Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a08000 PsLoadedModuleList = 0xfffff800`02c45e50
Debug session time: Sat Jan 29 15:17:25.885 2011 (GMT-5)
System Uptime: 0 days 0:21:34.321
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {28, 2, 0, fffff80002aba518}
Probably caused by : memory_corruption ( nt!MiFindNodeOrParent+0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002aba518, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb00e0
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiFindNodeOrParent+0
fffff800`02aba518 48f7412800ffffff test qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8800550f400 -- (.trap 0xfffff8800550f400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aba518 rsp=fffff8800550f598 rbp=0000000000000000
r8=fffff8800550f5e0 r9=0000000000000000 r10=fffffa8003c82270
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiFindNodeOrParent:
fffff800`02aba518 48f7412800ffffff test qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h ds:3000:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a77ca9 to fffff80002a78740
STACK_TEXT:
fffff880`0550f2b8 fffff800`02a77ca9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0550f2c0 fffff800`02a76920 : 00000000`00000000 fffffa80`03c822b8 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0550f400 fffff800`02aba518 : fffff800`02abe2d7 00000000`000007ff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0550f598 fffff800`02abe2d7 : 00000000`000007ff 00000000`00000000 00000000`00000000 00001f80`00000000 : nt!MiFindNodeOrParent
fffff880`0550f5a0 fffff800`02abe25d : fffff8a0`002feb68 00000000`00000000 fffff880`0550f7c0 00000000`00000001 : nt!MiLocateAddressInTree+0x17
fffff880`0550f5d0 fffff800`02abe368 : 00000000`00000002 fffffa80`03c82328 00000000`000000ce fffffa80`03c82328 : nt!MiGetSharedProtosAtDpcLevel+0xbd
fffff880`0550f620 fffff800`02a161cb : 000067ee`7ebfd87d 00000000`00000000 00000000`00000000 fffff800`02a9b139 : nt!MiGetSharedProtos+0x18
fffff880`0550f650 fffff800`02b2ac4b : 00000000`00029a55 02000000`00050954 00000000`000018c0 fffff800`02d3f35b : nt! ?? ::FNODOBFM::`string'+0x927b
fffff880`0550f680 fffff800`02b2b7cb : 00000000`00000000 00000000`00000004 fffffa80`03ea3250 fffffa80`03ea3000 : nt!MiIdentifyPfn+0x39b
fffff880`0550f720 fffff800`02e8a595 : fffffa80`03ea3000 fffff880`0550fca0 fffff880`0550f7f8 00000000`00000000 : nt!MmQueryPfnList+0xbb
fffff880`0550f760 fffff800`02dcf8b8 : 00000000`00000006 00000000`00000000 fffffa80`03ea3000 fffff800`02a08001 : nt!PfpPfnPrioRequest+0x115
fffff880`0550f7b0 fffff800`02d763c3 : 00000000`00000000 fffff800`02a08000 fffffa80`04693000 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x472ad
fffff880`0550f840 fffff800`02d771e5 : 00000000`01b0bd88 fffff800`02a7e652 00000000`01b0bde0 00000000`01b0bda8 : nt!ExpQuerySystemInformation+0x11c2
fffff880`0550fbe0 fffff800`02a77993 : fffffa80`05ae3b60 00000000`021bbb30 00000000`021bea88 00000000`041d2050 : nt!NtQuerySystemInformation+0x4d
fffff880`0550fc20 00000000`777c00ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01b0bca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777c00ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiFindNodeOrParent+0
fffff800`02aba518 48f7412800ffffff test qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiFindNodeOrParent+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiFindNodeOrParent+0
BUCKET_ID: X64_0xA_nt!MiFindNodeOrParent+0
Followup: MachineOwner
---------
Debug session time: Sat Jan 29 15:49:02.194 2011 (GMT-5)
System Uptime: 0 days 0:30:40.004
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002a21b6c, fffff88002fa0fd8, fffff88002fa0840}
Probably caused by : cng.sys ( cng!GatherRandomKey+294 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a21b6c, The address that the exception occurred at
Arg3: fffff88002fa0fd8, Exception Record Address
Arg4: fffff88002fa0840, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpGetLookasideInformation+8c
fffff800`02a21b6c 0fb742c0 movzx eax,word ptr [rdx-40h]
EXCEPTION_RECORD: fffff88002fa0fd8 -- (.exr 0xfffff88002fa0fd8)
Cannot read Exception record @ fffff88002fa0fd8
CONTEXT: fffff88002fa0840 -- (.cxr 0xfffff88002fa0840)
rax=0000000000000090 rbx=0000000000000ff4 rcx=fffff8800b4c43b0
rdx=ffeff88002d63da0 rsi=0000000000000000 rdi=0000000000000001
rip=fffff80002a21b6c rsp=fffff88002fa1210 rbp=0000000000000092
r8=fffff80002c18720 r9=0000000000000000 r10=0000000000000000
r11=0000fffffffff000 r12=fffff88002fa12e0 r13=0000000000000000
r14=000000000001fe90 r15=fffff88002fa1840
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010283
nt!ExpGetLookasideInformation+0x8c:
fffff800`02a21b6c 0fb742c0 movzx eax,word ptr [rdx-40h] ds:002b:ffeff880`02d63d60=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cab0e0
0000000000000000
FOLLOWUP_IP:
cng!GatherRandomKey+294
fffff880`010d6b04 85c0 test eax,eax
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002d717bb to fffff80002a21b6c
STACK_TEXT:
fffff880`02fa1210 fffff800`02d717bb : 00000000`00000000 fffff800`00000ff4 fffff880`02fa12e0 00000000`00000000 : nt!ExpGetLookasideInformation+0x8c
fffff880`02fa12a0 fffff800`02d721e5 : fffff8a0`0942c170 00000000`00000000 00000000`00000004 00000000`00000000 : nt!ExpQuerySystemInformation+0x15bc
fffff880`02fa1640 fffff800`02a72993 : fffff8a0`09440000 fffff800`02a7193d 00000000`00000041 fffffa80`04805060 : nt!NtQuerySystemInformation+0x4d
fffff880`02fa1680 fffff800`02a6ef30 : fffff880`010d6b04 00000000`00020000 fffff880`02fa1844 fffff8a0`0942c148 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02fa1818 fffff880`010d6b04 : 00000000`00020000 fffff880`02fa1844 fffff8a0`0942c148 fffff800`02a80c3e : nt!KiServiceLinkage
fffff880`02fa1820 fffff880`010d656d : fffffa80`04805060 00000000`00000000 fffff800`20206f49 fffff800`02a7e2a1 : cng!GatherRandomKey+0x294
fffff880`02fa1be0 fffff800`02d6fc5d : 00000000`00000000 fffff800`02c78fa0 00000000`00000000 fffffa80`039f2b60 : cng!scavengingWorkItemRoutine+0x3d
fffff880`02fa1c80 fffff800`02a80961 : fffff800`02ccb700 fffff800`02ccb7b4 fffffa80`039f2b60 00000000`00000000 : nt!IopProcessWorkItem+0x3d
fffff880`02fa1cb0 fffff800`02d17c06 : 00000000`00000000 fffffa80`039f2b60 00000000`00000080 fffffa80`039db040 : nt!ExpWorkerThread+0x111
fffff880`02fa1d40 fffff800`02a51c26 : fffff880`02d63180 fffffa80`039f2b60 fffff880`02d6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fa1d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: cng!GatherRandomKey+294
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cng
IMAGE_NAME: cng.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc814
STACK_COMMAND: .cxr 0xfffff88002fa0840 ; kb
FAILURE_BUCKET_ID: X64_0x7E_cng!GatherRandomKey+294
BUCKET_ID: X64_0x7E_cng!GatherRandomKey+294
Followup: MachineOwner
---------
Debug session time: Sun Jan 30 14:25:29.064 2011 (GMT-5)
System Uptime: 0 days 0:43:52.874
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002a7a7b1, fffff88007b20180, 0}
Probably caused by : ntkrnlmp.exe ( nt!KeSetEvent+121 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002a7a7b1, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88007b20180, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KeSetEvent+121
fffff800`02a7a7b1 488908 mov qword ptr [rax],rcx
CONTEXT: fffff88007b20180 -- (.cxr 0xfffff88007b20180)
rax=fffdfa8003dcd5a8 rbx=fffffa8003dcd5a0 rcx=fffffa8003dcd5a8
rdx=fffffa8003de7768 rsi=0000000000000000 rdi=fffff80002bf0e80
rip=fffff80002a7a7b1 rsp=fffff88007b20b50 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffffa80039f6570
r11=00000000001f0003 r12=000000000012e001 r13=0000000000000005
r14=0000000000000007 r15=000007fee3d67740
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!KeSetEvent+0x121:
fffff800`02a7a7b1 488908 mov qword ptr [rax],rcx ds:002b:fffdfa80`03dcd5a8=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002d93154 to fffff80002a7a7b1
STACK_TEXT:
fffff880`07b20b50 fffff800`02d93154 : fffff880`00000000 fffff880`00000001 fffffa80`039f6500 fffffa80`03dcd5a8 : nt!KeSetEvent+0x121
fffff880`07b20bc0 fffff800`02a75993 : fffffa80`03ba4510 fffff880`00000000 000007fe`00000000 fffffa80`03dcd5a0 : nt!NtSetEvent+0x90
fffff880`07b20c20 00000000`771efe3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0123cd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771efe3a
FOLLOWUP_IP:
nt!KeSetEvent+121
fffff800`02a7a7b1 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeSetEvent+121
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88007b20180 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KeSetEvent+121
BUCKET_ID: X64_0x3B_nt!KeSetEvent+121
Followup: MachineOwner
---------
Debug session time: Sun Jan 30 15:19:04.460 2011 (GMT-5)
System Uptime: 0 days 0:53:07.270
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88007572048, fffff880075718b0, fffff80002a7fcfc}
Unable to load image \SystemRoot\system32\DRIVERS\AVGIDSFilter.Sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AVGIDSFilter.Sys
*** ERROR: Module load completed but symbols could not be loaded for AVGIDSFilter.Sys
Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushUserStream+92 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88007572048
Arg3: fffff880075718b0
Arg4: fffff80002a7fcfc
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88007572048 -- (.exr 0xfffff88007572048)
ExceptionAddress: fffff80002a7fcfc (nt!IoGetRelatedDeviceObject+0x000000000000000c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880075718b0 -- (.cxr 0xfffff880075718b0)
rax=ffdffa80048eb820 rbx=0000000000000000 rcx=fffffa800493f970
rdx=fffffa800493f970 rsi=0000000000000000 rdi=fffffa800493f970
rip=fffff80002a7fcfc rsp=fffff88007572288 rbp=fffffa8004976840
r8=0000000000000009 r9=fffff880009e9100 r10=0000000000000000
r11=0000000000000000 r12=fffff880075722c0 r13=fffffa800493f970
r14=fffffa80045b7b00 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!IoGetRelatedDeviceObject+0xc:
fffff800`02a7fcfc 488b4008 mov rax,qword ptr [rax+8] ds:002b:ffdffa80`048eb828=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: VSSVC.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ca80e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsFlushUserStream+92
fffff880`01304642 389c24a0000000 cmp byte ptr [rsp+0A0h],bl
FAULTING_IP:
nt!IoGetRelatedDeviceObject+c
fffff800`02a7fcfc 488b4008 mov rax,qword ptr [rax+8]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff80002d62864 to fffff80002a7fcfc
STACK_TEXT:
fffff880`07572288 fffff800`02d62864 : 00000000`00000000 fffff880`01296d80 fffffa80`04b27030 00000000`00000000 : nt!IoGetRelatedDeviceObject+0xc
fffff880`07572290 fffff800`02a5c923 : fffff880`07572728 fffff880`07572700 fffffa80`04976840 00000000`00000000 : nt!FsRtlAcquireFileForCcFlushEx+0x3c
fffff880`07572530 fffff800`02a5c4fa : 00000000`00000000 fffff980`013d6100 00000000`00000000 fffff880`012ed961 : nt!MmFlushSection+0x1c3
fffff880`075725f0 fffff880`01304642 : fffffa80`03a34398 00000000`00000000 fffff8a0`00000000 00000000`00000001 : nt!CcFlushCache+0x88a
fffff880`075726f0 fffff880`012b39e7 : 00000000`00000000 fffff8a0`00203140 00000000`00000000 00000000`00000001 : Ntfs!NtfsFlushUserStream+0x92
fffff880`07572770 fffff880`01304bbd : fffffa80`06823010 fffffa80`04b27180 fffffa80`06231901 fffffa80`010a2600 : Ntfs!NtfsFlushVolume+0x2c7
fffff880`075728a0 fffff880`013055f0 : fffffa80`06823010 fffffa80`040ab9c0 fffffa80`03c32550 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459
fffff880`07572980 fffff880`0100c23f : fffffa80`040abda8 fffffa80`040ab9c0 fffffa80`06823010 fffff880`075729a8 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`075729f0 fffff880`0100a6df : fffffa80`0495dbf0 00000000`00000000 fffffa80`0495db00 fffffa80`040ab9c0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`07572a80 fffff880`061bf656 : 00000000`00000002 00000000`00000801 fffffa80`045b7b60 00000000`02cef4d0 : fltmgr!FltpDispatch+0xcf
fffff880`07572ae0 00000000`00000002 : 00000000`00000801 fffffa80`045b7b60 00000000`02cef4d0 00000000`00000000 : AVGIDSFilter+0x2656
fffff880`07572ae8 00000000`00000801 : fffffa80`045b7b60 00000000`02cef4d0 00000000`00000000 fffffa80`06314060 : 0x2
fffff880`07572af0 fffffa80`045b7b60 : 00000000`02cef4d0 00000000`00000000 fffffa80`06314060 fffffa80`040ab9c0 : 0x801
fffff880`07572af8 00000000`02cef4d0 : 00000000`00000000 fffffa80`06314060 fffffa80`040ab9c0 fffff800`02d86ca9 : 0xfffffa80`045b7b60
fffff880`07572b00 00000000`00000000 : fffffa80`06314060 fffffa80`040ab9c0 fffff800`02d86ca9 fffffa80`06314060 : 0x2cef4d0
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: Ntfs!NtfsFlushUserStream+92
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff880075718b0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsFlushUserStream+92
BUCKET_ID: X64_0x24_Ntfs!NtfsFlushUserStream+92
Followup: MachineOwner
---------