*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffdf81419f0e70
Arg3: 0000000000000000
Arg4: fffff8041ab62eca
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9515
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 107467
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffffdf81419f0e70
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8041ab62eca
TRAP_FRAME: ffffdf81419f0e70 -- (.trap 0xffffdf81419f0e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041ab62eca rsp=0000000000000000 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
amdppm!ReadIoMemRaw+0x5a:
fffff804`1ab62eca c3 ret
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffdf81`419f0d28 fffff804`0c005e69 : 00000000`0000007f 00000000`00000008 ffffdf81`419f0e70 00000000`00000000 : nt!KeBugCheckEx
ffffdf81`419f0d30 fffff804`0c000c83 : 02e08211`0f000002 0002f082`110f0000 00000300`82110f00 48000003`10828948 : nt!KiBugCheckDispatch+0x69
ffffdf81`419f0e70 fffff804`1ab62eca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : amdppm!ReadIoMemRaw+0x5a
SYMBOL_NAME: amdppm!ReadIoMemRaw+5a
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
IMAGE_VERSION: 10.0.19041.208
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5a
FAILURE_BUCKET_ID: 0x7f_8_amdppm!ReadIoMemRaw
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {224c29e4-aa37-00cf-dfef-b2ba3b97b525}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8055d5fb3a8, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5155
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9026
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8055d5fb3a8
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8055defa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8055de0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8055de0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
BAD_STACK_POINTER: fffff805620c38e8
STACK_TEXT:
fffff805`620c38e8 fffff805`5d64e5b9 : 00000000`0000001e ffffffff`c0000005 fffff805`5d5fb3a8 00000000`00000000 : nt!KeBugCheckEx
fffff805`620c38f0 fffff805`5d5f4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1caa59
fffff805`620c3fb0 fffff805`5d5f4d00 : fffff805`5d605fa5 00000000`00000006 00000000`00000003 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8285`7ed25358 fffff805`5d605fa5 : 00000000`00000006 00000000`00000003 00000000`00000000 00000000`00000005 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8285`7ed25360 fffff805`5d601ce0 : ffff8285`7ed25710 fffff805`5d5fae64 00000000`00000000 00000001`00000000 : nt!KiExceptionDispatch+0x125
ffff8285`7ed25540 fffff805`5d5fb3a8 : f4fff805`5d5fac26 f7ffdc80`5eb08180 07000000`00000000 fdfff805`5d200000 : nt!KiGeneralProtectionFault+0x320
ffff8285`7ed256d8 f4fff805`5d5fac26 : f7ffdc80`5eb08180 07000000`00000000 fdfff805`5d200000 f6ffa607`0e865080 : nt!SwapContext+0x4a8
ffff8285`7ed256e0 f7ffdc80`5eb08180 : 07000000`00000000 fdfff805`5d200000 f6ffa607`0e865080 00000000`0000000f : 0xf4fff805`5d5fac26
ffff8285`7ed256e8 07000000`00000000 : fdfff805`5d200000 f6ffa607`0e865080 00000000`0000000f 00000000`00000400 : 0xf7ffdc80`5eb08180
ffff8285`7ed256f0 fdfff805`5d200000 : f6ffa607`0e865080 00000000`0000000f 00000000`00000400 7eec3dcd`ef89c429 : 0x07000000`00000000
ffff8285`7ed256f8 f6ffa607`0e865080 : 00000000`0000000f 00000000`00000400 7eec3dcd`ef89c429 62cee072`c7f85d84 : 0xfdfff805`5d200000
ffff8285`7ed25700 00000000`0000000f : 00000000`00000400 7eec3dcd`ef89c429 62cee072`c7f85d84 bea0465d`2bc764f3 : 0xf6ffa607`0e865080
ffff8285`7ed25708 00000000`00000400 : 7eec3dcd`ef89c429 62cee072`c7f85d84 bea0465d`2bc764f3 a004b742`b4b28e4b : 0xf
ffff8285`7ed25710 7eec3dcd`ef89c429 : 62cee072`c7f85d84 bea0465d`2bc764f3 a004b742`b4b28e4b 00000000`00000000 : 0x400
ffff8285`7ed25718 62cee072`c7f85d84 : bea0465d`2bc764f3 a004b742`b4b28e4b 00000000`00000000 00000000`00000000 : 0x7eec3dcd`ef89c429
ffff8285`7ed25720 bea0465d`2bc764f3 : a004b742`b4b28e4b 00000000`00000000 00000000`00000000 00000000`00000000 : 0x62cee072`c7f85d84
ffff8285`7ed25728 a004b742`b4b28e4b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbea0465d`2bc764f3
ffff8285`7ed25730 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xa004b742`b4b28e4b
SYMBOL_NAME: nt!SwapContext+4a8
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4a8
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bd591bce-fa9d-a983-0398-0157fd169b8e}
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80068a172f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80065d05808, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for rt640x64.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11030
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 58092
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: fffff80068a172f0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80065d05808
READ_ADDRESS: fffff800666fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8006660f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8006660f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80068a172f0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff9085024de130 -- (.trap 0xffff9085024de130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80065d05808 rsp=ffff9085024de2c0 rbp=0000000000000004
r8=ffffde8329a25f70 r9=0000000000000004 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiFillSystemPtes+0xa8:
fffff800`65d05808 498b9cc7d0720100 mov rbx,qword ptr [r15+rax*8+172D0h] ds:00000000`000172f0=????????????????
Resetting default scope
STACK_TEXT:
ffff9085`024de2c0 fffff800`65d05692 : ffffde83`00000001 00000000`00000001 ffff9085`024de988 ffffde83`2a451720 : nt!MiFillSystemPtes+0xa8
ffff9085`024de380 fffff800`73f5b795 : ffffde83`29a25f40 00000000`00000000 00000000`00000254 ffffde83`295e8de0 : nt!MmMapLockedPagesSpecifyCache+0x162
ffff9085`024de3e0 fffff800`73f5b31d : 00000000`00000000 00000000`00000000 00001e00`00001e00 00000000`00000000 : afd!AfdMapMdlChain+0x39
ffff9085`024de420 fffff800`73f1245e : ffffde83`28edf900 ffffde83`00000000 ffffde83`00000254 00000000`00000000 : afd!AfdSetupReceiveDatagramIrp+0x6d
ffff9085`024de4e0 fffff800`73f5d1c9 : ffffde83`289ff2b0 ffffde83`253f60e0 ffffde83`253f6118 fffff800`6b584d1b : afd!AfdReceiveDatagramEventCommonHandler+0x32e
ffff9085`024de600 fffff800`6bb1704b : ffff9085`024de7d0 00000000`00000000 ffff9085`00000254 00000000`00000000 : afd!AfdTLDgramReceiveEventHandler+0x149
ffff9085`024de6d0 fffff800`6bb15d7d : 00000000`00000000 ffff9085`024de9f0 ffffde83`2a451791 ffff9085`024de988 : tcpip!UdpDeliverDatagrams+0x8eb
ffff9085`024de8f0 fffff800`6bb159c0 : ffffde83`2a554320 00000000`00000001 00000000`00000000 ffff9085`024df0b0 : tcpip!UdpReceiveDatagrams+0x2ad
ffff9085`024decf0 fffff800`6bb00969 : 00000000`00000000 00000000`00000001 ffffde83`23eee9f0 00000000`00000000 : tcpip!UdpNlClientReceiveDatagrams+0x10
ffff9085`024ded20 fffff800`6bb59a2e : ffffde83`250ff140 ffffde83`2560c970 00000001`ffffff11 fffffff6`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
ffff9085`024defb0 fffff800`65cb8908 : ffffde83`2378ff60 00000000`00000002 ffffde83`236ee040 ffff9085`024df2a8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
ffff9085`024df100 fffff800`65cb887d : fffff800`6bb59900 ffff9085`024df2a8 ffffde83`234dac40 fffff800`6b6f23af : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9085`024df170 fffff800`6bae331d : ffffde83`282a4488 00000000`00000000 ffffde83`28f31a20 fffff800`6bdd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff9085`024df1b0 fffff800`6bae29fd : 00000000`00000001 ffff9085`024df310 ffffde83`2560c970 00000000`00000000 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffff9085`024df210 fffff800`6b581eb0 : ffffde83`23e8c961 00000000`00000001 ffffde83`238439b0 ffff9085`024df620 : tcpip!FlReceiveNetBufferListChain+0x46d
ffff9085`024df4c0 fffff800`6b581ccb : ffffde83`25613050 fffff800`00000001 ffff9085`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffff9085`024df5a0 fffff800`6b587ef0 : ffffde83`23ae41a0 ffffde83`23f45001 ffffde83`23ae41a0 ffffde83`29413001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffff9085`024df620 fffff800`6b5bdcf3 : ffffde83`23f45030 ffff9085`024df6f1 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
ffff9085`024df670 fffff800`6b584a94 : 00000000`00008c94 00000000`00000001 ffffde83`23ae41a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffff9085`024df740 fffff800`74516a28 : ffffde83`23ee0000 ffffde83`23ee0000 00000000`00000000 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffff9085`024df7d0 ffffde83`23ee0000 : ffffde83`23ee0000 00000000`00000000 00000000`00000000 00000000`00000001 : rt640x64+0x26a28
ffff9085`024df7d8 ffffde83`23ee0000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : 0xffffde83`23ee0000
ffff9085`024df7e0 00000000`00000000 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : 0xffffde83`23ee0000
STACK_COMMAND: .trap 0xffff9085024de130 ; kb
SYMBOL_NAME: rt640x64+26a28
MODULE_NAME: rt640x64
IMAGE_NAME: rt640x64.sys
BUCKET_ID_FUNC_OFFSET: 26a28
FAILURE_BUCKET_ID: AV_rt640x64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2e96e72d-48ac-dceb-22bd-11e71513e43e}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000000c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8010e2e6955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5218
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 20050
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8010e2e6955
READ_ADDRESS: fffff8010ecfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010ec0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8010ec0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000000c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffffaa0ce9ab5710 -- (.trap 0xffffaa0ce9ab5710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8a0540d58010 rbx=0000000000000000 rcx=0000000000000004
rdx=ffff8a053edf9348 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010e2e6955 rsp=ffffaa0ce9ab58a0 rbp=ffffaa0ce9ab5920
r8=ffff8a053d6900c0 r9=fffff8010e000000 r10=ffffffffffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiDeliverApc+0x135:
fffff801`0e2e6955 48395108 cmp qword ptr [rcx+8],rdx ds:00000000`0000000c=????????????????
Resetting default scope
STACK_TEXT:
ffffaa0c`e9ab55c8 fffff801`0e405e69 : 00000000`0000000a 00000000`0000000c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaa0c`e9ab55d0 fffff801`0e402169 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaa0c`e9ab5710 fffff801`0e2e6955 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffaa0c`e9ab58a0 fffff801`0e20dcfb : 00000000`00000e74 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x135
ffffaa0c`e9ab5950 fffff801`0e2c76af : ffff8a05`3cad5f30 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCheckForKernelApcDelivery+0x2b
ffffaa0c`e9ab5980 fffff801`0e6d4b41 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeLeaveCriticalRegionThread+0x2f
ffffaa0c`e9ab59b0 fffff801`0e6d48fe : ffff8a05`3d6900c0 00000000`00000002 ffff8a05`354c1900 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0x231
ffffaa0c`e9ab5a40 fffff801`0e6a4890 : 00000000`00000000 ffff8a05`3edf9280 00000000`1aa1ec28 ffffaa0c`e9ab5aa8 : nt!ObReferenceObjectByHandle+0x2e
ffffaa0c`e9ab5a90 fffff801`0e4058b8 : ffff8a05`3edf9280 00000000`00000000 00000000`00000000 ffff8a05`3cad5f60 : nt!NtSetEvent+0x90
ffffaa0c`e9ab5b00 00000000`77411cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1aa1ec08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77411cfc
SYMBOL_NAME: nt!KiDeliverApc+135
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 135
FAILURE_BUCKET_ID: AV_nt!KiDeliverApc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f94393b9-4308-5aa6-9044-71825dde3286}
Followup: MachineOwner
---------