3 dumps, all core Windows files so it is more than likely those are not the cause of the crash itself. The verifier enabled dump(s) didn't show anything.
Run Memtest:
Drivers that need to be updated:
FNETURPX.SYS - Fri Oct 03 22:27:02 2008 (FNet Turbo HDD USB Driver - Also part of AsRock XFastUSB package). Update
here, or
here, or
here.
Dumps for reference:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Icarus\Downloads\Windows_NT6_BSOD_jcgriff2 - Copy\032312-32604-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e50000 PsLoadedModuleList = 0xfffff800`03095670
Debug session time: Fri Mar 23 12:30:04.302 2012 (UTC - 4:00)
System Uptime: 0 days 0:33:16.083
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff880045a4338, fffff880045a3b90, fffff80002ec4b65}
Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonRead+1ff )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880045a4338
Arg3: fffff880045a3b90
Arg4: fffff80002ec4b65
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880045a4338 -- (.exr 0xfffff880045a4338)
ExceptionAddress: fffff80002ec4b65 (nt!ExpInterlockedPopEntrySListFault16)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880045a3b90 -- (.cxr 0xfffff880045a3b90)
rax=000000011e230003 rbx=fffff8a012fecc70 rcx=fffff88001264780
rdx=ff000000ff000001 rsi=fffff8a00279d280 rdi=fffff8a012fecb40
rip=fffff80002ec4b65 rsp=fffff880045a4570 rbp=fffff880045a4750
r8=ff000000ff000000 r9=0000000000000000 r10=fffff88001264780
r11=fffffa8011bda9c8 r12=0000000040060401 r13=0000000000000001
r14=fffffa8011bdaa38 r15=fffffa8011bda9c0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02ec4b65 498b08 mov rcx,qword ptr [r8] ds:002b:ff000000`ff000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: avp.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff100
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsCommonRead+1ff
fffff880`01213a1f 4885c0 test rax,rax
FAULTING_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ec4b65 498b08 mov rcx,qword ptr [r8]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff88001213a1f to fffff80002ec4b65
STACK_TEXT:
fffff880`045a4570 fffff880`01213a1f : fffff880`045a4620 fffff880`01073aae fffffa80`0ea0e730 fffff880`045a46c0 : nt!ExpInterlockedPopEntrySListFault16
fffff880`045a4580 fffff880`01215a68 : fffffa80`11bda9c0 fffffa80`12358010 fffff880`045a4700 fffffa80`0ee6f001 : Ntfs!NtfsCommonRead+0x1ff
fffff880`045a4720 fffff800`03372c16 : fffffa80`12358010 fffffa80`12358010 fffffa80`0ee6f030 fffffa80`11b26b70 : Ntfs!NtfsFsdRead+0x1b8
fffff880`045a47d0 fffff880`01071bcf : fffffa80`12358368 fffff880`045a4880 fffffa80`1212c010 fffffa80`11b26b70 : nt!IovCallDriver+0x566
fffff880`045a4830 fffff880`010706df : fffffa80`0f007950 fffffa80`0f007950 fffffa80`0f007900 fffffa80`12358010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`045a48c0 fffff800`03372c16 : fffffa80`12358010 00000000`00000002 fffffa80`0ea0e730 fffffa80`0db35298 : fltmgr!FltpDispatch+0xcf
fffff880`045a4920 fffff800`02ef4bc5 : fffffa80`12358030 fffffa80`0f010c30 fffffa80`0f010b00 fffffa80`0ebc7d40 : nt!IovCallDriver+0x566
fffff880`045a4980 fffff800`03169417 : fffffa80`0f010b00 fffffa80`0f010b00 fffffa80`0ea0e732 fffffa80`0fc0c060 : nt!IoPageRead+0x255
fffff880`045a4a10 fffff800`03169511 : fffffa80`12267210 fffffa80`0fc0c060 fffff880`045a4b48 00000000`00000005 : nt!MiPfExecuteReadList+0xff
fffff880`045a4a70 fffff800`02ebbc8d : fffffa80`12267210 00000000`00000000 00000000`0000a000 00000000`00000000 : nt!MmPrefetchForCacheManager+0xb5
fffff880`045a4ac0 fffff800`031b6e10 : 00000000`00000000 00000000`00000000 fffffa80`0ea0e730 fffff8a0`12fce000 : nt!CcFetchDataForRead+0x17d
fffff880`045a4b20 fffff880`01213730 : fffff8a0`00000000 00000000`00000005 fffffa80`00040000 fffff880`01266001 : nt!CcCopyRead+0x180
fffff880`045a4be0 fffff880`01213da3 : 00000000`00000000 fffff8a0`12fecc70 fffff880`045a4e10 fffff8a0`12fecb40 : Ntfs!NtfsCachedRead+0x180
fffff880`045a4c40 fffff880`01215a68 : fffffa80`12127aa0 fffffa80`0ea9c010 fffff880`045a4e01 fffffa80`0ee6f000 : Ntfs!NtfsCommonRead+0x583
fffff880`045a4de0 fffff800`03372c16 : fffffa80`0ea9c010 fffffa80`0ea9c010 fffffa80`0ee6f030 fffffa80`11bc3c60 : Ntfs!NtfsFsdRead+0x1b8
fffff880`045a4e90 fffff880`01071bcf : fffffa80`0ea9c368 fffff880`045a4f40 fffffa80`12257530 fffffa80`11bc3c60 : nt!IovCallDriver+0x566
fffff880`045a4ef0 fffff880`01074aea : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`12257530 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`045a4f80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!FltPerformSynchronousIo+0x2ca
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsCommonRead+1ff
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d79997b
STACK_COMMAND: .cxr 0xfffff880045a3b90 ; kb
FAILURE_BUCKET_ID: X64_0x24_VRF_Ntfs!NtfsCommonRead+1ff
BUCKET_ID: X64_0x24_VRF_Ntfs!NtfsCommonRead+1ff
Followup: MachineOwner
---------
2: kd> !thread
GetPointerFromAddress: unable to read from fffff800030ff000
THREAD fffffa800fc0c060 Cid 0784.0524 Teb: 000000007efd8000 Win32Thread: 0000000000000000 RUNNING on processor 2
IRP List:
Unable to read nt!_IRP @ fffffa8012358010
Not impersonating
GetUlongFromAddress: unable to read from fffff8000303eba4
Owning Process fffffa800fb8e060 Image: avp.exe
Attached Process N/A Image: N/A
fffff78000000000: Unable to get shared data
Wait Start TickCount 127953
Context Switch Count 25
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00000000675e4e30
Stack Init fffff880045a6c70 Current fffff8800b76d1c0
Base fffff880045a7000 Limit fffff880045a1000 Call 0
Priority 9 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
fffff880`045a3328 fffff880`0120ea88 : 00000000`00000024 00000000`001904fb fffff880`045a4338 fffff880`045a3b90 : nt!KeBugCheckEx
fffff880`045a3330 fffff880`01222f3d : fffff880`01254f8c fffff880`045a4750 fffff880`045a4720 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x2b49
fffff880`045a3370 fffff800`02ef8a7c : 00000000`00000000 fffffa80`112a6900 fffff800`031c44f4 00000000`000034c0 : Ntfs! ?? ::FNODOBFM::`string'+0x12c6
fffff880`045a33b0 fffff880`012225c5 : fffff880`01254f94 fffff880`045a4720 fffff880`045a4338 fffff880`045a4720 : nt!_C_specific_handler+0x8c
fffff880`045a3420 fffff800`02ef84fd : fffff880`01254f80 00000000`00000000 fffff880`01209000 00000000`00000000 : Ntfs!_GSHandlerCheck_SEH+0x75
fffff880`045a3450 fffff800`02ef72d5 : fffff880`01254f80 fffff880`045a34c8 fffff880`045a4338 fffff880`01209000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`045a3480 fffff800`02f08361 : fffff880`045a4338 fffff880`045a3b90 fffff880`00000000 fffff8a0`12fecb40 : nt!RtlDispatchException+0x415
fffff880`045a3b60 fffff800`02ecc2c2 : fffff880`045a4338 fffff8a0`12fecc70 fffff880`045a43e0 fffff8a0`0279d280 : nt!KiDispatchException+0x135
fffff880`045a4200 fffff800`02ecabca : fffffa80`0e99c0e0 fffffa80`1249cea0 00000000`00b600b6 fffff8a0`02ae5d00 : nt!KiExceptionDispatch+0xc2
fffff880`045a43e0 fffff800`02ec4b65 : fffff8a0`12fecc70 fffff880`01213a1f fffff880`045a4620 fffff880`01073aae : nt!KiGeneralProtectionFault+0x10a (TrapFrame @ fffff880`045a43e0)
fffff880`045a4570 fffff880`01213a1f : fffff880`045a4620 fffff880`01073aae fffffa80`0ea0e730 fffff880`045a46c0 : nt!ExpInterlockedPopEntrySListFault16
fffff880`045a4580 fffff880`01215a68 : fffffa80`11bda9c0 fffffa80`12358010 fffff880`045a4700 fffffa80`0ee6f001 : Ntfs!NtfsCommonRead+0x1ff
fffff880`045a4720 fffff800`03372c16 : fffffa80`12358010 fffffa80`12358010 fffffa80`0ee6f030 fffffa80`11b26b70 : Ntfs!NtfsFsdRead+0x1b8
fffff880`045a47d0 fffff880`01071bcf : fffffa80`12358368 fffff880`045a4880 fffffa80`1212c010 fffffa80`11b26b70 : nt!IovCallDriver+0x566
fffff880`045a4830 fffff880`010706df : fffffa80`0f007950 fffffa80`0f007950 fffffa80`0f007900 fffffa80`12358010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`045a48c0 fffff800`03372c16 : fffffa80`12358010 00000000`00000002 fffffa80`0ea0e730 fffffa80`0db35298 : fltmgr!FltpDispatch+0xcf
fffff880`045a4920 fffff800`02ef4bc5 : fffffa80`12358030 fffffa80`0f010c30 fffffa80`0f010b00 fffffa80`0ebc7d40 : nt!IovCallDriver+0x566
fffff880`045a4980 fffff800`03169417 : fffffa80`0f010b00 fffffa80`0f010b00 fffffa80`0ea0e732 fffffa80`0fc0c060 : nt!IoPageRead+0x255
fffff880`045a4a10 fffff800`03169511 : fffffa80`12267210 fffffa80`0fc0c060 fffff880`045a4b48 00000000`00000005 : nt!MiPfExecuteReadList+0xff
fffff880`045a4a70 fffff800`02ebbc8d : fffffa80`12267210 00000000`00000000 00000000`0000a000 00000000`00000000 : nt!MmPrefetchForCacheManager+0xb5
fffff880`045a4ac0 fffff800`031b6e10 : 00000000`00000000 00000000`00000000 fffffa80`0ea0e730 fffff8a0`12fce000 : nt!CcFetchDataForRead+0x17d
fffff880`045a4b20 fffff880`01213730 : fffff8a0`00000000 00000000`00000005 fffffa80`00040000 fffff880`01266001 : nt!CcCopyRead+0x180
fffff880`045a4be0 fffff880`01213da3 : 00000000`00000000 fffff8a0`12fecc70 fffff880`045a4e10 fffff8a0`12fecb40 : Ntfs!NtfsCachedRead+0x180
fffff880`045a4c40 fffff880`01215a68 : fffffa80`12127aa0 fffffa80`0ea9c010 fffff880`045a4e01 fffffa80`0ee6f000 : Ntfs!NtfsCommonRead+0x583
fffff880`045a4de0 fffff800`03372c16 : fffffa80`0ea9c010 fffffa80`0ea9c010 fffffa80`0ee6f030 fffffa80`11bc3c60 : Ntfs!NtfsFsdRead+0x1b8
fffff880`045a4e90 fffff880`01071bcf : fffffa80`0ea9c368 fffff880`045a4f40 fffffa80`12257530 fffffa80`11bc3c60 : nt!IovCallDriver+0x566
fffff880`045a4ef0 fffff880`01074aea : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`12257530 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`045a4f80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!FltPerformSynchronousIo+0x2ca
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Icarus\Downloads\Windows_NT6_BSOD_jcgriff2 - Copy\032112-28579-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e06000 PsLoadedModuleList = 0xfffff800`0304b670
Debug session time: Wed Mar 21 16:46:13.891 2012 (UTC - 4:00)
System Uptime: 0 days 5:01:18.561
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff70001080000, 3ea30, fffff680002b4962}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2a001 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000003ea30
Arg4: fffff680002b4962
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: TribesAscend.e
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002eed969 to fffff80002e82c40
STACK_TEXT:
fffff880`049d1748 fffff800`02eed969 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0003ea30 : nt!KeBugCheckEx
fffff880`049d1750 fffff800`02ea153f : 00000000`00000000 00000003`f514d121 00000000`00000000 fffffa80`128363f8 : nt! ?? ::FNODOBFM::`string'+0x2a001
fffff880`049d17e0 fffff800`02ea0053 : 00000000`0042203c 00000000`751b3495 fffff680`003a8d98 fffffa80`128363f8 : nt!MiResolveProtoPteFault+0x1cf
fffff880`049d1870 fffff800`02e8ff19 : 00000000`00000000 00000000`751b3495 ffffffff`ffffffff 00000000`00000000 : nt!MiDispatchFault+0x1c3
fffff880`049d1980 fffff800`02e80d6e : 00000000`00000000 00000000`751b3495 fffff880`00000001 00000000`00000000 : nt!MmAccessFault+0x359
fffff880`049d1ae0 00000000`751b3495 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0b50f3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x751b3495
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+2a001
fffff800`02eed969 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+2a001
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+2a001
BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+2a001
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Icarus\Downloads\Windows_NT6_BSOD_jcgriff2 - Copy\032112-16785-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e53000 PsLoadedModuleList = 0xfffff800`03098670
Debug session time: Wed Mar 21 11:44:07.660 2012 (UTC - 4:00)
System Uptime: 0 days 3:08:00.457
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3132613965316666
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff8800371ba08 -- (.exr 0xfffff8800371ba08)
ExceptionAddress: fffff80002ec7942 (nt!KiIdleLoop+0x0000000000000032)
ExceptionCode: c0000096
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff8800371bab0 -- (.trap 0xfffff8800371bab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000033508 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ec7942 rsp=fffff8800371bc40 rbp=0000000000000000
r8=0000000000016fcf r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiIdleLoop+0x32:
fffff800`02ec7942 440f22c1 mov cr8,rcx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ec75fe to fffff80002ecfc10
STACK_TEXT:
fffff880`0371aae8 fffff800`02ec75fe : fffffa80`0f230000 00000000`01840800 fffff880`0371b260 fffff800`02efb830 : nt!KeBugCheck
fffff880`0371aaf0 fffff800`02efb4fd : 00000000`0010001f fffff880`0371b260 fffff880`0371bab0 fffff880`0371ba08 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`0371ab20 fffff800`02efa2d5 : fffff800`0301a0fc fffff880`0371ab98 fffff880`0371ba08 fffff800`02e53000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0371ab50 fffff800`02f0b361 : fffff880`0371ba08 fffff880`0371b260 fffff880`00000000 fffff880`009f50c0 : nt!RtlDispatchException+0x415
fffff880`0371b230 fffff800`02ecf2c2 : fffff880`0371ba08 fffff880`009ea180 fffff880`0371bab0 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`0371b8d0 fffff800`02ecdbca : fffff880`009ea180 fffff880`0371bb30 fffff880`009f50c0 000023d2`14ec1fec : nt!KiExceptionDispatch+0xc2
fffff880`0371bab0 fffff800`02ec7942 : fffff880`009ea180 fffff880`00000001 00000000`00000001 fffff880`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`0371bc40 00000000`00000000 : fffff880`0371c000 fffff880`03716000 fffff880`0371bc00 00000000`00000000 : nt!KiIdleLoop+0x32
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`02ec75fe 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner
---------