BugCheck D5, {fffff9800a150d60, 0, fffff880044da7ea, 0}
Unable to load image \SystemRoot\system32\drivers\[U][B]RTKVHD64.sys,[/B][/U] Win32 error 0n2
*** WARNING: Unable to verify timestamp for[U][B] RTKVHD64.sys[/B][/U]
*** ERROR: Module load completed but symbols could not be loaded for [U][B]RTKVHD64.sys[/B][/U]
Could not read faulting driver name
[U][B]Probably caused by : RTKVHD64.sys ( RTKVHD64+d97ea )[/B][/U]
DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5)
Memory was referenced after it was freed.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff9800a150d60, memory referenced
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation
Arg3: fffff880044da7ea, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, (reserved)
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800022c8100
fffff9800a150d60
FAULTING_IP:
[U][B]RTKVHD64[/B][/U]+d97ea
fffff880`044da7ea 8b4630 mov eax,dword ptr [rsi+30h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xD5
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880055592a0 -- (.trap 0xfffff880055592a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff880055594c8
rdx=fffff88005559430 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880044da7ea rsp=fffff88005559430 rbp=0000000000000002
r8=0000000000000000 r9=fffff880044da7ea r10=0000000000000100
r11=fffff8000220be80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
[U][B]RTKVHD64[/B][/U]+0xd97ea:
fffff880`044da7ea 8b4630 mov eax,dword ptr [rsi+30h] ds:be80:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000204154c to fffff800020991c0
STACK_TEXT:
fffff880`05559138 fffff800`0204154c : 00000000`00000050 fffff980`0a150d60 00000000`00000000 fffff880`055592a0 : nt!KeBugCheckEx
fffff880`05559140 fffff800`020972ee : 00000000`00000000 fffff980`0a150d60 fffffa80`03347500 fffff8a0`01df0126 : nt! ?? ::FNODOBFM::`string'+0x456df
fffff880`055592a0 fffff880`044da7ea : fffff880`055594c8 00000000`00000000 fffff8a0`01df0126 fffffa80`051449e0 : nt!KiPageFault+0x16e
fffff880`05559430 fffff880`055594c8 : 00000000`00000000 fffff8a0`01df0126 fffffa80`051449e0 00000000`00000000 : [U][B]RTKVHD64[/B][/U]+0xd97ea
fffff880`05559438 00000000`00000000 : fffff8a0`01df0126 fffffa80`051449e0 00000000`00000000 fffff800`00000000 : 0xfffff880`055594c8
STACK_COMMAND: kb
FOLLOWUP_IP:
[U][B]RTKVHD64[/B][/U]+d97ea
fffff880`044da7ea 8b4630 mov eax,dword ptr [rsi+30h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: [U][B]RTKVHD64[/B][/U]+d97ea
MODULE_NAME: [U][B]RTKVHD64[/B][/U]
IMAGE_NAME: [U][B]RTKVHD64.sys[/B][/U]
DEBUG_FLR_IMAGE_TIMESTAMP: 4c500000
FAILURE_BUCKET_ID: X64_0xD5_VRF_[U][B]RTKVHD64[/B][/U]+d97ea
BUCKET_ID: X64_0xD5_VRF_[U][B]RTKVHD64[/B][/U]+d97ea