : 00000000`00000000 00000000`00000005 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`27e6b0c0 fffff807`342efc4e : ffffc28f`988f1000 fffff807`342e60ae fffff807`27e6b2a0 00000000`00000000 : nt!KiPageFault+0x469
fffff807`27e6b250 ffffc28f`988f1000 : fffff807`342e60ae fffff807`27e6b2a0 00000000`00000000 fffff807`27e6b2f0 : nvlddmkm+0x11fc4e
fffff807`27e6b258 fffff807`342e60ae : fffff807`27e6b2a0 00000000`00000000 fffff807`27e6b2f0 fffff807`342f012a : 0xffffc28f`988f1000
fffff807`27e6b260 fffff807`27e6b2a0 : 00000000`00000000 fffff807`27e6b2f0 fffff807`342f012a 00000000`00000000 : nvlddmkm+0x1160ae
fffff807`27e6b268 00000000`00000000 : fffff807`27e6b2f0 fffff807`342f012a 00000000`00000000 ffffc28f`988f1000 : 0xfffff807`27e6b2a0
SYMBOL_NAME: nvlddmkm+11fc4e
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 11fc4e
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80605cfa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9273
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80605cfa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffbe0e8e12b7b0 -- (.trap 0xffffbe0e8e12b7b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000068c4000b rbx=0000000000000000 rcx=ffffe502f8890700
rdx=0000000005d455c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806053fbdc7 rsp=ffffbe0e8e12b940 rbp=ffffe502f8890700
r8=0000000005d455c0 r9=0000000000000040 r10=ffffe502f8890700
r11=ffffe502f8834000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExpInterlockedPopEntrySListResume:
fffff806`053fbdc7 498b02 mov rax,qword ptr [r10] ds:ffffe502`f8890700=0000000068c4000b
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: BitTorrent.exe
STACK_TEXT:
ffff8f00`305a2c88 fffff806`054795de : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`05cfa320 : nt!KeBugCheckEx
ffff8f00`305a2c90 fffff806`05309f2d : 00000210`309e59ae ffff8f00`30589180 00000000`00000246 00000000`00009a91 : nt!KeAccumulateTicks+0x17118e
ffff8f00`305a2cf0 fffff806`0530a4d1 : 00000000`00007c00 00000000`00005c21 ffff8f00`30589180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8f00`305a2d40 fffff806`0530538b : 00000000`00000000 ffffbe0e`8e12b800 fffff806`05c31918 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8f00`305a2e80 fffff806`0530cae2 : ffffbe0e`8e12b7b0 ffffbe0e`8e12b830 ffffbe0e`8e12b830 00000000`00000000 : nt!KeClockInterruptNotify+0x2bb
ffff8f00`305a2f30 fffff806`05280795 : 00000001`70a98f7a ffffe502`f50c9720 ffffe502`f50c97d0 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
ffff8f00`305a2f60 fffff806`053f594a : ffffbe0e`8e12b830 ffffe502`f50c9720 00000000`00000005 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8f00`305a2fb0 fffff806`053f5eb7 : 00000000`0000e11a 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbe0e`8e12b7b0 fffff806`053fbdc7 : 00000000`0000e11a fffff806`081c3eb1 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbe0e`8e12b940 fffff806`081c3eb1 : 00000000`00000000 00000000`00000000 00000000`0000ffff 00000000`00000000 : nt!ExpInterlockedPopEntrySListResume
ffffbe0e`8e12b950 fffff806`08346987 : 00000000`0000e11a ffffbe0e`8e12bae0 00000000`00000008 ffffe503`05df0cb0 : ndis!NdisAllocateNetBufferList+0x91
ffffbe0e`8e12b9b0 fffff806`087438d0 : 00000000`0000e11a ffffe502`f88a4f00 ffffe502`f88ae11a ffffe502`f88a4f00 : NETIO!NetioAllocateAndReferenceNetBufferListNetBufferMdlAndData+0x27
ffffbe0e`8e12b9e0 fffff806`087430bc : 00000000`00000000 00000000`034de900 00000000`00000030 fffff806`0560ef6e : tcpip!UdpSendMessagesOnPath+0x190
ffffbe0e`8e12be80 fffff806`08742e05 : ffffe502`fcf88f01 fffff806`08742df0 ffffbe0e`8e12c300 ffffbe0e`8e12c300 : tcpip!UdpSendMessages+0x29c
ffffbe0e`8e12c1f0 fffff806`052b8908 : ffffbe0e`8e12c450 ffffe503`07915870 00000000`00000000 00000000`00000005 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
ffffbe0e`8e12c220 fffff806`052b887d : fffff806`08742df0 ffffbe0e`8e12c300 00000000`00000000 ffffa380`033d1d60 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffbe0e`8e12c290 fffff806`0872538b : ffffbe0e`8e12c5c0 fffff806`052192fd 00000000`00000040 fffff806`11b020c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffbe0e`8e12c2d0 fffff806`11b1d898 : ffffbe0e`8e12c640 ffffbe0e`8e12cb80 ffffe502`fcf88f40 ffffbe0e`8e12cb80 : tcpip!UdpTlProviderSendMessages+0x7b
ffffbe0e`8e12c350 fffff806`11b01fb5 : ffffbe0e`8e12c968 00000000`00000000 ffffe503`07915870 ffffe503`05d9a2e0 : afd!AfdFastDatagramSend+0x658
ffffbe0e`8e12c540 fffff806`056a6622 : 00000000`00000000 00000000`00012023 ffffbe0e`8e12cb80 ffffe503`0616ad80 : afd!AfdFastIoDeviceControl+0x1825
ffffbe0e`8e12c8e0 fffff806`056a6286 : 00000000`0000057c 00000000`00000708 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x382
ffffbe0e`8e12ca20 fffff806`054058b8 : 00000000`00000000 ffffe503`0598e080 00000000`034df328 ffffbe0e`8e12caa8 : nt!NtDeviceIoControlFile+0x56
ffffbe0e`8e12ca90 00000000`774a1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`034df308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774a1cfc
SYMBOL_NAME: NETIO!NetioAllocateAndReferenceNetBufferListNetBufferMdlAndData+27
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 27
FAILURE_BUCKET_ID: 0x133_ISR_NETIO!NetioAllocateAndReferenceNetBufferListNetBufferMdlAndData
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3ade7757-33ce-d5c1-e602-ff0f3eccc6a2}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffde0f7b19eaf0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffde0f7b19eaf0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3327
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3407
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffde0f7b19eaf0
BUGCHECK_P2: 11
BUGCHECK_P3: ffffde0f7b19eaf0
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff803164fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031640f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8031640f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffde0f7b19eaf0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: firefox.exe
TRAP_FRAME: fffffd0c20c925e0 -- (.trap 0xfffffd0c20c925e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffde0f7b28d770 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000bf rsi=0000000000000000 rdi=0000000000000000
rip=ffffde0f7b19eaf0 rsp=fffffd0c20c92770 rbp=fffff80312b44180
r8=0000000100000056 r9=ffff80008415c180 r10=ffffde0f7a1a50c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffde0f`7b19eaf0 f0 ???
Resetting default scope
STACK_TEXT:
fffffd0c`20c92338 fffff803`15c86729 : 00000000`00000050 ffffde0f`7b19eaf0 00000000`00000011 fffffd0c`20c925e0 : nt!KeBugCheckEx
fffffd0c`20c92340 fffff803`15aeeb80 : fffffd0c`20c924a0 00000000`00000011 fffffd0c`20c92660 00000000`00000000 : nt!MiSystemFault+0x13faf9
fffffd0c`20c92440 fffff803`15c0205e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffffd0c`20c925e0 ffffde0f`7b19eaf0 : ffffde0f`00000000 00000000`00000005 00000000`00000000 fffff803`00000000 : nt!KiPageFault+0x35e
fffffd0c`20c92770 ffffde0f`00000000 : 00000000`00000005 00000000`00000000 fffff803`00000000 ffffde0f`7a1b0000 : 0xffffde0f`7b19eaf0
fffffd0c`20c92778 00000000`00000005 : 00000000`00000000 fffff803`00000000 ffffde0f`7a1b0000 ffffde0f`7a58e508 : 0xffffde0f`00000000
fffffd0c`20c92780 00000000`00000000 : fffff803`00000000 ffffde0f`7a1b0000 ffffde0f`7a58e508 ffffde0f`00000000 : 0x5
SYMBOL_NAME: nt!MiSystemFault+13faf9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 13faf9
FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffdd80efbb5010, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdd80efbb4f68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19874
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: ffffdd80efbb5010
BUGCHECK_P3: ffffdd80efbb4f68
BUGCHECK_P4: 0
TRAP_FRAME: 490b74ff854dffc4 -- (.trap 0x490b74ff854dffc4)
Unable to read trap frame at 490b74ff`854dffc4
EXCEPTION_RECORD: ffffdd80efbb4f68 -- (.exr 0xffffdd80efbb4f68)
ExceptionAddress: fffff8067244ea79 (nt!RtlpGetStackLimitsEx+0x00000000001c9dd9)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffdd80efbb4ce8
STACK_TEXT:
ffffdd80`efbb4ce8 fffff806`72405e69 : 00000000`00000139 00000000`00000004 ffffdd80`efbb5010 ffffdd80`efbb4f68 : nt!KeBugCheckEx
ffffdd80`efbb4cf0 fffff806`72406290 : 00000000`00000000 00000000`00000000 02c08348`1175d03b c28b41e9`72c13b49 : nt!KiBugCheckDispatch+0x69
ffffdd80`efbb4e30 fffff806`72404623 : ffffdd80`efbb57c0 00000000`00000000 ffffdd80`efbb4a60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffdd80`efbb5010 fffff806`7244ea79 : fffffd8b`d42a6550 fffff806`723f773c ffffdd80`efbb5710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffdd80`efbb51a0 fffff806`7244ec47 : ffffdd80`efbb5710 00000000`00000000 fffffd8b`d361bf80 fffff806`00000002 : nt!RtlpGetStackLimitsEx+0x1c9dd9
ffffdd80`efbb51d0 fffff806`72283ce6 : fffffd8b`d361b138 ffffdd80`efbb5e20 fffffd8b`d361b138 ffff800a`53e00000 : nt!RtlDispatchException+0x1c9eb7
ffffdd80`efbb58f0 fffff806`723f4d32 : d38b48ff`c5d16be8 461ee858`244c8d48 490b74ff`854dffc4 4dffd0d7`a1e8cf8b : nt!KiDispatchException+0x186
ffffdd80`efbb5fb0 fffff806`723f4d00 : fffff806`72405fa5 ffff800a`00000001 fffffd8b`d361b100 00000000`0000000e : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffd8b`d361aff8 fffff806`72405fa5 : ffff800a`00000001 fffffd8b`d361b100 00000000`0000000e fffff806`7539a9cd : nt!KiExceptionDispatchOnExceptionStackContinue
fffffd8b`d361b000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------