Seyfettin171
Femtopat
- Katılım
- 20 Aralık 2020
- Mesajlar
- 11
Daha fazla
- Cinsiyet
- Erkek
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO886A49D6\122020-7421-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*
Executable search path is:
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
SYMSRV: BYINDEX: 0x1
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x2
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`38200000 PsLoadedModuleList = 0xfffff805`38e2a2b0
Debug session time: Sun Dec 20 07:21:23.703 2020 (UTC + 3:00)
System Uptime: 0 days 0:07:17.332
SYMSRV: BYINDEX: 0x3
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x4
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Loading Kernel Symbols
.SYMSRV: BYINDEX: 0x5
C:\ProgramData\Dbg\sym
halaacpi.dll
1A7BE8E96000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - OK
DBGENG: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - Mapped image memory
..............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`385f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9f85`ff87c540=000000000000003b
0: kd> !analyze -v; lm
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff805384532b2, Address of the instruction which caused the bugcheck
Arg3: ffff9f85ff87ce40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
SYMSRV: BYINDEX: 0x6
C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/index2.txt
SYMSRV: HttpQueryInfo: 80190190 - HTTP_STATUS_BAD_REQUEST
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGHELP: C:\Windows\System32\Null.SYS - file not found
SYMSRV: BYINDEX: 0x7
https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGENG: \SystemRoot\System32\Drivers\Null.SYS - Image mapping disallowed by non-local path.
SYMSRV: BYINDEX: 0x8
https://msdl.microsoft.com/download/symbols
win32kbase.sys
5EBD4C642de000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - OK
SYMSRV: BYINDEX: 0x9
https://msdl.microsoft.com/download/symbols
FLTMGR.SYS
02839B666f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS - OK
SYMSRV: BYINDEX: 0xA
C:\ProgramData\Dbg\sym
win32k.sys
E87370BB9a000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - Mapped image memory
SYMSRV: BYINDEX: 0xB
C:\ProgramData\Dbg\sym
win32k.pdb
ED706A38659240A066E6FB19B994BAAA1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: win32k - public symbols
C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: BYINDEX: 0xC
C:\ProgramData\Dbg\sym
FLTMGR.SYS
02839B666f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS - OK
DBGENG: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS - Mapped image memory
SYMSRV: BYINDEX: 0xD
https://msdl.microsoft.com/download/symbols
Wdf01000.sys
A9A9D36Ed1000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys - OK
SYMSRV: BYINDEX: 0xE
https://msdl.microsoft.com/download/symbols
Ntfs.sys
77A1338E2d9000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Ntfs.sys\77A1338E2d9000\Ntfs.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Ntfs.sys\77A1338E2d9000\Ntfs.sys - mismatched
SYMSRV: BYINDEX: 0xF
https://msdl.microsoft.com/download/symbols
Ntfs.sys
77A1338E2d9000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Ntfs.sys\77A1338E2d9000\Ntfs.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Ntfs.sys\77A1338E2d9000\Ntfs.sys - mismatched
SYMSRV: BYINDEX: 0x10
https://msdl.microsoft.com/download/symbols
ndis.sys
6A91EFD516f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ndis.sys\6A91EFD516f000\ndis.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ndis.sys\6A91EFD516f000\ndis.sys - mismatched
SYMSRV: BYINDEX: 0x11
https://msdl.microsoft.com/download/symbols
ndis.sys
6A91EFD516f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ndis.sys\6A91EFD516f000\ndis.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ndis.sys\6A91EFD516f000\ndis.sys - mismatched
SYMSRV: BYINDEX: 0x12
https://msdl.microsoft.com/download/symbols
tcpip.sys
9503E2DE2eb000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys - OK
SYMSRV: BYINDEX: 0x13
C:\ProgramData\Dbg\sym
tcpip.sys
9503E2DE2eb000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys - Mapped image memory
SYMSRV: BYINDEX: 0x14
https://msdl.microsoft.com/download/symbols
dxgkrnl.sys
670B3B6A3a3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys - OK
SYMSRV: BYINDEX: 0x15
https://msdl.microsoft.com/download/symbols
afd.sys
CC0C9B73a3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\afd.sys\CC0C9B73a3000\afd.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\afd.sys\CC0C9B73a3000\afd.sys - OK
SYMSRV: BYINDEX: 0x16
C:\ProgramData\Dbg\sym
afd.sys
CC0C9B73a3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\afd.sys\CC0C9B73a3000\afd.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\afd.sys\CC0C9B73a3000\afd.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\afd.sys\CC0C9B73a3000\afd.sys - Mapped image memory
SYMSRV: BYINDEX: 0x17
https://msdl.microsoft.com/download/symbols
rt640x64.sys
5DD260E011a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\rt640x64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\rt640x64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/rt640x64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/rt640x64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x18
https://msdl.microsoft.com/download/symbols
rt640x64.sys
5DD260E011a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\rt640x64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\rt640x64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/rt640x64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/rt640x64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x19
https://msdl.microsoft.com/download/symbols
rt640x64.sys
5DD260E011a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\rt640x64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\rt640x64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/rt640x64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/rt640x64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x1A
https://msdl.microsoft.com/download/symbols
rt640x64.sys
5DD260E011a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\rt640x64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\rt640x64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\rt640x64.sys\5DD260E011a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/rt640x64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/rt640x64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/rt640x64.sys/5DD260E011a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x1B
https://msdl.microsoft.com/download/symbols
crashdmp.sys
9A19AF811e000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\crashdmp.sys\9A19AF811e000\crashdmp.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\crashdmp.sys\9A19AF811e000\crashdmp.sys - mismatched
SYMSRV: BYINDEX: 0x1C
https://msdl.microsoft.com/download/symbols
BTHport.sys
F471926D182000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys - OK
SYMSRV: BYINDEX: 0x1D
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x1E
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8546
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17826
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff805384532b2
BUGCHECK_P3: ffff9f85ff87ce40
BUGCHECK_P4: 0
CONTEXT: ffff9f85ff87ce40 -- (.cxr 0xffff9f85ff87ce40)
rax=0000000000000100 rbx=ffffb60527e72700 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000004 rdi=fffff80533958180
rip=fffff805384532b2 rsp=ffff9f85ff87d840 rbp=00000000000001f0
r8=0000000000000000 r9=0000000000000000 r10=ffffb6051f7a3dd0
r11=ffffd2f8fc400000 r12=0000000000000004 r13=0000000000000000
r14=0000000000000100 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!IopAllocateIrpPrivate+0x302:
fffff805`384532b2 41ff44241c inc dword ptr [r12+1Ch] ds:002b:00000000`00000020=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
STACK_TEXT:
ffff9f85`ff87d840 fffff805`38452f97 : 00000000`00000004 00000000`00000004 00000000`00012017 fffff805`3c0c0790 : nt!IopAllocateIrpPrivate+0x302
ffff9f85`ff87d8b0 fffff805`387fcbc9 : 00000000`00012017 00000000`00000000 00000000`00000000 ffffb605`2de9b7b0 : nt!IopAllocateIrpExReturn+0x17
ffff9f85`ff87d8e0 fffff805`387fc7e6 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`07d10d58 : nt!IopXxxControlFile+0x3c9
ffff9f85`ff87da20 fffff805`386071b8 : 00000000`00a3d000 00000000`00000001 ffffe300`88bc3dc0 fffff805`33958180 : nt!NtDeviceIoControlFile+0x56
ffff9f85`ff87da90 00000000`77a31cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`07a3f1a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a31cfc
SYMBOL_NAME: nt!IopAllocateIrpPrivate+302
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xffff9f85ff87ce40 ; kb
BUCKET_ID_FUNC_OFFSET: 302
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopAllocateIrpPrivate
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e93a9916-76c1-e3f1-8941-d66a0ca9563d}
Followup: MachineOwner
---------
start end module name
ffffb4a4`cf400000 ffffb4a4`cf6de000 win32kbase (deferred)
ffffb4a4`cf6e0000 ffffb4a4`cfa96000 win32kfull (deferred)
ffffb4a4`cfaa0000 ffffb4a4`cfae8000 cdd (deferred)
ffffb4a4`cfb90000 ffffb4a4`cfc2a000 win32k # (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffff805`34630000 fffff805`34658000 mcupdate_AuthenticAMD (deferred)
fffff805`34660000 fffff805`34666000 hal (deferred)
fffff805`34670000 fffff805`3467b000 kd (deferred)
fffff805`34680000 fffff805`346a7000 tm (deferred)
fffff805`346b0000 fffff805`3471a000 CLFS (deferred)
fffff805`34720000 fffff805`3473a000 PSHED (deferred)
fffff805`34740000 fffff805`3474b000 BOOTVID (deferred)
fffff805`34750000 fffff805`34863000 clipsp (deferred)
fffff805`34870000 fffff805`348df000 FLTMGR (deferred)
fffff805`348e0000 fffff805`34909000 ksecdd (deferred)
fffff805`34910000 fffff805`34972000 msrpc (deferred)
fffff805`34980000 fffff805`3498e000 cmimcext (deferred)
fffff805`34990000 fffff805`349a1000 werkernel (deferred)
fffff805`349b0000 fffff805`349bc000 ntosext (deferred)
fffff805`349c0000 fffff805`349d3000 WDFLDR (deferred)
fffff805`349e0000 fffff805`349ef000 SleepStudyHelper (deferred)
fffff805`349f0000 fffff805`34a01000 WppRecorder (deferred)
fffff805`34a10000 fffff805`34a2a000 SgrmAgent (deferred)
fffff805`38200000 fffff805`39246000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
fffff805`3a000000 fffff805`3a0e3000 CI (deferred)
fffff805`3a0f0000 fffff805`3a1a7000 cng (deferred)
fffff805`3a1b0000 fffff805`3a281000 Wdf01000 (deferred)
fffff805`3a290000 fffff805`3a2b6000 acpiex (deferred)
fffff805`3a2c0000 fffff805`3a38c000 ACPI (deferred)
fffff805`3a390000 fffff805`3a39c000 WMILIB (deferred)
fffff805`3a3c0000 fffff805`3a42b000 intelpep (deferred)
fffff805`3a430000 fffff805`3a447000 WindowsTrustedRT (deferred)
fffff805`3a450000 fffff805`3a45b000 IntelTA (deferred)
fffff805`3a460000 fffff805`3a46b000 WindowsTrustedRTProxy (deferred)
fffff805`3a470000 fffff805`3a484000 pcw (deferred)
fffff805`3a490000 fffff805`3a49b000 msisadrv (deferred)
fffff805`3a4a0000 fffff805`3a516000 pci (deferred)
fffff805`3a520000 fffff805`3a535000 vdrvroot (deferred)
fffff805`3a540000 fffff805`3a56f000 pdc (deferred)
fffff805`3a570000 fffff805`3a589000 CEA (deferred)
fffff805`3a590000 fffff805`3a5c1000 partmgr (deferred)
fffff805`3a5d0000 fffff805`3a67a000 spaceport (deferred)
fffff805`3a680000 fffff805`3a699000 volmgr (deferred)
fffff805`3a6a0000 fffff805`3a703000 volmgrx (deferred)
fffff805`3a710000 fffff805`3a72e000 mountmgr (deferred)
fffff805`3a730000 fffff805`3a762000 storahci (deferred)
fffff805`3a770000 fffff805`3a78c000 EhStorClass (deferred)
fffff805`3a790000 fffff805`3a7aa000 fileinfo (deferred)
fffff805`3a7b0000 fffff805`3a7ef000 Wof (deferred)
fffff805`3a7f0000 fffff805`3a7fd000 Fs_Rec (deferred)
fffff805`3a800000 fffff805`3a8b0000 storport (deferred)
fffff805`3a8c0000 fffff805`3a92c000 WdFilter (deferred)
fffff805`3a930000 fffff805`3ac09000 Ntfs (deferred)
fffff805`3ac10000 fffff805`3ad7f000 ndis (deferred)
fffff805`3ad80000 fffff805`3ae18000 NETIO (deferred)
fffff805`3ae20000 fffff805`3ae52000 ksecpkg (deferred)
fffff805`3ae60000 fffff805`3ae82000 amdpsp (deferred)
fffff805`3ae90000 fffff805`3b17b000 tcpip (deferred)
fffff805`3b180000 fffff805`3b1ff000 fwpkclnt (deferred)
fffff805`3b200000 fffff805`3b230000 wfplwfs (deferred)
fffff805`3b240000 fffff805`3b308000 fvevol (deferred)
fffff805`3b310000 fffff805`3b31b000 volume (deferred)
fffff805`3b320000 fffff805`3b38d000 volsnap (deferred)
fffff805`3b390000 fffff805`3b3e0000 rdyboost (deferred)
fffff805`3b3f0000 fffff805`3b416000 mup (deferred)
fffff805`3b420000 fffff805`3b432000 iorate (deferred)
fffff805`3b460000 fffff805`3b47c000 disk (deferred)
fffff805`3b480000 fffff805`3b4ec000 CLASSPNP (deferred)
fffff805`3bac0000 fffff805`3baf0000 cdrom (deferred)
fffff805`3bb00000 fffff805`3bb15000 filecrypt (deferred)
fffff805`3bb20000 fffff805`3bb2e000 tbs (deferred)
fffff805`3bb30000 fffff805`3bb3a000 Null (deferred)
fffff805`3bb40000 fffff805`3bb4a000 Beep (deferred)
fffff805`3bb50000 fffff805`3bef3000 dxgkrnl (deferred)
fffff805`3bf00000 fffff805`3bf18000 watchdog (deferred)
fffff805`3bf20000 fffff805`3bf36000 BasicDisplay (deferred)
fffff805`3bf40000 fffff805`3bf51000 BasicRender (deferred)
fffff805`3bf60000 fffff805`3bf7c000 Npfs (deferred)
fffff805`3bf80000 fffff805`3bf91000 Msfs (deferred)
fffff805`3bfa0000 fffff805`3bfbb000 CimFS (deferred)
fffff805`3bfc0000 fffff805`3bfe2000 tdx (deferred)
fffff805`3bff0000 fffff805`3c000000 TDI (deferred)
fffff805`3c010000 fffff805`3c06c000 netbt (deferred)
fffff805`3c070000 fffff805`3c083000 afunix (deferred)
fffff805`3c090000 fffff805`3c133000 afd (deferred)
fffff805`3c160000 fffff805`3c17a000 vwififlt (deferred)
fffff805`3c180000 fffff805`3c1ab000 pacer (deferred)
fffff805`3c1b0000 fffff805`3c1c4000 ndiscap (deferred)
fffff805`3c1d0000 fffff805`3c1e4000 netbios (deferred)
fffff805`3c1f0000 fffff805`3c291000 Vid (deferred)
fffff805`3c2a0000 fffff805`3c2c1000 winhvr (deferred)
fffff805`3c2d0000 fffff805`3c34c000 rdbss (deferred)
fffff805`3c350000 fffff805`3c362000 nsiproxy (deferred)
fffff805`3c370000 fffff805`3c37e000 npsvctrig (deferred)
fffff805`3c380000 fffff805`3c390000 mssmbios (deferred)
fffff805`3c3a0000 fffff805`3c3aa000 gpuenergydrv (deferred)
fffff805`3c3b0000 fffff805`3c3b8000 ene (deferred)
fffff805`3c3c0000 fffff805`3c3ec000 dfsc (deferred)
fffff805`3c410000 fffff805`3c427000 bam (deferred)
fffff805`3c430000 fffff805`3c47e000 ahcache (deferred)
fffff805`3c480000 fffff805`3c492000 CompositeBus (deferred)
fffff805`3c4a0000 fffff805`3c4ad000 kdnic (deferred)
fffff805`3c4b0000 fffff805`3c4c5000 umbus (deferred)
fffff805`3c4d0000 fffff805`3c568000 USBXHCI (deferred)
fffff805`3c570000 fffff805`3c5b4000 ucx01000 (deferred)
fffff805`3c5c0000 fffff805`3c6da000 rt640x64 (deferred)
fffff805`3c790000 fffff805`3c7ae000 crashdmp (deferred)
fffff805`3d000000 fffff805`3d182000 BTHport (deferred)
fffff805`3d190000 fffff805`3d1c3000 usbccgp (deferred)
fffff805`3d1d0000 fffff805`3d207000 usbaudio (deferred)
fffff805`3d210000 fffff805`3d222000 hidusb (deferred)
fffff805`3d230000 fffff805`3d26f000 HIDCLASS (deferred)
fffff805`3d270000 fffff805`3d283000 HIDPARSE (deferred)
fffff805`3d290000 fffff805`3d2a0000 mouhid (deferred)
fffff805`3d2b0000 fffff805`3d2c3000 mouclass (deferred)
fffff805`3d2d0000 fffff805`3d2e1000 kbdhid (deferred)
fffff805`3d2f0000 fffff805`3d304000 kbdclass (deferred)
fffff805`3d310000 fffff805`3d34d000 rfcomm (deferred)
fffff805`3d350000 fffff805`3d372000 BthEnum (deferred)
fffff805`3d380000 fffff805`3d3a6000 bthpan (deferred)
fffff805`3d3c0000 fffff805`3d3ce000 dump_diskdump (deferred)
fffff805`3d410000 fffff805`3d442000 dump_storahci (deferred)
fffff805`3d470000 fffff805`3d48d000 dump_dumpfve (deferred)
fffff805`3d490000 fffff805`3d572000 dxgmms2 (deferred)
fffff805`3d580000 fffff805`3d5a9000 luafv (deferred)
fffff805`3d5b0000 fffff805`3d5e6000 wcifs (deferred)
fffff805`3d5f0000 fffff805`3d670000 cldflt (deferred)
fffff805`3d680000 fffff805`3d69a000 storqosflt (deferred)
fffff805`3d6a0000 fffff805`3d6c8000 bindflt (deferred)
fffff805`3d6f0000 fffff805`3d708000 lltdio (deferred)
fffff805`3d710000 fffff805`3d728000 mslldp (deferred)
fffff805`3d730000 fffff805`3d74b000 rspndr (deferred)
fffff805`3d750000 fffff805`3d76d000 wanarp (deferred)
fffff805`3d770000 fffff805`3d7c6000 msquic (deferred)
fffff805`3d7d0000 fffff805`3d956000 HTTP (deferred)
fffff805`3d960000 fffff805`3d985000 bowser (deferred)
fffff805`3d990000 fffff805`3d9aa000 mpsdrv (deferred)
fffff805`3d9b0000 fffff805`3da43000 mrxsmb (deferred)
fffff805`3da50000 fffff805`3da95000 mrxsmb20 (deferred)
fffff805`3daa0000 fffff805`3db76000 peauth (deferred)
fffff805`3db80000 fffff805`3dbd3000 srvnet (deferred)
fffff805`3dbe0000 fffff805`3dbf4000 mmcss (deferred)
fffff805`3dc00000 fffff805`3dc52000 mrxsmb10 (deferred)
fffff805`3dc60000 fffff805`3dc75000 tcpipreg (deferred)
fffff805`3dc80000 fffff805`3dd47000 srv2 (deferred)
fffff805`3dd50000 fffff805`3dd6c000 rassstp (deferred)
fffff805`3dd70000 fffff805`3dd8d000 NDProxy (deferred)
fffff805`3dd90000 fffff805`3ddb8000 AgileVpn (deferred)
fffff805`3ddc0000 fffff805`3dde1000 rasl2tp (deferred)
fffff805`3ddf0000 fffff805`3de11000 raspptp (deferred)
fffff805`3de20000 fffff805`3de3c000 raspppoe (deferred)
fffff805`3de40000 fffff805`3de4f000 ndistapi (deferred)
fffff805`3de50000 fffff805`3de8a000 ndiswan (deferred)
fffff805`3de90000 fffff805`3dea3000 condrv (deferred)
fffff805`3deb0000 fffff805`3dec6000 WdNisDrv (deferred)
fffff805`3ded0000 fffff805`3dedb000 gdrv2 (deferred)
fffff805`3dee0000 fffff805`3dee7000 GVCIDrv64 (deferred)
fffff805`3dff0000 fffff805`3e725000 RTKVHD64 (deferred)
fffff805`3e730000 fffff805`3e751000 BTHUSB (deferred)
fffff805`3ea00000 fffff805`3eaae000 UcmCxUcsiNvppc (deferred)
fffff805`3eab0000 fffff805`3eadc000 UcmCx (deferred)
fffff805`3eae0000 fffff805`3eaea000 AMDPCIDev (deferred)
fffff805`3eaf0000 fffff805`3eb0c000 serial (deferred)
fffff805`3eb10000 fffff805`3eb1f000 serenum (deferred)
fffff805`3eb20000 fffff805`3eb2d000 amdgpio2 (deferred)
fffff805`3eb30000 fffff805`3eb62000 msgpioclx (deferred)
fffff805`3eb70000 fffff805`3eb7c000 wmiacpi (deferred)
fffff805`3eb80000 fffff805`3ebbb000 amdppm (deferred)
fffff805`3ebc0000 fffff805`3ebca000 amdgpio3 (deferred)
fffff805`3ebd0000 fffff805`3ebe1000 nvvad64v (deferred)
fffff805`3ebf0000 fffff805`3ebff000 ksthunk (deferred)
fffff805`3ec00000 fffff805`3ec0d000 NvModuleTracker (deferred)
fffff805`3ec10000 fffff805`3ec20000 nvvhci (deferred)
fffff805`3ec30000 fffff805`3ec3d000 NdisVirtualBus (deferred)
fffff805`3ec40000 fffff805`3ec4c000 swenum (deferred)
fffff805`3ec50000 fffff805`3ec5e000 rdpbus (deferred)
fffff805`3ec60000 fffff805`3ed03000 UsbHub3 (deferred)
fffff805`3ed10000 fffff805`3ed1e000 USBD (deferred)
fffff805`3ed30000 fffff805`40e67000 nvlddmkm (deferred)
fffff805`40e70000 fffff805`40e95000 HDAudBus (deferred)
fffff805`40ea0000 fffff805`40f06000 portcls (deferred)
fffff805`40f10000 fffff805`40f31000 drmk (deferred)
fffff805`40f40000 fffff805`40fb6000 ks (deferred)
fffff805`40fc0000 fffff805`40fe3000 nvhda64v (deferred)
Unloaded modules:
fffff805`3d6d0000 fffff805`3d6ec000 monitor.sys
fffff805`3c140000 fffff805`3c151000 rtf64x64.sys
fffff805`3c7c0000 fffff805`3c7cf000 dump_storpor
fffff805`3ba40000 fffff805`3ba73000 dump_storahc
fffff805`3baa0000 fffff805`3babe000 dump_dumpfve
fffff805`3c3f0000 fffff805`3c40c000 dam.sys
fffff805`3a3a0000 fffff805`3a3b1000 WdBoot.sys
fffff805`3b440000 fffff805`3b451000 hwpolicy.sys
0: kd> !blackboxpnp
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132529115384157068
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : SWD\MMDEVAPI\{0.0.0.00000000}.{6907c82e-b0ae-4fd9-82e4-4436e0d4f234}
VetoString :
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO886EAAE6\122020-7187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*
Executable search path is:
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
SYMSRV: BYINDEX: 0x1
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x2
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`35c00000 PsLoadedModuleList = 0xfffff807`3682a2b0
Debug session time: Sun Dec 20 05:21:53.800 2020 (UTC + 3:00)
System Uptime: 0 days 0:01:15.430
SYMSRV: BYINDEX: 0x3
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x4
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Loading Kernel Symbols
.SYMSRV: BYINDEX: 0x5
C:\ProgramData\Dbg\sym
halaacpi.dll
1A7BE8E96000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - OK
DBGENG: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - Mapped image memory
..............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`35ff5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9280`64498ea0=00000000000000f7
1: kd> !analyze -v; lm
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: ffff928164488ee1, Actual security check cookie from the stack
Arg2: 0000bb2635216cbb, Expected security check cookie
Arg3: ffff44d9cade9344, Complement of the expected security check cookie
Arg4: 0000000000000000, zero
Debugging Details:
------------------
SYMSRV: BYINDEX: 0x6
C:\ProgramData\Dbg\sym
ndis.sys
6A91EFD516f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ndis.sys\6A91EFD516f000\ndis.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ndis.sys\6A91EFD516f000\ndis.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\ndis.sys\6A91EFD516f000\ndis.sys - Mapped image memory
SYMSRV: BYINDEX: 0x7
C:\ProgramData\Dbg\sym
NETIO.SYS
B358C89B98000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\NETIO.SYS\B358C89B98000\NETIO.SYS
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\NETIO.SYS\B358C89B98000\NETIO.SYS - OK
DBGENG: C:\ProgramData\Dbg\sym\NETIO.SYS\B358C89B98000\NETIO.SYS - Mapped image memory
SYMSRV: BYINDEX: 0x8
C:\ProgramData\Dbg\sym
netio.pdb
F2507BD039FA9728FF27C4D5831A36B81
SYMSRV: PATH: C:\ProgramData\Dbg\sym\netio.pdb\F2507BD039FA9728FF27C4D5831A36B81\netio.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: NETIO - public symbols
C:\ProgramData\Dbg\sym\netio.pdb\F2507BD039FA9728FF27C4D5831A36B81\netio.pdb
SYMSRV: BYINDEX: 0x9
C:\ProgramData\Dbg\sym
nsiproxy.sys
F6E3177912000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\nsiproxy.sys\F6E3177912000\nsiproxy.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\nsiproxy.sys\F6E3177912000\nsiproxy.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\nsiproxy.sys\F6E3177912000\nsiproxy.sys - Mapped image memory
SYMSRV: BYINDEX: 0xA
C:\ProgramData\Dbg\sym
nsiproxy.pdb
66765E77A9A77564F1914FE1046B24861
SYMSRV: PATH: C:\ProgramData\Dbg\sym\nsiproxy.pdb\66765E77A9A77564F1914FE1046B24861\nsiproxy.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nsiproxy - public symbols
C:\ProgramData\Dbg\sym\nsiproxy.pdb\66765E77A9A77564F1914FE1046B24861\nsiproxy.pdb
SYMSRV: BYINDEX: 0xB
C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/index2.txt
SYMSRV: HttpQueryInfo: 80190190 - HTTP_STATUS_BAD_REQUEST
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGHELP: C:\Windows\System32\Null.SYS - file not found
SYMSRV: BYINDEX: 0xC
https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGENG: \SystemRoot\System32\Drivers\Null.SYS - Image mapping disallowed by non-local path.
SYMSRV: BYINDEX: 0xD
https://msdl.microsoft.com/download/symbols
win32kbase.sys
5EBD4C642de000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - OK
SYMSRV: BYINDEX: 0xE
C:\ProgramData\Dbg\sym
win32k.sys
E87370BB9a000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - Mapped image memory
SYMSRV: BYINDEX: 0xF
C:\ProgramData\Dbg\sym
win32k.pdb
ED706A38659240A066E6FB19B994BAAA1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: win32k - public symbols
C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: BYINDEX: 0x10
https://msdl.microsoft.com/download/symbols
Wdf01000.sys
A9A9D36Ed1000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys - OK
SYMSRV: BYINDEX: 0x11
https://msdl.microsoft.com/download/symbols
ACPI.sys
2D5A8B5Dcc000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ACPI.sys\2D5A8B5Dcc000\ACPI.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ACPI.sys\2D5A8B5Dcc000\ACPI.sys - mismatched
SYMSRV: BYINDEX: 0x12
https://msdl.microsoft.com/download/symbols
ACPI.sys
2D5A8B5Dcc000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ACPI.sys\2D5A8B5Dcc000\ACPI.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ACPI.sys\2D5A8B5Dcc000\ACPI.sys - mismatched
SYMSRV: BYINDEX: 0x13
https://msdl.microsoft.com/download/symbols
ACPI.sys
2D5A8B5Dcc000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ACPI.sys\2D5A8B5Dcc000\ACPI.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ACPI.sys\2D5A8B5Dcc000\ACPI.sys - mismatched
SYMSRV: BYINDEX: 0x14
https://msdl.microsoft.com/download/symbols
ACPI.sys
2D5A8B5Dcc000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ACPI.sys\2D5A8B5Dcc000\ACPI.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ACPI.sys\2D5A8B5Dcc000\ACPI.sys - mismatched
SYMSRV: BYINDEX: 0x15
https://msdl.microsoft.com/download/symbols
pdc.sys
1B16F9E02f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\pdc.sys\1B16F9E02f000\pdc.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\pdc.sys\1B16F9E02f000\pdc.sys - mismatched
SYMSRV: BYINDEX: 0x16
https://msdl.microsoft.com/download/symbols
CEA.sys
75736B9119000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\CEA.sys\75736B9119000\CEA.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\CEA.sys\75736B9119000\CEA.sys - mismatched
SYMSRV: BYINDEX: 0x17
https://msdl.microsoft.com/download/symbols
CEA.sys
75736B9119000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\CEA.sys\75736B9119000\CEA.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\CEA.sys\75736B9119000\CEA.sys - mismatched
SYMSRV: BYINDEX: 0x18
https://msdl.microsoft.com/download/symbols
CEA.sys
75736B9119000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\CEA.sys\75736B9119000\CEA.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\CEA.sys\75736B9119000\CEA.sys - mismatched
SYMSRV: BYINDEX: 0x19
https://msdl.microsoft.com/download/symbols
storport.sys
8566CB6Ab0000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV: BYINDEX: 0x1A
https://msdl.microsoft.com/download/symbols
storport.sys
8566CB6Ab0000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV: BYINDEX: 0x1B
https://msdl.microsoft.com/download/symbols
storport.sys
8566CB6Ab0000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV: BYINDEX: 0x1C
https://msdl.microsoft.com/download/symbols
storport.sys
8566CB6Ab0000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV: BYINDEX: 0x1D
https://msdl.microsoft.com/download/symbols
tcpip.sys
9503E2DE2eb000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys - OK
SYMSRV: BYINDEX: 0x1E
C:\ProgramData\Dbg\sym
tcpip.sys
9503E2DE2eb000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\tcpip.sys\9503E2DE2eb000\tcpip.sys - Mapped image memory
SYMSRV: BYINDEX: 0x1F
https://msdl.microsoft.com/download/symbols
fwpkclnt.sys
1E076A7F7f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\fwpkclnt.sys\1E076A7F7f000\fwpkclnt.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\fwpkclnt.sys\1E076A7F7f000\fwpkclnt.sys - mismatched
SYMSRV: BYINDEX: 0x20
https://msdl.microsoft.com/download/symbols
fwpkclnt.sys
1E076A7F7f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\fwpkclnt.sys\1E076A7F7f000\fwpkclnt.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\fwpkclnt.sys\1E076A7F7f000\fwpkclnt.sys - mismatched
SYMSRV: BYINDEX: 0x21
https://msdl.microsoft.com/download/symbols
fwpkclnt.sys
1E076A7F7f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\fwpkclnt.sys\1E076A7F7f000\fwpkclnt.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\fwpkclnt.sys\1E076A7F7f000\fwpkclnt.sys - mismatched
SYMSRV: BYINDEX: 0x22
https://msdl.microsoft.com/download/symbols
dxgkrnl.sys
670B3B6A3a3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys - OK
SYMSRV: BYINDEX: 0x23
https://msdl.microsoft.com/download/symbols
tdx.sys
28EC0E8022000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\tdx.sys\28EC0E8022000\tdx.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\tdx.sys\28EC0E8022000\tdx.sys - mismatched
SYMSRV: BYINDEX: 0x24
https://msdl.microsoft.com/download/symbols
tcpipreg.sys
0651E2F315000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\tcpipreg.sys\0651E2F315000\tcpipreg.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\tcpipreg.sys\0651E2F315000\tcpipreg.sys - mismatched
SYMSRV: BYINDEX: 0x25
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x26
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x27
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x28
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x29
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x2A
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x2B
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x2C
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x2D
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x2E
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x2F
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x30
https://msdl.microsoft.com/download/symbols
RTKVHD64.sys
5EAA4A63735000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\RTKVHD64.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\RTKVHD64.sys\5EAA4A63735000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/RTKVHD64.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/RTKVHD64.sys/5EAA4A63735000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
SYMSRV: BYINDEX: 0x31
https://msdl.microsoft.com/download/symbols
BTHport.sys
F471926D182000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys - OK
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8734
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21554
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: f7
BUGCHECK_P1: ffff928164488ee1
BUGCHECK_P2: bb2635216cbb
BUGCHECK_P3: ffff44d9cade9344
BUGCHECK_P4: 0
SECURITY_COOKIE: Expected 0000bb2635216cbb found ffff928164488ee1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Dragon.exe
STACK_TEXT:
ffff9280`64498e98 fffff807`360b0a25 : 00000000`000000f7 ffff9281`64488ee1 0000bb26`35216cbb ffff44d9`cade9344 : nt!KeBugCheckEx
ffff9280`64498ea0 fffff807`35e0ad18 : ffff9609`57c29cdc ffff9609`55af7320 ffff9609`55af7320 fffff807`35eeda00 : nt!_report_gsfailure+0x25
ffff9280`64498ee0 fffff807`35e097b4 : ffff9280`64499170 00000000`00000000 ffff9609`55af7320 00000000`00000200 : nt!SepAccessCheck+0x328
ffff9280`64499050 fffff807`35e07fe7 : 00000000`00020019 ffffe007`124c39d0 00000000`00000003 00000000`00000001 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x4f4
ffff9280`64499230 fffff807`3b7962e9 : 00000000`00000000 ffff9280`64499329 00000000`00000003 00000000`000000c0 : nt!SeAccessCheck+0x67
ffff9280`644992a0 fffff807`3b794fca : 00000000`00cacb28 00000000`00000003 00000000`00000000 00000000`00000001 : NETIO!NsipAccessCheck+0x249
ffff9280`64499390 fffff807`3cd12b32 : 0000004b`479ff720 0000004b`479ff720 ffffe007`156524e0 ffffe007`138fe0d8 : NETIO!NsiEnumerateObjectsAllParametersEx+0xda
ffff9280`644995c0 fffff807`3cd126e2 : 00000000`00000000 ffffe007`138fe170 ffffe007`138fe0a0 0000004b`479ff720 : nsiproxy!NsippEnumerateObjectsAllParameters+0x282
ffff9280`644997b0 fffff807`35e52f55 : 00000000`00000002 00000000`00000000 ffffe007`148b6690 ffffe007`0daa2da0 : nsiproxy!NsippDispatch+0x82
ffff9280`64499800 fffff807`361fd518 : ffffe007`138fe0a0 00000000`00000000 00000000`00000000 00000000`00000001 : nt!IofCallDriver+0x55
ffff9280`64499840 fffff807`361fcde5 : 00000000`00000000 ffff9280`64499b80 00000000`00040800 ffff9280`64499b80 : nt!IopSynchronousServiceTail+0x1a8
ffff9280`644998e0 fffff807`361fc7e6 : 00000000`00000001 00000000`00000cc0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff9280`64499a20 fffff807`360071b8 : ffffe007`14973080 0000004b`479ff608 ffff9280`64499aa8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffff9280`64499a90 00007ffb`6bb8c094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004b`479ff698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`6bb8c094
SYMBOL_NAME: NETIO!NsipAccessCheck+249
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.602
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 249
FAILURE_BUCKET_ID: 0xF7_MISSING_GSFRAME_NETIO!NsipAccessCheck
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3b483cfb-421a-af8b-7c04-d182486f8cab}
Followup: MachineOwner
---------
start end module name
ffff9425`bd610000 ffff9425`bd6aa000 win32k # (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
ffff9425`bd800000 ffff9425`bdbb6000 win32kfull (deferred)
ffff9425`bdbc0000 ffff9425`bdc08000 cdd (deferred)
ffff9425`be130000 ffff9425`be40e000 win32kbase (deferred)
fffff807`35090000 fffff807`350b8000 mcupdate_AuthenticAMD (deferred)
fffff807`350c0000 fffff807`350c6000 hal (deferred)
fffff807`350d0000 fffff807`350db000 kd (deferred)
fffff807`350e0000 fffff807`35107000 tm (deferred)
fffff807`35110000 fffff807`3517a000 CLFS (deferred)
fffff807`35180000 fffff807`3519a000 PSHED (deferred)
fffff807`351a0000 fffff807`351ab000 BOOTVID (deferred)
fffff807`351b0000 fffff807`352c3000 clipsp (deferred)
fffff807`352d0000 fffff807`3533f000 FLTMGR (deferred)
fffff807`35340000 fffff807`35369000 ksecdd (deferred)
fffff807`35370000 fffff807`353d2000 msrpc (deferred)
fffff807`353e0000 fffff807`353ee000 cmimcext (deferred)
fffff807`353f0000 fffff807`35401000 werkernel (deferred)
fffff807`35410000 fffff807`3541c000 ntosext (deferred)
fffff807`35420000 fffff807`35433000 WDFLDR (deferred)
fffff807`35440000 fffff807`3544f000 SleepStudyHelper (deferred)
fffff807`35450000 fffff807`35461000 WppRecorder (deferred)
fffff807`35470000 fffff807`3548a000 SgrmAgent (deferred)
fffff807`35c00000 fffff807`36c46000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
fffff807`3aa00000 fffff807`3aae3000 CI (deferred)
fffff807`3aaf0000 fffff807`3aba7000 cng (deferred)
fffff807`3abb0000 fffff807`3ac81000 Wdf01000 (deferred)
fffff807`3ac90000 fffff807`3acb6000 acpiex (deferred)
fffff807`3acc0000 fffff807`3ad8c000 ACPI (deferred)
fffff807`3ad90000 fffff807`3ad9c000 WMILIB (deferred)
fffff807`3adc0000 fffff807`3add7000 WindowsTrustedRT (deferred)
fffff807`3ade0000 fffff807`3adeb000 IntelTA (deferred)
fffff807`3adf0000 fffff807`3adfb000 WindowsTrustedRTProxy (deferred)
fffff807`3ae00000 fffff807`3ae6b000 intelpep (deferred)
fffff807`3ae70000 fffff807`3ae84000 pcw (deferred)
fffff807`3ae90000 fffff807`3ae9b000 msisadrv (deferred)
fffff807`3aea0000 fffff807`3af16000 pci (deferred)
fffff807`3af20000 fffff807`3af35000 vdrvroot (deferred)
fffff807`3af40000 fffff807`3af6f000 pdc (deferred)
fffff807`3af70000 fffff807`3af89000 CEA (deferred)
fffff807`3af90000 fffff807`3afc1000 partmgr (deferred)
fffff807`3afd0000 fffff807`3b07a000 spaceport (deferred)
fffff807`3b080000 fffff807`3b099000 volmgr (deferred)
fffff807`3b0a0000 fffff807`3b103000 volmgrx (deferred)
fffff807`3b110000 fffff807`3b12e000 mountmgr (deferred)
fffff807`3b130000 fffff807`3b162000 storahci (deferred)
fffff807`3b170000 fffff807`3b220000 storport (deferred)
fffff807`3b230000 fffff807`3b24c000 EhStorClass (deferred)
fffff807`3b250000 fffff807`3b26a000 fileinfo (deferred)
fffff807`3b270000 fffff807`3b2af000 Wof (deferred)
fffff807`3b2b0000 fffff807`3b31c000 WdFilter (deferred)
fffff807`3b320000 fffff807`3b5f9000 Ntfs (deferred)
fffff807`3b600000 fffff807`3b60d000 Fs_Rec (deferred)
fffff807`3b610000 fffff807`3b77f000 ndis (deferred)
fffff807`3b780000 fffff807`3b818000 NETIO # (pdb symbols) C:\ProgramData\Dbg\sym\netio.pdb\F2507BD039FA9728FF27C4D5831A36B81\netio.pdb
fffff807`3b820000 fffff807`3b852000 ksecpkg (deferred)
fffff807`3b860000 fffff807`3b882000 amdpsp (deferred)
fffff807`3b890000 fffff807`3bb7b000 tcpip (deferred)
fffff807`3bb80000 fffff807`3bbff000 fwpkclnt (deferred)
fffff807`3bc00000 fffff807`3bc30000 wfplwfs (deferred)
fffff807`3bc40000 fffff807`3bd08000 fvevol (deferred)
fffff807`3bd10000 fffff807`3bd1b000 volume (deferred)
fffff807`3bd20000 fffff807`3bd8d000 volsnap (deferred)
fffff807`3bd90000 fffff807`3bde0000 rdyboost (deferred)
fffff807`3bdf0000 fffff807`3be16000 mup (deferred)
fffff807`3be20000 fffff807`3be32000 iorate (deferred)
fffff807`3be60000 fffff807`3be7c000 disk (deferred)
fffff807`3be80000 fffff807`3beec000 CLASSPNP (deferred)
fffff807`3c480000 fffff807`3c4b0000 cdrom (deferred)
fffff807`3c4c0000 fffff807`3c4d5000 filecrypt (deferred)
fffff807`3c4e0000 fffff807`3c4ee000 tbs (deferred)
fffff807`3c4f0000 fffff807`3c4fa000 Null (deferred)
fffff807`3c500000 fffff807`3c50a000 Beep (deferred)
fffff807`3c510000 fffff807`3c8b3000 dxgkrnl (deferred)
fffff807`3c8c0000 fffff807`3c8d8000 watchdog (deferred)
fffff807`3c8e0000 fffff807`3c8f6000 BasicDisplay (deferred)
fffff807`3c900000 fffff807`3c911000 BasicRender (deferred)
fffff807`3c920000 fffff807`3c93c000 Npfs (deferred)
fffff807`3c940000 fffff807`3c951000 Msfs (deferred)
fffff807`3c960000 fffff807`3c97b000 CimFS (deferred)
fffff807`3c980000 fffff807`3c9a2000 tdx (deferred)
fffff807`3c9b0000 fffff807`3c9c0000 TDI (deferred)
fffff807`3c9d0000 fffff807`3ca2c000 netbt (deferred)
fffff807`3ca30000 fffff807`3ca43000 afunix (deferred)
fffff807`3ca50000 fffff807`3caf3000 afd (deferred)
fffff807`3cb00000 fffff807`3cb10000 rtf64x64 (deferred)
fffff807`3cb20000 fffff807`3cb3a000 vwififlt (deferred)
fffff807`3cb40000 fffff807`3cb6b000 pacer (deferred)
fffff807`3cb70000 fffff807`3cb84000 ndiscap (deferred)
fffff807`3cb90000 fffff807`3cba4000 netbios (deferred)
fffff807`3cbb0000 fffff807`3cc51000 Vid (deferred)
fffff807`3cc60000 fffff807`3cc81000 winhvr (deferred)
fffff807`3cc90000 fffff807`3cd0c000 rdbss (deferred)
fffff807`3cd10000 fffff807`3cd22000 nsiproxy (pdb symbols) C:\ProgramData\Dbg\sym\nsiproxy.pdb\66765E77A9A77564F1914FE1046B24861\nsiproxy.pdb
fffff807`3cd30000 fffff807`3cd3e000 npsvctrig (deferred)
fffff807`3cd40000 fffff807`3cd50000 mssmbios (deferred)
fffff807`3cd60000 fffff807`3cd6a000 gpuenergydrv (deferred)
fffff807`3cd70000 fffff807`3cd78000 ene (deferred)
fffff807`3cd80000 fffff807`3cdac000 dfsc (deferred)
fffff807`3cdd0000 fffff807`3cde7000 bam (deferred)
fffff807`3cdf0000 fffff807`3ce3e000 ahcache (deferred)
fffff807`3ce40000 fffff807`3ce52000 CompositeBus (deferred)
fffff807`3ce60000 fffff807`3ce6d000 kdnic (deferred)
fffff807`3ce70000 fffff807`3ce85000 umbus (deferred)
fffff807`3ce90000 fffff807`3cf28000 USBXHCI (deferred)
fffff807`3cf70000 fffff807`3cf8e000 crashdmp (deferred)
fffff807`3d000000 fffff807`3d032000 msgpioclx (deferred)
fffff807`3d040000 fffff807`3d07b000 amdppm (deferred)
fffff807`3d080000 fffff807`3d08f000 ksthunk (deferred)
fffff807`3d090000 fffff807`3d09d000 NvModuleTracker (deferred)
fffff807`3d0a0000 fffff807`3d0b0000 nvvhci (deferred)
fffff807`3d0c0000 fffff807`3d0cd000 NdisVirtualBus (deferred)
fffff807`3d0d0000 fffff807`3d0dc000 swenum (deferred)
fffff807`3d0e0000 fffff807`3d0ee000 rdpbus (deferred)
fffff807`3d0f0000 fffff807`3d193000 UsbHub3 (deferred)
fffff807`3d1a0000 fffff807`3d1ae000 USBD (deferred)
fffff807`3d1b0000 fffff807`3d1d3000 nvhda64v (deferred)
fffff807`3d670000 fffff807`3d6b4000 ucx01000 (deferred)
fffff807`3d6c0000 fffff807`3d7da000 rt640x64 (deferred)
fffff807`3e000000 fffff807`3e033000 usbccgp (deferred)
fffff807`3e040000 fffff807`3e052000 hidusb (deferred)
fffff807`3e060000 fffff807`3e09f000 HIDCLASS (deferred)
fffff807`3e0a0000 fffff807`3e0b3000 HIDPARSE (deferred)
fffff807`3e0c0000 fffff807`3e0f7000 usbaudio (deferred)
fffff807`3e100000 fffff807`3e110000 mouhid (deferred)
fffff807`3e120000 fffff807`3e133000 mouclass (deferred)
fffff807`3e140000 fffff807`3e151000 kbdhid (deferred)
fffff807`3e160000 fffff807`3e174000 kbdclass (deferred)
fffff807`3e180000 fffff807`3e1bd000 rfcomm (deferred)
fffff807`3e1c0000 fffff807`3e1e2000 BthEnum (deferred)
fffff807`3e1f0000 fffff807`3e216000 bthpan (deferred)
fffff807`3e230000 fffff807`3e23e000 dump_diskdump (deferred)
fffff807`3e280000 fffff807`3e2b2000 dump_storahci (deferred)
fffff807`3e2e0000 fffff807`3e2fd000 dump_dumpfve (deferred)
fffff807`3e300000 fffff807`3e3e2000 dxgmms2 (deferred)
fffff807`3e3f0000 fffff807`3e419000 luafv (deferred)
fffff807`3e420000 fffff807`3e456000 wcifs (deferred)
fffff807`3e460000 fffff807`3e4e0000 cldflt (deferred)
fffff807`3e4f0000 fffff807`3e50a000 storqosflt (deferred)
fffff807`3e510000 fffff807`3e538000 bindflt (deferred)
fffff807`3e540000 fffff807`3e558000 lltdio (deferred)
fffff807`3e560000 fffff807`3e578000 mslldp (deferred)
fffff807`3e580000 fffff807`3e59b000 rspndr (deferred)
fffff807`3e5a0000 fffff807`3e5bd000 wanarp (deferred)
fffff807`3e5c0000 fffff807`3e616000 msquic (deferred)
fffff807`3e620000 fffff807`3e7a6000 HTTP (deferred)
fffff807`3e7b0000 fffff807`3e7d5000 bowser (deferred)
fffff807`3e7e0000 fffff807`3e7fa000 mpsdrv (deferred)
fffff807`3e800000 fffff807`3e893000 mrxsmb (deferred)
fffff807`3e8a0000 fffff807`3e8e5000 mrxsmb20 (deferred)
fffff807`3e8f0000 fffff807`3e943000 srvnet (deferred)
fffff807`3e950000 fffff807`3e964000 mmcss (deferred)
fffff807`3e970000 fffff807`3ea46000 peauth (deferred)
fffff807`3ea50000 fffff807`3eaa2000 mrxsmb10 (deferred)
fffff807`3eab0000 fffff807`3eac5000 tcpipreg (deferred)
fffff807`3ead0000 fffff807`3eb97000 srv2 (deferred)
fffff807`3eba0000 fffff807`3ebbc000 rassstp (deferred)
fffff807`3ebc0000 fffff807`3ebdd000 NDProxy (deferred)
fffff807`3ebe0000 fffff807`3ec08000 AgileVpn (deferred)
fffff807`3ec10000 fffff807`3ec31000 rasl2tp (deferred)
fffff807`3ec40000 fffff807`3ec61000 raspptp (deferred)
fffff807`3ec70000 fffff807`3ec8c000 raspppoe (deferred)
fffff807`3ec90000 fffff807`3ec9f000 ndistapi (deferred)
fffff807`3eca0000 fffff807`3ecda000 ndiswan (deferred)
fffff807`3ece0000 fffff807`3ecf6000 WdNisDrv (deferred)
fffff807`3ed00000 fffff807`3ed13000 condrv (deferred)
fffff807`3ef00000 fffff807`3f635000 RTKVHD64 (deferred)
fffff807`3f640000 fffff807`3f661000 BTHUSB (deferred)
fffff807`3f670000 fffff807`3f7f2000 BTHport (deferred)
fffff807`3fa00000 fffff807`3fa76000 ks (deferred)
fffff807`3fa80000 fffff807`3fb2e000 UcmCxUcsiNvppc (deferred)
fffff807`3fb30000 fffff807`3fb5c000 UcmCx (deferred)
fffff807`3fb60000 fffff807`3fb6a000 AMDPCIDev (deferred)
fffff807`3fb70000 fffff807`3fb8c000 serial (deferred)
fffff807`3fb90000 fffff807`3fb9f000 serenum (deferred)
fffff807`3fba0000 fffff807`3fbad000 amdgpio2 (deferred)
fffff807`3fbb0000 fffff807`3fbbc000 wmiacpi (deferred)
fffff807`3fbc0000 fffff807`41cf7000 nvlddmkm (deferred)
fffff807`41d00000 fffff807`41d25000 HDAudBus (deferred)
fffff807`41d30000 fffff807`41d96000 portcls (deferred)
fffff807`41da0000 fffff807`41dc1000 drmk (deferred)
fffff807`41dd0000 fffff807`41dda000 amdgpio3 (deferred)
fffff807`41de0000 fffff807`41df1000 nvvad64v (deferred)
Unloaded modules:
fffff807`3cfa0000 fffff807`3cfaf000 dump_storpor
fffff807`3c400000 fffff807`3c433000 dump_storahc
fffff807`3c460000 fffff807`3c47e000 dump_dumpfve
fffff807`3cdb0000 fffff807`3cdcc000 dam.sys
fffff807`3ada0000 fffff807`3adb1000 WdBoot.sys
fffff807`3be40000 fffff807`3be51000 hwpolicy.sys
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO886697A7\122020-7593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*
Executable search path is:
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
SYMSRV: BYINDEX: 0x1
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x2
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`62600000 PsLoadedModuleList = 0xfffff800`6322a2b0
Debug session time: Sun Dec 20 03:10:45.962 2020 (UTC + 3:00)
System Uptime: 0 days 0:00:44.591
SYMSRV: BYINDEX: 0x3
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x4
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Loading Kernel Symbols
.SYMSRV: BYINDEX: 0x5
C:\ProgramData\Dbg\sym
halaacpi.dll
1A7BE8E96000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - OK
DBGENG: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - Mapped image memory
..............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`629f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`08c29310=000000000000000a
1: kd> !analyze -v; lm
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000130, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80062b192df, address which referenced memory
Debugging Details:
------------------
SYMSRV: BYINDEX: 0x6
C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/index2.txt
SYMSRV: HttpQueryInfo: 80190190 - HTTP_STATUS_BAD_REQUEST
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGHELP: C:\Windows\System32\Null.SYS - file not found
SYMSRV: BYINDEX: 0x7
https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGENG: \SystemRoot\System32\Drivers\Null.SYS - Image mapping disallowed by non-local path.
SYMSRV: BYINDEX: 0x8
C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
win32kbase.sys
000000000000000000000000000000002de000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\win32kbase.sys\000000000000000000000000000000002de000\win32kbase.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\win32kbase.sys\000000000000000000000000000000002de000\win32kbase.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\win32kbase.sys\000000000000000000000000000000002de000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/win32kbase.sys/000000000000000000000000000000002de000/win32kbase.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/win32kbase.sys/000000000000000000000000000000002de000/win32kbase.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/win32kbase.sys/000000000000000000000000000000002de000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGHELP: C:\Windows\System32\win32kbase.sys - OK
DBGENG: C:\Windows\System32\win32kbase.sys - Mapped image memory
SYMSRV: BYINDEX: 0x9
C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
win32kfull.sys
000000000000000000000000000000003b6000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\win32kfull.sys\000000000000000000000000000000003b6000\win32kfull.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\win32kfull.sys\000000000000000000000000000000003b6000\win32kfull.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\win32kfull.sys\000000000000000000000000000000003b6000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/win32kfull.sys/000000000000000000000000000000003b6000/win32kfull.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/win32kfull.sys/000000000000000000000000000000003b6000/win32kfull.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/win32kfull.sys/000000000000000000000000000000003b6000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGHELP: C:\Windows\System32\win32kfull.sys - OK
DBGENG: C:\Windows\System32\win32kfull.sys - Mapped image memory
SYMSRV: BYINDEX: 0xA
C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
cdd.dll
0000000000000000000000000000000048000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\cdd.dll\0000000000000000000000000000000048000\cdd.dll - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\cdd.dll\0000000000000000000000000000000048000\cdd.dl_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\cdd.dll\0000000000000000000000000000000048000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/cdd.dll/0000000000000000000000000000000048000/cdd.dll
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/cdd.dll/0000000000000000000000000000000048000/cdd.dl_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/cdd.dll/0000000000000000000000000000000048000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGHELP: C:\Windows\System32\cdd.dll - OK
DBGENG: C:\Windows\System32\cdd.dll - Mapped image memory
SYMSRV: BYINDEX: 0xB
C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
win32k.sys
000000000000000000000000000000009a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\win32k.sys\000000000000000000000000000000009a000\win32k.sys - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\win32k.sys\000000000000000000000000000000009a000\win32k.sy_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\win32k.sys\000000000000000000000000000000009a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/win32k.sys/000000000000000000000000000000009a000/win32k.sys
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/win32k.sys/000000000000000000000000000000009a000/win32k.sy_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/win32k.sys/000000000000000000000000000000009a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGHELP: C:\Windows\System32\win32k.sys - OK
DBGENG: C:\Windows\System32\win32k.sys - Mapped image memory
SYMSRV: BYINDEX: 0xC
C:\ProgramData\Dbg\sym
win32k.pdb
ED706A38659240A066E6FB19B994BAAA1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: RESULT: 0x00000000
*** WARNING: Unable to verify checksum for win32k.sys
DBGHELP: win32k - public symbols
C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: BYINDEX: 0xD
https://msdl.microsoft.com/download/symbols
Wdf01000.sys
A9A9D36Ed1000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys - OK
SYMSRV: BYINDEX: 0xE
https://msdl.microsoft.com/download/symbols
dxgkrnl.sys
670B3B6A3a3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys - OK
SYMSRV: BYINDEX: 0xF
https://msdl.microsoft.com/download/symbols
BTHport.sys
F471926D182000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys - OK
SYMSRV: BYINDEX: 0x10
https://msdl.microsoft.com/download/symbols
amdppm.sys
C9C030003b000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\amdppm.sys\C9C030003b000\amdppm.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\amdppm.sys\C9C030003b000\amdppm.sys - mismatched
SYMSRV: BYINDEX: 0x11
https://msdl.microsoft.com/download/symbols
amdppm.sys
C9C030003b000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\amdppm.sys\C9C030003b000\amdppm.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\amdppm.sys\C9C030003b000\amdppm.sys - mismatched
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7483
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14313
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 130
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80062b192df
READ_ADDRESS: fffff800632fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8006320f330: Unable to get Flags value from nt!KdVersionBlock
fffff8006320f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000130
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff88008c29450 -- (.trap 0xfffff88008c29450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80062b192df rsp=fffff88008c295e8 rbp=fffff88008c29659
r8=000000000000000f r9=fffff88008c29650 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiGenerateHeteroSets+0x7:
fffff800`62b192df 4e8b9cc1b8000000 mov r11,qword ptr [rcx+r8*8+0B8h] ds:00000000`00000130=????????????????
Resetting default scope
STACK_TEXT:
fffff880`08c29308 fffff800`62a07769 : 00000000`0000000a 00000000`00000130 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08c29310 fffff800`62a03a69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`08c29450 fffff800`62b192df : fffff800`62b195c7 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff880`08c295e8 fffff800`62b195c7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGenerateHeteroSets+0x7
fffff880`08c295f0 fffff800`62a2c6fc : ffff9880`8b0a0180 ffffe00a`d3c79080 00000000`00000005 fffff880`08c296fc : nt!KiHeteroChooseTargetProcessor+0xa7
fffff880`08c296c0 fffff800`62844c4d : 00000000`000006bd fffff880`08c29b10 00000000`00000080 ffff9880`8b0a0180 : nt!KiDeferredReadySingleThread+0x1e1bac
fffff880`08c298b0 fffff800`62845030 : ffff9880`8b0a0180 00000000`00000000 ffffe00a`d3bb51f0 00000000`00000000 : nt!KiReadyThread+0x4d
fffff880`08c298e0 fffff800`62806eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000006bd : nt!KiProcessExpiredTimerList+0x290
fffff880`08c299d0 fffff800`629f92ee : ffffffff`00000000 ffff9880`8b0a0180 ffff9880`8b0ab340 ffffe00a`d533b080 : nt!KiRetireDpcList+0x5dd
fffff880`08c29c60 00000000`00000000 : fffff880`08c2a000 fffff880`08c24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiGenerateHeteroSets+7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7
FAILURE_BUCKET_ID: AV_nt!KiGenerateHeteroSets
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e12c4c11-0ff5-f5ca-55be-f1d53353b217}
Followup: MachineOwner
---------
start end module name
fffff800`5ea80000 fffff800`5eaa8000 mcupdate_AuthenticAMD (deferred)
fffff800`5eab0000 fffff800`5eab6000 hal (deferred)
fffff800`5eac0000 fffff800`5eacb000 kd (deferred)
fffff800`5ead0000 fffff800`5eaf7000 tm (deferred)
fffff800`5eb00000 fffff800`5eb6a000 CLFS (deferred)
fffff800`5eb70000 fffff800`5eb8a000 PSHED (deferred)
fffff800`5eb90000 fffff800`5eb9b000 BOOTVID (deferred)
fffff800`5eba0000 fffff800`5ecb3000 clipsp (deferred)
fffff800`5ecc0000 fffff800`5ed2f000 FLTMGR (deferred)
fffff800`5ed30000 fffff800`5ed59000 ksecdd (deferred)
fffff800`5ed60000 fffff800`5edc2000 msrpc (deferred)
fffff800`5edd0000 fffff800`5edde000 cmimcext (deferred)
fffff800`5ede0000 fffff800`5edf1000 werkernel (deferred)
fffff800`5ee00000 fffff800`5ee0c000 ntosext (deferred)
fffff800`5ee10000 fffff800`5ee23000 WDFLDR (deferred)
fffff800`5ee30000 fffff800`5ee3f000 SleepStudyHelper (deferred)
fffff800`5ee40000 fffff800`5ee51000 WppRecorder (deferred)
fffff800`5ee60000 fffff800`5ee7a000 SgrmAgent (deferred)
fffff800`62600000 fffff800`63646000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
fffff800`64400000 fffff800`644e3000 CI (deferred)
fffff800`644f0000 fffff800`645a7000 cng (deferred)
fffff800`645b0000 fffff800`64681000 Wdf01000 (deferred)
fffff800`64690000 fffff800`646b6000 acpiex (deferred)
fffff800`646c0000 fffff800`6478c000 ACPI (deferred)
fffff800`64790000 fffff800`6479c000 WMILIB (deferred)
fffff800`647c0000 fffff800`647d7000 WindowsTrustedRT (deferred)
fffff800`647e0000 fffff800`647eb000 IntelTA (deferred)
fffff800`647f0000 fffff800`647fb000 WindowsTrustedRTProxy (deferred)
fffff800`64800000 fffff800`6486b000 intelpep (deferred)
fffff800`64870000 fffff800`64884000 pcw (deferred)
fffff800`64890000 fffff800`6489b000 msisadrv (deferred)
fffff800`648a0000 fffff800`64916000 pci (deferred)
fffff800`64920000 fffff800`64935000 vdrvroot (deferred)
fffff800`64940000 fffff800`6496f000 pdc (deferred)
fffff800`64970000 fffff800`64989000 CEA (deferred)
fffff800`64990000 fffff800`649c1000 partmgr (deferred)
fffff800`649d0000 fffff800`64a7a000 spaceport (deferred)
fffff800`64a80000 fffff800`64a99000 volmgr (deferred)
fffff800`64aa0000 fffff800`64b03000 volmgrx (deferred)
fffff800`64b10000 fffff800`64b2e000 mountmgr (deferred)
fffff800`64b30000 fffff800`64b62000 storahci (deferred)
fffff800`64b70000 fffff800`64c20000 storport (deferred)
fffff800`64c30000 fffff800`64c4c000 EhStorClass (deferred)
fffff800`64c50000 fffff800`64c6a000 fileinfo (deferred)
fffff800`64c70000 fffff800`64caf000 Wof (deferred)
fffff800`64cb0000 fffff800`64d1c000 WdFilter (deferred)
fffff800`64d20000 fffff800`64ff9000 Ntfs (deferred)
fffff800`65000000 fffff800`6500d000 Fs_Rec (deferred)
fffff800`65010000 fffff800`6517f000 ndis (deferred)
fffff800`65180000 fffff800`65218000 NETIO (deferred)
fffff800`65220000 fffff800`65252000 ksecpkg (deferred)
fffff800`65260000 fffff800`65282000 amdpsp (deferred)
fffff800`65290000 fffff800`6557b000 tcpip (deferred)
fffff800`65580000 fffff800`655ff000 fwpkclnt (deferred)
fffff800`65600000 fffff800`65630000 wfplwfs (deferred)
fffff800`65640000 fffff800`65708000 fvevol (deferred)
fffff800`65710000 fffff800`6571b000 volume (deferred)
fffff800`65720000 fffff800`6578d000 volsnap (deferred)
fffff800`65790000 fffff800`657e0000 rdyboost (deferred)
fffff800`657f0000 fffff800`65816000 mup (deferred)
fffff800`65820000 fffff800`65832000 iorate (deferred)
fffff800`65860000 fffff800`6587c000 disk (deferred)
fffff800`65880000 fffff800`658ec000 CLASSPNP (deferred)
fffff800`65e80000 fffff800`65eb0000 cdrom (deferred)
fffff800`65ec0000 fffff800`65ed5000 filecrypt (deferred)
fffff800`65ee0000 fffff800`65eee000 tbs (deferred)
fffff800`65ef0000 fffff800`65efa000 Null (deferred)
fffff800`65f00000 fffff800`65f0a000 Beep (deferred)
fffff800`65f10000 fffff800`662b3000 dxgkrnl (deferred)
fffff800`662c0000 fffff800`662d8000 watchdog (deferred)
fffff800`662e0000 fffff800`662f6000 BasicDisplay (deferred)
fffff800`66300000 fffff800`66311000 BasicRender (deferred)
fffff800`66320000 fffff800`6633c000 Npfs (deferred)
fffff800`66360000 fffff800`6637e000 crashdmp (deferred)
fffff800`663e0000 fffff800`663f1000 Msfs (deferred)
fffff800`66400000 fffff800`664a3000 afd (deferred)
fffff800`664b0000 fffff800`664c0000 rtf64x64 (deferred)
fffff800`664d0000 fffff800`664ea000 vwififlt (deferred)
fffff800`664f0000 fffff800`6651b000 pacer (deferred)
fffff800`66520000 fffff800`66534000 ndiscap (deferred)
fffff800`66540000 fffff800`66554000 netbios (deferred)
fffff800`66560000 fffff800`66601000 Vid (deferred)
fffff800`66610000 fffff800`66631000 winhvr (deferred)
fffff800`66640000 fffff800`666bc000 rdbss (deferred)
fffff800`666c0000 fffff800`666d2000 nsiproxy (deferred)
fffff800`666e0000 fffff800`666ee000 npsvctrig (deferred)
fffff800`666f0000 fffff800`66700000 mssmbios (deferred)
fffff800`66710000 fffff800`6671a000 gpuenergydrv (deferred)
fffff800`66720000 fffff800`66728000 ene (deferred)
fffff800`66730000 fffff800`6675c000 dfsc (deferred)
fffff800`66780000 fffff800`66797000 bam (deferred)
fffff800`667a0000 fffff800`667ee000 ahcache (deferred)
fffff800`667f0000 fffff800`66802000 CompositeBus (deferred)
fffff800`66810000 fffff800`6681d000 kdnic (deferred)
fffff800`66820000 fffff800`66835000 umbus (deferred)
fffff800`66840000 fffff800`668d8000 USBXHCI (deferred)
fffff800`668e0000 fffff800`66924000 ucx01000 (deferred)
fffff800`66930000 fffff800`66a4a000 rt640x64 (deferred)
fffff800`66a50000 fffff800`66a66000 WdNisDrv (deferred)
fffff800`66ec0000 fffff800`66edb000 CimFS (deferred)
fffff800`66ee0000 fffff800`66f02000 tdx (deferred)
fffff800`66f10000 fffff800`66f20000 TDI (deferred)
fffff800`66f30000 fffff800`66f8c000 netbt (deferred)
fffff800`66f90000 fffff800`66fa3000 afunix (deferred)
fffff800`67800000 fffff800`67833000 usbccgp (deferred)
fffff800`67840000 fffff800`67852000 hidusb (deferred)
fffff800`67860000 fffff800`6789f000 HIDCLASS (deferred)
fffff800`678a0000 fffff800`678b3000 HIDPARSE (deferred)
fffff800`678c0000 fffff800`678f7000 usbaudio (deferred)
fffff800`67900000 fffff800`67910000 mouhid (deferred)
fffff800`67920000 fffff800`67933000 mouclass (deferred)
fffff800`67940000 fffff800`67951000 kbdhid (deferred)
fffff800`67960000 fffff800`67974000 kbdclass (deferred)
fffff800`67980000 fffff800`679bd000 rfcomm (deferred)
fffff800`679c0000 fffff800`679e2000 BthEnum (deferred)
fffff800`679f0000 fffff800`67a16000 bthpan (deferred)
fffff800`67a30000 fffff800`67a3e000 dump_diskdump (deferred)
fffff800`67a80000 fffff800`67ab2000 dump_storahci (deferred)
fffff800`67ae0000 fffff800`67afd000 dump_dumpfve (deferred)
fffff800`67b00000 fffff800`67be2000 dxgmms2 (deferred)
fffff800`67bf0000 fffff800`67c19000 luafv (deferred)
fffff800`67c20000 fffff800`67c56000 wcifs (deferred)
fffff800`67c60000 fffff800`67ce0000 cldflt (deferred)
fffff800`67cf0000 fffff800`67d0a000 storqosflt (deferred)
fffff800`67d10000 fffff800`67d38000 bindflt (deferred)
fffff800`67d40000 fffff800`67d58000 lltdio (deferred)
fffff800`67d60000 fffff800`67d78000 mslldp (deferred)
fffff800`67d80000 fffff800`67d9b000 rspndr (deferred)
fffff800`67da0000 fffff800`67dbd000 wanarp (deferred)
fffff800`67dc0000 fffff800`67e16000 msquic (deferred)
fffff800`67e20000 fffff800`67e45000 bowser (deferred)
fffff800`67e50000 fffff800`67e6a000 mpsdrv (deferred)
fffff800`67e70000 fffff800`67eb5000 mrxsmb20 (deferred)
fffff800`67ec0000 fffff800`67ed5000 tcpipreg (deferred)
fffff800`67ee0000 fffff800`68615000 RTKVHD64 (deferred)
fffff800`68620000 fffff800`68641000 BTHUSB (deferred)
fffff800`68650000 fffff800`687d2000 BTHport (deferred)
fffff800`687e0000 fffff800`687f4000 mmcss (deferred)
fffff800`69200000 fffff800`69221000 drmk (deferred)
fffff800`69230000 fffff800`692a6000 ks (deferred)
fffff800`692b0000 fffff800`6935e000 UcmCxUcsiNvppc (deferred)
fffff800`69360000 fffff800`6938c000 UcmCx (deferred)
fffff800`69390000 fffff800`6939a000 AMDPCIDev (deferred)
fffff800`693a0000 fffff800`693bc000 serial (deferred)
fffff800`693c0000 fffff800`693cf000 serenum (deferred)
fffff800`693d0000 fffff800`693dd000 amdgpio2 (deferred)
fffff800`693e0000 fffff800`69412000 msgpioclx (deferred)
fffff800`69420000 fffff800`6942c000 wmiacpi (deferred)
fffff800`69430000 fffff800`6946b000 amdppm (deferred)
fffff800`69470000 fffff800`6947a000 amdgpio3 (deferred)
fffff800`69480000 fffff800`69491000 nvvad64v (deferred)
fffff800`694a0000 fffff800`694af000 ksthunk (deferred)
fffff800`694b0000 fffff800`694bd000 NvModuleTracker (deferred)
fffff800`694c0000 fffff800`694d0000 nvvhci (deferred)
fffff800`694e0000 fffff800`694ed000 NdisVirtualBus (deferred)
fffff800`694f0000 fffff800`694fc000 swenum (deferred)
fffff800`69500000 fffff800`6950e000 rdpbus (deferred)
fffff800`69510000 fffff800`695b3000 UsbHub3 (deferred)
fffff800`695c0000 fffff800`695ce000 USBD (deferred)
fffff800`695d0000 fffff800`695f3000 nvhda64v (deferred)
fffff800`69600000 fffff800`69786000 HTTP (deferred)
fffff800`69790000 fffff800`69823000 mrxsmb (deferred)
fffff800`69830000 fffff800`69883000 srvnet (deferred)
fffff800`69890000 fffff800`698e2000 mrxsmb10 (deferred)
fffff800`698f0000 fffff800`699c6000 peauth (deferred)
fffff800`699d0000 fffff800`69a97000 srv2 (deferred)
fffff800`69aa0000 fffff800`69abc000 rassstp (deferred)
fffff800`69ac0000 fffff800`69add000 NDProxy (deferred)
fffff800`69ae0000 fffff800`69b08000 AgileVpn (deferred)
fffff800`69b10000 fffff800`69b31000 rasl2tp (deferred)
fffff800`69b40000 fffff800`69b61000 raspptp (deferred)
fffff800`69b70000 fffff800`69b8c000 raspppoe (deferred)
fffff800`69b90000 fffff800`69b9f000 ndistapi (deferred)
fffff800`69ba0000 fffff800`69bda000 ndiswan (deferred)
fffff800`69be0000 fffff800`69bf3000 condrv (deferred)
fffff800`69c00000 fffff800`69c0b000 gdrv2 (deferred)
fffff800`69c10000 fffff800`6bd47000 nvlddmkm (deferred)
fffff800`6bd50000 fffff800`6bd75000 HDAudBus (deferred)
fffff800`6bd80000 fffff800`6bde6000 portcls (deferred)
fffff800`6bdf0000 fffff800`6bdf7000 GVCIDrv64 (deferred)
fffff9d3`b6a00000 fffff9d3`b6cde000 win32kbase (deferred)
fffff9d3`b6ce0000 fffff9d3`b7096000 win32kfull (deferred)
fffff9d3`b70a0000 fffff9d3`b70e8000 cdd (deferred)
fffff9d3`b7180000 fffff9d3`b721a000 win32k C (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
Unloaded modules:
fffff800`66390000 fffff800`6639f000 dump_storpor
fffff800`65e00000 fffff800`65e33000 dump_storahc
fffff800`65e60000 fffff800`65e7e000 dump_dumpfve
fffff800`66760000 fffff800`6677c000 dam.sys
fffff800`647a0000 fffff800`647b1000 WdBoot.sys
fffff800`65840000 fffff800`65851000 hwpolicy.sys
1: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.3, DMIVersion 0, Size=2576]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends Inc.
BiosVersion = F60e
BiosReleaseDate = 12/09/2020
SystemManufacturer = Gigabyte Technology Co., Ltd.
SystemProductName = B450 AORUS ELITE
SystemFamily = Default string
SystemVersion = Default string
SystemSKU = Default string
BaseBoardManufacturer = Gigabyte Technology Co., Ltd.
BaseBoardProduct = B450 AORUS ELITE
BaseBoardVersion = x.x
1: kd> !sysinfo cpuinfo
[CPU Information]
~MHz = REG_DWORD 3593
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 23 Model 113 Stepping 0
ProcessorNameString = REG_SZ AMD Ryzen 5 3600 6-Core Processor
Update Status = REG_DWORD 1
VendorIdentifier = REG_SZ AuthenticAMD
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8864ECA7\122020-7625-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*
Executable search path is:
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
SYMSRV: BYINDEX: 0x1
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x2
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`50a00000 PsLoadedModuleList = 0xfffff802`5162a2b0
Debug session time: Sun Dec 20 05:19:48.326 2020 (UTC + 3:00)
System Uptime: 0 days 0:00:44.955
SYMSRV: BYINDEX: 0x3
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x4
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Loading Kernel Symbols
.SYMSRV: BYINDEX: 0x5
C:\ProgramData\Dbg\sym
halaacpi.dll
1A7BE8E96000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - OK
DBGENG: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - Mapped image memory
..............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`50df5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa70d`88ebc440=0000000000000162
1: kd> !analyze -v; lm
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE (162)
A lock tracked by AutoBoost was released by a thread that did not own the lock.
This is typically caused when some thread releases a lock on behalf of another
thread (which is not legal with AutoBoost tracking enabled) or when some thread
tries to release a lock it no longer owns.
Arguments:
Arg1: ffffbe0f6a7d8080, The address of the thread
Arg2: ffffbe0f6c6ea6c0, The lock address
Arg3: 00000000ffffffff, The session ID of the thread
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
SYMSRV: BYINDEX: 0x6
C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/index2.txt
SYMSRV: HttpQueryInfo: 80190190 - HTTP_STATUS_BAD_REQUEST
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGHELP: C:\Windows\System32\Null.SYS - file not found
SYMSRV: BYINDEX: 0x7
https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGENG: \SystemRoot\System32\Drivers\Null.SYS - Image mapping disallowed by non-local path.
SYMSRV: BYINDEX: 0x8
C:\ProgramData\Dbg\sym
cldflt.sys
2C3DF52180000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\cldflt.sys\2C3DF52180000\cldflt.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\cldflt.sys\2C3DF52180000\cldflt.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\cldflt.sys\2C3DF52180000\cldflt.sys - Mapped image memory
SYMSRV: BYINDEX: 0x9
C:\ProgramData\Dbg\sym
raspptp.sys
DBF0767021000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\raspptp.sys\DBF0767021000\raspptp.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\raspptp.sys\DBF0767021000\raspptp.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\raspptp.sys\DBF0767021000\raspptp.sys - Mapped image memory
SYMSRV: BYINDEX: 0xA
https://msdl.microsoft.com/download/symbols
win32kbase.sys
5EBD4C642de000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - OK
SYMSRV: BYINDEX: 0xB
C:\ProgramData\Dbg\sym
win32k.sys
E87370BB9a000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - Mapped image memory
SYMSRV: BYINDEX: 0xC
C:\ProgramData\Dbg\sym
win32k.pdb
ED706A38659240A066E6FB19B994BAAA1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: win32k - public symbols
C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: BYINDEX: 0xD
https://msdl.microsoft.com/download/symbols
dxgkrnl.sys
670B3B6A3a3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys - OK
SYMSRV: BYINDEX: 0xE
https://msdl.microsoft.com/download/symbols
BTHport.sys
F471926D182000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys - OK
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5656
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9481
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 162
BUGCHECK_P1: ffffbe0f6a7d8080
BUGCHECK_P2: ffffbe0f6c6ea6c0
BUGCHECK_P3: ffffffff
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Dragon.exe
STACK_TEXT:
ffffa70d`88ebc438 fffff802`50e1302c : 00000000`00000162 ffffbe0f`6a7d8080 ffffbe0f`6c6ea6c0 00000000`ffffffff : nt!KeBugCheckEx
ffffa70d`88ebc440 fffff802`51029061 : 00000000`00000001 ffffbe0f`0000003f ffffbe0f`00000000 00000000`00000001 : nt!ExReleasePushLockEx+0x1b214c
ffffa70d`88ebc4a0 fffff802`5102b5e9 : ffffbe0f`6c9888e0 ffffbe0f`6b692dc0 00000000`00000000 ffffbe0f`6c9888f0 : nt!ObpIncrementHandleCountEx+0x231
ffffa70d`88ebc5a0 fffff802`51001e7d : ffffbe0f`5f010340 ffffbe0f`5f0136c0 ffffbe0f`5f013900 fffff802`00000080 : nt!ObpCreateHandle+0x239
ffffa70d`88ebc790 fffff802`51001081 : 00000000`00000001 ffffa70d`88ebcb80 00000000`00000001 00000000`00000001 : nt!ObInsertObjectEx+0x13d
ffffa70d`88ebca20 fffff802`50e071b8 : ffffbe0f`6a7d8080 0000000c`d65ff2b8 ffffa70d`88ebcaa8 00000000`00000000 : nt!NtCreateEvent+0xe1
ffffa70d`88ebca90 00007ff8`577ec8b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000c`d65ff298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`577ec8b4
SYMBOL_NAME: nt!ExReleasePushLockEx+1b214c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b214c
FAILURE_BUCKET_ID: 0x162_nt!ExReleasePushLockEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4a9d56bb-cea2-9f57-d6a8-f8645f8b78a8}
Followup: MachineOwner
---------
start end module name
ffffe63e`d8800000 ffffe63e`d8ade000 win32kbase (deferred)
ffffe63e`d8ae0000 ffffe63e`d8e96000 win32kfull (deferred)
ffffe63e`d8ea0000 ffffe63e`d8ee8000 cdd (deferred)
ffffe63e`d8f10000 ffffe63e`d8faa000 win32k # (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffff802`4f400000 fffff802`4f586000 HTTP (deferred)
fffff802`4f590000 fffff802`4f5b5000 bowser (deferred)
fffff802`4f5c0000 fffff802`4f5da000 mpsdrv (deferred)
fffff802`4f5e0000 fffff802`4f673000 mrxsmb (deferred)
fffff802`4f680000 fffff802`4f6c5000 mrxsmb20 (deferred)
fffff802`4f6d0000 fffff802`4f723000 srvnet (deferred)
fffff802`4f730000 fffff802`4f782000 mrxsmb10 (deferred)
fffff802`4f790000 fffff802`4f857000 srv2 (deferred)
fffff802`4f860000 fffff802`4f8b6000 msquic (deferred)
fffff802`4f8c0000 fffff802`4f996000 peauth (deferred)
fffff802`4f9a0000 fffff802`4f9b5000 tcpipreg (deferred)
fffff802`4f9c0000 fffff802`4f9d4000 mmcss (deferred)
fffff802`4f9e0000 fffff802`4f9fc000 rassstp (deferred)
fffff802`50030000 fffff802`50058000 mcupdate_AuthenticAMD (deferred)
fffff802`50060000 fffff802`50066000 hal (deferred)
fffff802`50070000 fffff802`5007b000 kd (deferred)
fffff802`50080000 fffff802`500a7000 tm (deferred)
fffff802`500b0000 fffff802`5011a000 CLFS (deferred)
fffff802`50120000 fffff802`5013a000 PSHED (deferred)
fffff802`50140000 fffff802`5014b000 BOOTVID (deferred)
fffff802`50150000 fffff802`50263000 clipsp (deferred)
fffff802`50270000 fffff802`502df000 FLTMGR (deferred)
fffff802`502e0000 fffff802`50309000 ksecdd (deferred)
fffff802`50310000 fffff802`50372000 msrpc (deferred)
fffff802`50380000 fffff802`5038e000 cmimcext (deferred)
fffff802`50390000 fffff802`503a1000 werkernel (deferred)
fffff802`503b0000 fffff802`503bc000 ntosext (deferred)
fffff802`503c0000 fffff802`503d3000 WDFLDR (deferred)
fffff802`503e0000 fffff802`503ef000 SleepStudyHelper (deferred)
fffff802`503f0000 fffff802`50401000 WppRecorder (deferred)
fffff802`50410000 fffff802`5042a000 SgrmAgent (deferred)
fffff802`50a00000 fffff802`51a46000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
fffff802`53f80000 fffff802`53fba000 ndiswan (deferred)
fffff802`53fc0000 fffff802`53fd3000 condrv (deferred)
fffff802`53fe0000 fffff802`53ff6000 WdNisDrv (deferred)
fffff802`55a00000 fffff802`55ae3000 CI (deferred)
fffff802`55af0000 fffff802`55ba7000 cng (deferred)
fffff802`55bb0000 fffff802`55c81000 Wdf01000 (deferred)
fffff802`55c90000 fffff802`55cb6000 acpiex (deferred)
fffff802`55cc0000 fffff802`55d8c000 ACPI (deferred)
fffff802`55d90000 fffff802`55d9c000 WMILIB (deferred)
fffff802`55dc0000 fffff802`55dd7000 WindowsTrustedRT (deferred)
fffff802`55de0000 fffff802`55deb000 IntelTA (deferred)
fffff802`55df0000 fffff802`55dfb000 WindowsTrustedRTProxy (deferred)
fffff802`55e00000 fffff802`55e6b000 intelpep (deferred)
fffff802`55e70000 fffff802`55e84000 pcw (deferred)
fffff802`55e90000 fffff802`55e9b000 msisadrv (deferred)
fffff802`55ea0000 fffff802`55f16000 pci (deferred)
fffff802`55f20000 fffff802`55f35000 vdrvroot (deferred)
fffff802`55f40000 fffff802`55f6f000 pdc (deferred)
fffff802`55f70000 fffff802`55f89000 CEA (deferred)
fffff802`55f90000 fffff802`55fc1000 partmgr (deferred)
fffff802`55fd0000 fffff802`5607a000 spaceport (deferred)
fffff802`56080000 fffff802`56099000 volmgr (deferred)
fffff802`560a0000 fffff802`56103000 volmgrx (deferred)
fffff802`56110000 fffff802`5612e000 mountmgr (deferred)
fffff802`56130000 fffff802`56162000 storahci (deferred)
fffff802`56170000 fffff802`56220000 storport (deferred)
fffff802`56230000 fffff802`5624c000 EhStorClass (deferred)
fffff802`56250000 fffff802`5626a000 fileinfo (deferred)
fffff802`56270000 fffff802`562af000 Wof (deferred)
fffff802`562b0000 fffff802`5631c000 WdFilter (deferred)
fffff802`56320000 fffff802`565f9000 Ntfs (deferred)
fffff802`56600000 fffff802`5660d000 Fs_Rec (deferred)
fffff802`56610000 fffff802`5677f000 ndis (deferred)
fffff802`56780000 fffff802`56818000 NETIO (deferred)
fffff802`56820000 fffff802`56852000 ksecpkg (deferred)
fffff802`56860000 fffff802`56882000 amdpsp (deferred)
fffff802`56890000 fffff802`56b7b000 tcpip (deferred)
fffff802`56b80000 fffff802`56bff000 fwpkclnt (deferred)
fffff802`56c00000 fffff802`56c30000 wfplwfs (deferred)
fffff802`56c40000 fffff802`56d08000 fvevol (deferred)
fffff802`56d10000 fffff802`56d1b000 volume (deferred)
fffff802`56d20000 fffff802`56d8d000 volsnap (deferred)
fffff802`56d90000 fffff802`56de0000 rdyboost (deferred)
fffff802`56df0000 fffff802`56e16000 mup (deferred)
fffff802`56e20000 fffff802`56e32000 iorate (deferred)
fffff802`56e60000 fffff802`56e7c000 disk (deferred)
fffff802`56e80000 fffff802`56eec000 CLASSPNP (deferred)
fffff802`57400000 fffff802`57480000 cldflt (deferred)
fffff802`57490000 fffff802`574b1000 raspptp (deferred)
fffff802`574c0000 fffff802`574f0000 cdrom (deferred)
fffff802`57500000 fffff802`57515000 filecrypt (deferred)
fffff802`57520000 fffff802`5752e000 tbs (deferred)
fffff802`57530000 fffff802`5753a000 Null (deferred)
fffff802`57540000 fffff802`5754a000 Beep (deferred)
fffff802`57550000 fffff802`578f3000 dxgkrnl (deferred)
fffff802`57900000 fffff802`57918000 watchdog (deferred)
fffff802`57920000 fffff802`57936000 BasicDisplay (deferred)
fffff802`57940000 fffff802`57951000 BasicRender (deferred)
fffff802`57960000 fffff802`5797c000 Npfs (deferred)
fffff802`579a0000 fffff802`579be000 crashdmp (deferred)
fffff802`579e0000 fffff802`579f1000 Msfs (deferred)
fffff802`57a00000 fffff802`57a5c000 netbt (deferred)
fffff802`57a60000 fffff802`57a73000 afunix (deferred)
fffff802`57a80000 fffff802`57b23000 afd (deferred)
fffff802`57b30000 fffff802`57b40000 rtf64x64 (deferred)
fffff802`57b50000 fffff802`57b6a000 vwififlt (deferred)
fffff802`57b70000 fffff802`57b9b000 pacer (deferred)
fffff802`57ba0000 fffff802`57bb4000 ndiscap (deferred)
fffff802`57bc0000 fffff802`57bd4000 netbios (deferred)
fffff802`57be0000 fffff802`57c81000 Vid (deferred)
fffff802`57c90000 fffff802`57cb1000 winhvr (deferred)
fffff802`57cc0000 fffff802`57d3c000 rdbss (deferred)
fffff802`57d40000 fffff802`57d52000 nsiproxy (deferred)
fffff802`57d60000 fffff802`57d6e000 npsvctrig (deferred)
fffff802`57d70000 fffff802`57d80000 mssmbios (deferred)
fffff802`57d90000 fffff802`57d9a000 gpuenergydrv (deferred)
fffff802`57da0000 fffff802`57da8000 ene (deferred)
fffff802`57db0000 fffff802`57ddc000 dfsc (deferred)
fffff802`57e00000 fffff802`57e17000 bam (deferred)
fffff802`57e20000 fffff802`57e6e000 ahcache (deferred)
fffff802`57e70000 fffff802`57e82000 CompositeBus (deferred)
fffff802`57e90000 fffff802`57e9d000 kdnic (deferred)
fffff802`57ea0000 fffff802`57eb5000 umbus (deferred)
fffff802`57ec0000 fffff802`57f58000 USBXHCI (deferred)
fffff802`57f60000 fffff802`57fa4000 ucx01000 (deferred)
fffff802`57fb0000 fffff802`580ca000 rt640x64 (deferred)
fffff802`580d0000 fffff802`580e8000 mslldp (deferred)
fffff802`580f0000 fffff802`5810d000 NDProxy (deferred)
fffff802`58110000 fffff802`58138000 AgileVpn (deferred)
fffff802`58140000 fffff802`5815b000 CimFS (deferred)
fffff802`58160000 fffff802`58182000 tdx (deferred)
fffff802`58190000 fffff802`581a0000 TDI (deferred)
fffff802`581b0000 fffff802`581d1000 rasl2tp (deferred)
fffff802`581e0000 fffff802`581fc000 raspppoe (deferred)
fffff802`58400000 fffff802`5843f000 HIDCLASS (deferred)
fffff802`58440000 fffff802`58453000 HIDPARSE (deferred)
fffff802`58460000 fffff802`58497000 usbaudio (deferred)
fffff802`584a0000 fffff802`584b0000 mouhid (deferred)
fffff802`584c0000 fffff802`584d3000 mouclass (deferred)
fffff802`584e0000 fffff802`584f1000 kbdhid (deferred)
fffff802`58500000 fffff802`58514000 kbdclass (deferred)
fffff802`58520000 fffff802`5855d000 rfcomm (deferred)
fffff802`58560000 fffff802`58582000 BthEnum (deferred)
fffff802`58590000 fffff802`585b6000 bthpan (deferred)
fffff802`585d0000 fffff802`585de000 dump_diskdump (deferred)
fffff802`58620000 fffff802`58652000 dump_storahci (deferred)
fffff802`58680000 fffff802`5869d000 dump_dumpfve (deferred)
fffff802`586a0000 fffff802`58782000 dxgmms2 (deferred)
fffff802`58790000 fffff802`587b9000 luafv (deferred)
fffff802`587c0000 fffff802`587da000 storqosflt (deferred)
fffff802`587e0000 fffff802`587ef000 ndistapi (deferred)
fffff802`587f0000 fffff802`58972000 BTHport (deferred)
fffff802`58980000 fffff802`589b3000 usbccgp (deferred)
fffff802`589c0000 fffff802`589d2000 hidusb (deferred)
fffff802`589e0000 fffff802`589f8000 lltdio (deferred)
fffff802`5a400000 fffff802`5a4ae000 UcmCxUcsiNvppc (deferred)
fffff802`5a4b0000 fffff802`5a4dc000 UcmCx (deferred)
fffff802`5a4e0000 fffff802`5a4ea000 AMDPCIDev (deferred)
fffff802`5a4f0000 fffff802`5a50c000 serial (deferred)
fffff802`5a510000 fffff802`5a51f000 serenum (deferred)
fffff802`5a520000 fffff802`5a52d000 amdgpio2 (deferred)
fffff802`5a530000 fffff802`5a562000 msgpioclx (deferred)
fffff802`5a570000 fffff802`5a57c000 wmiacpi (deferred)
fffff802`5a580000 fffff802`5a5bb000 amdppm (deferred)
fffff802`5a5c0000 fffff802`5a5ca000 amdgpio3 (deferred)
fffff802`5a5d0000 fffff802`5a5e1000 nvvad64v (deferred)
fffff802`5a5f0000 fffff802`5a5ff000 ksthunk (deferred)
fffff802`5a600000 fffff802`5a60d000 NvModuleTracker (deferred)
fffff802`5a610000 fffff802`5a620000 nvvhci (deferred)
fffff802`5a630000 fffff802`5a63d000 NdisVirtualBus (deferred)
fffff802`5a640000 fffff802`5a64c000 swenum (deferred)
fffff802`5a650000 fffff802`5a65e000 rdpbus (deferred)
fffff802`5a660000 fffff802`5a703000 UsbHub3 (deferred)
fffff802`5a710000 fffff802`5a71e000 USBD (deferred)
fffff802`5a720000 fffff802`5a743000 nvhda64v (deferred)
fffff802`5a750000 fffff802`5ae85000 RTKVHD64 (deferred)
fffff802`5ae90000 fffff802`5aeb1000 BTHUSB (deferred)
fffff802`5aec0000 fffff802`5aef6000 wcifs (deferred)
fffff802`5af00000 fffff802`5af28000 bindflt (deferred)
fffff802`5af30000 fffff802`5af4d000 wanarp (deferred)
fffff802`5af50000 fffff802`5af6b000 rspndr (deferred)
fffff802`5af70000 fffff802`5d0a7000 nvlddmkm (deferred)
fffff802`5d0b0000 fffff802`5d0d5000 HDAudBus (deferred)
fffff802`5d0e0000 fffff802`5d146000 portcls (deferred)
fffff802`5d150000 fffff802`5d171000 drmk (deferred)
fffff802`5d180000 fffff802`5d1f6000 ks (deferred)
Unloaded modules:
fffff802`579d0000 fffff802`579df000 dump_storpor
fffff802`57440000 fffff802`57473000 dump_storahc
fffff802`574a0000 fffff802`574be000 dump_dumpfve
fffff802`57de0000 fffff802`57dfc000 dam.sys
fffff802`55da0000 fffff802`55db1000 WdBoot.sys
fffff802`56e40000 fffff802`56e51000 hwpolicy.sys
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO88619FA7\122020-8531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*
Executable search path is:
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
SYMSRV: BYINDEX: 0x1
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x2
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`37c00000 PsLoadedModuleList = 0xfffff803`3882a2b0
Debug session time: Sun Dec 20 05:18:12.800 2020 (UTC + 3:00)
System Uptime: 0 days 2:06:23.430
SYMSRV: BYINDEX: 0x3
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x4
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Loading Kernel Symbols
.SYMSRV: BYINDEX: 0x5
C:\ProgramData\Dbg\sym
halaacpi.dll
1A7BE8E96000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - OK
DBGENG: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - Mapped image memory
..............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`37ff5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb489`d1b87120=000000000000000a
3: kd> !analyze -v; lm
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000e40, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000e40, address which referenced memory
Debugging Details:
------------------
SYMSRV: BYINDEX: 0x6
C:\ProgramData\Dbg\sym
win32kbase.sys
5EBD4C642de000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - Mapped image memory
SYMSRV: BYINDEX: 0x7
C:\ProgramData\Dbg\sym
win32kbase.pdb
2BE295389035D6BA25B87CBACE8C52241
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kbase.pdb\2BE295389035D6BA25B87CBACE8C52241\win32kbase.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: win32kbase - public symbols
C:\ProgramData\Dbg\sym\win32kbase.pdb\2BE295389035D6BA25B87CBACE8C52241\win32kbase.pdb
SYMSRV: BYINDEX: 0x8
C:\ProgramData\Dbg\sym
win32kfull.sys
63C7040F3b6000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kfull.sys\63C7040F3b6000\win32kfull.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32kfull.sys\63C7040F3b6000\win32kfull.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\win32kfull.sys\63C7040F3b6000\win32kfull.sys - Mapped image memory
SYMSRV: BYINDEX: 0x9
C:\ProgramData\Dbg\sym
win32kfull.pdb
99DD72D54AD5D80E2341B00580C41D821
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kfull.pdb\99DD72D54AD5D80E2341B00580C41D821\win32kfull.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: win32kfull - public symbols
C:\ProgramData\Dbg\sym\win32kfull.pdb\99DD72D54AD5D80E2341B00580C41D821\win32kfull.pdb
SYMSRV: BYINDEX: 0xA
C:\ProgramData\Dbg\sym
win32k.sys
E87370BB9a000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - Mapped image memory
SYMSRV: BYINDEX: 0xB
C:\ProgramData\Dbg\sym
win32k.pdb
ED706A38659240A066E6FB19B994BAAA1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: win32k - public symbols
C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: BYINDEX: 0xC
C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/index2.txt
SYMSRV: HttpQueryInfo: 80190190 - HTTP_STATUS_BAD_REQUEST
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGHELP: C:\Windows\System32\Null.SYS - file not found
SYMSRV: BYINDEX: 0xD
https://msdl.microsoft.com/download/symbols
Null.SYS
00000000000000000000000000000000a000
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SYS - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\Null.SY_ - path not found
SYMSRV: UNC: C:\ProgramData\Dbg\sym\Null.SYS\00000000000000000000000000000000a000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SYS
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/Null.SY_
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: HTTPGET: /download/symbols/Null.SYS/00000000000000000000000000000000a000/file.ptr
SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND
SYMSRV: RESULT: 0x80190194
DBGENG: \SystemRoot\System32\Drivers\Null.SYS - Image mapping disallowed by non-local path.
SYMSRV: BYINDEX: 0xE
C:\ProgramData\Dbg\sym
msquic.sys
DE68830356000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\msquic.sys\DE68830356000\msquic.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\msquic.sys\DE68830356000\msquic.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\msquic.sys\DE68830356000\msquic.sys - Mapped image memory
SYMSRV: BYINDEX: 0xF
C:\ProgramData\Dbg\sym
AgileVpn.sys
68BE7A9F28000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\AgileVpn.sys\68BE7A9F28000\AgileVpn.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\AgileVpn.sys\68BE7A9F28000\AgileVpn.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\AgileVpn.sys\68BE7A9F28000\AgileVpn.sys - Mapped image memory
SYMSRV: BYINDEX: 0x10
C:\ProgramData\Dbg\sym
lltdio.sys
D4D91B5718000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\lltdio.sys\D4D91B5718000\lltdio.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\lltdio.sys\D4D91B5718000\lltdio.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\lltdio.sys\D4D91B5718000\lltdio.sys - Mapped image memory
SYMSRV: BYINDEX: 0x11
https://msdl.microsoft.com/download/symbols
HTTP.sys
3F355312186000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\HTTP.sys\3F355312186000\HTTP.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\HTTP.sys\3F355312186000\HTTP.sys - mismatched
SYMSRV: BYINDEX: 0x12
https://msdl.microsoft.com/download/symbols
CI.dll
CD35337Ee3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\CI.dll\CD35337Ee3000\CI.dll
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\CI.dll\CD35337Ee3000\CI.dll - OK
SYMSRV: BYINDEX: 0x13
C:\ProgramData\Dbg\sym
CI.dll
CD35337Ee3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\CI.dll\CD35337Ee3000\CI.dll
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\CI.dll\CD35337Ee3000\CI.dll - OK
DBGENG: C:\ProgramData\Dbg\sym\CI.dll\CD35337Ee3000\CI.dll - Mapped image memory
SYMSRV: BYINDEX: 0x14
https://msdl.microsoft.com/download/symbols
Wdf01000.sys
A9A9D36Ed1000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys - OK
SYMSRV: BYINDEX: 0x15
https://msdl.microsoft.com/download/symbols
dxgmms2.sys
E725F6E7e2000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\dxgmms2.sys\E725F6E7e2000\dxgmms2.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\dxgmms2.sys\E725F6E7e2000\dxgmms2.sys - mismatched
SYMSRV: BYINDEX: 0x16
https://msdl.microsoft.com/download/symbols
dxgmms2.sys
E725F6E7e2000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\dxgmms2.sys\E725F6E7e2000\dxgmms2.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\dxgmms2.sys\E725F6E7e2000\dxgmms2.sys - mismatched
SYMSRV: BYINDEX: 0x17
https://msdl.microsoft.com/download/symbols
dxgmms2.sys
E725F6E7e2000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\dxgmms2.sys\E725F6E7e2000\dxgmms2.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\dxgmms2.sys\E725F6E7e2000\dxgmms2.sys - mismatched
SYMSRV: BYINDEX: 0x18
https://msdl.microsoft.com/download/symbols
bam.sys
4BADB6B817000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\bam.sys\4BADB6B817000\bam.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\bam.sys\4BADB6B817000\bam.sys - mismatched
SYMSRV: BYINDEX: 0x19
https://msdl.microsoft.com/download/symbols
dxgkrnl.sys
670B3B6A3a3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys - OK
SYMSRV: BYINDEX: 0x1A
https://msdl.microsoft.com/download/symbols
kbdclass.sys
3156654A14000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\kbdclass.sys\3156654A14000\kbdclass.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\kbdclass.sys\3156654A14000\kbdclass.sys - mismatched
SYMSRV: BYINDEX: 0x1B
https://msdl.microsoft.com/download/symbols
BTHport.sys
F471926D182000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\BTHport.sys\F471926D182000\BTHport.sys - OK
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10858
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15298
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: e40
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: e40
READ_ADDRESS: fffff803388fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033880f330: Unable to get Flags value from nt!KdVersionBlock
fffff8033880f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000e40
PROCESS_NAME: csrss.exe
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: ffffb489d1b87260 -- (.trap 0xffffb489d1b87260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd700d33e6180
rdx=fffff80337c00000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000e40 rsp=ffffb489d1b873f0 rbp=0000000000000000
r8=ffffb489d1b87420 r9=ffffd700d33e6180 r10=0000000000000fff
r11=ffffb489d1b87330 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`00000e40 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000e40 ?? ???
STACK_TEXT:
ffffb489`d1b87118 fffff803`38007769 : 00000000`0000000a 00000000`00000e40 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffb489`d1b87120 fffff803`38003a69 : ffffd700`d33f4000 ffffe70f`c047b040 00000000`00000000 00000000`00000090 : nt!KiBugCheckDispatch+0x69
ffffb489`d1b87260 00000000`00000e40 : 00000000`00000005 ffffb489`d1b87428 ffffb489`d1b87420 ffffd700`d33e6180 : nt!KiPageFault+0x469
ffffb489`d1b873f0 00000000`00000005 : ffffb489`d1b87428 ffffb489`d1b87420 ffffd700`d33e6180 ffffd700`d33e6180 : 0xe40
ffffb489`d1b873f8 ffffb489`d1b87428 : ffffb489`d1b87420 ffffd700`d33e6180 ffffd700`d33e6180 fffff803`380351fe : 0x5
ffffb489`d1b87400 ffffb489`d1b87420 : ffffd700`d33e6180 ffffd700`d33e6180 fffff803`380351fe ffffd700`00000000 : 0xffffb489`d1b87428
ffffb489`d1b87408 ffffd700`d33e6180 : ffffd700`d33e6180 fffff803`380351fe ffffd700`00000000 00000000`00000000 : 0xffffb489`d1b87420
ffffb489`d1b87410 ffffd700`d33e6180 : fffff803`380351fe ffffd700`00000000 00000000`00000000 ffffd700`00000000 : 0xffffd700`d33e6180
ffffb489`d1b87418 fffff803`380351fe : ffffd700`00000000 00000000`00000000 ffffd700`00000000 ffffe70f`cb9f4080 : 0xffffd700`d33e6180
ffffb489`d1b87420 fffff803`37e64d7f : 00000000`00000003 00000000`0000000b ffffb489`d1b87610 00000000`00000000 : nt!KiSwapThread+0x1cfeae
ffffb489`d1b874d0 fffff803`37e43d5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffffb489`d1b87570 ffffd3ed`116583b8 : ffffd3ed`11858200 ffffe70f`c9375730 00000000`00000001 ffffd3b0`45b35300 : nt!KeWaitForMultipleObjects+0x2be
ffffb489`d1b87680 ffffd3ed`11999e7f : 00000000`00000000 00000000`00000001 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
ffffb489`d1b877b0 ffffd3ed`116c60c3 : ffffe70f`c976b080 ffffe70f`c976b080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffffb489`d1b87970 ffffd3ed`11938d80 : ffffe70f`c976b080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffb489`d1b87aa0 ffffd3ed`1230474d : ffffe70f`c976b080 ffffe70f`c976b080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffb489`d1b87ad0 fffff803`380071b8 : ffffe70f`00000005 00000000`00000005 0000028f`54205000 00000000`000003e4 : win32k!NtUserCallNoParam+0x15
ffffb489`d1b87b00 00007ff9`b17d10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000094`c773f898 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`b17d10e4
SYMBOL_NAME: win32kbase!LegacyInputDispatcher::WaitAndDispatch+88
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.662
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 88
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_win32kbase!LegacyInputDispatcher::WaitAndDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1eb1d638-b6d3-ffe9-f932-06c4719a507d}
Followup: MachineOwner
---------
start end module name
ffffd3ed`11600000 ffffd3ed`118de000 win32kbase (pdb symbols) C:\ProgramData\Dbg\sym\win32kbase.pdb\2BE295389035D6BA25B87CBACE8C52241\win32kbase.pdb
ffffd3ed`118e0000 ffffd3ed`11c96000 win32kfull (pdb symbols) C:\ProgramData\Dbg\sym\win32kfull.pdb\99DD72D54AD5D80E2341B00580C41D821\win32kfull.pdb
ffffd3ed`11ca0000 ffffd3ed`11ce8000 cdd (deferred)
ffffd3ed`12300000 ffffd3ed`1239a000 win32k # (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffff803`34600000 fffff803`34652000 mrxsmb10 (deferred)
fffff803`34660000 fffff803`34736000 peauth (deferred)
fffff803`34740000 fffff803`34755000 tcpipreg (deferred)
fffff803`34760000 fffff803`34774000 mmcss (deferred)
fffff803`34780000 fffff803`34847000 srv2 (deferred)
fffff803`34850000 fffff803`3486c000 rassstp (deferred)
fffff803`34870000 fffff803`3488d000 NDProxy (deferred)
fffff803`34890000 fffff803`348ac000 raspppoe (deferred)
fffff803`348b0000 fffff803`34a36000 HTTP (deferred)
fffff803`34a40000 fffff803`34a65000 bowser (deferred)
fffff803`34a70000 fffff803`34a8a000 mpsdrv (deferred)
fffff803`34a90000 fffff803`34b23000 mrxsmb (deferred)
fffff803`34b30000 fffff803`34b75000 mrxsmb20 (deferred)
fffff803`34b80000 fffff803`34bd3000 srvnet (deferred)
fffff803`34be0000 fffff803`34bef000 ndistapi (deferred)
fffff803`35170000 fffff803`35198000 mcupdate_AuthenticAMD (deferred)
fffff803`351a0000 fffff803`351a6000 hal (deferred)
fffff803`351b0000 fffff803`351bb000 kd (deferred)
fffff803`351c0000 fffff803`351e7000 tm (deferred)
fffff803`351f0000 fffff803`3525a000 CLFS (deferred)
fffff803`35260000 fffff803`3527a000 PSHED (deferred)
fffff803`35280000 fffff803`3528b000 BOOTVID (deferred)
fffff803`35290000 fffff803`353a3000 clipsp (deferred)
fffff803`353b0000 fffff803`3541f000 FLTMGR (deferred)
fffff803`35420000 fffff803`35449000 ksecdd (deferred)
fffff803`35450000 fffff803`354b2000 msrpc (deferred)
fffff803`354c0000 fffff803`354ce000 cmimcext (deferred)
fffff803`354d0000 fffff803`354e1000 werkernel (deferred)
fffff803`354f0000 fffff803`354fc000 ntosext (deferred)
fffff803`35500000 fffff803`35513000 WDFLDR (deferred)
fffff803`35520000 fffff803`3552f000 SleepStudyHelper (deferred)
fffff803`35530000 fffff803`35541000 WppRecorder (deferred)
fffff803`35550000 fffff803`3556a000 SgrmAgent (deferred)
fffff803`37710000 fffff803`3774a000 ndiswan (deferred)
fffff803`37750000 fffff803`37763000 condrv (deferred)
fffff803`37770000 fffff803`37786000 WdNisDrv (deferred)
fffff803`37c00000 fffff803`38c46000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
fffff803`3aa00000 fffff803`3aae3000 CI (deferred)
fffff803`3aaf0000 fffff803`3aba7000 cng (deferred)
fffff803`3abb0000 fffff803`3ac81000 Wdf01000 (deferred)
fffff803`3ac90000 fffff803`3acb6000 acpiex (deferred)
fffff803`3acc0000 fffff803`3ad8c000 ACPI (deferred)
fffff803`3ad90000 fffff803`3ad9c000 WMILIB (deferred)
fffff803`3adc0000 fffff803`3add7000 WindowsTrustedRT (deferred)
fffff803`3ade0000 fffff803`3adeb000 IntelTA (deferred)
fffff803`3adf0000 fffff803`3adfb000 WindowsTrustedRTProxy (deferred)
fffff803`3ae00000 fffff803`3ae6b000 intelpep (deferred)
fffff803`3ae70000 fffff803`3ae84000 pcw (deferred)
fffff803`3ae90000 fffff803`3ae9b000 msisadrv (deferred)
fffff803`3aea0000 fffff803`3af16000 pci (deferred)
fffff803`3af20000 fffff803`3af35000 vdrvroot (deferred)
fffff803`3af40000 fffff803`3af6f000 pdc (deferred)
fffff803`3af70000 fffff803`3af89000 CEA (deferred)
fffff803`3af90000 fffff803`3afc1000 partmgr (deferred)
fffff803`3afd0000 fffff803`3b07a000 spaceport (deferred)
fffff803`3b080000 fffff803`3b099000 volmgr (deferred)
fffff803`3b0a0000 fffff803`3b103000 volmgrx (deferred)
fffff803`3b110000 fffff803`3b12e000 mountmgr (deferred)
fffff803`3b130000 fffff803`3b162000 storahci (deferred)
fffff803`3b170000 fffff803`3b220000 storport (deferred)
fffff803`3b230000 fffff803`3b24c000 EhStorClass (deferred)
fffff803`3b250000 fffff803`3b26a000 fileinfo (deferred)
fffff803`3b270000 fffff803`3b2af000 Wof (deferred)
fffff803`3b2b0000 fffff803`3b31c000 WdFilter (deferred)
fffff803`3b320000 fffff803`3b5f9000 Ntfs (deferred)
fffff803`3b600000 fffff803`3b60d000 Fs_Rec (deferred)
fffff803`3b610000 fffff803`3b77f000 ndis (deferred)
fffff803`3b780000 fffff803`3b818000 NETIO (deferred)
fffff803`3b820000 fffff803`3b852000 ksecpkg (deferred)
fffff803`3b860000 fffff803`3b882000 amdpsp (deferred)
fffff803`3b890000 fffff803`3bb7b000 tcpip (deferred)
fffff803`3bb80000 fffff803`3bbff000 fwpkclnt (deferred)
fffff803`3bc00000 fffff803`3bc30000 wfplwfs (deferred)
fffff803`3bc40000 fffff803`3bd08000 fvevol (deferred)
fffff803`3bd10000 fffff803`3bd1b000 volume (deferred)
fffff803`3bd20000 fffff803`3bd8d000 volsnap (deferred)
fffff803`3bd90000 fffff803`3bde0000 rdyboost (deferred)
fffff803`3bdf0000 fffff803`3be16000 mup (deferred)
fffff803`3be20000 fffff803`3be32000 iorate (deferred)
fffff803`3be60000 fffff803`3be7c000 disk (deferred)
fffff803`3be80000 fffff803`3beec000 CLASSPNP (deferred)
fffff803`3c400000 fffff803`3c415000 filecrypt (deferred)
fffff803`3c420000 fffff803`3c42e000 tbs (deferred)
fffff803`3c430000 fffff803`3c43a000 Null (deferred)
fffff803`3c440000 fffff803`3c44a000 Beep (deferred)
fffff803`3c450000 fffff803`3c532000 dxgmms2 (deferred)
fffff803`3c540000 fffff803`3c5c0000 cldflt (deferred)
fffff803`3c5d0000 fffff803`3c5f8000 bindflt (deferred)
fffff803`3c600000 fffff803`3c61d000 wanarp (deferred)
fffff803`3c620000 fffff803`3c63b000 rspndr (deferred)
fffff803`3c640000 fffff803`3c658000 mslldp (deferred)
fffff803`3c660000 fffff803`3c681000 raspptp (deferred)
fffff803`3c6b0000 fffff803`3c6ce000 crashdmp (deferred)
fffff803`3c6d0000 fffff803`3c726000 msquic (deferred)
fffff803`3c730000 fffff803`3c758000 AgileVpn (deferred)
fffff803`3c760000 fffff803`3c781000 rasl2tp (deferred)
fffff803`3c7b0000 fffff803`3c7e0000 cdrom (deferred)
fffff803`3cc00000 fffff803`3cc1b000 CimFS (deferred)
fffff803`3cc20000 fffff803`3cc42000 tdx (deferred)
fffff803`3cc50000 fffff803`3cc60000 TDI (deferred)
fffff803`3cc70000 fffff803`3cccc000 netbt (deferred)
fffff803`3ccd0000 fffff803`3cce3000 afunix (deferred)
fffff803`3ccf0000 fffff803`3cd93000 afd (deferred)
fffff803`3cda0000 fffff803`3cdb0000 rtf64x64 (deferred)
fffff803`3cdc0000 fffff803`3cdda000 vwififlt (deferred)
fffff803`3cde0000 fffff803`3ce0b000 pacer (deferred)
fffff803`3ce10000 fffff803`3ce24000 ndiscap (deferred)
fffff803`3ce30000 fffff803`3ce44000 netbios (deferred)
fffff803`3ce50000 fffff803`3cef1000 Vid (deferred)
fffff803`3cf00000 fffff803`3cf21000 winhvr (deferred)
fffff803`3cf30000 fffff803`3cfac000 rdbss (deferred)
fffff803`3cfb0000 fffff803`3cfc2000 nsiproxy (deferred)
fffff803`3cfd0000 fffff803`3cfde000 npsvctrig (deferred)
fffff803`3cfe0000 fffff803`3cff0000 mssmbios (deferred)
fffff803`3d000000 fffff803`3d00a000 gpuenergydrv (deferred)
fffff803`3d010000 fffff803`3d018000 ene (deferred)
fffff803`3d020000 fffff803`3d04c000 dfsc (deferred)
fffff803`3d050000 fffff803`3d068000 lltdio (deferred)
fffff803`3d070000 fffff803`3d087000 bam (deferred)
fffff803`3d090000 fffff803`3d0de000 ahcache (deferred)
fffff803`3d0e0000 fffff803`3d0f2000 CompositeBus (deferred)
fffff803`3d100000 fffff803`3d10d000 kdnic (deferred)
fffff803`3d110000 fffff803`3d125000 umbus (deferred)
fffff803`3d130000 fffff803`3d1c8000 USBXHCI (deferred)
fffff803`3d1d0000 fffff803`3d214000 ucx01000 (deferred)
fffff803`3d220000 fffff803`3d33a000 rt640x64 (deferred)
fffff803`3d340000 fffff803`3da75000 RTKVHD64 (deferred)
fffff803`3da80000 fffff803`3dabd000 rfcomm (deferred)
fffff803`3dac0000 fffff803`3dae2000 BthEnum (deferred)
fffff803`3daf0000 fffff803`3db16000 bthpan (deferred)
fffff803`3db20000 fffff803`3db49000 luafv (deferred)
fffff803`3db50000 fffff803`3db86000 wcifs (deferred)
fffff803`3db90000 fffff803`3dbaa000 storqosflt (deferred)
fffff803`3dbb0000 fffff803`3df53000 dxgkrnl (deferred)
fffff803`3df60000 fffff803`3df78000 watchdog (deferred)
fffff803`3df80000 fffff803`3df96000 BasicDisplay (deferred)
fffff803`3dfa0000 fffff803`3dfb1000 BasicRender (deferred)
fffff803`3dfc0000 fffff803`3dfdc000 Npfs (deferred)
fffff803`3dfe0000 fffff803`3dff1000 Msfs (deferred)
fffff803`40200000 fffff803`402ae000 UcmCxUcsiNvppc (deferred)
fffff803`402b0000 fffff803`402dc000 UcmCx (deferred)
fffff803`402e0000 fffff803`402ea000 AMDPCIDev (deferred)
fffff803`402f0000 fffff803`4030c000 serial (deferred)
fffff803`40310000 fffff803`4031f000 serenum (deferred)
fffff803`40320000 fffff803`4032d000 amdgpio2 (deferred)
fffff803`40330000 fffff803`40362000 msgpioclx (deferred)
fffff803`40370000 fffff803`4037c000 wmiacpi (deferred)
fffff803`40380000 fffff803`403bb000 amdppm (deferred)
fffff803`403c0000 fffff803`403ca000 amdgpio3 (deferred)
fffff803`403d0000 fffff803`403e1000 nvvad64v (deferred)
fffff803`403f0000 fffff803`403ff000 ksthunk (deferred)
fffff803`40400000 fffff803`4040d000 NvModuleTracker (deferred)
fffff803`40410000 fffff803`40420000 nvvhci (deferred)
fffff803`40430000 fffff803`4043d000 NdisVirtualBus (deferred)
fffff803`40440000 fffff803`4044c000 swenum (deferred)
fffff803`40450000 fffff803`4045e000 rdpbus (deferred)
fffff803`40460000 fffff803`40503000 UsbHub3 (deferred)
fffff803`40510000 fffff803`4051e000 USBD (deferred)
fffff803`40520000 fffff803`40543000 nvhda64v (deferred)
fffff803`40550000 fffff803`40583000 usbccgp (deferred)
fffff803`40590000 fffff803`405a2000 hidusb (deferred)
fffff803`405b0000 fffff803`405ef000 HIDCLASS (deferred)
fffff803`405f0000 fffff803`40603000 HIDPARSE (deferred)
fffff803`40610000 fffff803`40647000 usbaudio (deferred)
fffff803`40650000 fffff803`40660000 mouhid (deferred)
fffff803`40670000 fffff803`40683000 mouclass (deferred)
fffff803`40690000 fffff803`406a1000 kbdhid (deferred)
fffff803`406b0000 fffff803`406c4000 kbdclass (deferred)
fffff803`406d0000 fffff803`406f1000 BTHUSB (deferred)
fffff803`40700000 fffff803`40882000 BTHport (deferred)
fffff803`408a0000 fffff803`408ae000 dump_diskdump (deferred)
fffff803`408f0000 fffff803`40922000 dump_storahci (deferred)
fffff803`40930000 fffff803`42a67000 nvlddmkm (deferred)
fffff803`42a70000 fffff803`42a95000 HDAudBus (deferred)
fffff803`42aa0000 fffff803`42b06000 portcls (deferred)
fffff803`42b10000 fffff803`42b31000 drmk (deferred)
fffff803`42b40000 fffff803`42bb6000 ks (deferred)
fffff803`42be0000 fffff803`42bfd000 dump_dumpfve (deferred)
Unloaded modules:
fffff803`37790000 fffff803`377a2000 MpKslDrv.sys
fffff803`3c6e0000 fffff803`3c6ef000 dump_storpor
fffff803`3c730000 fffff803`3c763000 dump_storahc
fffff803`3c790000 fffff803`3c7ae000 dump_dumpfve
fffff803`3d050000 fffff803`3d06c000 dam.sys
fffff803`3ada0000 fffff803`3adb1000 WdBoot.sys
fffff803`3be40000 fffff803`3be51000 hwpolicy.sys