************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 44
Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\072925-2921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Kernel base = 0xfffff805`0b800000 PsLoadedModuleList = 0xfffff805`0c4134a0
Debug session time: Tue Jul 29 20:54:27.129 2025 (UTC + 2:00)
System Uptime: 0 days 0:00:29.771
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000004a`ea303018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`0bc16b00 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffb00`37837290=0000000000000139
5: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000004a`ea303018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
*******************************************************************************
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffb00378375b0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffffb0037837508, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1328
Key : Analysis.Elapsed.mSec
Value: 3043
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 40
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 393252
Key : Analysis.Memory.CommitPeak.Mb
Value: 127
Key : Analysis.Version.DbgEng
Value: 10.0.27829.1001
Key : Analysis.Version.Description
Value: 10.2503.24.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2503.24.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!CCompositionFrame::Release
Key : Failure.Exception.Code
Value: 0xc0000409
Key : Failure.Exception.Record
Value: 0xfffffb0037837508
Key : Failure.Hash
Value: {ef10764d-c859-4c5d-7486-8c95c83f0442}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffb00378375b0
BUGCHECK_P3: fffffb0037837508
BUGCHECK_P4: 0
FILE_IN_CAB: 072925-2921-01.dmp
FAULTING_THREAD: ffffbe0412fcb080
TRAP_FRAME: fffffb00378375b0 -- (.trap 0xfffffb00378375b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa90fc51ffba8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80518f6fbc2 rsp=fffffb0037837740 rbp=00000000c0000225
r8=0000000000000000 r9=ffffa90fc51ffb00 r10=0000fffff80518f6
r11=ffff83feca600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
dxgkrnl!CCompositionFrame::Release+0x162:
fffff805`18f6fbc2 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffb0037837508 -- (.exr 0xfffffb0037837508)
ExceptionAddress: fffff80518f6fbc2 (dxgkrnl!CCompositionFrame::Release+0x0000000000000162)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Das System hat in dieser Anwendung den berlauf eines stapelbasierten Puffers ermittelt. Dieser berlauf k nnte einem b sartigen Benutzer erm glichen, die Steuerung der Anwendung zu bernehmen.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffb00`37837288 fffff805`0bc2c4e9 : 00000000`00000139 00000000`00000003 fffffb00`378375b0 fffffb00`37837508 : nt!KeBugCheckEx
fffffb00`37837290 fffff805`0bc2cab2 : ffffbe04`0e9ab000 fffff805`19115e39 ffffbe04`12ead080 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffb00`378373d0 fffff805`0bc2a806 : 00000000`000000f0 fffff805`0c2ac2b0 ffffa90f`c42f5230 00000000`00000003 : nt!KiFastFailDispatch+0xb2
fffffb00`378375b0 fffff805`18f6fbc2 : ffffa90f`c33182b0 00000000`00000000 00000000`0000012b ffffa90f`c33182b0 : nt!KiRaiseSecurityCheckFailure+0x346
fffffb00`37837740 fffff805`18f763dd : ffffa90f`c51ffb10 00000000`00000000 ffffa90f`c3318290 ffffa90f`c1a23df0 : dxgkrnl!CCompositionFrame::Release+0x162
fffffb00`37837770 ffffa7b1`8b898a15 : ffffa90f`c1a23df0 fffffb00`37837b60 00000000`00000000 00000000`0000012b : dxgkrnl!CCompositionFrameCollection::RemoveCompositionFrame+0x8d
fffffb00`378377b0 ffffa7b1`8bfcfc75 : 00000000`00000004 ffffbe04`12fcb080 00000000`00000000 00000000`00000000 : win32kbase!NtDCompositionConfirmFrame+0x815
fffffb00`37837ab0 fffff805`0bc2bbe8 : ffffbe04`12fcb080 00000000`00000000 00000000`00000000 ffffffff`ffffffff : win32k!NtDCompositionConfirmFrame+0x15
fffffb00`37837ae0 00007ff8`438c37d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004a`ea5ff9f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`438c37d4
SYMBOL_NAME: dxgkrnl!CCompositionFrame::Release+162
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.22621.1258
STACK_COMMAND: .process /r /p 0xffffbe0412ead080; .thread 0xffffbe0412fcb080 ; kb
BUCKET_ID_FUNC_OFFSET: 162
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!CCompositionFrame::Release
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ef10764d-c859-4c5d-7486-8c95c83f0442}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2504.15001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 44
Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\072925-3484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Kernel base = 0xfffff806`50800000 PsLoadedModuleList = 0xfffff806`514134a0
Debug session time: Tue Jul 29 21:03:00.723 2025 (UTC + 2:00)
System Uptime: 0 days 0:08:16.364
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000005b`1c3e6018). Type ".hh dbgerr001" for details
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`50c16b00 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb401`c3275600=000000000000000a
4: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000005b`1c3e6018). Type ".hh dbgerr001" for details
Loading unloaded module list
..........
*******************************************************************************
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffb401c32779c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8065489a708, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for rt640x64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1265
Key : Analysis.Elapsed.mSec
Value: 1428
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 10
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 33764
Key : Analysis.Memory.CommitPeak.Mb
Value: 122
Key : Analysis.Version.DbgEng
Value: 10.0.27829.1001
Key : Analysis.Version.Description
Value: 10.2503.24.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2503.24.1
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Failure.Bucket
Value: AV_rt640x64!unknown_function
Key : Failure.Exception.IP.Address
Value: 0xfffff8065489a708
Key : Failure.Exception.IP.Module
Value: tcpip
Key : Failure.Exception.IP.Offset
Value: 0xaa708
Key : Failure.Hash
Value: {2e96e72d-48ac-dceb-22bd-11e71513e43e}
Key : Stack.Pointer
Value: NMI
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffb401c32779c8
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8065489a708
FILE_IN_CAB: 072925-3484-01.dmp
FAULTING_THREAD: ffffa38a1ee9a080
WRITE_ADDRESS: fffff8065151d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb401c32779c8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
DPC_STACK_BASE: FFFFB401C3276FB0
STACK_TEXT:
ffffb401`c32755f8 fffff806`50c2c4e9 : 00000000`0000000a ffffb401`c32779c8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb401`c3275600 fffff806`50c27a34 : 00000000`0000ffff 00000000`00000000 ffffb401`c3275810 fffff806`50c59f6f : nt!KiBugCheckDispatch+0x69
ffffb401`c3275740 fffff806`5489a708 : ffffb401`c3275ba0 ffffa38a`1ef08030 00000000`00000000 00000000`00000006 : nt!KiPageFault+0x474
ffffb401`c32758d0 fffff806`548684fb : ffffa38a`1fdd0110 ffffa38a`1ef08030 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x878
ffffb401`c3275b40 fffff806`50aeb6fa : 00000000`00000004 fffff806`548683b0 ffffa38a`1ee9a0f4 00000000`00000002 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x14b
ffffb401`c3275c90 fffff806`50aeb66d : fffff806`548683b0 ffffb401`c3275dd8 ffffa38a`16bfed30 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
ffffb401`c3275d00 fffff806`54869810 : ffffb401`c3275e40 fffff806`5470540e ffffa38a`1ef08030 ffffb401`c3275e50 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffb401`c3275d40 fffff806`545826e0 : 00000000`00000000 00000000`00000000 ffffb401`c32761f8 ffffb401`c32761e0 : tcpip!FlReceiveNetBufferListChain+0x530
ffffb401`c3276020 fffff806`545820fa : ffffa38a`201eeba0 00000000`00000801 ffffa38a`00000000 fffff806`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffffb401`c3276100 fffff806`545a6224 : ffffa38a`1f1681a0 ffffa38a`00000000 ffffa38a`00000000 ffffa38a`1f1681a0 : ndis!ndisMTopReceiveNetBufferLists+0x24a
ffffb401`c32761e0 fffff806`545a5c93 : 00000000`00000000 ffffb401`c32762d0 fffff806`54581eb0 00000000`00000000 : ndis!ndisCallReceiveHandler+0xb8
ffffb401`c3276230 fffff806`545a604b : 00000000`00000000 00001f80`00000200 00000000`00000000 00000000`00000002 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
ffffb401`c3276280 fffff806`545a5d82 : ffffa38a`1f1681a0 fffff806`54581eb0 ffffa38a`1f1681a0 00000000`00000001 : ndis!ndisIterativeDPInvokeHandlerOnTracker<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0x8b
ffffb401`c32762f0 fffff806`545a62ea : ffffa38a`1fa44bf0 00000000`00000000 00000000`00000001 ffffa38a`1ef08030 : ndis!ndisInvokeIterativeDatapath<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xe2
ffffb401`c3276360 fffff806`54583766 : 00000000`00007c17 00000000`00000001 00000000`00000000 00000000`00000246 : ndis!ndisInvokeNextReceiveHandler+0xa6
ffffb401`c32763c0 fffff806`7fe079bc : ffffa38a`1d0c2002 ffffa38a`1d0c2000 00000000`00000002 ffffdd01`c4d66900 : ndis!NdisMIndicateReceiveNetBufferLists+0x116
ffffb401`c3276450 ffffa38a`1d0c2002 : ffffa38a`1d0c2000 00000000`00000002 ffffdd01`c4d66900 00000000`00000001 : rt640x64+0x279bc
ffffb401`c3276458 ffffa38a`1d0c2000 : 00000000`00000002 ffffdd01`c4d66900 00000000`00000001 ffffa38a`1edf4c40 : 0xffffa38a`1d0c2002
ffffb401`c3276460 00000000`00000002 : ffffdd01`c4d66900 00000000`00000001 ffffa38a`1edf4c40 00000002`c3270001 : 0xffffa38a`1d0c2000
ffffb401`c3276468 ffffdd01`c4d66900 : 00000000`00000001 ffffa38a`1edf4c40 00000002`c3270001 8000f800`00000001 : 0x2
ffffb401`c3276470 00000000`00000001 : ffffa38a`1edf4c40 00000002`c3270001 8000f800`00000001 ffff0000`00000001 : 0xffffdd01`c4d66900
ffffb401`c3276478 ffffa38a`1edf4c40 : 00000002`c3270001 8000f800`00000001 ffff0000`00000001 00206900`00000000 : 0x1
ffffb401`c3276480 00000002`c3270001 : 8000f800`00000001 ffff0000`00000001 00206900`00000000 00000001`00000001 : 0xffffa38a`1edf4c40
ffffb401`c3276488 8000f800`00000001 : ffff0000`00000001 00206900`00000000 00000001`00000001 00000001`00000000 : 0x00000002`c3270001
ffffb401`c3276490 ffff0000`00000001 : 00206900`00000000 00000001`00000001 00000001`00000000 00000010`00000001 : 0x8000f800`00000001
ffffb401`c3276498 00206900`00000000 : 00000001`00000001 00000001`00000000 00000010`00000001 fffff806`00000400 : 0xffff0000`00000001
ffffb401`c32764a0 00000001`00000001 : 00000001`00000000 00000010`00000001 fffff806`00000400 ffffa38a`1ef08030 : 0x00206900`00000000
ffffb401`c32764a8 00000001`00000000 : 00000010`00000001 fffff806`00000400 ffffa38a`1ef08030 00000000`00000000 : 0x00000001`00000001
ffffb401`c32764b0 00000010`00000001 : fffff806`00000400 ffffa38a`1ef08030 00000000`00000000 ffffb401`c3276678 : 0x00000001`00000000
ffffb401`c32764b8 fffff806`00000400 : ffffa38a`1ef08030 00000000`00000000 ffffb401`c3276678 00000000`00000002 : 0x00000010`00000001
ffffb401`c32764c0 ffffa38a`1ef08030 : 00000000`00000000 ffffb401`c3276678 00000000`00000002 00000000`00000020 : 0xfffff806`00000400
ffffb401`c32764c8 00000000`00000000 : ffffb401`c3276678 00000000`00000002 00000000`00000020 ffffa38a`1ef08030 : 0xffffa38a`1ef08030
SYMBOL_NAME: rt640x64+279bc
MODULE_NAME: rt640x64
IMAGE_NAME: rt640x64.sys
STACK_COMMAND: .process /r /p 0xffffa38a1ed6a080; .thread 0xffffa38a1ee9a080 ; kb
BUCKET_ID_FUNC_OFFSET: 279bc
FAILURE_BUCKET_ID: AV_rt640x64!unknown_function
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2e96e72d-48ac-dceb-22bd-11e71513e43e}
Followup: MachineOwner
---------