*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation.
Arg2: ffff9d0ffaf02990, Address of pool
Arg3: 00000000ffff9d0f, Pool allocation's tag
Arg4: dff970ec95816abc, Quota process pointer (bad).
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7234
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16926
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: c2
BUGCHECK_P1: d
BUGCHECK_P2: ffff9d0ffaf02990
BUGCHECK_P3: ffff9d0f
BUGCHECK_P4: dff970ec95816abc
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff402`86c30a28 fffff802`6d266e60 : 00000000`000000c2 00000000`0000000d ffff9d0f`faf02990 00000000`ffff9d0f : nt!KeBugCheckEx
fffff402`86c30a30 fffff802`6d7b1019 : 00000000`00000000 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x19fe20
fffff402`86c30b10 fffff802`6d5075a1 : fffff802`6db25440 ffff9d0f`f8f8a490 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
fffff402`86c30b40 fffff802`6d1035f5 : ffff9d0f`f08e6040 ffff9d0f`eea8cce0 ffff9d0f`f8f8a1f0 ffff9d0f`f8f8a1f0 : nt!PfSnSectionInfoCleanupWorkItem+0x61
fffff402`86c30b70 fffff802`6d0a2ae5 : ffff9d0f`f08e6040 00000000`00000080 ffff9d0f`eea9f200 00000000`00000000 : nt!ExpWorkerThread+0x105
fffff402`86c30c10 fffff802`6d1fbbf8 : ffffaf00`4ab07180 ffff9d0f`f08e6040 fffff802`6d0a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff402`86c30c60 00000000`00000000 : fffff402`86c31000 fffff402`86c2b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PfSnSectionInfoCleanupWorkItem+61
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 61
FAILURE_BUCKET_ID: 0xc2_d_nt!PfSnSectionInfoCleanupWorkItem
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {296cfd8d-5abd-60db-7854-0f142056bcef}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000001025, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8052daedf40, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7358
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15352
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 1025
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8052daedf40
READ_ADDRESS: fffff8052c0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8052c00f340: Unable to get Flags value from nt!KdVersionBlock
fffff8052c00f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000001025
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe600f20992a0 -- (.trap 0xffffe600f20992a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=6800a73b52110000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8052daedf40 rsp=ffffe600f2099430 rbp=0000000000000ffe
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffffe600f2099400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
tcpip!TcpRetransmitTimeout+0x100:
fffff805`2daedf40 488b4d27 mov rcx,qword ptr [rbp+27h] ss:0018:00000000`00001025=????????????????
Resetting default scope
STACK_TEXT:
ffffe600`f2099158 fffff805`2b806569 : 00000000`0000000a 00000000`00001025 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe600`f2099160 fffff805`2b802869 : 00000000`00000001 fffff805`2b72d5b1 00000000`00000000 00000000`00000002 : nt!KiBugCheckDispatch+0x69
ffffe600`f20992a0 fffff805`2daedf40 : 00000000`676d20f8 00000000`00000200 ffff8a09`b5fee460 fffff780`00000008 : nt!KiPageFault+0x469
ffffe600`f2099430 fffff805`2daf03a6 : fffff780`00000008 ffff8a09`b5fee460 ffff8a09`b5fee460 fffff780`00000008 : tcpip!TcpRetransmitTimeout+0x100
ffffe600`f2099530 fffff805`2daee787 : 00000000`00000000 00000000`00989680 00000000`00000009 00000000`678eab36 : tcpip!TcpProcessExpiredTcbTimers+0x4e6
ffffe600`f2099640 fffff805`2b6e549e : ffff9b01`cf503240 00000000`00000000 ffffe600`f2099b20 ffff9b01`cf500180 : tcpip!TcpPeriodicTimeoutHandler+0x3f7
ffffe600`f2099860 fffff805`2b6e4784 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffe600`f20999d0 fffff805`2b7f810e : ffffffff`00000000 ffff9b01`cf500180 ffff9b01`cf50b340 ffff8a09`b633f040 : nt!KiRetireDpcList+0x1f4
ffffe600`f2099c60 00000000`00000000 : ffffe600`f209a000 ffffe600`f2094000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: tcpip!TcpRetransmitTimeout+100
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
IMAGE_VERSION: 10.0.19041.1124
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 100
FAILURE_BUCKET_ID: AV_tcpip!TcpRetransmitTimeout
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f754d840-60d7-f804-f689-3ddd9703fad4}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff800692fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6906
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13991
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff800692fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffce04e323e0f0 -- (.trap 0xffffce04e323e0f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000006c5ab7c9 rbx=0000000000000000 rcx=ffffce04e323e318
rdx=ffffe608fe34c4c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800688bee17 rsp=ffffce04e323e280 rbp=00000001e83bf7d0
r8=ffffce04e323e500 r9=0000000000000001 r10=ffffe608fe34cd58
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff800`688bee17 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
BAD_STACK_POINTER: ffffce04e323e280
STACK_TEXT:
ffffcf80`26cd2e18 fffff800`68a87a98 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`692fb320 : nt!KeBugCheckEx
ffffcf80`26cd2e20 fffff800`68926993 : 00001811`c25a906a ffffcf80`26c80180 00000000`00000000 ffffcf80`26c80180 : nt!KeAccumulateTicks+0x15dda8
ffffcf80`26cd2e80 fffff800`6892647a : ffffe608`f30cd040 ffffce04`e323e170 ffffce04`df4b5b00 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffffcf80`26cd2f30 fffff800`6882ecd5 : ffffe608`f30cd040 00000000`00000000 00000000`00000000 ffff80f9`0d9ed039 : nt!HalpTimerClockIpiRoutine+0x1a
ffffcf80`26cd2f60 fffff800`689f604a : ffffce04`e323e170 ffffe608`f30cd040 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffcf80`26cd2fb0 fffff800`689f65b7 : 00000000`0000126c ffffcf80`268ea000 ffffe608`fe34c4c0 fffff800`689f65c4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffce04`e323e0f0 fffff800`688bee17 : ffffffff`ffffffd2 fffff800`688c603e 00000000`00000010 00000000`00000286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffce04`e323e280 fffff800`688c603a : ffffcf80`00000000 ffffe608`fe34c4c0 00000000`00000006 ffffce04`08000808 : nt!KeYieldProcessorEx+0x17
ffffce04`e323e2b0 fffff800`689241bc : ffffce04`e323e660 fffff800`688c5966 ffffcf80`26a40180 fffff800`68b1958e : nt!KiDeferredReadySingleThread+0xc3a
ffffce04`e323e4a0 fffff800`6885a191 : ffffe608`fe34c598 ffffe608`f3089040 00000000`00000000 00000000`0000018c : nt!KiReadyDeferredReadyList+0x3c
ffffce04`e323e4d0 fffff800`689fb54e : 00000000`ffffffff 00000000`00000000 ffffcf80`26c80180 00000000`00000000 : nt!KiQueueReadyThread+0x361
ffffce04`e323e550 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxDispatchInterrupt+0x12e
SYMBOL_NAME: nt!KeAccumulateTicks+15dda8
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15dda8
FAILURE_BUCKET_ID: 0x133_ISR_STACKPTR_ERROR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29be0eb-3419-aa75-d38d-83d2e8ddbdc2}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffb879cbe14
Arg3: 000000000000001d
Arg4: fffffa8a4d4bbb00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5250
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8788
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 7ffb879cbe14
BUGCHECK_P3: 1d
BUGCHECK_P4: fffffa8a4d4bbb00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
fffffa8a`4d4bb958 fffff800`6a073a20 : 00000000`0000001a 00000000`00061941 00007ffb`879cbe14 00000000`0000001d : nt!KeBugCheckEx
fffffa8a`4d4bb960 fffff800`6a00275e : 000001a7`ceb89660 00000000`00000000 fffffa8a`4d4bbb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840
fffffa8a`4d4bbb00 00007ffb`879cbe14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000089`1918f9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`879cbe14
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8024a87a795, The address that the exception occurred at
Arg3: ffff83080fc97278, Exception Record Address
Arg4: ffff83080fc96ab0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 7936
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13319
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8024a87a795
BUGCHECK_P3: ffff83080fc97278
BUGCHECK_P4: ffff83080fc96ab0
EXCEPTION_RECORD: ffff83080fc97278 -- (.exr 0xffff83080fc97278)
ExceptionAddress: fffff8024a87a795 (nt!IoIsOperationSynchronous+0x0000000000000015)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000050
Attempt to read from address 0000000000000050
CONTEXT: ffff83080fc96ab0 -- (.cxr 0xffff83080fc96ab0)
rax=0000000000000000 rbx=ffff83080fc975d0 rcx=ffff870e56cec4c8
rdx=0000000000000000 rsi=0000000000060830 rdi=0000000000000000
rip=fffff8024a87a795 rsp=ffff83080fc974b8 rbp=0000000000000000
r8=0000000000060830 r9=0000000000000564 r10=fffff8024a87a780
r11=ffff870e536190a0 r12=ffff870e56cec4c8 r13=0000000000000000
r14=ffff870e58c1c310 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!IoIsOperationSynchronous+0x15:
fffff802`4a87a795 f6425002 test byte ptr [rdx+50h],2 ds:002b:00000000`00000050=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: drvinst.exe
READ_ADDRESS: fffff8024b2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8024b20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8024b20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000050
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000050
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff8308`0fc974b8 fffff802`470e5bbb : ffff8308`0fc975b1 fffff802`4a8caa71 ffff870e`58c1c310 00000000`00000000 : nt!IoIsOperationSynchronous+0x15
ffff8308`0fc974c0 fffff802`470e4b46 : ffff8308`0fc975d0 ffff870e`00000000 ffff870e`56cec050 ffff8308`0fc975e0 : FLTMGR!FltpPassThroughInternal+0x14b
ffff8308`0fc97510 fffff802`4711caaf : 001f0003`ffff0001 00000000`00000000 00000000`000000e0 fffff802`4acefe11 : FLTMGR!FltpPassThrough+0x1d6
ffff8308`0fc975b0 fffff802`4a8cd805 : 00000000`0000000a ffff870e`56cec050 00000000`00000002 00000000`00000000 : FLTMGR!FltpFsControl+0xbf
ffff8308`0fc97610 fffff802`4acc2528 : ffff870e`56cec050 00000000`00000000 00000000`00000000 ffff870e`58351080 : nt!IofCallDriver+0x55
ffff8308`0fc97650 fffff802`4acc1df5 : 00000000`00090120 ffff8308`0fc97990 00000000`00440005 ffff8308`0fc97990 : nt!IopSynchronousServiceTail+0x1a8
ffff8308`0fc976f0 fffff802`4ac9a0f8 : 00000000`00000000 ffffffff`80001be0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff8308`0fc97830 fffff802`4ae41b83 : ffff988b`9dfae150 ffffffff`800018f4 ffff8308`0fc979b1 ffff988b`9e4021e8 : nt!PfSnPrefetchFileMetadata+0xe8
ffff8308`0fc978d0 fffff802`4ad078b5 : 00000000`0000006c ffff8308`0fc97b00 ffff988b`9e44db58 ffff988b`00000000 : nt!PfSnGetSectionObject+0x13a04b
ffff8308`0fc97a00 fffff802`4a9035f5 : ffff870e`53b43040 ffff870e`53b43040 ffff870e`4ce98940 00000000`00000100 : nt!PfSnPopulateReadList+0x2b5
ffff8308`0fc97b70 fffff802`4a8a2ae5 : ffff870e`53b43040 00000000`00000080 ffff870e`4cea3040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8308`0fc97c10 fffff802`4a9fbbf8 : ffffaa00`d01e0180 ffff870e`53b43040 fffff802`4a8a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8308`0fc97c60 00000000`00000000 : ffff8308`0fc98000 ffff8308`0fc92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!IoIsOperationSynchronous+15
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffff83080fc96ab0 ; kb
BUCKET_ID_FUNC_OFFSET: 15
FAILURE_BUCKET_ID: AV_nt!IoIsOperationSynchronous
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a2c8398f-561e-ba4f-ad91-3cdfd861b289}
Followup: MachineOwner
---------