Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\minidump\080219-11296-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols Symbol search path is: srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols Executable search path is: Windows 10 Kernel Version 18362 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 18362.1.amd64fre.19h1_release.190318-1202 Machine Name: Kernel base = 0xfffff803`62c00000 PsLoadedModuleList = 0xfffff803`630432f0 Debug session time: Fri Aug 2 20:37:09.365 2019 (UTC + 3:00) System Uptime: 0 days 0:11:15.077 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .................. Loading User Symbols Loading unloaded module list ................ For analysis of this file, run !analyze -v 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffff800803df71a0, Virtual address for the attempted execute. Arg2: 8a00000809c008e3, PTE contents. Arg3: ffff908edb1c8340, (reserved) Arg4: 0000000000000003, (reserved) Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for e1d65x64.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffff800803df71a0 BUGCHECK_P2: 8a00000809c008e3 BUGCHECK_P3: ffff908edb1c8340 BUGCHECK_P4: 3 CPU_COUNT: 8 CPU_MHZ: 1068 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 9e CPU_STEPPING: 9 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xFC PROCESS_NAME: System CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: 7700K ANALYSIS_SESSION_TIME: 08-19-2019 19:08:23.0965 ANALYSIS_VERSION: 10.0.18362.1 amd64fre TRAP_FRAME: ffff908edb1c8340 -- (.trap 0xffff908edb1c8340) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff800803df71a0 rbx=0000000000000000 rcx=ffff8008042dab50 rdx=ffff80080ae10600 rsi=0000000000000000 rdi=0000000000000000 rip=ffff800803df71a0 rsp=ffff908edb1c84d8 rbp=ffff908edb1c8559 r8=0000000000000001 r9=0000000000000000 r10=fffff8036e9c5b90 r11=0000000000000001 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc ffff8008`03df71a0 1101 adc dword ptr [rcx],eax ds:ffff8008`042dab50=03da7ef0 Resetting default scope LAST_CONTROL_TRANSFER: from fffff80362e554bc to fffff80362dbc900 STACK_TEXT: ffff908e`db1c8118 fffff803`62e554bc : 00000000`000000fc ffff8008`03df71a0 8a000008`09c008e3 ffff908e`db1c8340 : nt!KeBugCheckEx ffff908e`db1c8120 fffff803`62e4fbc1 : 00000000`00000003 00000000`00000001 00000000`00000000 ffff908e`db1c8260 : nt!MiCheckSystemNxFault+0x125330 ffff908e`db1c8160 fffff803`62c7ac2a : 00000000`00000006 00000000`00000011 ffff908e`db1c82a0 00000000`00000000 : nt!MiRaisedIrqlFault+0x12a6e1 ffff908e`db1c81a0 fffff803`62dca920 : 00000000`00000000 fffff803`b2503711 00000000`00000002 00000000`00000036 : nt!MmAccessFault+0x48a ffff908e`db1c8340 ffff8008`03df71a0 : fffff803`6778aa51 ffff8008`0451aa20 ffff8008`03e223f0 fffff803`6ea910b0 : nt!KiPageFault+0x360 ffff908e`db1c84d8 fffff803`6778aa51 : ffff8008`0451aa20 ffff8008`03e223f0 fffff803`6ea910b0 ffff8008`0ae10600 : 0xffff8008`03df71a0 ffff908e`db1c84e0 fffff803`6778eba3 : 00000000`00000002 00000000`00000000 fffff803`00000001 fffff803`6ea62101 : ndis!ndisMSendCompleteNetBufferListsInternal+0x121 ffff908e`db1c85c0 fffff803`6778bcdf : fffff803`60367101 ffff8008`03afb9a1 ffff8008`043198c0 ffff8008`0ae10600 : ndis!ndisCallSendCompleteHandler+0x33 ffff908e`db1c8600 fffff803`70ed33b4 : 00000000`00000002 00000001`00000000 00000001`00000000 fffff803`70ed0d00 : ndis!NdisMSendNetBufferListsComplete+0x1df ffff908e`db1c86f0 00000000`00000002 : 00000001`00000000 00000001`00000000 fffff803`70ed0d00 00000000`00000000 : e1d65x64+0x133b4 ffff908e`db1c86f8 00000001`00000000 : 00000001`00000000 fffff803`70ed0d00 00000000`00000000 00000000`00000000 : 0x2 ffff908e`db1c8700 00000001`00000000 : fffff803`70ed0d00 00000000`00000000 00000000`00000000 ffff8008`03e23000 : 0x00000001`00000000 ffff908e`db1c8708 fffff803`70ed0d00 : 00000000`00000000 00000000`00000000 ffff8008`03e23000 ffff8008`03e23e40 : 0x00000001`00000000 ffff908e`db1c8710 00000000`00000000 : 00000000`00000000 ffff8008`03e23000 ffff8008`03e23e40 00000001`03e3ed01 : e1d65x64+0x10d00 THREAD_SHA1_HASH_MOD_FUNC: c0ffbf375cd55e1aa93daf3c03427b8881b1e850 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5058410cce10b80427a1f7de155fad955a47b3fb THREAD_SHA1_HASH_MOD: f2616a5e3854c666781435d2d0ed7d6384206ea6 FOLLOWUP_IP: e1d65x64+133b4 fffff803`70ed33b4 448b7dcb mov r15d,dword ptr [rbp-35h] FAULT_INSTR_CODE: cb7d8b44 SYMBOL_STACK_INDEX: 9 SYMBOL_NAME: e1d65x64+133b4 FOLLOWUP_NAME: MachineOwner MODULE_NAME: e1d65x64 IMAGE_NAME: e1d65x64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 57f4c1b3 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 133b4 FAILURE_BUCKET_ID: 0xFC_e1d65x64!unknown_function BUCKET_ID: 0xFC_e1d65x64!unknown_function PRIMARY_PROBLEM_CLASS: 0xFC_e1d65x64!unknown_function TARGET_TIME: 2019-08-02T17:37:09.000Z OSBUILD: 18362 OSSERVICEPACK: 239 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-02-02 11:33:06 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 10b20 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xfc_e1d65x64!unknown_function FAILURE_ID_HASH: {7259990a-ebc1-3d2e-33f5-0c4abf098887} Followup: MachineOwner ---------