************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.312 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\Downloads\greg\112423-10812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 22621 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff806`7d600000 PsLoadedModuleList = 0xfffff806`7e2134a0
Debug session time: Fri Nov 24 10:15:24.617 2023 (UTC + 0:00)
System Uptime: 0 days 1:10:32.270
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................
Loading User Symbols

Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`7da16980 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff60c`93b7d5c0=000000000000000a
7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8058a89be20, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8068a87f6bf, address which referenced memory

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0x20397e, File: 0x2039f2 - C:\ProgramData\Dbg\sym\BTHport.sys\5249EE07202000\BTHport.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6187

    Key  : Analysis.Elapsed.mSec
    Value: 16522

    Key  : Analysis.IO.Other.Mb
    Value: 12

    Key  : Analysis.IO.Read.Mb
    Value: 13

    Key  : Analysis.IO.Write.Mb
    Value: 41

    Key  : Analysis.Init.CPU.mSec
    Value: 1453

    Key  : Analysis.Init.Elapsed.mSec
    Value: 51396

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_bddci!unknown_function

    Key  : Failure.Hash
    Value: {26543f81-49dd-6bd2-b0fe-b3443123a4f7}


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff8058a89be20

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8068a87f6bf

FILE_IN_CAB:  112423-10812-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

READ_ADDRESS: fffff8067e31d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff8058a89be20 

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff60c93b7d700 -- (.trap 0xfffff60c93b7d700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8058a89be18 rbx=0000000000000000 rcx=f2c34a74d0870000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068a87f6bf rsp=fffff60c93b7d890 rbp=fffff60c93b7d911
 r8=00000000000054eb  r9=000010c4000008b8 r10=0000000000000000
r11=fffff60c93b7d7c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
bddci+0x2f6bf:
fffff806`8a87f6bf 488b5808        mov     rbx,qword ptr [rax+8] ds:fffff805`8a89be20=????????????????
Resetting default scope

STACK_TEXT:  
fffff60c`93b7d5b8 fffff806`7da2bfa9     : 00000000`0000000a fffff805`8a89be20 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff60c`93b7d5c0 fffff806`7da27634     : fffff60c`93b7d850 fffff60c`93b7d848 fffff60c`93b7d828 fffff806`7e0accae : nt!KiBugCheckDispatch+0x69
fffff60c`93b7d700 fffff806`8a87f6bf     : ffffe609`3f10eb20 00000000`00000000 00000000`00000000 fffff806`8ca76fc0 : nt!KiPageFault+0x474
fffff60c`93b7d890 ffffe609`3f10eb20     : 00000000`00000000 00000000`00000000 fffff806`8ca76fc0 fffff60c`93b7d8c0 : bddci+0x2f6bf
fffff60c`93b7d898 00000000`00000000     : 00000000`00000000 fffff806`8ca76fc0 fffff60c`93b7d8c0 fffff806`7da59970 : 0xffffe609`3f10eb20


SYMBOL_NAME:  bddci+2f6bf

MODULE_NAME: bddci

IMAGE_NAME:  bddci.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  2f6bf

FAILURE_BUCKET_ID:  AV_bddci!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {26543f81-49dd-6bd2-b0fe-b3443123a4f7}

Followup:     MachineOwner
---------

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'

************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\Downloads\greg\112423-11187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 22621 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff801`0ce00000 PsLoadedModuleList = 0xfffff801`0da134a0
Debug session time: Fri Nov 24 09:04:37.047 2023 (UTC + 0:00)
System Uptime: 0 days 10:06:38.705
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000087`7f16c018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`0d216980 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff8001`4dfc5fb0=????????????????
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8010d014df7, Address of the instruction which caused the BugCheck
Arg3: ffff80014dfc6900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0x20397e, File: 0x2039f2 - C:\ProgramData\Dbg\sym\BTHport.sys\5249EE07202000\BTHport.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5061

    Key  : Analysis.Elapsed.mSec
    Value: 15668

    Key  : Analysis.IO.Other.Mb
    Value: 2

    Key  : Analysis.IO.Read.Mb
    Value: 5

    Key  : Analysis.IO.Write.Mb
    Value: 12

    Key  : Analysis.Init.CPU.mSec
    Value: 1249

    Key  : Analysis.Init.Elapsed.mSec
    Value: 14834

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 101

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_Npfs!NpCommonCleanup

    Key  : Failure.Hash
    Value: {636ae15b-e9e0-3480-4f9c-b8877da98d9c}


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8010d014df7

BUGCHECK_P3: ffff80014dfc6900

BUGCHECK_P4: 0

FILE_IN_CAB:  112423-11187-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

CONTEXT:  ffff80014dfc6900 -- (.cxr 0xffff80014dfc6900)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffbb09dbd56180 rsi=ffffd287cdab8b80 rdi=ffffd288d146e7d0
rip=fffff8010d014df7 rsp=ffffbb09dbd56110 rbp=ffffbb09dbd56189
 r8=ffffd287cdab8bc0  r9=ffffd288cd800000 r10=0000000000000004
r11=ffffd288cd85dff0 r12=ffffffffffffffff r13=ffffffffc000014b
r14=0000000000000002 r15=0000000000000002
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!IopfCompleteRequest+0x577:
fffff801`0d014df7 498710          xchg    rdx,qword ptr [r8] ds:002b:ffffd287`cdab8bc0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:  
ffffbb09`dbd56110 fffff801`0d014867     : ffffd288`d146e7d0 00000000`00000002 ffffd288`c94528f0 00000000`00000000 : nt!IopfCompleteRequest+0x577
ffffbb09`dbd561f0 fffff801`1b48efe8     : ffff9182`b179c440 ffff9182`b179c440 ffffd288`00000010 ffffbb09`dbd56260 : nt!IofCompleteRequest+0x17
ffffbb09`dbd56220 fffff801`1b48ee57     : 00000000`00000000 00000000`00000000 ffffd288`baef10b0 ffffd288`d1448a48 : Npfs!NpCommonCleanup+0x158
ffffbb09`dbd562b0 fffff801`0d0ec015     : ffffd288`cf11ea10 fffff801`0f798029 ffffbb09`dbd57000 ffffbb09`dbd51000 : Npfs!NpFsdCleanup+0x27
ffffbb09`dbd562e0 fffff801`0f79a1db     : ffffd288`b8010380 ffffd288`cf11ea10 ffffd288`b8010380 00000000`00000000 : nt!IofCallDriver+0x55
ffffbb09`dbd56320 fffff801`0f797e23     : ffffbb09`dbd563b0 00000000`00000000 00000000`00000000 ffffd288`ba531d40 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b
ffffbb09`dbd56390 fffff801`0d0ec015     : ffffd288`c94528f0 fffff801`0d0e9da8 00000000`00000000 ffff9182`ac0b1080 : FLTMGR!FltpDispatch+0xa3
ffffbb09`dbd563f0 fffff801`0d4f999f     : ffffd288`c94528f0 ffffd288`baf2a620 ffffd288`cb4130c0 ffffd288`d1448930 : nt!IofCallDriver+0x55
ffffbb09`dbd56430 fffff801`0d4dd53e     : ffffd288`b9178220 fffff801`00000000 ffffffff`00000000 00000000`00000001 : nt!IopCloseFile+0x18f
ffffbb09`dbd564c0 fffff801`0d4dd388     : 00000000`ffff8004 00000000`00000001 00000000`00007ff5 fffff801`0d0e60aa : nt!ObpDecrementHandleCount+0x10a
ffffbb09`dbd56570 fffff801`0d4dd218     : ffffd288`ca9cc080 fffff801`0d06ad61 ffffd288`cf731060 00000000`00000840 : nt!ObCloseHandleTableEntry+0xe4
ffffbb09`dbd56630 fffff801`0d48c91d     : 00000000`00000000 00000000`00000001 ffffffff`ffffff01 ffffd288`cb4130c0 : nt!ExSweepHandleTable+0xd8
ffffbb09`dbd566e0 fffff801`0d48da65     : ffffffff`ffffffff ffffd288`cb4130c0 ffffffff`ffffffff fffff801`0d4be7a4 : nt!ObKillProcess+0x35
ffffbb09`dbd56710 fffff801`0d4dc6a2     : ffffd288`cb4130c0 ffff9182`b0ddf060 ffffbb09`dbd56939 00000000`00000000 : nt!PspRundownSingleProcess+0xb9
ffffbb09`dbd567a0 fffff801`0d5cdf88     : 00000000`00000000 00000000`00000001 ffffd288`ca9cc0f4 00000087`7f185000 : nt!PspExitThread+0x64e
ffffbb09`dbd568a0 fffff801`0d10b9ad     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffbb09`dbd568e0 fffff801`0d21cb20     : 00000000`00000001 ffffbb09`dbd569a0 00000000`00000000 ffffd288`cb4130c0 : nt!KiDeliverApc+0x47d
ffffbb09`dbd569a0 fffff801`0d22b78f     : ffffd288`ca9cc080 00000000`00000011 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffbb09`dbd56ae0 00007ffd`cbaef3f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000087`05fff4f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`cbaef3f4


SYMBOL_NAME:  Npfs!NpCommonCleanup+158

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

IMAGE_VERSION:  10.0.22621.2771

STACK_COMMAND:  .cxr 0xffff80014dfc6900 ; kb

BUCKET_ID_FUNC_OFFSET:  158

FAILURE_BUCKET_ID:  AV_Npfs!NpCommonCleanup

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {636ae15b-e9e0-3480-4f9c-b8877da98d9c}

Followup:     MachineOwner
---------

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'

************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.016 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\Downloads\greg\112423-11531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 22621 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff804`6d600000 PsLoadedModuleList = 0xfffff804`6e2134a0
Debug session time: Fri Nov 24 12:32:21.651 2023 (UTC + 0:00)
System Uptime: 0 days 2:16:42.304
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
...........................
Loading User Symbols

Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!IopfCompleteRequest+0x577:
fffff804`6d814df7 498710          xchg    rdx,qword ptr [r8] ds:002b:ffffa184`e1919c80=????????????????
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8046d814df7, The address that the exception occurred at
Arg3: fffffb84d1c60a18, Exception Record Address
Arg4: ffff8000215c6900, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Write

    Key  : Analysis.CPU.mSec
    Value: 6687

    Key  : Analysis.Elapsed.mSec
    Value: 65429

    Key  : Analysis.IO.Other.Mb
    Value: 6

    Key  : Analysis.IO.Read.Mb
    Value: 10

    Key  : Analysis.IO.Write.Mb
    Value: 21

    Key  : Analysis.Init.CPU.mSec
    Value: 1077

    Key  : Analysis.Init.Elapsed.mSec
    Value: 31437

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 105

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1000007e

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_klwtp!unknown_function

    Key  : Failure.Hash
    Value: {c2c3e109-24c7-92df-d028-f2419ec87f25}


BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8046d814df7

BUGCHECK_P3: fffffb84d1c60a18

BUGCHECK_P4: ffff8000215c6900

FILE_IN_CAB:  112423-11531-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

EXCEPTION_RECORD:  fffffb84d1c60a18 -- (.exr 0xfffffb84d1c60a18)
ExceptionAddress: fffff8046d814df7 (nt!IopfCompleteRequest+0x0000000000000577)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: ffffa184e1919c80
Attempt to write to address ffffa184e1919c80

CONTEXT:  ffff8000215c6900 -- (.cxr 0xffff8000215c6900)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffb84d1c60cc0 rsi=ffffa184e1919c40 rdi=ffffa185eb2277b0
rip=fffff8046d814df7 rsp=fffffb84d1c60c50 rbp=fffffb84d1c60cc9
 r8=ffffa184e1919c80  r9=fffffb84d1c60d08 r10=0000000000000004
r11=fffffb84d1c60d28 r12=ffffffffffffffff r13=0000000000000000
r14=0000000000000002 r15=0000000000000002
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!IopfCompleteRequest+0x577:
fffff804`6d814df7 498710          xchg    rdx,qword ptr [r8] ds:002b:ffffa184`e1919c80=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

WRITE_ADDRESS: fffff8046e31d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa184e1919c80 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  ffffa184e1919c80

EXCEPTION_STR:  0xc0000005

STACK_TEXT:  
fffffb84`d1c60c50 fffff804`6d814867     : ffffa185`eb2277b0 ffffa185`e8f24902 ffffa185`e4b58360 00000000`00000000 : nt!IopfCompleteRequest+0x577
fffffb84`d1c60d30 fffff804`7ff87562     : ffffa185`e241cb20 fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 : nt!IofCompleteRequest+0x17
fffffb84`d1c60d60 ffffa185`e241cb20     : fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 : klwtp+0x37562
fffffb84`d1c60d68 fffffb84`d1c60dc9     : ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 : 0xffffa185`e241cb20
fffffb84`d1c60d70 ffffa185`e241cbb8     : fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 : 0xfffffb84`d1c60dc9
fffffb84`d1c60d78 fffff804`728b4c42     : fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 ffffa185`ea131030 : 0xffffa185`e241cbb8
fffffb84`d1c60d80 ffffa185`e3b42000     : 00000000`00000000 ffffa185`e241cbb8 00000000`00000002 00000000`00000000 : fwpkclnt!FwpsAllocateCloneNetBufferList0+0x62
fffffb84`d1c60dc0 00000000`00000000     : ffffa185`e241cbb8 00000000`00000002 00000000`00000000 fffffb84`d1c60e30 : 0xffffa185`e3b42000


SYMBOL_NAME:  klwtp+37562

MODULE_NAME: klwtp

IMAGE_NAME:  klwtp.sys

STACK_COMMAND:  .cxr 0xffff8000215c6900 ; kb

BUCKET_ID_FUNC_OFFSET:  37562

FAILURE_BUCKET_ID:  AV_klwtp!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c2c3e109-24c7-92df-d028-f2419ec87f25}

Followup:     MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8046d814df7, The address that the exception occurred at
Arg3: fffffb84d1c60a18, Exception Record Address
Arg4: ffff8000215c6900, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Write

    Key  : Analysis.CPU.mSec
    Value: 6405

    Key  : Analysis.Elapsed.mSec
    Value: 6433

    Key  : Analysis.IO.Other.Mb
    Value: 6

    Key  : Analysis.IO.Read.Mb
    Value: 10

    Key  : Analysis.IO.Write.Mb
    Value: 21

    Key  : Analysis.Init.CPU.mSec
    Value: 13827

    Key  : Analysis.Init.Elapsed.mSec
    Value: 103011

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 106

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1000007e

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_klwtp!unknown_function

    Key  : Failure.Hash
    Value: {c2c3e109-24c7-92df-d028-f2419ec87f25}


BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8046d814df7

BUGCHECK_P3: fffffb84d1c60a18

BUGCHECK_P4: ffff8000215c6900

FILE_IN_CAB:  112423-11531-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

EXCEPTION_RECORD:  fffffb84d1c60a18 -- (.exr 0xfffffb84d1c60a18)
ExceptionAddress: fffff8046d814df7 (nt!IopfCompleteRequest+0x0000000000000577)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: ffffa184e1919c80
Attempt to write to address ffffa184e1919c80

CONTEXT:  ffff8000215c6900 -- (.cxr 0xffff8000215c6900)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffb84d1c60cc0 rsi=ffffa184e1919c40 rdi=ffffa185eb2277b0
rip=fffff8046d814df7 rsp=fffffb84d1c60c50 rbp=fffffb84d1c60cc9
 r8=ffffa184e1919c80  r9=fffffb84d1c60d08 r10=0000000000000004
r11=fffffb84d1c60d28 r12=ffffffffffffffff r13=0000000000000000
r14=0000000000000002 r15=0000000000000002
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!IopfCompleteRequest+0x577:
fffff804`6d814df7 498710          xchg    rdx,qword ptr [r8] ds:002b:ffffa184`e1919c80=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

WRITE_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffa184e1919c80 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  ffffa184e1919c80

EXCEPTION_STR:  0xc0000005

STACK_TEXT:  
fffffb84`d1c60c50 fffff804`6d814867     : ffffa185`eb2277b0 ffffa185`e8f24902 ffffa185`e4b58360 00000000`00000000 : nt!IopfCompleteRequest+0x577
fffffb84`d1c60d30 fffff804`7ff87562     : ffffa185`e241cb20 fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 : nt!IofCompleteRequest+0x17
fffffb84`d1c60d60 ffffa185`e241cb20     : fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 : klwtp+0x37562
fffffb84`d1c60d68 fffffb84`d1c60dc9     : ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 : 0xffffa185`e241cb20
fffffb84`d1c60d70 ffffa185`e241cbb8     : fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 : 0xfffffb84`d1c60dc9
fffffb84`d1c60d78 fffff804`728b4c42     : fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 ffffa185`ea131030 : 0xffffa185`e241cbb8
fffffb84`d1c60d80 ffffa185`e3b42000     : 00000000`00000000 ffffa185`e241cbb8 00000000`00000002 00000000`00000000 : fwpkclnt!FwpsAllocateCloneNetBufferList0+0x62
fffffb84`d1c60dc0 00000000`00000000     : ffffa185`e241cbb8 00000000`00000002 00000000`00000000 fffffb84`d1c60e30 : 0xffffa185`e3b42000


SYMBOL_NAME:  klwtp+37562

MODULE_NAME: klwtp

IMAGE_NAME:  klwtp.sys

STACK_COMMAND:  .cxr 0xffff8000215c6900 ; kb

BUCKET_ID_FUNC_OFFSET:  37562

FAILURE_BUCKET_ID:  AV_klwtp!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c2c3e109-24c7-92df-d028-f2419ec87f25}

Followup:     MachineOwner
---------