Hab jetzt meine festplatte komplett defragmentiert und Windows neu istalliert !!
Nach paar stunden habe ich meinen ersten Bluescreen gehabt, bloß jetzt geht es um was anderes !!!!
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Bonar\Desktop\040713-27643-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\mss*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.Windows 7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e05000 PsLoadedModuleList = 0xfffff800`0304ae90
Debug session time: Sun Apr 7 23:32:39.407 2013 (UTC + 2:00)
System Uptime: 0 days 6:14:33.578
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {fffff88004273028, 800000022011d121, fffff88002ffda20, a}
Probably caused by : USBPORT.SYS ( USBPORT!MPf_PollEndpoint+77 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff88004273028, Virtual address for the attempted write.
Arg2: 800000022011d121, PTE contents.
Arg3: fffff88002ffda20, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 2
TRAP_FRAME: fffff88002ffda20 -- (.trap 0xfffff88002ffda20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8008b96178
rdx=0000000050456302 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004244e67 rsp=fffff88002ffdbb0 rbp=fffffa8007dda570
r8=0000000050456300 r9=0000000000000000 r10=00000000ffffffff
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
USBPORT!MPf_PollEndpoint+0x77:
fffff880`04244e67 ff15bbe10200 call qword ptr [USBPORT!_imp_KeAcquireSpinLockRaiseToDpc (fffff880`04273028)] ds:4c39:fffff880`04273028={nt!KeAcquireSpinLockRaiseToDpc (fffff800`02e8f230)}
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e2f807 to fffff80002e85640
STACK_TEXT:
fffff880`02ffd8b8 fffff800`02e2f807 : 00000000`000000be fffff880`04273028 80000002`2011d121 fffff880`02ffda20 : nt!KeBugCheckEx
fffff880`02ffd8c0 fffff800`02e8376e : fffffa80`0893b0b0 00000000`0000000b fffff880`00000000 00000000`00000010 : nt! ?? ::FNODOBFM::`string'+0x443cb
fffff880`02ffda20 fffff880`04244e67 : fffffa80`08b951a0 00000000`00000002 00000000`00000000 00000000`00000010 : nt!KiPageFault+0x16e
fffff880`02ffdbb0 fffff880`042499d1 : 00000000`00000010 00000000`00000004 fffffa80`07dda570 fffffa80`08b95050 : USBPORT!MPf_PollEndpoint+0x77
fffff880`02ffdbe0 fffff880`04255077 : fffffa80`08b951a0 00000000`00000010 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`02ffdc40 fffff880`04245f89 : fffffa80`08b95050 00000000`00000000 fffffa80`08b95a02 fffffa80`08b95a18 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1c3
fffff880`02ffdca0 fffff800`02e90b1c : fffff880`02fd5180 fffffa80`08b95a18 fffffa80`08b95a30 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02ffdcd0 fffff800`02e7d36a : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`04245db0 : nt!KiRetireDpcList+0x1bc
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!MPf_PollEndpoint+77
fffff880`04244e67 ff15bbe10200 call qword ptr [USBPORT!_imp_KeAcquireSpinLockRaiseToDpc (fffff880`04273028)]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBPORT!MPf_PollEndpoint+77
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a670
FAILURE_BUCKET_ID: X64_0xBE_USBPORT!MPf_PollEndpoint+77
BUCKET_ID: X64_0xBE_USBPORT!MPf_PollEndpoint+77
Followup: MachineOwner
---------
3: kd> lmvm USBPORT
start end module name
fffff880`04243000 fffff880`04299000 USBPORT (pdb symbols) c:\mss\usbport.pdb\71BCD350024D47208D5EA216690A7BFF1\usbport.pdb
Loaded symbol image file: USBPORT.SYS
Mapped memory image file: c:\mss\USBPORT.SYS\4CE7A67056000\USBPORT.SYS
Image path: \SystemRoot\system32\DRIVERS\USBPORT.SYS
Image name: USBPORT.SYS
Timestamp: Sat Nov 20 11:44:00 2010 (4CE7A670)
CheckSum: 00059BC8
ImageSize: 00056000
File version: 6.1.7601.17514
Product version: 6.1.7601.17514
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: usbport.sys
OriginalFilename: usbport.sys
ProductVersion: 6.1.7601.17514
FileVersion: 6.1.7601.17514 (Windows 7sp1_rtm.101119-1850)
FileDescription: USB 1.1 & 2.0 Port Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
was könnte das jetzt sein ???
🙁
EDIT (autom. Beitragszusammenführung):
Nach eine stunde schon wieder blue screen...
aber komisch, schon wieder was anderes....
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Bonar\Desktop\040813-32042-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\mss*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.Windows 7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03051000 PsLoadedModuleList = 0xfffff800`03296e90
Debug session time: Mon Apr 8 00:51:24.649 2013 (UTC + 2:00)
System Uptime: 0 days 1:18:04.194
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : hardware ( ks!CKsPin::TransferKsIrp+f5 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - Der Vorgang wurde erfolgreich beendet.
FAULTING_IP:
+6438613734346539
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f8c4a8 -- (.exr 0xfffff88002f8c4a8)
ExceptionAddress: fffff800030ef8df (nt!MmUnlockPages+0x000000000000049f)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff88002f8c550 -- (.trap 0xfffff88002f8c550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000064e40 rbx=0000000000000000 rcx=000000000000fc00
rdx=0000000000064e40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030ef8df rsp=fffff88002f8c6e0 rbp=000000000000c47f
r8=0000000000064e42 r9=0000000000000000 r10=0000000000000000
r11=000000000000200b r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MmUnlockPages+0x49f:
fffff800`030ef8df ff ???
Resetting default scope
MISALIGNED_IP:
nt!MmUnlockPages+49f
fffff800`030ef8df ff ???
LAST_CONTROL_TRANSFER: from fffff800030c8ffe to fffff800030d1610
STACK_TEXT:
fffff880`02f8b588 fffff800`030c8ffe : fffffa80`09570620 fffff880`0444a780 fffff880`02f8bd00 fffff800`030fd2a0 : nt!KeBugCheck
fffff880`02f8b590 fffff800`030fcf6d : fffff800`032d8a10 fffff800`03214c78 fffff800`03051000 fffff880`02f8c4a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8b5c0 fffff800`030fbd45 : fffff800`032180fc fffff880`02f8b638 fffff880`02f8c4a8 fffff800`03051000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8b5f0 fffff800`0310cdc1 : fffff880`02f8c4a8 fffff880`02f8bd00 fffff880`00000000 00000000`00000007 : nt!RtlDispatchException+0x415
fffff880`02f8bcd0 fffff800`030d0cc2 : fffff880`02f8c4a8 fffff6fc`400623f8 fffff880`02f8c550 00000000`00000003 : nt!KiDispatchException+0x135
fffff880`02f8c370 fffff800`030cee1f : fffff880`02f8c550 00000000`00000002 fffff880`02f8c600 fffff880`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02f8c550 fffff800`030ef8df : 00000000`00000003 fffff880`07621c90 fffffa80`086ea010 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`02f8c6e0 fffff800`030d4848 : fffffa80`086e200b 0000b0e1`00064e40 fffffa80`094d0010 00000000`00000000 : nt!MmUnlockPages+0x49f
fffff880`02f8c770 fffff880`03e03025 : fffffa80`09502b10 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x168
fffff880`02f8c850 fffff880`03e015cc : fffffa80`072a5010 fffffa80`0bc9c310 00000000`00000000 fffffa80`086ea010 : ks!CKsPin::TransferKsIrp+0xf5
fffff880`02f8c890 fffff880`03e0271f : 00000000`00000000 00000000`00000000 fffffa80`094f2000 fffff880`04808c57 : ks!KspTransferKsIrp+0x54
fffff880`02f8c8c0 fffff880`03e027af : fffffa80`0bc9c310 00000000`00000002 00000000`00000000 fffffa80`0ab2ed02 : ks!CKsQueue::ForwardIrp+0x167
fffff880`02f8c910 fffff880`03e0317f : fffffa80`0bc9c310 00000000`00000000 fffffa80`086ea010 fffffa80`06ce1f60 : ks!CKsQueue::ForwardWaitingIrps+0x5f
fffff880`02f8c940 fffff880`03e02945 : fffffa80`06ce1f60 00000000`00000000 fffffa80`06ce1fc0 00000000`00000000 : ks!CKsQueue::UnlockStreamPointer+0x123
fffff880`02f8c990 fffff880`07602061 : fffffa80`0a5a3a20 fffffa80`06ce1fc0 00000000`00000000 fffffa80`0a5a3a20 : ks!CKsQueue:
😀eleteStreamPointer+0xf5
fffff880`02f8c9d0 fffff800`030d4a91 : fffffa80`08525e9b 00000000`00000000 00000000`00000000 00000000`000007ff : usbaudio!USBType1CompleteCallback+0x20d
fffff880`02f8ca40 fffff880`044f3631 : fffffa80`08a0f050 fffffa80`0ab2ed00 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3b1
fffff880`02f8cb20 fffff880`044f3b0f : fffffa80`0d244902 fffffa80`08525c60 00000000`ffffffff fffffa80`08a0feb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8cc00 fffff880`044f166f : fffffa80`08a0feb0 fffffa80`08a0f1a0 fffffa80`08a10050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8cc60 fffff880`044e2f89 : fffffa80`08a0f050 00000000`00000000 fffffa80`08a0fe02 fffffa80`08a0feb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8cca0 fffff800`030dcb1c : fffff880`02f64180 fffffa80`08a0feb0 fffffa80`08a0fec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8ccd0 fffff800`030c936a : fffff880`02f64180 fffff880`02f6efc0 00000000`00000000 fffff880`044e2db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f8cd80 00000000`00000000 : fffff880`02f8d000 fffff880`02f87000 fffff880`02f8cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ks!CKsPin::TransferKsIrp+f5
fffff880`03e03025 488bcf mov rcx,rdi
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: ks!CKsPin::TransferKsIrp+f5
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
IMAGE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - Der Vorgang wurde erfolgreich beendet.
FAULTING_IP:
+6438613734346539
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f8c4a8 -- (.exr 0xfffff88002f8c4a8)
ExceptionAddress: fffff800030ef8df (nt!MmUnlockPages+0x000000000000049f)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff88002f8c550 -- (.trap 0xfffff88002f8c550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000064e40 rbx=0000000000000000 rcx=000000000000fc00
rdx=0000000000064e40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030ef8df rsp=fffff88002f8c6e0 rbp=000000000000c47f
r8=0000000000064e42 r9=0000000000000000 r10=0000000000000000
r11=000000000000200b r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MmUnlockPages+0x49f:
fffff800`030ef8df ff ???
Resetting default scope
MISALIGNED_IP:
nt!MmUnlockPages+49f
fffff800`030ef8df ff ???
LAST_CONTROL_TRANSFER: from fffff800030c8ffe to fffff800030d1610
STACK_TEXT:
fffff880`02f8b588 fffff800`030c8ffe : fffffa80`09570620 fffff880`0444a780 fffff880`02f8bd00 fffff800`030fd2a0 : nt!KeBugCheck
fffff880`02f8b590 fffff800`030fcf6d : fffff800`032d8a10 fffff800`03214c78 fffff800`03051000 fffff880`02f8c4a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8b5c0 fffff800`030fbd45 : fffff800`032180fc fffff880`02f8b638 fffff880`02f8c4a8 fffff800`03051000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8b5f0 fffff800`0310cdc1 : fffff880`02f8c4a8 fffff880`02f8bd00 fffff880`00000000 00000000`00000007 : nt!RtlDispatchException+0x415
fffff880`02f8bcd0 fffff800`030d0cc2 : fffff880`02f8c4a8 fffff6fc`400623f8 fffff880`02f8c550 00000000`00000003 : nt!KiDispatchException+0x135
fffff880`02f8c370 fffff800`030cee1f : fffff880`02f8c550 00000000`00000002 fffff880`02f8c600 fffff880`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02f8c550 fffff800`030ef8df : 00000000`00000003 fffff880`07621c90 fffffa80`086ea010 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`02f8c6e0 fffff800`030d4848 : fffffa80`086e200b 0000b0e1`00064e40 fffffa80`094d0010 00000000`00000000 : nt!MmUnlockPages+0x49f
fffff880`02f8c770 fffff880`03e03025 : fffffa80`09502b10 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x168
fffff880`02f8c850 fffff880`03e015cc : fffffa80`072a5010 fffffa80`0bc9c310 00000000`00000000 fffffa80`086ea010 : ks!CKsPin::TransferKsIrp+0xf5
fffff880`02f8c890 fffff880`03e0271f : 00000000`00000000 00000000`00000000 fffffa80`094f2000 fffff880`04808c57 : ks!KspTransferKsIrp+0x54
fffff880`02f8c8c0 fffff880`03e027af : fffffa80`0bc9c310 00000000`00000002 00000000`00000000 fffffa80`0ab2ed02 : ks!CKsQueue::ForwardIrp+0x167
fffff880`02f8c910 fffff880`03e0317f : fffffa80`0bc9c310 00000000`00000000 fffffa80`086ea010 fffffa80`06ce1f60 : ks!CKsQueue::ForwardWaitingIrps+0x5f
fffff880`02f8c940 fffff880`03e02945 : fffffa80`06ce1f60 00000000`00000000 fffffa80`06ce1fc0 00000000`00000000 : ks!CKsQueue::UnlockStreamPointer+0x123
fffff880`02f8c990 fffff880`07602061 : fffffa80`0a5a3a20 fffffa80`06ce1fc0 00000000`00000000 fffffa80`0a5a3a20 : ks!CKsQueue:
😀eleteStreamPointer+0xf5
fffff880`02f8c9d0 fffff800`030d4a91 : fffffa80`08525e9b 00000000`00000000 00000000`00000000 00000000`000007ff : usbaudio!USBType1CompleteCallback+0x20d
fffff880`02f8ca40 fffff880`044f3631 : fffffa80`08a0f050 fffffa80`0ab2ed00 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3b1
fffff880`02f8cb20 fffff880`044f3b0f : fffffa80`0d244902 fffffa80`08525c60 00000000`ffffffff fffffa80`08a0feb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8cc00 fffff880`044f166f : fffffa80`08a0feb0 fffffa80`08a0f1a0 fffffa80`08a10050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8cc60 fffff880`044e2f89 : fffffa80`08a0f050 00000000`00000000 fffffa80`08a0fe02 fffffa80`08a0feb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8cca0 fffff800`030dcb1c : fffff880`02f64180 fffffa80`08a0feb0 fffffa80`08a0fec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8ccd0 fffff800`030c936a : fffff880`02f64180 fffff880`02f6efc0 00000000`00000000 fffff880`044e2db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f8cd80 00000000`00000000 : fffff880`02f8d000 fffff880`02f87000 fffff880`02f8cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ks!CKsPin::TransferKsIrp+f5
fffff880`03e03025 488bcf mov rcx,rdi
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: ks!CKsPin::TransferKsIrp+f5
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
IMAGE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------