Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040911-43531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02868000 PsLoadedModuleList = 0xfffff800`02aade90
Debug session time: Sat Apr 9 18:12:52.390 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:46.937
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff89fc2f83fcf, 1, fffff88013d0a3ed, 5}
Could not read faulting driver name
Probably caused by : hardware ( dxgkrnl!DXGDEVICE::Unlock+2bd )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff89fc2f83fcf, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88013d0a3ed, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b190e8
fffff89fc2f83fcf
FAULTING_IP:
dxgkrnl!DXGDEVICE::Unlock+2bd
fffff880`13d0a3ed d08bcfff15c2 ror byte ptr [rbx-3DEA0031h],1
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002b97fe0 -- (.trap 0xfffff88002b97fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80053f5a30 rbx=0000000000000000 rcx=fffff88013d0a3d2
rdx=fffffa80053f5a30 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88013d0a3ed rsp=fffff88002b98170 rbp=fffff88002b982b0
r8=000000000001a4fa r9=0000000000000009 r10=0000000000000000
r11=fffff880019e9120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dxgkrnl!DXGDEVICE::Unlock+0x2bd:
fffff880`13d0a3ed d08bcfff15c2 ror byte ptr [rbx-3DEA0031h],1 ds:ffffffff`c215ffcf=??
Resetting default scope
MISALIGNED_IP:
dxgkrnl!DXGDEVICE::Unlock+2bd
fffff880`13d0a3ed d08bcfff15c2 ror byte ptr [rbx-3DEA0031h],1
LAST_CONTROL_TRANSFER: from fffff80002892c6f to fffff800028e8640
STACK_TEXT:
fffff880`02b97e78 fffff800`02892c6f : 00000000`00000050 fffff89f`c2f83fcf 00000000`00000001 fffff880`02b97fe0 : nt!KeBugCheckEx
fffff880`02b97e80 fffff800`028e676e : 00000000`00000001 fffff89f`c2f83fcf fffff880`02b98000 fffff8a0`00e24000 : nt! ?? ::FNODOBFM::`string'+0x44891
fffff880`02b97fe0 fffff880`13d0a3ed : fffff8a0`400000c0 fffff880`13cd7906 fffff8a0`00e19470 fffff880`13cac3af : nt!KiPageFault+0x16e
fffff880`02b98170 fffff880`13cefa81 : fffff8a0`00e24000 fffff880`02b982b0 fffff900`c00afd00 00000000`00000000 : dxgkrnl!DXGDEVICE::Unlock+0x2bd
fffff880`02b98200 fffff960`00624c36 : fffff900`c00b7020 00000000`00000030 00000000`00000030 fffff900`c1a45a10 : dxgkrnl!DxgkCddUnlock+0x181
fffff880`02b98270 fffff960`0062606c : ffffffff`fffd7476 00000000`0104002e 00000000`00000001 00000000`00000000 : cdd!CddPresentBlt+0x2be
fffff880`02b989b0 fffff800`02b85cce : 00000000`0587beb4 fffffa80`06c32b60 00000000`00000080 fffffa80`06b42730 : cdd!PresentWorkerThread+0xd00
fffff880`02b98d40 fffff800`028d9fe6 : fffff800`02a5ae80 fffffa80`06c32b60 fffff800`02a68cc0 fffff880`01261cb0 : nt!PspSystemThreadStartup+0x5a
fffff880`02b98d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgkrnl!DXGDEVICE::Unlock+2bd
fffff880`13d0a3ed d08bcfff15c2 ror byte ptr [rbx-3DEA0031h],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgkrnl!DXGDEVICE::Unlock+2bd
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED_dxgkrnl.sys
BUCKET_ID: X64_IP_MISALIGNED_dxgkrnl.sys
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050811-20640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have process information
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a13000 PsLoadedModuleList = 0xfffff800`02c58e90
Debug session time: Sun May 8 20:17:06.464 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:14.996
Loading Kernel Symbols
...............................................
Loading User Symbols
Missing image name, possible paged-out or corrupt data.
Loading unloaded module list
.Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
..
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002d8e8f8, fffff88006acfd90, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpLookupDirectoryEntry+358 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002d8e8f8, Address of the instruction which caused the bugcheck
Arg3: fffff88006acfd90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObpLookupDirectoryEntry+358
fffff800`02d8e8f8 488b7008 mov rsi,qword ptr [rax+8]
CONTEXT: fffff88006acfd90 -- (.cxr 0xfffff88006acfd90)
rax=00fff8a0015ef090 rbx=0000000000000000 rcx=fffffa8006bf3060
rdx=0000000000000011 rsi=0000000000000000 rdi=fffffa8003bb98c8
rip=fffff80002d8e8f8 rsp=fffff88006ad0770 rbp=fffffa8006bf3060
r8=0000000000000040 r9=0000000000000001 r10=fffff8a0015cdeb0
r11=0000000000000000 r12=0000000000000001 r13=0000000000000000
r14=fffff8a0015cdfb8 r15=fffff8a0015cdeb0
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!ObpLookupDirectoryEntry+0x358:
fffff800`02d8e8f8 488b7008 mov rsi,qword ptr [rax+8] ds:002b:00fff8a0`015ef098=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002d8e8f8
STACK_TEXT:
fffff880`06ad0770 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpLookupDirectoryEntry+0x358
FOLLOWUP_IP:
nt!ObpLookupDirectoryEntry+358
fffff800`02d8e8f8 488b7008 mov rsi,qword ptr [rax+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpLookupDirectoryEntry+358
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff88006acfd90 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObpLookupDirectoryEntry+358
BUCKET_ID: X64_0x3B_nt!ObpLookupDirectoryEntry+358
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050711-25140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c9fe90
Debug session time: Sat May 7 20:15:48.491 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:13.038
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff10006ff8498, 1, fffff88013d67685, 7}
Could not read faulting driver name
Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGCONTEXT::Render+9fd )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff10006ff8498, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88013d67685, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0b0e8
fffff10006ff8498
FAULTING_IP:
dxgkrnl!DXGCONTEXT::Render+9fd
fffff880`13d67685 899c2490010000 mov dword ptr [rsp+190h],ebx
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880037fbe60 -- (.trap 0xfffff880037fbe60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880037fc184 rbx=0000000000000000 rcx=fffff880037fc218
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88013d67685 rsp=fffff880037fbff0 rbp=fffff880037fc7f0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff88001439120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
dxgkrnl!DXGCONTEXT::Render+0x9fd:
fffff880`13d67685 899c2490010000 mov dword ptr [rsp+190h],ebx ss:fffff880`037fc180=00000200
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a84bf7 to fffff80002ada640
STACK_TEXT:
fffff880`037fbcf8 fffff800`02a84bf7 : 00000000`00000050 fffff100`06ff8498 00000000`00000001 fffff880`037fbe60 : nt!KeBugCheckEx
fffff880`037fbd00 fffff800`02ad876e : 00000000`00000001 fffff100`06ff8498 00000000`00000000 00000000`00000200 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`037fbe60 fffff880`13d67685 : 00000000`00000000 00000000`00000200 fffff880`037fc7f0 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`037fbff0 fffff880`13d3dfb2 : fffff8a0`00000001 fffff8a0`00000114 fffff880`037fc638 fffff880`00000002 : dxgkrnl!DXGCONTEXT::Render+0x9fd
fffff880`037fc600 fffff960`0078b264 : 00000000`00000000 00000000`00000000 fffff900`c00c1020 00000000`00000000 : dxgkrnl!DxgkCddGdiCommand+0x1ea
fffff880`037fc690 fffff960`007895d5 : fffffa80`0653fc30 fffffa80`0653fc30 00000000`00000001 fffff900`c00c1020 : cdd!CHwCommandBuffer::FlushGdiCommands+0xb4
fffff880`037fc980 fffff960`00785c6e : ffffffff`fffd7476 00000000`00000010 00000000`00000001 fffff900`00000000 : cdd!CDDPDEV::FlushGdiOutput+0x81
fffff880`037fc9b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : cdd!PresentWorkerThread+0x902
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgkrnl!DXGCONTEXT::Render+9fd
fffff880`13d67685 899c2490010000 mov dword ptr [rsp+190h],ebx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgkrnl!DXGCONTEXT::Render+9fd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799fa
FAILURE_BUCKET_ID: X64_0x50_dxgkrnl!DXGCONTEXT::Render+9fd
BUCKET_ID: X64_0x50_dxgkrnl!DXGCONTEXT::Render+9fd
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050811-30015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a1b000 PsLoadedModuleList = 0xfffff800`02c60e90
Debug session time: Sun May 8 20:22:18.843 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:54.390
Loading Kernel Symbols
...............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff88013d54ec7, fffff880034fb120, 0}
Probably caused by : ntkrnlmp.exe ( nt!ExReleaseResourceAndLeaveCriticalRegion+12 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88013d54ec7, Address of the instruction which caused the bugcheck
Arg3: fffff880034fb120, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+13
fffff880`13d54ec7 7533 jne fffff880`13d54efc
CONTEXT: fffff880034fb120 -- (.cxr 0xfffff880034fb120)
rax=fffff8a001aa2ac0 rbx=000000000000080c rcx=fffffa8006a0eb30
rdx=0000000000000001 rsi=000000000373fc20 rdi=fffff8a001aa2ac0
rip=fffff88013d54ec7 rsp=fffff880034fbb00 rbp=fffff880034fbca0
r8=000000000373fae8 r9=0000000000000800 r10=fffff960001be4e0
r11=000007fffffd6000 r12=0000000000000001 r13=000000000373fb28
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
fffff880`13d54ec7 7533 jne fffff880`13d54efc [br=1]
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 00000000000007ff to fffff88013d54ec7
STACK_TEXT:
fffff880`034fbb00 00000000`000007ff : 00000000`0000000f 00000000`0373fc20 fffff8a0`02541c00 00000000`000000e4 : 0xfffff880`13d54ec7
fffff880`034fbb08 00000000`0000000f : 00000000`0373fc20 fffff8a0`02541c00 00000000`000000e4 00000000`0000080c : 0x7ff
fffff880`034fbb10 00000000`0373fc20 : fffff8a0`02541c00 00000000`000000e4 00000000`0000080c 00000000`000000e4 : 0xf
fffff880`034fbb18 fffff8a0`02541c00 : 00000000`000000e4 00000000`0000080c 00000000`000000e4 fffff960`002b86c8 : 0x373fc20
fffff880`034fbb20 00000000`000000e4 : 00000000`0000080c 00000000`000000e4 fffff960`002b86c8 000007fe`faa9c610 : 0xfffff8a0`02541c00
fffff880`034fbb28 00000000`0000080c : 00000000`000000e4 fffff960`002b86c8 000007fe`faa9c610 fffff8a0`01aa2ac0 : 0xe4
fffff880`034fbb30 00000000`000000e4 : fffff960`002b86c8 000007fe`faa9c610 fffff8a0`01aa2ac0 00000000`00000800 : 0x80c
fffff880`034fbb38 fffff960`002b86c8 : 000007fe`faa9c610 fffff8a0`01aa2ac0 00000000`00000800 00000000`00000800 : 0xe4
fffff880`034fbb40 000007fe`faa9c610 : fffff8a0`01aa2ac0 00000000`00000800 00000000`00000800 fffff880`034fbc38 : 0xfffff960`002b86c8
fffff880`034fbb48 fffff8a0`01aa2ac0 : 00000000`00000800 00000000`00000800 fffff880`034fbc38 fffff800`02aa5402 : 0x7fe`faa9c610
fffff880`034fbb50 00000000`00000800 : 00000000`00000800 fffff880`034fbc38 fffff800`02aa5402 00000000`00000000 : 0xfffff8a0`01aa2ac0
fffff880`034fbb58 00000000`00000800 : fffff880`034fbc38 fffff800`02aa5402 00000000`00000000 00000000`00000000 : 0x800
fffff880`034fbb60 fffff880`034fbc38 : fffff800`02aa5402 00000000`00000000 00000000`00000000 00000000`00000000 : 0x800
fffff880`034fbb68 fffff800`02aa5402 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000800 : 0xfffff880`034fbc38
fffff880`034fbb70 fffff960`00255bb3 : fffff960`00307bd8 fffff800`00000000 fffff880`034fbbd8 fffff800`03014790 : nt!ExReleaseResourceAndLeaveCriticalRegion+0x12
fffff880`034fbba0 fffff960`00307bd8 : fffff800`00000000 fffff880`034fbbd8 fffff800`03014790 00000000`00000018 : 0xfffff960`00255bb3
fffff880`034fbba8 fffff800`00000000 : fffff880`034fbbd8 fffff800`03014790 00000000`00000018 000007fe`faa9c610 : 0xfffff960`00307bd8
fffff880`034fbbb0 fffff880`034fbbd8 : fffff800`03014790 00000000`00000018 000007fe`faa9c610 00000000`00000000 : 0xfffff800`00000000
fffff880`034fbbb8 fffff800`03014790 : 00000000`00000018 000007fe`faa9c610 00000000`00000000 00000000`002a56c0 : 0xfffff880`034fbbd8
fffff880`034fbbc0 fffff960`001be4f7 : fffffa80`06c80b60 00000000`00000001 00000000`00000020 00000000`0373fc20 : hal!KeQueryPerformanceCounter+0x9c
fffff880`034fbbf0 fffffa80`06c80b60 : 00000000`00000001 00000000`00000020 00000000`0373fc20 fffffa80`06c80b60 : 0xfffff960`001be4f7
fffff880`034fbbf8 00000000`00000001 : 00000000`00000020 00000000`0373fc20 fffffa80`06c80b60 fffff800`02a9a8d3 : 0xfffffa80`06c80b60
fffff880`034fbc00 00000000`00000020 : 00000000`0373fc20 fffffa80`06c80b60 fffff800`02a9a8d3 fffffa80`00000800 : 0x1
fffff880`034fbc08 00000000`0373fc20 : fffffa80`06c80b60 fffff800`02a9a8d3 fffffa80`00000800 00000000`0373fb90 : 0x20
fffff880`034fbc10 fffffa80`06c80b60 : fffff800`02a9a8d3 fffffa80`00000800 00000000`0373fb90 000007fe`faa9c610 : 0x373fc20
fffff880`034fbc18 fffff800`02a9a8d3 : fffffa80`00000800 00000000`0373fb90 000007fe`faa9c610 fffffa80`00000000 : 0xfffffa80`06c80b60
fffff880`034fbc20 000007fe`fea8120a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0373fae8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fea8120a
FOLLOWUP_IP:
nt!ExReleaseResourceAndLeaveCriticalRegion+12
fffff800`02aa5402 654c8b1c2588010000 mov r11,qword ptr gs:[188h]
SYMBOL_STACK_INDEX: e
SYMBOL_NAME: nt!ExReleaseResourceAndLeaveCriticalRegion+12
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff880034fb120 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExReleaseResourceAndLeaveCriticalRegion+12
BUCKET_ID: X64_0x3B_nt!ExReleaseResourceAndLeaveCriticalRegion+12
Followup: MachineOwner
---------