0: kd> .load pde;!dpx
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
Start memory scan : 0xfffff88009c3a898 ($csp)
End memory scan : 0xfffff88009c3d000 (Kernel Stack Base)
rsp : 0xfffff88009c3a898 : 0xfffff80001ab7f69 : nt!KiBugCheckDispatch+0x69
r11 : 0xfffff88009c3aa98 : 0xfffff80001a16000 : "nt!_imp_CiInitialize (nt+0x0)"
0xfffff88009c3a898 : 0xfffff80001ab7f69 : nt!KiBugCheckDispatch+0x69
0xfffff88009c3a8b0 : 0xfffff88002f02f91 : termdd!IcaChannelInputInternal+0x17d
0xfffff88009c3a970 : 0xfffff80001aaeeb1 : nt!KiIpiInterrupt+0x311
0xfffff88009c3a998 : 0xfffff80001ff4dcc : hal!HalpDmaSyncMapBuffers+0x1b0
0xfffff88009c3a9b0 : 0xfffff80001a16000 : "nt!_imp_CiInitialize (nt+0x0)"
0xfffff88009c3a9b8 : 0xfffff80001ab7bd3 : nt!KiSystemServiceCopyEnd+0x13
0xfffff88009c3a9c0 : 0xfffff80001c91008 : "nt!BBTBuffer (nt+0x27b008)"
0xfffff88009c3a9c8 : 0xfffff80001ab7600 : nt!KiSystemServiceHandler
0xfffff88009c3a9d8 : 0xfffff80001ab767c : nt!KiSystemServiceHandler+0x7c
0xfffff88009c3a9f8 : 0xfffff80001a97dcc : nt!_C_specific_handler
0xfffff88009c3aa00 : 0xfffff80001cad9a0 : "nt!BBTBuffer (nt+0x2979a0)"
0xfffff88009c3aa08 : 0xfffff80001ece831 : nt!IopXxxControlFile+0xc51
0xfffff88009c3aa18 : 0xfffff80001ab0edd : nt!RtlpExecuteHandlerForException+0xd
0xfffff88009c3aa20 : 0xfffff80001ca0560 : "nt!BBTBuffer (nt+0x28a560)"
0xfffff88009c3aa30 : 0xfffff80001a16000 : "nt!_imp_CiInitialize (nt+0x0)"
0xfffff88009c3aa40 : 0xfffff88009c3aae0 : 0xfffff80001ab7bd3 : nt!KiSystemServiceCopyEnd+0x13
0xfffff88009c3aa48 : 0xfffff80001a741f5 : nt!RtlDispatchException+0x415
0xfffff88009c3aa58 : 0xfffff88009c3aa98 : 0xfffff80001a16000 : "nt!_imp_CiInitialize (nt+0x0)"
0xfffff88009c3aa68 : 0xfffff80001a16000 : "nt!_imp_CiInitialize (nt+0x0)"
0xfffff88009c3aa98 : 0xfffff80001a16000 : "nt!_imp_CiInitialize (nt+0x0)"
0xfffff88009c3aab8 : 0xfffff80001c91008 : "nt!BBTBuffer (nt+0x27b008)"
Unable to load image \SystemRoot\system32\DRIVERS\vmxnet.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for vmxnet.sys
0xfffff88009c3aae0 : 0xfffff80001ab7bd3 : nt!KiSystemServiceCopyEnd+0x13
0xfffff88009c3aae8 : 0xfffff80001a16000 : "nt!_imp_CiInitialize (nt+0x0)"
0xfffff88009c3aaf0 : 0xfffff80001c91008 : "nt!BBTBuffer (nt+0x27b008)"
0xfffff88009c3ab00 : 0xfffff80001bfa180 : nt!KiInitialPCR+0x180
0xfffff88009c3ab10 : 0xfffff80001ab7600 : nt!KiSystemServiceHandler
0xfffff88009c3ab38 : 0xfffff88000efe0a5 : NDIS!ndisMProcessSGList+0x95
0xfffff88009c3ac38 : 0xfffff88000f23e07 : NDIS!ndisMSendNetBufferListsToPackets+0x97
0xfffff88009c3ac58 : 0xfffff88000ec8110 : NDIS!WPP_GLOBAL_Control
0xfffff88009c3aca0 : 0xfffff80001c10880 : nt!NonPagedPoolDescriptor
0xfffff88009c3aca8 : 0xfffff80001bef8a6 : nt!ExAllocatePoolWithTag+0x316
0xfffff88009c3acb8 : 0xfffff80001c119c0 : nt!ExpScratchBufferLookasideList
0xfffff88009c3ae48 : 0xfffff80001ff4dcc : hal!HalpDmaSyncMapBuffers+0x1b0
0xfffff88009c3afd8 : 0xfffff88009c3b038 : 0xfffff8800632a000 : "RDPWD!McGenControlCallbackV2 (RDPWD+0x0)"
0xfffff88009c3afe8 : 0xfffff88000efe0a5 : NDIS!ndisMProcessSGList+0x95
0xfffff88009c3b008 : 0xfffff88002f02d24 : termdd!IcaChannelInput
0xfffff88009c3b010 : 0xfffff8800635227b : RDPWD!HandleDisconnectProviderUlt+0xff
0xfffff88009c3b018 : 0xfffff88002f00000 : "termdd!IcaLoadSdWorker (termdd+0x0)"
0xfffff88009c3b020 : 0xfffff88002f0c114 : "termdd!__PchSym_ (termdd+0xc114)"
0xfffff88009c3b028 : 0xfffff88002f00000 : "termdd!IcaLoadSdWorker (termdd+0x0)"
0xfffff88009c3b030 : 0xfffff88002f0c108 : "termdd!__PchSym_ (termdd+0xc108)"
0xfffff88009c3b038 : 0xfffff8800632a000 : "RDPWD!McGenControlCallbackV2 (RDPWD+0x0)"
0xfffff88009c3b040 : 0xfffff8800635d038 : "RDPWD!__PchSym_ (RDPWD+0x33038)"
0xfffff88009c3b048 : 0xfffff8800632a000 : "RDPWD!McGenControlCallbackV2 (RDPWD+0x0)"
0xfffff88009c3b050 : 0xfffff8800635cf90 : "RDPWD!__PchSym_ (RDPWD+0x32f90)"
0xfffff88009c3b058 : 0xfffff8800632a000 : "RDPWD!McGenControlCallbackV2 (RDPWD+0x0)"
0xfffff88009c3b060 : 0xfffff8800635cf84 : "RDPWD!__PchSym_ (RDPWD+0x32f84)"
0xfffff88009c3b068 : 0xfffff88002f00000 : "termdd!IcaLoadSdWorker (termdd+0x0)"
0xfffff88009c3b070 : 0xfffff88002f0c294 : "termdd!__PchSym_ (termdd+0xc294)"
*** WARNING: Unable to verify timestamp for tssecsrv.sys
0xfffff88009c3b078 : 0xfffff8800631a000 : tssecsrv
0xfffff88009c3b088 : 0xfffff8800631a000 : tssecsrv
0xfffff88009c3b098 : 0xfffff8800631a000 : tssecsrv
0xfffff88009c3b0a8 : 0xfffff88002f00000 : "termdd!IcaLoadSdWorker (termdd+0x0)"
0xfffff88009c3b0b0 : 0xfffff88002f0c294 : "termdd!__PchSym_ (termdd+0xc294)"
*** WARNING: Unable to verify timestamp for tdtcp.sys
0xfffff88009c3b0b8 : 0xfffff8800630f000 : tdtcp
0xfffff88009c3b0c8 : 0xfffff88002f00000 : "termdd!IcaLoadSdWorker (termdd+0x0)"
0xfffff88009c3b0d0 : 0xfffff88002f0c324 : "termdd!__PchSym_ (termdd+0xc324)"
0xfffff88009c3b0e0 : 0xfffff88002f02f91 : termdd!IcaChannelInputInternal+0x17d
0xfffff88009c3b128 : 0xfffff80001b90a9e : nt!KiDispatchException+0x17e
0xfffff88009c3b168 : 0xfffff88000f020d3 : NDIS!ndisMAllocSGList+0xe3
0xfffff88009c3b220 : 0xfffff88009c3bb88 : 0xfffff88002f0618f : termdd!IcaCallNextDriver+0x5b
0xfffff88009c3b258 : 0xfffff88002f02f91 : termdd!IcaChannelInputInternal+0x17d
0xfffff88009c3b268 : 0xfffff88000f23e07 : NDIS!ndisMSendNetBufferListsToPackets+0x97
0xfffff88009c3b288 : 0xfffff88000ec8110 : NDIS!WPP_GLOBAL_Control
0xfffff88009c3b2d0 : 0xfffff80001c10880 : nt!NonPagedPoolDescriptor
0xfffff88009c3b2d8 : 0xfffff80001bef8a6 : nt!ExAllocatePoolWithTag+0x316
0xfffff88009c3b2e8 : 0xfffff80001c119c0 : nt!ExpScratchBufferLookasideList
0xfffff88009c3b420 : 0xfffff80001aaa842 : nt!KiInterruptDispatch+0xf2
0xfffff88009c3b468 : 0xfffff88000e663f9 : NDIS!ndisSendNBLToFilter+0x69
0xfffff88009c3b4a8 : 0xfffff88002f02e01 : termdd!IcaChannelInput+0xdd
0xfffff88009c3b4e8 : 0xfffff88006332f68 : RDPWD!WDW_OnDataReceived+0x360
0xfffff88009c3b528 : 0xfffff8800165eeee : tcpip!IppFragmentPackets+0x39e
0xfffff88009c3b598 : 0xfffff80001aac0c2 : nt!KiDispatchInterrupt+0x12
0xfffff88009c3b5a8 : 0xfffff88000ef4a92 : NDIS!ndisMIsr+0x62
0xfffff88009c3b5c8 : 0xfffff80001aaeb83 : nt!KiDpcInterruptBypass+0x13
0xfffff88009c3b5d0 : 0xfffff80001aaa842 : nt!KiInterruptDispatch+0xf2
0xfffff88009c3b5d8 : 0xfffff80001aaa8ae : nt!KiInterruptDispatch+0x15e
0xfffff88009c3b5f8 : 0xfffff80001a66731 : nt!RtlGetExtendedContextLength+0x19
0xfffff88009c3b648 : 0xfffff8800165cae7 : tcpip!IppDispatchSendPacketHelper+0x87
0xfffff88009c3b738 : 0xfffff8800121becc : cng!SHA512Update+0x6c
0xfffff88009c3b778 : 0xfffff88001264d33 : cng!SHA384Final+0x179
0xfffff88009c3b788 : 0xfffff8800121bf37 : cng!SHA512Update+0xdb
0xfffff88009c3b7b8 : 0xfffff80001ab8042 : nt!KiExceptionDispatch+0xc2
0xfffff88009c3b8b8 : 0xfffff88001242a25 : cng!Tls1ComputeMac+0x195
0xfffff88009c3b908 : 0xfffff88002f02f91 : termdd!IcaChannelInputInternal+0x17d
0xfffff88009c3b958 : 0xfffff8800121882d : cng!TlsDecryptPacket+0x44d
0xfffff88009c3b998 : 0xfffff80001ab5932 : nt!KiGeneralProtectionFault+0x2f2
0xfffff88009c3b9a0 : 0xfffff88009c3b9b0 : Trap @ fffff88009c3b9a0
0xfffff88009c3b9f0 : 0xfffff88009c3bb88 : 0xfffff88002f0618f : termdd!IcaCallNextDriver+0x5b
0xfffff88009c3bac8 : 0xfffff80001a565a2 : nt!ExReleaseResourceAndLeaveCriticalRegion+0x12
0xfffff88009c3bb08 : 0xfffff88002f02f91 : termdd!IcaChannelInputInternal+0x17d
0xfffff88009c3bb58 : 0xfffff88002f0767f : termdd!IcaCallSd+0x43
0xfffff88009c3bb88 : 0xfffff88002f0618f : termdd!IcaCallNextDriver+0x5b
0xfffff88009c3bc08 : 0xfffff88002f02e01 : termdd!IcaChannelInput+0xdd
0xfffff88009c3bc18 : 0xfffff88002f0618f : termdd!IcaCallNextDriver+0x5b
0xfffff88009c3bc48 : 0xfffff8800635225e : RDPWD!HandleDisconnectProviderUlt+0xe2
0xfffff88009c3bcd8 : 0xfffff880063513fc : RDPWD!RecognizeMCSFrame+0x50
0xfffff88009c3bd18 : 0xfffff88006350fe4 : RDPWD!MCSIcaRawInputWorker+0x3d4
0xfffff88009c3bdb8 : 0xfffff88002f061f8 : termdd!IcaRawInput+0x50
0xfffff88009c3bf38 : 0xfffff88002f061f8 : termdd!IcaRawInput+0x50
0xfffff88009c3bf40 : 0xfffff80001bfa180 : nt!KiInitialPCR+0x180
0xfffff88009c3bfc8 : 0xfffff80001d29fda : nt!PspInitializeThunkContext+0x166
0xfffff88009c3bfe8 : 0xfffff80001d2a028 : nt!PspInitializeThunkContext+0x1b4
0: kd> lmvm vmxnet
Browse full module list
start end module name
fffff880`02be3000 fffff880`02bf0000 vmxnet T (no symbols)
Loaded symbol image file: vmxnet.sys
Image path: \SystemRoot\system32\DRIVERS\vmxnet.sys
Image name: vmxnet.sys
Browse all global symbols functions data
Timestamp: Tue May 8 11:19:16 2012 (4FA8F324)
CheckSum: 00016332
ImageSize: 0000D000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: