Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121010-18828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a13000 PsLoadedModuleList = 0xfffff800`02c50e50
Debug session time: Fri Dec 10 15:29:24.688 2010 (UTC - 5:00)
System Uptime: 0 days 0:19:44.907
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffffba80055ce998, 2, 0, fffff88003ac19ea}
Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+29ea )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffba80055ce998, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88003ac19ea, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbb0e0
ffffba80055ce998
CURRENT_IRQL: 2
FAULTING_IP:
Rt64win7+29ea
fffff880`03ac19ea 488b4208 mov rax,qword ptr [rdx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80003fd5230 -- (.trap 0xfffff80003fd5230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa80055417d8
rdx=ffffba80055ce990 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003ac19ea rsp=fffff80003fd53c0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffffa80048a8020
r11=fffffa80048a8ba0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
Rt64win7+0x29ea:
fffff880`03ac19ea 488b4208 mov rax,qword ptr [rdx+8] ds:ffffba80`055ce998=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a82ca9 to fffff80002a83740
STACK_TEXT:
fffff800`03fd50e8 fffff800`02a82ca9 : 00000000`0000000a ffffba80`055ce998 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`03fd50f0 fffff800`02a81920 : fffff800`03fd52e8 fffffa80`0553d000 fffff800`03fd5328 fffffa80`0435ba90 : nt!KiBugCheckDispatch+0x69
fffff800`03fd5230 fffff880`03ac19ea : fffffa80`0553d000 fffffa80`05722b30 fffffa80`048a8000 fffff880`0144aace : nt!KiPageFault+0x260
fffff800`03fd53c0 fffffa80`0553d000 : fffffa80`05722b30 fffffa80`048a8000 fffff880`0144aace 00000000`00000000 : Rt64win7+0x29ea
fffff800`03fd53c8 fffffa80`05722b30 : fffffa80`048a8000 fffff880`0144aace 00000000`00000000 fffff880`014c9484 : 0xfffffa80`0553d000
fffff800`03fd53d0 fffffa80`048a8000 : fffff880`0144aace 00000000`00000000 fffff880`014c9484 fffffa80`053481a0 : 0xfffffa80`05722b30
fffff800`03fd53d8 fffff880`0144aace : 00000000`00000000 fffff880`014c9484 fffffa80`053481a0 00000000`00000000 : 0xfffffa80`048a8000
fffff800`03fd53e0 fffff880`01507088 : 00000000`00000000 fffffa80`053481a0 00000000`00000000 fffff800`02b35856 : ndis!ndisXlateReturnPacketToNetBufferList+0xfe
fffff800`03fd5430 fffff880`01508f15 : fffffa80`048a8ba0 00000000`00000001 fffffa80`048a8b30 fffffa80`05535010 : ndis!ndisReturnPacketToNetBufferList+0x28
fffff800`03fd5460 fffff880`014c90eb : fffffa80`053481a0 fffff800`03fd5870 00000000`00000001 fffffa80`06395680 : ndis! ?? ::DELBPBOK::`string'+0x855
fffff800`03fd5530 fffff880`01442ef1 : fffffa80`053481a0 fffff880`0144bf01 00000000`00000001 fffff880`03a22654 : ndis!ndisMDispatchReceiveNetBufferLists+0x2fb
fffff800`03fd59b0 fffff880`03ad3c05 : fffffa80`0553d000 00000000`00000001 00000000`00000001 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff800`03fd5a00 fffffa80`0553d000 : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000001 : Rt64win7+0x14c05
fffff800`03fd5a08 00000000`00000001 : 00000000`00000001 00000000`00000000 00000000`00000001 fffff800`03003090 : 0xfffffa80`0553d000
fffff800`03fd5a10 00000000`00000001 : 00000000`00000000 00000000`00000001 fffff800`03003090 fffff880`00000001 : 0x1
fffff800`03fd5a18 00000000`00000000 : 00000000`00000001 fffff800`03003090 fffff880`00000001 00000000`00000000 : 0x1
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt64win7+29ea
fffff880`03ac19ea 488b4208 mov rax,qword ptr [rdx+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: Rt64win7+29ea
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt64win7
IMAGE_NAME: Rt64win7.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a8d7432
FAILURE_BUCKET_ID: X64_0xD1_Rt64win7+29ea
BUCKET_ID: X64_0xD1_Rt64win7+29ea
Followup: MachineOwner
------------------------------------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121010-21312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a04000 PsLoadedModuleList = 0xfffff800`02c41e50
Debug session time: Fri Dec 10 13:13:02.809 2010 (UTC - 5:00)
System Uptime: 0 days 1:16:03.981
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffe8a008e65018, 0, fffff80002d50788, 7}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+218 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe8a008e65018, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002d50788, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cac0e0
ffffe8a008e65018
FAULTING_IP:
nt!CmpKcbCacheLookup+218
fffff800`02d50788 418b4710 mov eax,dword ptr [r15+10h]
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880096b9fb0 -- (.trap 0xfffff880096b9fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000007d
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d50788 rsp=fffff880096ba140 rbp=fffff8a008100630
r8=0000000000000005 r9=0000000000000000 r10=0000000000000000
r11=fffff880096ba2d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!CmpKcbCacheLookup+0x218:
fffff800`02d50788 418b4710 mov eax,dword ptr [r15+10h] ds:a0e0:00000000`00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002af3849 to fffff80002a74740
STACK_TEXT:
fffff880`096b9e48 fffff800`02af3849 : 00000000`00000050 ffffe8a0`08e65018 00000000`00000000 fffff880`096b9fb0 : nt!KeBugCheckEx
fffff880`096b9e50 fffff800`02a7282e : 00000000`00000000 00000000`00000000 fffff880`096ba100 fffffa80`06165900 : nt! ?? ::FNODOBFM::`string'+0x40e0b
fffff880`096b9fb0 fffff800`02d50788 : fffff8a0`0000b350 00000000`e9fe1463 fffff880`096ba6c4 fffff800`02d4c876 : nt!KiPageFault+0x16e
fffff880`096ba140 fffff800`02d4fd08 : fffff880`096ba2d8 fffff880`00000007 fffff880`096ba6c8 fffff880`096ba6e0 : nt!CmpKcbCacheLookup+0x218
fffff880`096ba230 fffff800`02d4df61 : fffff8a0`0a580c10 fffff880`096ba6e0 fffff880`096ba718 fffff880`096ba700 : nt!CmpBuildHashStackAndLookupCache+0x328
fffff880`096ba610 fffff800`02d6de84 : fffff800`02d4dcc0 00000000`00000000 fffffa80`05b09010 00000000`00000001 : nt!CmpParseKey+0x2a1
fffff880`096ba8e0 fffff800`02d72e4d : fffffa80`05b09010 fffff880`096baa40 00000000`00000040 fffffa80`03ad77b0 : nt!ObpLookupObjectName+0x585
fffff880`096ba9e0 fffff800`02d51dcc : 00000000`00000000 00000000`00000000 fffff8a0`0a580c01 fffff880`096baaa8 : nt!ObOpenObjectByName+0x1cd
fffff880`096baa90 fffff800`02d53f0f : 00000000`00eddba0 00000000`00020019 00000000`00eddc28 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`096babe0 fffff800`02a73993 : fffffa80`07553060 fffff880`096baca0 00000000`00000000 fffffa80`04637ca0 : nt!NtOpenKeyEx+0xf
fffff880`096bac20 00000000`77270caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00eddb38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77270caa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!CmpKcbCacheLookup+218
fffff800`02d50788 418b4710 mov eax,dword ptr [r15+10h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!CmpKcbCacheLookup+218
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x50_nt!CmpKcbCacheLookup+218
BUCKET_ID: X64_0x50_nt!CmpKcbCacheLookup+218
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121010-19328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Fri Dec 10 01:19:58.746 2010 (UTC - 5:00)
System Uptime: 0 days 0:05:55.980
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, 100000020, fffff88009941bb0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000100000020, Address of the instruction which caused the bugcheck
Arg3: fffff88009941bb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+0
00000001`00000020 ?? ???
CONTEXT: fffff88009941bb0 -- (.cxr 0xfffff88009941bb0)
rax=0000000000000000 rbx=000000002c5ff8e5 rcx=fffff8a00377182c
rdx=00000000031f55d0 rsi=000000000000ba58 rdi=fffff8a0036c6010
rip=0000000100000020 rsp=fffff88009942588 rbp=fffff8a00377182c
r8=0000000100000020 r9=000000000000007d r10=000000002c5ff8e5
r11=fffff8a0037718f6 r12=00000000ffffff00 r13=0000000000000000
r14=fffff880099426b0 r15=fffff8a0031f55d0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
00000001`00000020 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: FlashUtil10l_A
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to 0000000100000020
STACK_TEXT:
fffff880`099412e8 fffff800`02a88ca9 : 00000000`0000003b 00000000`c0000005 00000001`00000020 fffff880`09941bb0 : nt!KeBugCheckEx
fffff880`099412f0 fffff800`02a885fc : fffff880`09942348 fffff880`09941bb0 00000000`00000000 fffff800`02ab7c90 : nt!KiBugCheckDispatch+0x69
fffff880`09941430 fffff800`02aaf40d : fffff800`02cab508 fffff800`02bd0664 fffff800`02a19000 fffff880`09942348 : nt!KiSystemServiceHandler+0x7c
fffff880`09941470 fffff800`02ab6a90 : fffff800`02bd91a0 fffff880`099414e8 fffff880`09942348 fffff800`02a19000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`099414a0 fffff800`02ac39ef : fffff880`09942348 fffff880`09941bb0 fffff880`00000000 fffff8a0`036c6010 : nt!RtlDispatchException+0x410
fffff880`09941b80 fffff800`02a88d82 : fffff880`09942348 00000000`2c5ff8e5 fffff880`099423f0 00000000`0000ba58 : nt!KiDispatchException+0x16f
fffff880`09942210 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`02a885fc b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121010-30296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a66000 PsLoadedModuleList = 0xfffff800`02ca3e50
Debug session time: Fri Dec 10 14:38:13.302 2010 (UTC - 5:00)
System Uptime: 0 days 1:08:42.521
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffba8007080858, 0, fffff88002d20737, 7}
Could not read faulting driver name
Probably caused by : afd.sys ( afd! ?? ::GFJBLGFE::`string'+6a4b )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffba8007080858, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88002d20737, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0e0e0
ffffba8007080858
FAULTING_IP:
afd! ?? ::GFJBLGFE::`string'+6a4b
fffff880`02d20737 488b88b8000000 mov rcx,qword ptr [rax+0B8h]
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: vpnagent.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88005a12410 -- (.trap 0xfffff88005a12410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffba80070807a0 rbx=0000000000000000 rcx=fffffa80070801c0
rdx=fffff88002d2e8b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002d20737 rsp=fffff88005a125a0 rbp=fffff88005a12ca0
r8=fffffa8006dd25e0 r9=0000000000000000 r10=7217888ab475b60b
r11=fffffa80070801c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
afd! ?? ::GFJBLGFE::`string'+0x6a4b:
fffff880`02d20737 488b88b8000000 mov rcx,qword ptr [rax+0B8h] ds:ad30:ffffba80`07080858=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b55849 to fffff80002ad6740
STACK_TEXT:
fffff880`05a122a8 fffff800`02b55849 : 00000000`00000050 ffffba80`07080858 00000000`00000000 fffff880`05a12410 : nt!KeBugCheckEx
fffff880`05a122b0 fffff800`02ad482e : 00000000`00000000 00000000`0000059d fffffa80`06d80800 fffff880`038aecaf : nt! ?? ::FNODOBFM::`string'+0x40e0b
fffff880`05a12410 fffff880`02d20737 : 00000000`0000059d fffff880`05a12ca0 fffff880`05a127d0 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`05a125a0 fffff880`02cf4cf9 : fffffa80`04a8fe30 fffff880`05a127d0 00000000`0000059d fffffa80`03c65010 : afd! ?? ::GFJBLGFE::`string'+0x6a4b
fffff880`05a126a0 fffff800`02df1473 : 00000000`00000000 fffffa80`050d6070 00000000`00ca8920 fffffa80`07360e01 : afd!AfdFastIoDeviceControl+0xce9
fffff880`05a12a10 fffff800`02df1f66 : fffff880`05a12bf8 00000000`00000750 00000000`00000001 00000000`00ca8920 : nt!IopXxxControlFile+0x373
fffff880`05a12b40 fffff800`02ad5993 : fffff880`05a12ca0 fffffa80`05c00cc0 fffff880`05a12bf8 fffff800`02df5001 : nt!NtDeviceIoControlFile+0x56
fffff880`05a12bb0 00000000`752b2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00fbefd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x752b2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
afd! ?? ::GFJBLGFE::`string'+6a4b
fffff880`02d20737 488b88b8000000 mov rcx,qword ptr [rax+0B8h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: afd! ?? ::GFJBLGFE::`string'+6a4b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc184
FAILURE_BUCKET_ID: X64_0x50_afd!_??_::GFJBLGFE::_string_+6a4b
BUCKET_ID: X64_0x50_afd!_??_::GFJBLGFE::_string_+6a4b
Followup: MachineOwner
---------