The KMODE_EXCEPTION_NOT_HANDLED bug check has a value of 0x0000001E. This indicates that a kernel-mode program generated an exception which the error handler did not catch.
1st parameter = 0x8000000003 - A breakpoint or ASSERT was encountered when no kernel debugger was attached to the system.
Code:
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\071919-6234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*
Symbol search path is: SRV*
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff805`05800000 PsLoadedModuleList = 0xfffff805`05c432f0
Debug session time: Fri Jul 19 09:14:49.172 2019 (UTC + 2:00)
System Uptime: 0 days 5:08:47.908
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
.....................
For analysis of this file, run !analyze -v
0: kd> !analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffff80000003, fffff8050890a0c5, fffff80509065e58, fffff805090656a0}
*** WARNING: Unable to verify timestamp for win32k.sys
Probably caused by : ntkrnlmp.exe ( nt!KiFatalFilter+1f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8050890a0c5, The address that the exception occurred at
Arg3: fffff80509065e58, Parameter 0 of the exception
Arg4: fffff805090656a0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: fffff8050890a0c5
BUGCHECK_P3: fffff80509065e58
BUGCHECK_P4: fffff805090656a0
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
FAULTING_IP:
+0
fffff805`0890a0c5 cc int 3
EXCEPTION_PARAMETER1: fffff80509065e58
EXCEPTION_PARAMETER2: fffff805090656a0
BUGCHECK_STR: 0x1E_80000003
CPU_COUNT: 8
CPU_MHZ: d52
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 07-19-2019 13:49:23.0330
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
EXCEPTION_RECORD: ffffa60157aea228 -- (.exr 0xffffa60157aea228)
ExceptionAddress: 00000000deb5fec0
ExceptionCode: 00000001
ExceptionFlags: ffffa601
NumberParameters: 256
Parameter[0]: ffffa60157aea1f8
Parameter[1]: 0000000000000001
Parameter[2]: ffffa601579ad050
Parameter[3]: 0000000000000000
Parameter[4]: 00000000deb72000
Parameter[5]: fffff80511848bb0
Parameter[6]: ffffa60157ac9650
Parameter[7]: 00000000deb72000
Parameter[8]: ffffa601576d7510
Parameter[9]: 0000000000000001
Parameter[10]: 00000000deb6d000
Parameter[11]: 0000000000001000
Parameter[12]: 0000000000000000
Parameter[13]: 00000000deb65000
Parameter[14]: 0000000000001000
LAST_CONTROL_TRANSFER: from fffff80505aa39d7 to fffff805059bc900
STACK_TEXT:
fffff805`09064df8 fffff805`05aa39d7 : 00000000`0000001e ffffffff`80000003 fffff805`0890a0c5 fffff805`09065e58 : nt!KeBugCheckEx
fffff805`09064e00 fffff805`059d4536 : fffff805`0890a0c5 fffff805`0591c28b fffff805`09066090 fffff805`090656a0 : nt!KiFatalFilter+0x1f
fffff805`09064e40 fffff805`059991ec : 00000000`00000002 fffff805`09066f80 fffff805`09062000 fffff805`09068000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff805`09064e80 fffff805`059c5632 : fffff805`09066f80 fffff805`09065460 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xac
fffff805`09064ef0 fffff805`058ca765 : 00000000`00000000 00000000`00000000 fffff805`09065460 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff805`09064f20 fffff805`058cecfe : fffff805`09065e58 fffff805`09065ba0 fffff805`09065e58 00000000`00000002 : nt!RtlDispatchException+0x4a5
fffff805`09065670 fffff805`059ce81d : ffffa601`57aea228 fffff805`062d5b50 ffffa601`576d7510 00000000`00000000 : nt!KiDispatchException+0x16e
fffff805`09065d20 fffff805`059c81d8 : ffffa601`ffffffff 00000000`00000022 00000000`00000002 ffffa601`5bba1c30 : nt!KiExceptionDispatch+0x11d
fffff805`09065f00 fffff805`0890a0c6 : ffffa601`59e38380 00000000`00000002 ffffa601`00000002 00000000`00000006 : nt!KiBreakpointTrap+0x318
fffff805`09066090 ffffa601`59e38380 : 00000000`00000002 ffffa601`00000002 00000000`00000006 00000000`00000000 : 0xfffff805`0890a0c6
fffff805`09066098 00000000`00000002 : ffffa601`00000002 00000000`00000006 00000000`00000000 ffffa601`58d700c8 : 0xffffa601`59e38380
fffff805`090660a0 ffffa601`00000002 : 00000000`00000006 00000000`00000000 ffffa601`58d700c8 ffffa601`00000001 : 0x2
fffff805`090660a8 00000000`00000006 : 00000000`00000000 ffffa601`58d700c8 ffffa601`00000001 ffffd080`a08d64da : 0xffffa601`00000002
fffff805`090660b0 00000000`00000000 : ffffa601`58d700c8 ffffa601`00000001 ffffd080`a08d64da 00000000`00000007 : 0x6
THREAD_SHA1_HASH_MOD_FUNC: f4f21530a30e077b9315736f0bbc2df81ac4b264
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a01f3d60fe20c4b99fb2eec43d9ba5aa33314ed5
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!KiFatalFilter+1f
fffff805`05aa39d7 cc int 3
FAULT_INSTR_CODE: cccccccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiFatalFilter+1f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42
IMAGE_VERSION: 10.0.18362.239
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1f
FAILURE_BUCKET_ID: 0x1E_80000003_nt!KiFatalFilter
BUCKET_ID: 0x1E_80000003_nt!KiFatalFilter
PRIMARY_PROBLEM_CLASS: 0x1E_80000003_nt!KiFatalFilter
TARGET_TIME: 2019-07-19T07:14:49.000Z
OSBUILD: 18362
OSSERVICEPACK: 239
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-02-02 09:33:06
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4c2a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_80000003_nt!kifatalfilter
FAILURE_ID_HASH: {bf9ab27a-b6c7-08e8-0d27-df10fdd7c681}
Followup: MachineOwner
---------
0: kd> .load pde
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
0: kd> !dpx
Start memory scan : 0xfffff80509064df8 ($csp)
End memory scan : 0xfffff80509068000 (Kernel Stack Base)
rsp : 0xfffff80509064df8 : 0xfffff80505aa39d7 : nt!KiFatalFilter+0x1f
r14 : 0xfffff805090654e0 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
0xfffff80509064df8 : 0xfffff80505aa39d7 : nt!KiFatalFilter+0x1f
0xfffff80509064e30 : 0xfffff80505d86010 : nt!PsInvertedFunctionTable
0xfffff80509064e38 : 0xfffff805059d4536 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
0xfffff80509064e48 : 0xfffff8050591c28b : nt!KeCheckStackAndTargetAddress+0x2b
0xfffff80509064e78 : 0xfffff805059991ec : nt!_C_specific_handler+0xac
0xfffff80509064ea8 : 0xfffff80508697649 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x169
0xfffff80509064ec0 : 0xfffff80505d117cc : "nt!Ports <PERF> (nt+0x5117cc)"
0xfffff80509064ed8 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
0xfffff80509064ee8 : 0xfffff805059c5632 : nt!RtlpExecuteHandlerForException+0x12
0xfffff80509064f10 : 0xfffff805090654e0 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
0xfffff80509064f18 : 0xfffff805058ca765 : nt!RtlDispatchException+0x4a5
0xfffff80509064fc8 : 0xfffff805058311a5 : nt!IoAllocateMdl+0x75
0xfffff80509064fe8 : 0xfffff80505848674 : nt!KiDeferredReadyThread+0x3c4
0xfffff80509064ff8 : 0xfffff80509066ff0 : 0xfffff805086974e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine
0xfffff80509065018 : 0xfffff805083cc77c : ndis!NdisAllocateCloneNetBufferList+0x2ec
0xfffff80509065058 : 0xfffff8050587199d : nt!KeExpandKernelStackAndCalloutEx+0x1d
0xfffff80509065088 : 0xfffff80511834d00 : rt640x64!MPReturnNetBufferLists+0x190
0xfffff805090650a8 : 0xfffff80511834ffd : rt640x64!MPSendNetBufferListsNPQ+0x2a1
0xfffff805090650e8 : 0xfffff80511834d10 : rt640x64!MPSendNetBufferLists
0xfffff805090650f8 : 0xfffff80511834d57 : rt640x64!MPSendNetBufferLists+0x47
0xfffff80509065118 : 0xfffff80508693cd3 : tcpip!WfppTaggedContextClone+0x43
0xfffff80509065138 : 0xfffff80505847488 : nt!IopfCompleteRequest+0x908
0xfffff80509065148 : 0xfffff805085411b9 : NETIO!WfpNblInfoAlloc+0x69
0xfffff80509065210 : 0xffffa60152ead610 : 0xfffff805086a0790 : tcpip!InetInspectCreateEndpoint
0xfffff80509065218 : 0xfffff80508593f66 : NETIO!FwppTruncateStreamDataAfterOffset+0x46
0xfffff80509065238 : 0xfffff80508924612 : fwpkclnt!FwpsAllocateCloneNetBufferList0+0x62
0xfffff80509065278 : 0xfffff805062dc52a : hal!HalpDmaSyncMapBuffers+0x2c6
0xfffff805090652a8 : 0xfffff80508911040 : fwpkclnt!FwpsCopyStreamDataToBuffer0+0x30
0xfffff805090652b8 : 0xfffff805062d812a : hal!HalpDmaNextContiguousPieceV2+0x2e
0xfffff80509065338 : 0xfffff805062d8080 : hal!HalpDmaMapScatterTransferV2+0x110
Unable to load image \SystemRoot\system32\DRIVERS\klwtp.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for klwtp.sys
0xfffff80509065398 : 0xfffff8050587313d : nt!KeQueryCurrentStackInformationEx+0x6d
0xfffff805090653d8 : 0xfffff805058ce5f4 : nt!RtlGetExtendedContextLength2+0x3c
0xfffff805090653e8 : 0xfffff805059256e0 : nt!RtlpGetStackLimitsEx+0x14
0xfffff80509065418 : 0xfffff805058ca3bc : nt!RtlDispatchException+0xfc
0xfffff80509065458 : 0xfffff80505aa500b : nt!KeReleaseInStackQueuedSpinLockForDpc+0x6b
0xfffff80509065470 : 0xfffff80505800000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
0xfffff80509065478 : 0xfffff80505999140 : nt!_C_specific_handler
0xfffff805090654d0 : 0xfffff80505d117cc : "nt!Ports <PERF> (nt+0x5117cc)"
0xfffff805090654d8 : 0xfffff805062d6526 : hal!IoFreeAdapterChannelV2+0x6a
0xfffff805090654e0 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
0xfffff805090654e8 : 0xfffff80505800000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
0xfffff805090654f0 : 0xfffff80505d117cc : "nt!Ports <PERF> (nt+0x5117cc)"
0xfffff80509065510 : 0xfffff80505999140 : nt!_C_specific_handler
0xfffff80509065548 : 0xfffff805058719b0 : nt!KeExpandKernelStackAndCalloutInternal
0xfffff80509065550 : 0xfffff8050869765a : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17a
0xfffff80509065558 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff80509065560 : 0xfffff80508832c5c : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x212c5c)"
0xfffff80509065568 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff80509065570 : 0xfffff805088317a4 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x2117a4)"
0xfffff80509065578 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff80509065580 : 0xfffff805088316fc : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x2116fc)"
0xfffff80509065588 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff80509065590 : 0xfffff80508831684 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x211684)"
0xfffff80509065598 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff805090655a0 : 0xfffff80508831588 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x211588)"
0xfffff805090655a8 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff805090655b0 : 0xfffff80508832e24 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x212e24)"
0xfffff805090655b8 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff805090655c0 : 0xfffff80508832584 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x212584)"
0xfffff805090655c8 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff805090655d0 : 0xfffff80508833298 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x213298)"
0xfffff805090655d8 : 0xfffff80505800000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
0xfffff805090655e0 : 0xfffff80505d117cc : "nt!Ports <PERF> (nt+0x5117cc)"
0xfffff80509065628 : 0xfffff805058cf076 : nt!KdTrap+0x22
0xfffff80509065668 : 0xfffff805058cecfe : nt!KiDispatchException+0x16e
0xfffff805090656a8 : 0xfffff80511848bb0 : rt640x64!MpProcessSGList
0xfffff80509065720 : 0xfffff805086bf886 : tcpip!WfpMarshalIncomingValues+0x5e
0xfffff80509065728 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff805090657c8 : 0xfffff80511834d00 : rt640x64!MPReturnNetBufferLists+0x190
0xfffff805090657e8 : 0xfffff80511834ffd : rt640x64!MPSendNetBufferListsNPQ+0x2a1
0xfffff80509065828 : 0xfffff80511834d10 : rt640x64!MPSendNetBufferLists
0xfffff80509065838 : 0xfffff80511834d57 : rt640x64!MPSendNetBufferLists+0x47
0xfffff80509065958 : 0xfffff805083cdc70 : ndis!ndisMSendNBLToMiniport
0xfffff80509065960 : 0xfffff80508991500 : wfplwfs!LwfLowerReturnNetBufferLists+0x70
0xfffff80509065970 : 0xfffff805083cdc70 : ndis!ndisMSendNBLToMiniport
0xfffff80509065978 : 0xfffff805083cea48 : ndis!ndisCallSendHandler+0x58
Unable to load image \SystemRoot\system32\DRIVERS\klim6.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for klim6.sys
0xfffff80509065a38 : 0xfffff80508922150 : fwpkclnt!FwppGetPacketInfo+0x10
0xfffff80509065a78 : 0xfffff805062dc52a : hal!HalpDmaSyncMapBuffers+0x2c6
0xfffff80509065ab8 : 0xfffff805062d812a : hal!HalpDmaNextContiguousPieceV2+0x2e
0xfffff80509065af8 : 0xfffff805058ce5f4 : nt!RtlGetExtendedContextLength2+0x3c
0xfffff80509065b38 : 0xfffff805058ce4ed : nt!RtlGetExtendedContextLength+0x2d
0xfffff80509065b98 : 0xfffff805062d6163 : hal!HalpMapTransferV2+0x8f
0xfffff80509065d18 : 0xfffff805059ce81d : nt!KiExceptionDispatch+0x11d
0xfffff80509065d28 : 0xfffff805062d5b50 : hal!IoFreeAdapterChannel+0x20
0xfffff80509065df8 : 0xfffff805089118fe : fwpkclnt!FwpsNetBufferListRetrieveContext0+0x4e
0xfffff80509065ea8 : 0xfffff80511848bb0 : rt640x64!MpProcessSGList
0xfffff80509065ee8 : 0xfffff805111f33e8 : Ndu!NduOutboundMacClassify+0x138
0xfffff80509065ef8 : 0xfffff805059c81d8 : nt!KiBreakpointTrap+0x318
0xfffff80509065f00 : 0xffffa601ffffffff : Trap @ fffff80509065f00
0xfffff80509065f38 : 0xfffff805086bf886 : tcpip!WfpMarshalIncomingValues+0x5e
0xfffff80509065f40 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
0xfffff80509065fe8 : 0xfffff80511834ffd : rt640x64!MPSendNetBufferListsNPQ+0x2a1
0xfffff80509066028 : 0xfffff80511834d10 : rt640x64!MPSendNetBufferLists
0xfffff80509066038 : 0xfffff80511834d57 : rt640x64!MPSendNetBufferLists+0x47
0xfffff80509066050 : 0xfffff805083cdc70 : ndis!ndisMSendNBLToMiniport
Unable to load image \SystemRoot\system32\DRIVERS\kneps.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for kneps.sys
0xfffff805090661a8 : 0xfffff8050868d763 : tcpip!WfpTlShimInspectRecvTcpDatagram+0x97f
0xfffff805090661c8 : 0xfffff805084008a0 : ndis!ndisInvokeNextSendHandler+0x194
0xfffff80509066298 : 0xfffff805083cc13f : ndis!NdisSendNetBufferLists+0x1af
0xfffff805090662d8 : 0xfffff80508551a2b : NETIO!NetioAllocateAndReferenceCopyNetBufferListEx+0x11b
0xfffff80509066458 : 0xfffff80508642ee6 : tcpip!InetInspectReceiveTcpDatagram+0x576
0xfffff805090664e0 : 0xfffff805088278eb : tcpip!AddressFamilyInformation+0x3
0xfffff80509066538 : 0xfffff8050881f200 : tcpip!PktMonClientNotify+0x20
0xfffff80509066598 : 0xfffff80508640b6d : tcpip!TcpTcbReceive+0x12d
0xfffff805090665b8 : 0xfffff805111f3dc2 : Ndu!NduHandleNblContextRemoved+0x532
0xfffff805090666b8 : 0xfffff805111f3762 : Ndu!NduNblNotifyCallback+0xb2
0xfffff805090666c0 : 0xfffff8050881f202 : tcpip!PktMonClientNotify+0x22
0xfffff805090666e8 : 0xfffff8050863a39b : tcpip!IpNlpFastSendDatagram+0x23b
0xfffff80509066700 : 0xfffff8050881f2e0 : tcpip!Ipv4Global
0xfffff80509066718 : 0xfffff80508911598 : fwpkclnt!FwppNetBufferListEventNotify+0x108
0xfffff805090667a8 : 0xfffff80511834bac : rt640x64!MPReturnNetBufferLists+0x3c
0xfffff805090667e8 : 0xfffff8050863fb50 : tcpip!TcpMatchReceive+0x1f0
0xfffff80509066820 : 0xfffff805083d1360 : ndis!ndisReturnNblWithPowerQueue
0xfffff80509066848 : 0xfffff805083d0f02 : ndis!ndisCallReceiveCompleteHandler+0x32
0xfffff80509066888 : 0xfffff805083cd830 : ndis!NdisReturnNetBufferLists+0x2d0
0xfffff80509066898 : 0xfffff8050584557c : nt!ExFreeHeapPool+0x53c
0xfffff80509066988 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
0xfffff805090669b8 : 0xfffff805086860ac : tcpip!FlpReturnNetBufferListChain+0xbc
0xfffff805090669e0 : 0xfffff80508685ff0 : tcpip!FlpReturnNetBufferListChain
0xfffff80509066a18 : 0xfffff80508542e30 : NETIO!NetioDereferenceNetBufferListChain+0xf0
0xfffff80509066a48 : 0xfffff805059be8c4 : nt!KiInterruptDispatchNoLockNoEtw+0x44
0xfffff80509066a98 : 0xfffff8050863d6da : tcpip!TcpReceive+0x32a
0xfffff80509066b98 : 0xfffff8050869202d : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
0xfffff80509066bd0 : 0xfffff80508692000 : tcpip!TcpNlClientReceivePreValidatedDatagrams
0xfffff80509066bd8 : 0xfffff8050867eb19 : tcpip!IpFlcReceivePreValidatedPackets+0xc49
0xfffff80509066bf8 : 0xfffff80511834ffd : rt640x64!MPSendNetBufferListsNPQ+0x2a1
0xfffff80509066c48 : 0xfffff80508695005 : tcpip!WfppTaggedContextInit+0x15
0xfffff80509066c78 : 0xfffff80508552806 : NETIO!NetioInitializeNetBufferListAndFirstNetBufferContext+0x26
0xfffff80509066ca0 : 0xffffa60153f7cd20 : 0xfffff8050881f2e0 : tcpip!Ipv4Global
0xfffff80509066ce8 : 0xfffff8050881f648 : tcpip!Ipv4Global+0x368
0xfffff80509066d00 : 0xfffff8050881f2e0 : tcpip!Ipv4Global
0xfffff80509066d88 : 0xfffff805083cea48 : ndis!ndisCallSendHandler+0x58
0xfffff80509066da8 : 0xfffff805062b3c53 : hal!HalpApicRequestInterrupt+0xa3
0xfffff80509066de0 : 0xfffff8050591c5c0 : nt!KiIntSteerLoadCompare
0xfffff80509066de8 : 0xfffff8050599b86e : nt!qsort+0x38e
0xfffff80509066df8 : 0xfffff8050584938d : nt!KiChooseTargetProcessor+0x19d
0xfffff80509066e08 : 0xfffff805062b3b95 : hal!HalSendSoftwareInterrupt+0xf5
0xfffff80509066e10 : 0xfffff80508685ff0 : tcpip!FlpReturnNetBufferListChain
0xfffff80509066e40 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
0xfffff80509066e48 : 0xfffff80508697649 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x169
0xfffff80509066e58 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
0xfffff80509066ea8 : 0xfffff80508685ff0 : tcpip!FlpReturnNetBufferListChain
0xfffff80509066eb8 : 0xfffff8050587313d : nt!KeQueryCurrentStackInformationEx+0x6d
0xfffff80509066f08 : 0xfffff80505871b98 : nt!KiExpandKernelStackAndCalloutSwitchStack+0x108
0xfffff80509066f38 : 0xfffff805059be8c4 : nt!KiInterruptDispatchNoLockNoEtw+0x44
0xfffff80509066f58 : 0xfffff805086974e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine
0xfffff80509066f78 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
0xfffff80509066f90 : 0xfffff80505d8c400 : nt!KiInitialThread
0xfffff80509066f98 : 0xfffff805090670b8 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
0xfffff80509066fb8 : 0xfffff80505d8c400 : nt!KiInitialThread
0xfffff80509066fe8 : 0xfffff8050587199d : nt!KeExpandKernelStackAndCalloutEx+0x1d
0xfffff80509066ff0 : 0xfffff805086974e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine
0xfffff80509066ff8 : 0xfffff805090670b8 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
0xfffff80509067028 : 0xfffff80508686521 : tcpip!FlReceiveNetBufferListChain+0x311
0xfffff80509067038 : 0xfffff805111f6d2b : Ndu!PplGenericFreeFunction+0x3b
0xfffff80509067058 : 0xfffff8050855508c : NETIO!PplGenericAllocateFunction+0x1c
0xfffff805090670a8 : 0xfffff805111f6d2b : Ndu!PplGenericFreeFunction+0x3b
0xfffff805090670b0 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
0xfffff805090670b8 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
0xfffff805090670e0 : 0xfffff80508685ff0 : tcpip!FlpReturnNetBufferListChain
0xfffff80509067138 : 0xfffff805083dfe53 : ndis!NdisCopyFromNetBufferToNetBuffer+0xf3
Unable to load image \??\C:\ProgramData\Kaspersky Lab\AVP19.0.0\Bases\klids.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for klids.sys
0xfffff805090672c8 : 0xfffff805083cb530 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
0xfffff805090673a8 : 0xfffff805083cb027 : ndis!ndisMTopReceiveNetBufferLists+0x227
0xfffff805090673d8 : 0xfffff805083d12fd : ndis!NdisFIndicateReceiveNetBufferLists+0x6d
0xfffff80509067480 : 0xfffff805083cae00 : ndis!ndisMTopReceiveNetBufferLists
0xfffff805090674a0 : 0xfffff805083cae00 : ndis!ndisMTopReceiveNetBufferLists
0xfffff805090674a8 : 0xfffff805083d0eb0 : ndis!ndisCallReceiveHandler+0x60
0xfffff805090674e8 : 0xfffff805083caa50 : ndis!ndisMSendCompleteNetBufferListsInternal+0x120
0xfffff805090675c8 : 0xfffff805083ce874 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
0xfffff80509067600 : 0xfffff80508991010 : wfplwfs!LwfLowerRecvNetBufferLists
0xfffff80509067608 : 0xfffff805083cbcdf : ndis!NdisMSendNetBufferListsComplete+0x1df
0xfffff80509067658 : 0xfffff80511845bb9 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb41
0xfffff805090676f8 : 0xfffff80505822dbc : nt!KiCheckForTimerExpiration+0x11c
0xfffff80509067748 : 0xfffff80511832351 : rt640x64!MPHandleMessageInterrupt+0x341
0xfffff80509067778 : 0xfffff805058228f0 : nt!KeAccumulateTicks+0x30
0xfffff80509067798 : 0xfffff80511832010 : rt640x64!MPHandleMessageInterrupt
0xfffff805090677b8 : 0xfffff805083cf2cc : ndis!ndisInterruptDpc+0x19c
0xfffff805090677d0 : 0xfffff805119215a0 : intelppm!AcpiCStateIdleCancel
0xfffff805090678b8 : 0xfffff80509067b20 : 0xfffff805083cf130 : ndis!ndisInterruptDpc
0xfffff805090678e0 : 0xfffff805090679f0 : 0xfffff80505d8c400 : nt!KiInitialThread
0xfffff805090678e8 : 0xfffff80505872a95 : nt!KiExecuteAllDpcs+0x305
0xfffff80509067948 : 0xfffff805083cf130 : ndis!ndisInterruptDpc
0xfffff80509067960 : 0xfffff80505d8c400 : nt!KiInitialThread
0xfffff805090679f0 : 0xfffff80505d8c400 : nt!KiInitialThread
0xfffff80509067a00 : 0xfffff80505d8c400 : nt!KiInitialThread
0xfffff80509067a28 : 0xfffff805058720ef : nt!KiRetireDpcList+0x1ef
0xfffff80509067a90 : 0xfffff805062cac50 : hal!HalpApicX2EndOfInterrupt
0xfffff80509067a98 : 0xfffff805062b52ca : hal!HalPerformEndOfInterrupt+0x1a
0xfffff80509067aa8 : 0xfffff80505d8c400 : nt!KiInitialThread
0xfffff80509067ac8 : 0xfffff805059be405 : nt!KiInterruptDispatch+0x85
0xfffff80509067b20 : 0xfffff805083cf130 : ndis!ndisInterruptDpc
0xfffff80509067c58 : 0xfffff805059c03c4 : nt!KiIdleLoop+0x84
0xfffff80509067c70 : 0xfffff80505d8c400 : nt!KiInitialThread
0: kd> lmvm klwtp
Browse full module list
start end module name
fffff805`10220000 fffff805`1024a000 klwtp T (no symbols)
Loaded symbol image file: klwtp.sys
Image path: \SystemRoot\system32\DRIVERS\klwtp.sys
Image name: klwtp.sys
Browse all global symbols functions data
Timestamp: Thu Jan 31 09:26:24 2019 (5C532FC0)
CheckSum: 00038598
ImageSize: 0002A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
0: kd> lmvm rt640x64
Browse full module list
start end module name
fffff805`11830000 fffff805`118d6000 rt640x64 (pdb symbols) C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\sym\rt640x64.pdb\A333EFD411894F41BA2C83E5A727534D1\rt640x64.pdb
Loaded symbol image file: rt640x64.sys
Mapped memory image file: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\sym\rt640x64.sys\5BCDE005a6000\rt640x64.sys
Image path: \SystemRoot\System32\drivers\rt640x64.sys
Image name: rt640x64.sys
Browse all global symbols functions data
Timestamp: Mon Oct 22 07:34:45 2018 (5BCDE005)
CheckSum: 000ACC60
ImageSize: 000A6000
File version: 9.1.409.2015
Product version: 9.1.409.2015
File flags: 8 (Mask 3F) Private
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0000.04b0
Information from resource tables:
CompanyName: Realtek
ProductName: Realtek 8125/8136/8168/8169 PCI/PCIe Adapters
InternalName: rt640x64.sys
OriginalFilename: rt640x64.sys
ProductVersion: 9.001.0409.2015
FileVersion: 9.001.0409.2015
FileDescription: Realtek 8125/8136/8168/8169 NDIS 6.40 64-bit Driver
LegalCopyright: Copyright (C) 2018 Realtek Semiconductor Corporation. All Right Reserved.
Update Realtek LAN driver (Realtek PCIe FE / GBE / 2.5G / Gaming Ethernet Family Controller Software - REALTEK) and:
1. Run msconfig
2. Go to "Boot" page
3. Select "Advanced options"
4. Check "Debug"
5. Accept changes and reboot computer