Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep\Downloads\Compressed\Minidump2-20221007T190559Z-001\Minidump2\100722-9734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`33000000 PsLoadedModuleList = 0xfffff804`33c2a290
Debug session time: Fri Oct 7 15:46:26.634 2022 (UTC + 3:00)
System Uptime: 0 days 0:03:25.299
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`333f8fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd801`8a306160=000000000000001e
15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff804332d6526, The address that the exception occurred at
Arg3: ffffd8018a2b4440, Parameter 0 of the exception
Arg4: ffffd8018a2a9180, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1936
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16702
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 358
Key : Analysis.Init.Elapsed.mSec
Value: 10185
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Bugcheck.Code.DumpHeader
Value: 0x1e
Key : Bugcheck.Code.Register
Value: 0x1e
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 100722-9734-01.dmp
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff804332d6526
BUGCHECK_P3: ffffd8018a2b4440
BUGCHECK_P4: ffffd8018a2a9180
EXCEPTION_PARAMETER1: ffffd8018a2b4440
EXCEPTION_PARAMETER2: ffffd8018a2a9180
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
FAILED_INSTRUCTION_ADDRESS:
nt!KiGetNextTimerExpirationDueTime+1c6
fffff804`332d6526 60 ???
STACK_TEXT:
ffffd801`8a306158 fffff804`334f5e5e : 00000000`0000001e ffffffff`c000001d fffff804`332d6526 ffffd801`8a2b4440 : nt!KeBugCheckEx
ffffd801`8a306160 fffff804`33401e92 : fffff804`334f5e3c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffd801`8a3061a0 fffff804`33277a77 : ffffd801`8a306710 00000000`00000000 ffffd608`e1eedc60 fffff804`333fcaf4 : nt!RtlpExecuteHandlerForException+0x12
ffffd801`8a3061d0 fffff804`33276676 : ffffd608`e1eed458 ffffd801`8a306e20 ffffd608`e1eed458 ffffd801`8a2a9180 : nt!RtlDispatchException+0x297
ffffd801`8a3068f0 fffff804`333f9e32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffd801`8a306fb0 fffff804`333f9e00 : fffff804`3340b0a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffd608`e1eed318 fffff804`3340b0a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffd608`e1eed320 fffff804`334055e9 : 00000000`00000002 ffffd608`e1eed680 00000000`7a609f3f fffff804`3350ed2d : nt!KiExceptionDispatch+0x125
ffffd608`e1eed500 fffff804`332d6526 : ffffd801`8a2a9180 00000000`7a5ec64e 00000000`00000000 ffffd608`e1eed6f0 : nt!KiInvalidOpcodeFault+0x329
ffffd608`e1eed690 fffff804`33394029 : ffffffff`ffffffff 00000000`ffffff00 00000000`7a5ec64e 00000000`00000000 : nt!KiGetNextTimerExpirationDueTime+0x1c6
ffffd608`e1eed6f0 fffff804`332d31b5 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleSelectStates+0x599
ffffd608`e1eedaf0 fffff804`333fcaf4 : ffffffff`00000000 ffffd801`8a2b4440 ffffaf03`d7b640c0 00000000`00000549 : nt!PoIdle+0x405
ffffd608`e1eedc60 00000000`00000000 : ffffd608`e1eee000 ffffd608`e1ee8000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!KiGetNextTimerExpirationDueTime+1c6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c6
FAILURE_BUCKET_ID: 0x1E_C000001D_BAD_IP_nt!KiGetNextTimerExpirationDueTime
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3cf0bafd-83ed-8cf5-43a1-56778933476d}
Followup: MachineOwner
---------
15: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.2, DMIVersion 0, Size=1846]
BiosMajorRelease = 5
BiosMinorRelease = 16
FirmwareMajorRelease = 3
FirmwareMinorRelease = 15
BiosVendor = American Megatrends Inc.
BiosVersion = FA506IU.320
BiosReleaseDate = 06/01/2022
SystemManufacturer = ASUSTeK COMPUTER INC.
SystemProductName = ASUS TUF Gaming A15 FA506IU_FA506IU
SystemFamily = ASUS TUF Gaming A15
SystemVersion = 1.0
SystemSKU =
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = FA506IU
BaseBoardVersion = 1.0
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80649c0e45e, The address that the exception occurred at
Arg3: ffffeb84172de908, Exception Record Address
Arg4: ffffeb84172de140, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Write
Key : Analysis.CPU.mSec
Value: 3374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 25025
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 39
Key : Analysis.Init.CPU.mSec
Value: 453
Key : Analysis.Init.Elapsed.mSec
Value: 14263
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.DumpHeader
Value: 0x1000007e
Key : Bugcheck.Code.Register
Value: 0x7e
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 100722-9843-01.dmp
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80649c0e45e
BUGCHECK_P3: ffffeb84172de908
BUGCHECK_P4: ffffeb84172de140
EXCEPTION_RECORD: ffffeb84172de908 -- (.exr 0xffffeb84172de908)
ExceptionAddress: fffff80649c0e45e (nt!ExAcquirePushLockExclusiveEx+0x00000000000000ee)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 000000000000001c
Attempt to write to address 000000000000001c
CONTEXT: ffffeb84172de140 -- (.cxr 0xffffeb84172de140)
rax=0000000000000000 rbx=ffffa28108921040 rcx=ffffa28108921040
rdx=000000000000001c rsi=000000000000001c rdi=ffffa28108921690
rip=fffff80649c0e45e rsp=ffffeb84172deb40 rbp=0000000000000000
r8=ffffeb84172deb90 r9=ffffa2810cb1b0b0 r10=ffffa2810cb20b00
r11=00000000000002ce r12=0000000000000001 r13=00000000ffffffff
r14=ffffa28ff3a02340 r15=0000000000000020
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!ExAcquirePushLockExclusiveEx+0xee:
fffff806`49c0e45e 668383e601000001 add word ptr [rbx+1E6h],1 ds:002b:ffffa281`08921226=ffff
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ArmouryCrate.UserSessionHelper.exe
WRITE_ADDRESS: fffff8064a6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000001c
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 000000000000001c
IRP_ADDRESS: ffffeb84172dee88
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffeb84`172deb40 fffff806`49cf6de6 : 00000000`00000020 ffffa28f`00000000 ffffa281`00000000 ffffa281`0cb1b000 : nt!ExAcquirePushLockExclusiveEx+0xee
ffffeb84`172deb80 fffff806`49cf5244 : ffffa281`0911b400 fffff806`47156800 ffffa28f`fa5d3908 00000000`00000000 : nt!RtlpHpAcquireLockExclusive+0x2a
ffffeb84`172debb0 fffff806`49c24252 : ffffa28f`f3a02340 ffffa28f`f3a020ff ffffeb84`172deeb0 ffffa281`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x244
ffffeb84`172dec60 fffff806`4a3b2019 : ffffa281`00000000 ffffeb84`172ded80 ffffa281`0911b598 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffffeb84`172ded40 fffff806`49c20ed6 : ffffa281`0911b4c8 fffff806`4a017c79 ffffa281`0911b638 00000000`00000000 : nt!ExFreePool+0x9
ffffeb84`172ded70 fffff806`49c15540 : ffffeb84`172def00 ffffa281`0b98dc90 ffffa281`084972d0 ffffa281`08921040 : nt!IopCompleteRequest+0x106
ffffeb84`172dee30 fffff806`49c22183 : ffffa281`08921040 00000000`00000000 ffffc70f`00000000 00000000`00000000 : nt!KiDeliverApc+0x1b0
ffffeb84`172deee0 fffff806`49c20297 : ffffa281`08921040 00000000`00000001 ffffa281`08921040 ffffc70f`5ce0d170 : nt!KiExitDispatcher+0x2d3
ffffeb84`172def50 fffff806`49c1fd37 : ffffeb84`172df300 00000000`00000001 00000000`00000000 ffffa281`084972c0 : nt!IopfCompleteRequest+0x547
ffffeb84`172df040 fffff806`4d1cad28 : 00000000`00000000 00000000`00000001 ffffeb84`172df320 fffff806`4d1ca932 : nt!IofCompleteRequest+0x17
ffffeb84`172df070 fffff806`4d2ae82e : ffffeb84`172df320 00000000`00000000 ffffa281`084972c0 00000000`00000000 : Ntfs!NtfsExtendedCompleteRequestInternal+0x178
ffffeb84`172df0d0 fffff806`4d2acf36 : ffffeb84`172df320 ffffa281`084972c0 00000000`00000001 00000000`00000001 : Ntfs!NtfsCommonQueryInformation+0xcfe
ffffeb84`172df1d0 fffff806`4d2acdc0 : ffffeb84`172df320 ffffa281`084972c0 ffffa281`084972c0 00000000`00000000 : Ntfs!NtfsFsdDispatchSwitch+0x156
ffffeb84`172df300 fffff806`49c2a6b5 : ffffa281`084972c0 ffffeb84`172df670 00000000`00000000 fffff806`47124fe1 : Ntfs!NtfsFsdDispatchWait+0x40
ffffeb84`172df5a0 fffff806`471270cf : 00000000`00000006 00000000`00000000 ffffeb84`172df820 ffffeb84`172df740 : nt!IofCallDriver+0x55
ffffeb84`172df5e0 fffff806`47124a03 : ffffeb84`172df670 ffffa281`084972c0 ffffa28f`fa082010 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffeb84`172df650 fffff806`49c2a6b5 : 00000000`00000023 00000000`00000208 00000000`00040000 fffff806`00000000 : FLTMGR!FltpDispatch+0xa3
ffffeb84`172df6b0 fffff806`49cddde0 : ffffeb84`172df8b0 00000000`00040000 ffffa28f`fa8d8d90 00000000`00000000 : nt!IofCallDriver+0x55
ffffeb84`172df6f0 fffff806`4a01748f : ffffeb84`172df9b1 00000000`00000023 00000000`00040000 ffffa281`0b98dc90 : nt!IopCallDriverReference+0xd0
ffffeb84`172df760 fffff806`49c078a8 : ffffc70f`5cc18450 ffffeb84`172df8b0 ffffeb84`172df8e0 ffffeb84`00000008 : nt!NtQueryInformationFile+0x56f
ffffeb84`172df880 fffff806`49fdd2af : ffffc70f`61e518f8 ffffffff`fffdb610 00000000`00000020 ffffffff`800045bc : nt!PfpFileCheckAttributesForPrefetch+0x30
ffffeb84`172df8d0 fffff806`49fdcee5 : 00000000`0000006c ffffeb84`172dfb00 ffffc70f`69a2d446 ffffc70f`00000000 : nt!PfSnGetSectionObject+0x147
ffffeb84`172dfa00 fffff806`49c52b65 : ffffa281`08921040 ffffa281`08921040 ffffa28f`f40fba20 00000000`00000500 : nt!PfSnPopulateReadList+0x2b5
ffffeb84`172dfb70 fffff806`49c71d25 : ffffa281`08921040 00000000`00000080 ffffa28f`f412b100 000f8067`bcbbbdff : nt!ExpWorkerThread+0x105
ffffeb84`172dfc10 fffff806`49e00628 : ffffd881`29080180 ffffa281`08921040 fffff806`49c71cd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffeb84`172dfc60 00000000`00000000 : ffffeb84`172e0000 ffffeb84`172da000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr 0xffffeb84172de140 ; kb
BUCKET_ID_FUNC_OFFSET: ee
FAILURE_BUCKET_ID: AV_nt!ExAcquirePushLockExclusiveEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a4c38749-1c8c-1a85-3a1f-e83a0d92b536}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9980e129e180, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000070, value 0 = read operation, 1 = write operation
Arg4: ffff9980e129e180, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2062
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 23866
Key : Analysis.IO.Other.Mb
Value: 5
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 22
Key : Analysis.Init.CPU.mSec
Value: 515
Key : Analysis.Init.Elapsed.mSec
Value: 10509
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 100722-10031-01.dmp
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff9980e129e180
BUGCHECK_P2: ff
BUGCHECK_P3: 70
BUGCHECK_P4: ffff9980e129e180
READ_ADDRESS: fffff8052cefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9980e129e180
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffd89948ed4f0 -- (.trap 0xfffffd89948ed4f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9980e129e180 rsp=fffffd89948ed688 rbp=0000000000000001
r8=ffffda0a446bf7bc r9=0000000000000000 r10=0000000000000000
r11=ffff897e69000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
ffff9980`e129e180 801f00 sbb byte ptr [rdi],0 ds:00000000`00000000=??
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
ffff9980`e129e180 801f00 sbb byte ptr [rdi],0
STACK_TEXT:
fffffd89`948ed3a8 fffff805`2c60af69 : 00000000`0000000a ffff9980`e129e180 00000000`000000ff 00000000`00000070 : nt!KeBugCheckEx
fffffd89`948ed3b0 fffff805`2c607269 : ffff9980`e129e180 fffffd89`948ed780 00000000`00000002 fffffd89`948ed680 : nt!KiBugCheckDispatch+0x69
fffffd89`948ed4f0 ffff9980`e129e180 : ffffda0a`40c4b318 00000000`00000001 00000000`ffffffff 00000000`00090ace : nt!KiPageFault+0x469
fffffd89`948ed688 ffffda0a`40c4b318 : 00000000`00000001 00000000`ffffffff 00000000`00090ace ffffda0a`40c4b000 : 0xffff9980`e129e180
fffffd89`948ed690 00000000`00000001 : 00000000`ffffffff 00000000`00090ace ffffda0a`40c4b000 00000000`00000000 : 0xffffda0a`40c4b318
fffffd89`948ed698 00000000`ffffffff : 00000000`00090ace ffffda0a`40c4b000 00000000`00000000 ffffcbee`6b2d0428 : 0x1
fffffd89`948ed6a0 00000000`00090ace : ffffda0a`40c4b000 00000000`00000000 ffffcbee`6b2d0428 00000015`8f0e6d90 : 0xffffffff
fffffd89`948ed6a8 ffffda0a`40c4b000 : 00000000`00000000 ffffcbee`6b2d0428 00000015`8f0e6d90 ffffda0a`40c4b0f0 : 0x90ace
fffffd89`948ed6b0 00000000`00000000 : ffffcbee`6b2d0428 00000015`8f0e6d90 ffffda0a`40c4b0f0 ffff9980`e129e180 : 0xffffda0a`40c4b000
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80429af5000, The address that the exception occurred at
Arg3: ffff8383b3ca6c68, Exception Record Address
Arg4: ffff8383b3ca64a0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 2874
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16915
Key : Analysis.IO.Other.Mb
Value: 8
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 29
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 16504
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Bugcheck.Code.DumpHeader
Value: 0x1000007e
Key : Bugcheck.Code.Register
Value: 0x7e
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 100722-12843-01.dmp
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80429af5000
BUGCHECK_P3: ffff8383b3ca6c68
BUGCHECK_P4: ffff8383b3ca64a0
EXCEPTION_RECORD: ffff8383b3ca6c68 -- (.exr 0xffff8383b3ca6c68)
ExceptionAddress: fffff80429af5000 (nt!RtlpHpLfhSubsegmentFreeBlock)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000070
Attempt to read from address 0000000000000070
CONTEXT: ffff8383b3ca64a0 -- (.cxr 0xffff8383b3ca64a0)
rax=0110040000450000 rbx=0000000000000050 rcx=0000000000000012
rdx=ffffc20d554956e0 rsi=ffffc20d5547e000 rdi=ffffffffffffffff
rip=fffff80429af5000 rsp=ffff8383b3ca6ea0 rbp=0000000000000000
r8=fffffffffff3ffff r9=ffffc20d5547e128 r10=ffffc20d554956e0
r11=00000000000004a9 r12=0000000000000001 r13=00000000ffffffff
r14=ffffc20d48000340 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050293
nt!RtlpHpLfhSubsegmentFreeBlock:
fffff804`29af5000 44894c2420 mov dword ptr [rsp+20h],r9d ss:0018:ffff8383`b3ca6ec0=48001740
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: FileCoAuth.exe
READ_ADDRESS: fffff8042a4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000070
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000070
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff8383`b3ca6ea0 ffff8383`b3ca6f91 : fffff804`29a27eac ffffc20d`48000340 ffffc20d`48001580 ffffc20d`48001740 : nt!RtlpHpLfhSubsegmentFreeBlock
ffff8383`b3ca6ea8 fffff804`29a27eac : ffffc20d`48000340 ffffc20d`48001580 ffffc20d`48001740 00000000`00000050 : 0xffff8383`b3ca6f91
ffff8383`b3ca6eb0 00000000`00000000 : ffffc20d`4a101d38 00000000`00000000 ffffc20d`5b4ae460 00000000`20000000 : nt!ExAllocateHeapPool+0x83c
SYMBOL_NAME: nt!RtlpHpLfhSubsegmentFreeBlock+0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr 0xffff8383b3ca64a0 ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhSubsegmentFreeBlock
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0c706ef1-02bf-81b2-1c3a-d61be746c53f}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff682bd2affff, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8027c8042ae, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2405
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18371
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 27
Key : Analysis.Init.CPU.mSec
Value: 437
Key : Analysis.Init.Elapsed.mSec
Value: 12805
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 100722-12453-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff682bd2affff
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8027c8042ae
BUGCHECK_P4: 2
READ_ADDRESS: fffff802796fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff682bd2affff
LEGACY_PAGE_TABLE_ACCESS: 1
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
TRAP_FRAME: fffff682bd2b4df0 -- (.trap 0xfffff682bd2b4df0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff682bd2b4ff8 rbx=0000000000000000 rcx=fffff682bd2affff
rdx=ffffca038f2ce5d3 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027c8042ae rsp=fffff682bd2b4f80 rbp=ffffc0864c5835cb
r8=ffffffffffffb007 r9=0000000000000042 r10=fffff682bd2b5130
r11=ffffc0864c583565 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
Ntfs!memcpy+0x6e:
fffff802`7c8042ae 448819 mov byte ptr [rcx],r11b ds:fffff682`bd2affff=??
Resetting default scope
STACK_TEXT:
fffff682`bd2b4b48 fffff802`78e31a9d : 00000000`00000050 fffff682`bd2affff 00000000`00000002 fffff682`bd2b4df0 : nt!KeBugCheckEx
fffff682`bd2b4b50 fffff802`78c399e0 : 00000000`00000114 00000000`00000002 fffff682`bd2b4e70 00000000`00000000 : nt!MiSystemFault+0x1da08d
fffff682`bd2b4c50 fffff802`78e0715e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff682`bd2b4df0 fffff802`7c8042ae : 08b57000`00000000 04002000`00000000 57000c00`07007900 61004600`72006500 : nt!KiPageFault+0x35e
fffff682`bd2b4f80 08b57000`00000000 : 04002000`00000000 57000c00`07007900 61004600`72006500 2e007400`6c007500 : Ntfs!memcpy+0x6e
fffff682`bd2b4f88 04002000`00000000 : 57000c00`07007900 61004600`72006500 2e007400`6c007500 00006500`78006500 : 0x08b57000`00000000
fffff682`bd2b4f90 57000c00`07007900 : 61004600`72006500 2e007400`6c007500 00006500`78006500 00008000`00000000 : 0x04002000`00000000
fffff682`bd2b4f98 61004600`72006500 : 2e007400`6c007500 00006500`78006500 00008000`00000000 00000100`00004800 : 0x57000c00`07007900
fffff682`bd2b4fa0 2e007400`6c007500 : 00006500`78006500 00008000`00000000 00000100`00004800 00000000`04000000 : 0x61004600`72006500
fffff682`bd2b4fa8 00006500`78006500 : 00008000`00000000 00000100`00004800 00000000`04000000 00008b00`00000000 : 0x2e007400`6c007500
fffff682`bd2b4fb0 00008000`00000000 : 00000100`00004800 00000000`04000000 00008b00`00000000 00004000`00000000 : 0x00006500`78006500
fffff682`bd2b4fb8 00000100`00004800 : 00000000`04000000 00008b00`00000000 00004000`00000000 08c00000`00000000 : 0x00008000`00000000
fffff682`bd2b4fc0 00000000`04000000 : 00008b00`00000000 00004000`00000000 08c00000`00000000 08b57000`00000000 : 0x00000100`00004800
fffff682`bd2b4fc8 00008b00`00000000 : 00004000`00000000 08c00000`00000000 08b57000`00000000 08b57000`00000000 : 0x4000000
fffff682`bd2b4fd0 00004000`00000000 : 08c00000`00000000 08b57000`00000000 08b57000`00000000 008c4200`00000000 : 0x00008b00`00000000
fffff682`bd2b4fd8 08c00000`00000000 : 08b57000`00000000 08b57000`00000000 008c4200`00000000 00000000`016b5790 : 0x00004000`00000000
fffff682`bd2b4fe0 08b57000`00000000 : 08b57000`00000000 008c4200`00000000 00000000`016b5790 fffff682`bd2b5130 : 0x08c00000`00000000
fffff682`bd2b4fe8 08b57000`00000000 : 008c4200`00000000 00000000`016b5790 fffff682`bd2b5130 00000000`00000000 : 0x08b57000`00000000
fffff682`bd2b4ff0 008c4200`00000000 : 00000000`016b5790 fffff682`bd2b5130 00000000`00000000 ffffc086`4c583400 : 0x08b57000`00000000
fffff682`bd2b4ff8 00000000`016b5790 : fffff682`bd2b5130 00000000`00000000 ffffc086`4c583400 ffff8604`66465a28 : 0x008c4200`00000000
fffff682`bd2b5000 fffff682`bd2b5130 : 00000000`00000000 ffffc086`4c583400 ffff8604`66465a28 ffffc086`4c583588 : 0x16b5790
fffff682`bd2b5008 00000000`00000000 : ffffc086`4c583400 ffff8604`66465a28 ffffc086`4c583588 fffff802`7c8ad985 : 0xfffff682`bd2b5130
SYMBOL_NAME: Ntfs!memcpy+6e
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.2075
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 6e
FAILURE_BUCKET_ID: AV_W_(null)_Ntfs!memcpy
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ecc2527-a78b-104f-5cc6-f714fbc909cd}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8015c20da42, Address of the instruction which caused the BugCheck
Arg3: fffff8817fa05560, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2421
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 27323
Key : Analysis.IO.Other.Mb
Value: 6
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 375
Key : Analysis.Init.Elapsed.mSec
Value: 14414
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 100722-10078-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8015c20da42
BUGCHECK_P3: fffff8817fa05560
BUGCHECK_P4: 0
CONTEXT: fffff8817fa05560 -- (.cxr 0xfffff8817fa05560)
rax=0000000000000000 rbx=ffffe58951960dc0 rcx=fffff801587294a0
rdx=ffffe58955957080 rsi=ffffe589532504d0 rdi=fffff8817fa06010
rip=fffff8015c20da42 rsp=fffff8817fa05f60 rbp=0000000000000000
r8=00000000ffffffff r9=7fffa58306c421b8 r10=7ffffffffffffffc
r11=ffffacfecea00000 r12=fffff8817fa06050 r13=fffff8817fa06310
r14=ffffe58942b0e1a0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!FsRtlLookupPerStreamContextInternal+0xc2:
fffff801`5c20da42 0974db66 or dword ptr [rbx+rbx*8+66h],esi ds:002b:ffff11d3`de467c26=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: backgroundTaskHost.exe
MISALIGNED_IP:
nt!FsRtlLookupPerStreamContextInternal+c2
fffff801`5c20da42 0974db66 or dword ptr [rbx+rbx*8+66h],esi
STACK_TEXT:
fffff881`7fa05f60 fffff801`5c20e61b : ffffe589`51cb1010 ffffe589`51cb1600 00000000`00000000 fffff801`58703bcc : nt!FsRtlLookupPerStreamContextInternal+0xc2
fffff881`7fa05f90 00000000`c0000225 : ffffe589`520c6a20 00000000`10000004 ffffe589`55f7d560 ffffe589`532504d0 : nt!ExAcquirePushLockSharedEx+0xeb
fffff881`7fa05fe0 ffffe589`520c6a20 : 00000000`10000004 ffffe589`55f7d560 ffffe589`532504d0 ffffe589`55f7d5c8 : 0xc0000225
fffff881`7fa05fe8 00000000`10000004 : ffffe589`55f7d560 ffffe589`532504d0 ffffe589`55f7d5c8 fffff801`a4b7d14d : 0xffffe589`520c6a20
fffff881`7fa05ff0 ffffe589`55f7d560 : ffffe589`532504d0 ffffe589`55f7d5c8 fffff801`a4b7d14d ffffe589`51960dc0 : 0x10000004
fffff881`7fa05ff8 ffffe589`532504d0 : ffffe589`55f7d5c8 fffff801`a4b7d14d ffffe589`51960dc0 00000000`10000004 : 0xffffe589`55f7d560
fffff881`7fa06000 ffffe589`55f7d5c8 : fffff801`a4b7d14d ffffe589`51960dc0 00000000`10000004 ffffe589`520c6cb0 : 0xffffe589`532504d0
fffff881`7fa06008 fffff801`a4b7d14d : ffffe589`51960dc0 00000000`10000004 ffffe589`520c6cb0 ffffe589`55f7d5c8 : 0xffffe589`55f7d5c8
fffff881`7fa06010 fffff801`5870648b : 00000000`00000000 00000000`00000000 ffffe589`55f7d4e0 ffffe589`55f7d5c8 : luafv!LuafvPreClose+0x6d
fffff881`7fa060f0 fffff801`58705f3a : fffff881`7fa06300 fffff881`7fa06102 ffffe589`53250400 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x36b
fffff881`7fa06210 fffff801`58704fe1 : fffff881`7fa07000 fffff881`7fa01000 ffffe589`557aaa20 fffff881`7fa06320 : FLTMGR!FltpPassThroughInternal+0xca
fffff881`7fa06260 fffff801`587049eb : ffffffff`fffe7960 00000000`00000000 00000000`00000001 00000000`00000000 : FLTMGR!FltpPassThrough+0x541
fffff881`7fa062f0 fffff801`5c22a6b5 : ffffe589`532504d0 fffff801`5c22cec8 ffffe589`42ac27a0 00000000`00000000 : FLTMGR!FltpDispatch+0x8b
fffff881`7fa06350 fffff801`5c617ecf : ffffe589`532504d0 ffffe589`42ac27a0 ffffe589`3f3b8600 ffffe589`3f3b8600 : nt!IofCallDriver+0x55
fffff881`7fa06390 fffff801`5c6120d0 : ffffe589`3f3b8640 00000000`00000001 ffffe589`532504a0 ffffe589`00000000 : nt!IopDeleteFile+0x14f
fffff881`7fa06410 fffff801`5c20ec07 : 00000000`00000000 00000000`00000000 fffff881`7fa06599 ffffe589`532504d0 : nt!ObpRemoveObjectRoutine+0x80
fffff881`7fa06470 fffff801`5c600a89 : ffffe589`532504a0 00000000`00000000 00000000`00000000 ffffe589`532504a0 : nt!ObfDereferenceObjectWithTag+0xc7
fffff881`7fa064b0 fffff801`5c5da4c5 : ffffe589`546f5360 2ab61113`e81c9406 00000000`00000103 00000000`00000000 : nt!ObCloseHandleTableEntry+0x6c9
fffff881`7fa065f0 fffff801`5c5dab8d : ffffe589`55957080 ffffe589`55957080 ffffffff`ffffff01 ffffe589`55744518 : nt!ExSweepHandleTable+0xd5
fffff881`7fa066a0 fffff801`5c5da1f4 : ffffffff`ffffffff ffffe589`557440c0 fffff881`7fa066f0 fffff801`5c6abbb4 : nt!ObKillProcess+0x35
fffff881`7fa066d0 fffff801`5c640f7a : ffffe589`557440c0 ffffa583`0a70f770 fffff881`7fa06920 00000000`00000000 : nt!PspRundownSingleProcess+0x204
fffff881`7fa06760 fffff801`5c6fbc48 : ffffe589`00000001 00000000`00000001 00000000`000000c0 00000037`69caf000 : nt!PspExitThread+0x5f6
fffff881`7fa06860 fffff801`5c215817 : ffffa583`79510101 00000000`00000000 ffffe589`5394eb10 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff881`7fa068a0 fffff801`5c3fd570 : 000001e2`f4c02340 fffff881`7fa06950 00000037`6a07f878 ffffe589`00000000 : nt!KiDeliverApc+0x487
fffff881`7fa06950 fffff801`5c40aa5f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff881`7fa06a90 00007ffc`5e250a54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000037`6a07f828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`5e250a54
SYMBOL_NAME: luafv!LuafvPreClose+6d
IMAGE_VERSION: 10.0.19041.1110
STACK_COMMAND: .cxr 0xfffff8817fa05560 ; kb
MODULE_NAME: AuthenticAMD
IMAGE_NAME: AuthenticAMD.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2}
Followup: MachineOwner
---------