Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040911-24024-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e67000 PsLoadedModuleList = 0xfffff800`030ace90
Debug session time: Sat Apr 9 16:25:00.997 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:13.339
Loading Kernel Symbols
...............................................................
......................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff800031b43de, fffff880035c7098, fffff880035c68f0}
Probably caused by : NETIO.SYS ( NETIO!NsipOpenKey+56 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800031b43de, The address that the exception occurred at
Arg3: fffff880035c7098, Exception Record Address
Arg4: fffff880035c68f0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!CmpKcbCacheLookup+1de
fffff800`031b43de 418b45f4 mov eax,dword ptr [r13-0Ch]
EXCEPTION_RECORD: fffff880035c7098 -- (.exr 0xfffff880035c7098)
ExceptionAddress: fffff800031b43de (nt!CmpKcbCacheLookup+0x00000000000001de)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880035c68f0 -- (.cxr 0xfffff880035c68f0)
rax=0000000000000009 rbx=0000000000000000 rcx=00000000000001ec
rdx=0000000001cb3401 rsi=fffff880035c74e0 rdi=00000000e5c014d4
rip=fffff800031b43de rsp=fffff880035c72d0 rbp=fffff8a0000231f0
r8=0000000000000008 r9=0000000000000000 r10=0000000000000009
r11=fffff880035c7480 r12=fffff8a0046f0b98 r13=0200000000000000
r14=0000000000000004 r15=0000000000000004
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!CmpKcbCacheLookup+0x1de:
fffff800`031b43de 418b45f4 mov eax,dword ptr [r13-0Ch] ds:002b:01ffffff`fffffff4=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031180e8
ffffffffffffffff
FOLLOWUP_IP:
NETIO!NsipOpenKey+56
fffff880`016128e6 488b5c2470 mov rbx,qword ptr [rsp+70h]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff800031b50e5 to fffff800031b43de
STACK_TEXT:
fffff880`035c72d0 fffff800`031b50e5 : fffff880`035c7480 fffff880`00000005 fffff880`035c7868 fffff880`035c7860 : nt!CmpKcbCacheLookup+0x1de
fffff880`035c73c0 fffff800`031b1794 : fffff8a0`0000efa0 fffff880`035c7860 fffff880`035c78b0 fffff880`035c7890 : nt!CmpBuildHashStackAndLookupCache+0x335
fffff880`035c77a0 fffff800`031e1d38 : fffffa80`04f56a98 fffff800`02e67000 fffffa80`04f568e0 fffff800`00000001 : nt!CmpParseKey+0x294
fffff880`035c7aa0 fffff800`031e2f56 : 00000000`00000000 fffffa80`04f568e0 00000000`00000000 fffffa80`03a34a50 : nt!ObpLookupObjectName+0x588
fffff880`035c7b90 fffff800`031b682c : 00000000`00000002 00000000`00000000 00000000`65726300 00000000`00000052 : nt!ObOpenObjectByName+0x306
fffff880`035c7c60 fffff800`031c1922 : fffff880`035c8320 fffff880`00020019 fffff880`035c7fc0 fffffa80`00000000 : nt!CmOpenKey+0x28a
fffff880`035c7db0 fffff800`02ee68d3 : 00000000`00000000 00000000`040d1860 00000000`00000000 fffff800`0306bec0 : nt!NtOpenKey+0x12
fffff880`035c7df0 fffff800`02ee2e70 : fffff880`016128e6 ffff0800`00009b1a 00000000`000011d4 fffff6fb`00000091 : nt!KiSystemServiceCopyEnd+0x13
fffff880`035c7f88 fffff880`016128e6 : ffff0800`00009b1a 00000000`000011d4 fffff6fb`00000091 fffff880`00000023 : nt!KiServiceLinkage
fffff880`035c7f90 fffff880`0161284b : fffff880`035c8448 00000000`00020019 fffff880`01612610 fffff8a0`04710660 : NETIO!NsipOpenKey+0x56
fffff880`035c8000 fffff880`016141c8 : 00000000`0001010e fffff880`035c8548 00000000`00000000 fffff880`035c8468 : NETIO!NsipOpenInformationObjectKey+0xab
fffff880`035c8290 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NsipReadPersistentData+0x68
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: NETIO!NsipOpenKey+56
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
STACK_COMMAND: .cxr 0xfffff880035c68f0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_NETIO!NsipOpenKey+56
BUCKET_ID: X64_0x7E_NETIO!NsipOpenKey+56
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\030211-24835-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02ea2e90
Debug session time: Wed Mar 2 13:38:33.491 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:59.880
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff880024472a8, fffff88002446b00, fffff80002fd9b87}
Probably caused by : Ntfs.sys ( Ntfs!NtfsReadMftRecord+b2 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880024472a8
Arg3: fffff88002446b00
Arg4: fffff80002fd9b87
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880024472a8 -- (.exr 0xfffff880024472a8)
ExceptionAddress: fffff80002fd9b87 (nt!CcMapData+0x0000000000000117)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88002446b00 -- (.cxr 0xfffff88002446b00)
rax=fffffa80018a9150 rbx=000000000000000e rcx=0000000000000000
rdx=33fff98003677000 rsi=fffff880024476a8 rdi=fffffa8003775060
rip=fffff80002fd9b87 rsp=fffff880024474e0 rbp=0000000000000090
r8=000000000000000f r9=0000000000277000 r10=0000000000000000
r11=0000000000000001 r12=0000000000000001 r13=fffffa8002922f20
r14=fffff880024475e8 r15=0000000000000001
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
nt!CcMapData+0x117:
fffff800`02fd9b87 0fb602 movzx eax,byte ptr [rdx] ds:002b:33fff980`03677000=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: lsass.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0e0e8
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsReadMftRecord+b2
fffff880`014b61e2 84c0 test al,al
FAULTING_IP:
nt!CcMapData+117
fffff800`02fd9b87 0fb602 movzx eax,byte ptr [rdx]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880014b61e2 to fffff80002fd9b87
STACK_TEXT:
fffff880`024474e0 fffff880`014b61e2 : 00000000`00009000 fffffa80`018a9150 00000000`00000000 00000000`0000000e : nt!CcMapData+0x117
fffff880`024475a0 fffff880`014b1d5c : fffffa80`04961660 fffffa80`02e4c180 fffff8a0`00239468 fffff880`01222d01 : Ntfs!NtfsReadMftRecord+0xb2
fffff880`02447650 fffff880`014b6ae0 : fffff880`01226a00 fffff8a0`00239640 fffff8a0`00239590 fffffa80`02ceb0c0 : Ntfs!NtfsLookupInFileRecord+0x6c
fffff880`024476e0 fffff880`014a016d : fffffa80`02f28c10 fffffa80`02ceb010 00000000`00000000 00000000`00000000 : Ntfs!FindFirstIndexEntry+0x50
fffff880`02447770 fffff880`0149e9ce : fffffa80`04961660 fffff8a0`03d91930 fffff8a0`00239590 fffffa80`04961660 : Ntfs!NtfsRestartIndexEnumeration+0xed
fffff880`02447990 fffff880`0149fff1 : fffff880`02447ea0 00000000`00000008 fffffa80`028da530 fffffa80`02f28810 : Ntfs!NtfsQueryDirectory+0x94e
fffff880`02447d30 fffff880`014a28ef : fffffa80`04961660 00000000`00000000 fffff880`02447e20 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa1
fffff880`02447d70 fffff880`01215bcf : fffffa80`02f28bb0 fffffa80`02f28810 fffffa80`04961660 fffff880`02447d98 : Ntfs!NtfsFsdDirectoryControl+0x10f
fffff880`02447de0 fffff880`01218aea : 00000000`00000000 00000000`00000000 fffffa80`03a2a400 fffffa80`02ceb010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`02447e70 fffff880`01236978 : fffffa80`0297fbc0 00000000`00000022 fffffa80`029213d0 fffffa80`02ceb0c0 : fltmgr!FltPerformSynchronousIo+0x2ca
fffff880`02447f10 fffff880`05baad71 : 00000000`00000000 00000000`00000020 fffff880`02447fd0 fffff880`02448060 : fltmgr!FltQueryDirectoryFile+0x98
fffff880`02447f50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : luafv!LuafvNormalizeNameComponentEx+0x145
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsReadMftRecord+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce792f9
STACK_COMMAND: .cxr 0xfffff88002446b00 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsReadMftRecord+b2
BUCKET_ID: X64_0x24_Ntfs!NtfsReadMftRecord+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\030211-24882-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c59000 PsLoadedModuleList = 0xfffff800`02e9ee90
Debug session time: Wed Mar 2 13:40:08.112 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:47.517
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff880031968d8, fffff88003196130, fffff880014eafe0}
Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonClose+1a0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880031968d8
Arg3: fffff88003196130
Arg4: fffff880014eafe0
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880031968d8 -- (.exr 0xfffff880031968d8)
ExceptionAddress: fffff880014eafe0 (Ntfs!NtfsCommonClose+0x00000000000001a0)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88003196130 -- (.cxr 0xfffff88003196130)
rax=00fff8a0028de690 rbx=fffffa80038fd6d0 rcx=fffffa80038fd718
rdx=fffff8a0028de4a0 rsi=fffff8a0028de370 rdi=fffff88003196c38
rip=fffff880014eafe0 rsp=fffff88003196b10 rbp=fffff80002e76600
r8=0000000000000000 r9=0000000000000009 r10=0000000000000004
r11=fffffa8004391e10 r12=fffffa80028f7180 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
Ntfs!NtfsCommonClose+0x1a0:
fffff880`014eafe0 f6400804 test byte ptr [rax+8],4 ds:002b:00fff8a0`028de698=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0a0e8
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsCommonClose+1a0
fffff880`014eafe0 f6400804 test byte ptr [rax+8],4
FAULTING_IP:
Ntfs!NtfsCommonClose+1a0
fffff880`014eafe0 f6400804 test byte ptr [rax+8],4
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880014da357 to fffff880014eafe0
STACK_TEXT:
fffff880`03196b10 fffff880`014da357 : fffffa80`038fd6d0 fffff8a0`028de4a0 fffff8a0`028de370 fffffa80`028f7180 : Ntfs!NtfsCommonClose+0x1a0
fffff880`03196be0 fffff800`02ce3a21 : 00000000`00000000 fffff800`02fcff00 fffffa80`01906601 0000059a`00000002 : Ntfs!NtfsFspClose+0x15f
fffff880`03196cb0 fffff800`02f76cce : 0000059a`00000000 fffffa80`01906680 00000000`00000080 fffffa80`018e5450 : nt!ExpWorkerThread+0x111
fffff880`03196d40 fffff800`02ccafe6 : fffff880`009e8180 fffffa80`01906680 fffff880`009f2f40 0000059a`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03196d80 00000000`00000000 : fffff880`03197000 fffff880`03191000 fffff880`031969e0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsCommonClose+1a0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce792f9
STACK_COMMAND: .cxr 0xfffff88003196130 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCommonClose+1a0
BUCKET_ID: X64_0x24_Ntfs!NtfsCommonClose+1a0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042111-25334-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e00000 PsLoadedModuleList = 0xfffff800`03045e90
Debug session time: Thu Apr 21 16:39:52.620 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:33.103
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {31, fffffa8005183700, fffff8800d427000, fffff8a000f27b4d}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+7321 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the bugcheck.
Arg2: fffffa8005183700
Arg3: fffff8800d427000
Arg4: fffff8a000f27b4d
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_31
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: runonce.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800030dbd95 to fffff80002e80640
STACK_TEXT:
fffff880`05633888 fffff800`030dbd95 : 00000000`0000001a 00000000`00000031 fffffa80`05183700 fffff880`0d427000 : nt!KeBugCheckEx
fffff880`05633890 fffff800`031581b7 : fffffa80`00000000 fffffa80`062fc780 00000000`00000134 fffff8a0`00f17000 : nt! ?? ::NNGAKEGL::`string'+0x7321
fffff880`056338f0 fffff800`02eb015b : ffffffff`ffffffff fffff880`05633a78 00000000`00008000 fffffa80`06609c00 : nt!MiRelocateImagePfn+0xf7
fffff880`05633950 fffff800`02ea813f : fffffa80`064232d0 fffff880`05633a80 fffffa80`05e97ec8 fffff880`05633a88 : nt!MiWaitForInPageComplete+0x7ef
fffff880`05633a30 fffff800`02e8ea8a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff880`00000000 : nt!MiIssueHardFault+0x28b
fffff880`05633ac0 fffff800`02e7e76e : 00000000`00000008 00000000`76190add 00000000`7efdb001 00000000`00488208 : nt!MmAccessFault+0x146a
fffff880`05633c20 00000000`76190add : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`000ceebc 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76190add
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::NNGAKEGL::`string'+7321
fffff800`030dbd95 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::NNGAKEGL::`string'+7321
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+7321
BUCKET_ID: X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+7321
Followup: MachineOwner
---------