Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path. *
* Use .symfix to have the debugger choose a symbol path. *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is:
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c0e000 PsLoadedModuleList = 0xfffff800`02e4be50
Debug session time: Sun Dec 27 11:33:48.274 2009 (GMT+1)
System Uptime: 0 days 1:38:44.576
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 406f8, fffff80002c5b40f}
*** ERROR: Symbol file could not be found. Defaulted to export symbols for NETIO.SYS -
*** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
*** ERROR: Module load completed but symbols could not be loaded for tdx.sys
*** ERROR: Module load completed but symbols could not be loaded for netbt.sys
*** ERROR: Symbol file could not be found. Defaulted to export symbols for fwpkclnt.sys -
*** ERROR: Module load completed but symbols could not be loaded for vsdatant.sys
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ndis.sys -
*** ERROR: Module load completed but symbols could not be loaded for nwifi.sys
*** ERROR: Symbol file could not be found. Defaulted to export symbols for vwififlt.sys -
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Probably caused by : NETIO.SYS ( NETIO!KfdCheckConnectBypass+aca )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff80002c5b40f
Debugging Details:
------------------
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
MODULE_NAME: NETIO
FAULTING_MODULE: fffff80002c0e000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
BUGCHECK_STR: 0x7f_8
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002c7f469 to fffff80002c7ff00
STACK_TEXT:
fffff800`00ba4d28 fffff800`02c7f469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02c7d932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeSynchronizeExecution+0x3d59
fffff800`00ba4e70 fffff800`02c5b40f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeSynchronizeExecution+0x2222
fffff880`06b58ff0 fffff800`02c4869c : fffff880`06b590d0 fffffa80`04c24068 00000000`0000000a 3b9639cd`000002a6 : nt!RtlSidHashInitialize+0x2f
fffff880`06b59020 fffff800`02c487df : fffffa80`04c24068 00000000`00000001 0000000a`d01c0400 63732e6e`6f676f6c : nt!KeQueryDpcWatchdogInformation+0x25c
fffff880`06b59050 fffff880`01606c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x9f
fffff880`06b59740 fffff880`0160494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!KfdCheckConnectBypass+0xaca
fffff880`06b597b0 fffff880`016069b5 : 00200100`5842444c 00120865`02000864 000002a7`000002a9 00000000`00000000 : NETIO!WfpRefreshEntryLru+0x1df
fffff880`06b59800 fffff880`01606845 : fffffa80`0a2c3410 fffffa80`04628420 fffff880`06b59a28 fffff880`06b5a160 : NETIO!KfdCheckConnectBypass+0x825
fffff880`06b59850 fffff880`01607ccb : 00000000`00000000 00000000`00000000 fffff880`06b5a160 fffff880`06b59a10 : NETIO!KfdCheckConnectBypass+0x6b5
fffff880`06b598d0 fffff880`018404d0 : fffff880`06b5a160 fffff880`06b59da8 fffff880`06b5aae0 fffffa80`04e98030 : NETIO!KfdClassify+0xa3b
fffff880`06b59c40 fffff880`0183977e : fffff880`01948690 00000000`00000000 fffffa80`0a4d9db0 00000000`00000000 : tcpip+0x3d4d0
fffff880`06b59c80 fffff880`01838c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip+0x3677e
fffff880`06b5a390 fffff880`0183c956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip+0x35c15
fffff880`06b5a660 fffff880`0183f6a4 : 00000000`00000000 fffff880`06b5aa98 fffff880`06b5aaa0 00000000`00000000 : tcpip+0x39956
fffff880`06b5a750 fffff880`01837f59 : fffff880`03d853c0 00000000`000000ff 00000000`00000001 00000000`00000008 : tcpip+0x3c6a4
fffff880`06b5a9c0 fffff880`01864bf6 : 00000000`00000000 00000000`00000002 fffffa80`0a0d8900 fffffa80`09de97d6 : tcpip+0x34f59
fffff880`06b5ab90 fffff880`01869a7e : fffffa80`0a0df5d0 fffff880`01602804 fffff880`0196e9a0 fffffa80`0a4d9db0 : tcpip+0x61bf6
fffff880`06b5ae60 fffff880`01836cf8 : fffffa80`0a4d9db0 fffffa80`04e98030 fffffa80`04e98030 fffffa80`0a0df5d0 : tcpip+0x66a7e
fffff880`06b5aea0 fffff880`0183726d : fffffa80`04692380 fffffa80`0a0de380 fffff880`06b5b7f0 00000000`00000000 : tcpip+0x33cf8
fffff880`06b5b220 fffff880`01836ef5 : fffff880`06b5b750 fffffa80`048497d6 fffff880`00000001 fffffa80`09dec0f0 : tcpip+0x3426d
fffff880`06b5b610 fffff800`02c8f64a : fffff880`06b5b9a0 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip+0x33ef5
fffff880`06b5b640 fffff880`018374b8 : fffff880`01836ee0 fffff880`06b5b750 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`06b5b720 fffff880`02e02f45 : fffffa80`04bd3180 fffffa80`0a3f6c00 fffffa80`09dea230 fffffa80`0a79ee3e : tcpip+0x344b8
fffff880`06b5b7a0 fffff880`02e02ff2 : fffffa80`04f13902 fffffa80`04659e20 fffffa80`04da0298 fffffa80`04659e20 : tdx+0x2f45
fffff880`06b5b880 fffff880`03cbf542 : 00000000`00000000 fffffa80`0a4391e0 00000000`00000000 fffffa80`04da0180 : tdx+0x2ff2
fffff880`06b5b8b0 fffff880`03cbff61 : fffffa80`0a79ee08 fffffa80`0a79ee08 fffffa80`0424e230 fffff880`06b5b9b0 : netbt+0x2542
fffff880`06b5b920 fffff880`03ccc329 : fffffa80`0a7cfc20 fffffa80`0a79ec50 00000000`00000021 00000000`0000003e : netbt+0x2f61
fffff880`06b5b9b0 fffff880`03ccc0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`03ced697 : netbt+0xf329
fffff880`06b5ba30 fffff880`03cc0be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt+0xf0e6
fffff880`06b5bb60 fffff880`03cbeb47 : 00000000`00000032 fffff880`054a3040 00000000`00000032 fffffa80`09dea202 : netbt+0x3be7
fffff880`06b5bba0 fffff880`02e01325 : fffffa80`0a4dc080 fffffa80`0a450002 fffff880`06b5bea8 fffffa80`0a4dc080 : netbt+0x1b47
fffff880`06b5bc40 fffff880`018423c5 : fffffa80`0a45a6c0 00000000`00000000 fffffa80`0a45a6c0 fffffa80`0a45a6c0 : tdx+0x1325
fffff880`06b5be30 fffff880`018428d4 : fffffa80`00000000 fffffa80`0a45a6c0 00000000`00000000 fffff880`054a3038 : tcpip+0x3f3c5
fffff880`06b5bfc0 fffff880`0185e427 : fffffa80`04bfcd30 fffff880`00000000 fffffa80`060c2470 00000000`00000000 : tcpip+0x3f8d4
fffff880`06b5c0b0 fffff880`0185e499 : fffff880`06b5c230 fffff880`0196e9a0 fffff880`06b5c240 fffffa80`04bcb820 : tcpip+0x5b427
fffff880`06b5c170 fffff880`0185e990 : fffff880`0196e9a0 fffffa80`04841520 00000000`00000011 fffff880`06b5c230 : tcpip+0x5b499
fffff880`06b5c1e0 fffff880`0185d821 : 00000000`ff01a8c0 fffffa80`04c16138 fffff880`0196e9a0 00000000`05075501 : tcpip+0x5b990
fffff880`06b5c2c0 fffff880`01937592 : fffffa80`09cc3cb0 00000000`00000000 fffffa80`05075501 fffffa80`00000001 : tcpip+0x5a821
fffff880`06b5c4c0 fffff880`00c09afa : fffffa80`0415b202 fffffa80`0415b2b0 00000000`00000002 00000000`00000000 : tcpip+0x134592
fffff880`06b5c500 fffff880`03d17863 : fffffa80`0a2ff430 fffffa80`05075560 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`06b5c5b0 fffff880`03d16a86 : fffffa80`05075560 fffffa80`04f47d40 fffffa80`04280898 fffffa80`04280760 : vsdatant+0x15863
fffff880`06b5c640 fffff880`03d10651 : fffffa80`05075560 fffffa80`05075560 fffff880`06b5ce00 fffffa80`05075658 : vsdatant+0x14a86
fffff880`06b5c740 fffff880`0161d57f : fffff880`06b5cd58 fffff880`06b5ce70 fffffa80`05eef1d0 fffffa80`0a2b1e80 : vsdatant+0xe651
fffff880`06b5c870 fffff880`016074db : fffffa80`0a2b0018 fffff880`06b5cd58 fffffa80`048fee68 fffffa80`05eef1d0 : NETIO!NsiDeregisterChangeNotificationEx+0x5ddf
fffff880`06b5c990 fffff880`0190202b : fffff880`06b5d3a8 fffff880`06b5cd58 fffff880`06b5d3a8 fffffa80`05eef1d0 : NETIO!KfdClassify+0x24b
fffff880`06b5cd00 fffff880`01805d10 : 00000000`00000000 fffffa80`0a4d9db0 fffffa80`048fef70 00000000`00000100 : tcpip+0xff02b
fffff880`06b5d060 fffff880`0187ef2d : fffff880`06b5d4b8 fffff880`01828af4 00000000`00000001 fffffa80`05eef1d0 : tcpip+0x2d10
fffff880`06b5d2d0 fffff880`01841080 : fffffa80`0a4d9db0 00000000`00000000 00000000`00000002 00000000`000000de : tcpip+0x7bf2d
fffff880`06b5d3f0 fffff880`0186f861 : fffffa80`00000011 fffffa80`0a450002 fffffa80`04c18900 00000000`000097d6 : tcpip+0x3e080
fffff880`06b5d760 fffff880`01841f93 : fffffa80`0a45a6c0 fffffa80`04bfcde0 00000000`00000000 fffffa80`04c16000 : tcpip+0x6c861
fffff880`06b5d800 fffff880`01842345 : fffffa80`0a45a6c0 00000000`00000000 fffffa80`04e56030 fffffa80`062763c8 : tcpip+0x3ef93
fffff880`06b5d950 fffff880`018428d4 : fffffa80`00000000 fffffa80`0a45a6c0 00000000`00000000 fffff880`054a3038 : tcpip+0x3f345
fffff880`06b5dae0 fffff880`0185e427 : fffffa80`04bfcd30 fffff880`00000000 fffffa80`060c2470 00000000`00000000 : tcpip+0x3f8d4
fffff880`06b5dbd0 fffff880`0185e499 : fffff880`06b5dd50 fffff880`0196e9a0 fffff880`06b5dd60 fffffa80`04bcb820 : tcpip+0x5b427
fffff880`06b5dc90 fffff880`0185e990 : fffff880`0196e9a0 fffffa80`060cf500 00000000`00000011 fffff880`06b5dd50 : tcpip+0x5b499
fffff880`06b5dd00 fffff880`0185d821 : 00000000`ff01a8c0 fffffa80`04c16000 fffff880`0196e9a0 00000000`09d73b01 : tcpip+0x5b990
fffff880`06b5dde0 fffff880`0185c272 : fffffa80`09cc3cb0 00000000`00000000 fffffa80`09d73b01 00000000`00000001 : tcpip+0x5a821
fffff880`06b5dfe0 fffff880`018756ba : fffffa80`09d73bb0 fffff880`06b5e110 fffffa80`09d73bb0 00000000`00000000 : tcpip+0x59272
fffff880`06b5e0c0 fffff800`02c8f64a : fffffa80`05eef1d0 fffff880`06b59000 00000000`00004800 00000000`00000000 : tcpip+0x726ba
fffff880`06b5e110 fffff880`018750e2 : fffff880`018755e0 fffff880`06b5e220 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`06b5e1f0 fffff880`017ca0eb : fffffa80`060c1010 00000000`00000000 fffffa80`05ea31a0 fffffa80`05ea31a0 : tcpip+0x720e2
fffff880`06b5e260 fffff880`01793fc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisIMInitializeDeviceInstance+0xb5b
fffff880`06b5e2d0 fffff880`01716a24 : fffffa80`05ea31a0 00000000`00000002 00000000`00000001 fffffa80`05eef1d0 : ndis!NdisIMNotifyPnPEvent+0x1926
fffff880`06b5e750 fffff880`017169e9 : 00000000`00000000 00000000`00000000 fffffa80`09dc2020 00000000`00000001 : ndis!NdisFIndicateReceiveNetBufferLists+0xf4
fffff880`06b5e790 fffff880`01716980 : fffff880`03fe95c0 fffffa80`09d7c010 fffffa80`09dc2020 00000000`00000001 : ndis!NdisFIndicateReceiveNetBufferLists+0xb9
fffff880`06b5e7d0 fffff880`03fb27ee : fffffa80`09d7c010 00000000`00000000 fffffa80`05eef1d0 fffff880`03fe95c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`06b5e810 fffff880`017169e9 : fffffa80`062c9c90 00000000`00000000 00000000`00000001 fffff880`04b3f650 : nwifi+0x97ee
fffff880`06b5e870 fffff880`01716980 : 00000000`00000001 fffff880`03dcc0bc fffffa80`062cd028 fffff880`05573e10 : ndis!NdisFIndicateReceiveNetBufferLists+0xb9
fffff880`06b5e8b0 fffff880`03dc89c0 : fffff880`03dcf110 00000000`00000001 00000000`00000001 fffffa80`062cda78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`06b5e8f0 fffff880`0172e2b7 : fffffa80`05ea31a0 fffffa80`062c1300 fffffa80`062c1300 00000000`00000001 : vwififlt!DllInitialize+0x3e30
fffff880`06b5e950 fffff880`04a52e76 : fffffa80`05ea31a0 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisIfAllocateNetLuidIndex+0xe467
fffff880`06b5e9a0 fffff880`04a525e3 : fffffa80`06099030 00000000`00000001 00000000`00000000 fffff880`04b01286 : athrx+0x19e76
fffff880`06b5ea20 fffff880`04ad709b : fffffa80`06099030 fffffa80`0609b030 fffffa80`062cb010 00000000`00000000 : athrx+0x195e3
fffff880`06b5ea60 fffff880`04ade181 : fffffa80`0609b030 00000000`00000000 fffffa80`062cb010 fffffa80`05ea31a0 : athrx+0x9e09b
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!KfdCheckConnectBypass+aca
fffff880`01606c5a 448b442470 mov r8d,dword ptr [rsp+70h]
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: NETIO!KfdCheckConnectBypass+aca
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: NETIO.SYS
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
---------