2: kd> .load pde;!dpx
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
Start memory scan : 0xffffd20374ec92e8 ($csp)
End memory scan : 0xffffd20374ecb000 (Kernel Stack Base)
rax : 0xffffd20374ec93f0 : 0xfffff807656e3a48 : "nt!setjmpexused <PERF> (nt+0xe3a48)"
rsp : 0xffffd20374ec92e8 : 0xfffff80765a09869 : nt!KiBugCheckDispatch+0x69
0xffffd20374ec92e8 : 0xfffff80765a09869 : nt!KiBugCheckDispatch+0x69
0xffffd20374ec9300 : 0xffffb89e9660a64e : win32kbase!HMUnlockObjectWorker+0xe
0xffffd20374ec93d0 : 0xffffd20374ec9438 : 0xfffff807656e3a48 : "nt!setjmpexused <PERF> (nt+0xe3a48)"
0xffffd20374ec93f0 : 0xfffff807656e3a48 : "nt!setjmpexused <PERF> (nt+0xe3a48)"
0xffffd20374ec93f8 : 0xfffff80765a092b5 : nt!KiSystemServiceCopyEnd+0x25
0xffffd20374ec9400 : 0xfffff80765a08c40 : nt!KiSystemServiceHandler
0xffffd20374ec9410 : 0xfffff80765600000 : "nt!VrpRegistryString <PERF> (nt+0x0)"
0xffffd20374ec9428 : 0xfffff80765a08cbc : nt!KiSystemServiceHandler+0x7c
0xffffd20374ec9438 : 0xfffff807656e3a48 : "nt!setjmpexused <PERF> (nt+0xe3a48)"
0xffffd20374ec9460 : 0xffffd20374ec9470 : 0xfffff80765a08c40 : nt!KiSystemServiceHandler
0xffffd20374ec9468 : 0xfffff80765a0075f : nt!RtlpExecuteHandlerForException+0xf
0xffffd20374ec9470 : 0xfffff80765a08c40 : nt!KiSystemServiceHandler
0xffffd20374ec9490 : 0xffffd20374ec9a30 : 0xfffff80765a092b5 : nt!KiSystemServiceCopyEnd+0x25
0xffffd20374ec9498 : 0xfffff807658e6f97 : nt!RtlDispatchException+0x297
0xffffd20374ec94b8 : 0xfffff80765a092b5 : nt!KiSystemServiceCopyEnd+0x25
0xffffd20374ec9550 : 0xfffff80773666b28 : usbccgp!WPP_284f389f2fba3eba18632fb211154bfa_Traceguids
0xffffd20374ec9568 : 0xfffff807736519b6 : usbccgp!DispatchPdoInternalDeviceControl+0x1c6
0xffffd20374ec9610 : 0xffffa70fb88bd3b0 : dt dxgkrnl!DMMVIDPN
0xffffd20374ec9618 : 0xfffff807658f40df : nt!KeQueryPerformanceCounter+0x5f
0xffffd20374ec9628 : 0xfffff80765923df4 : nt!HalpApicRequestInterrupt+0x144
0xffffd20374ec9648 : 0xfffff8076589ae16 : nt!EtwpReserveTraceBuffer+0x1c6
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_1c83a5d7cffd7bff\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
0xffffd20374ec96b8 : 0xfffff80765925fda : nt!HalPerformEndOfInterrupt+0x1a
0xffffd20374ec9878 : 0xfffff80765885dfe : nt!KeReleaseMutant+0x1fe
0xffffd20374ec98d0 : 0xffffd20374ec9a10 : 0xfffff80765600000 : "nt!VrpRegistryString <PERF> (nt+0x0)"
0xffffd20374ec9908 : 0xfffff8076589afdb : nt!KeQueryCurrentStackInformationEx+0x8b
0xffffd20374ec9958 : 0xfffff807658e9e86 : nt!RtlGetExtendedContextLength2+0x46
0xffffd20374ec9968 : 0xfffff807658e6c24 : nt!RtlpGetStackLimitsEx+0x14
0xffffd20374ec9998 : 0xfffff807658e6e19 : nt!RtlDispatchException+0x119
0xffffd20374ec9a10 : 0xfffff80765600000 : "nt!VrpRegistryString <PERF> (nt+0x0)"
0xffffd20374ec9a30 : 0xfffff80765a092b5 : nt!KiSystemServiceCopyEnd+0x25
0xffffd20374ec9a38 : 0xfffff80765600000 : "nt!VrpRegistryString <PERF> (nt+0x0)"
0xffffd20374ec9a40 : 0xfffff807656e3a48 : "nt!setjmpexused <PERF> (nt+0xe3a48)"
0xffffd20374ec9a60 : 0xfffff80765a08c40 : nt!KiSystemServiceHandler
0xffffd20374ec9a88 : 0xfffff807658079f3 : nt!ExReleasePushLockExclusiveEx+0x1a3
0xffffd20374ec9a98 : 0xffffb89e9660a640 : win32kbase!HMUnlockObjectWorker
0xffffd20374ec9aa0 : 0xfffff80765a097ff : nt!KiSystemServiceExitPico+0x2ca
0xffffd20374ec9aa8 : 0xffffb89e96600000 : "win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ptr64>::Write<_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8> > <PERF> (win32kbase+0x0)"
0xffffd20374ec9ab8 : 0xffffb89e97be0000 : "win32kfull!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ptr64>::Write<_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4> > <PERF> (win32kfull+0x0)"
0xffffd20374ec9ac0 : 0xffffb89e97f226fc : "win32kfull!__PchSym_ <PERF> (win32kfull+0x3426fc)"
0xffffd20374ec9ac8 : 0xffffb89e97be0000 : "win32kfull!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ptr64>::Write<_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4> > <PERF> (win32kfull+0x0)"
0xffffd20374ec9ad0 : 0xffffb89e97f226f0 : "win32kfull!__PchSym_ <PERF> (win32kfull+0x3426f0)"
0xffffd20374ec9ad8 : 0xffffb89e96600000 : "win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ptr64>::Write<_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8> > <PERF> (win32kbase+0x0)"
0xffffd20374ec9ae8 : 0xffffb89e97be0000 : "win32kfull!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ptr64>::Write<_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4> > <PERF> (win32kfull+0x0)"
0xffffd20374ec9af0 : 0xffffb89e97f274b4 : "win32kfull!__PchSym_ <PERF> (win32kfull+0x3474b4)"
0xffffd20374ec9af8 : 0xffffb89e96b40000 : "win32k!IsSysEntryApiExtSupported <PERF> (win32k+0x0)"
0xffffd20374ec9b00 : 0xffffb89e96ba7abc : "win32k!HotPatchSpareGlobal7 <PERF> (win32k+0x67abc)"
0xffffd20374ec9b08 : 0xfffff80765600000 : "nt!VrpRegistryString <PERF> (nt+0x0)"
0xffffd20374ec9b10 : 0xfffff807656e3a48 : "nt!setjmpexused <PERF> (nt+0xe3a48)"
0xffffd20374ec9b68 : 0xffffb89e9660a650 : win32kbase!HMUnlockObjectWorker+0x10
0xffffd20374ec9b78 : 0xfffff807658e5f8e : nt!KdTrap+0x22
0xffffd20374ec9bb8 : 0xfffff807658e5b96 : nt!KiDispatchException+0x186
0xffffd20374ec9c08 : 0xfffff8076580ac67 : nt!ExReleasePushLockSharedEx+0x37
0xffffd20374ec9c38 : 0xfffff80765882b80 : nt!KiWakeOtherQueueWaiters+0xb0
0xffffd20374ec9cb8 : 0xfffff80765926f90 : nt!HalpApic1WriteIcr
0xffffd20374ec9ce8 : 0xffffb89e9660a64e : win32kbase!HMUnlockObjectWorker+0xe
0xffffd20374ec9d20 : 0xffffa70fb88bd3b0 : dt dxgkrnl!DMMVIDPN
0xffffd20374ec9d28 : 0xfffff807658f40df : nt!KeQueryPerformanceCounter+0x5f
0xffffd20374ec9d38 : 0xfffff80765923df4 : nt!HalpApicRequestInterrupt+0x144
0xffffd20374ec9d58 : 0xfffff8076589ae16 : nt!EtwpReserveTraceBuffer+0x1c6
0xffffd20374ec9e98 : 0xfffff807659a737e : nt!EtwpCCSwapFlush+0xf6
0xffffd20374ec9ef8 : 0xfffff807659a70d9 : nt!EtwpCCSwapTrace+0x1a9
0xffffd20374ec9f68 : 0xfffff807659a6ec7 : nt!EtwpLogContextSwapEvent+0xf7
0xffffd20374ec9fb8 : 0xfffff80765923d40 : nt!HalpApicRequestInterrupt+0x90
0xffffd20374ec9ff8 : 0xfffff807659a6d83 : nt!EtwTraceContextSwap+0x83
0xffffd20374eca028 : 0xfffff807658153af : nt!HalpInterruptSendIpi+0x2df
0xffffd20374eca048 : 0xfffff80765923d40 : nt!HalpApicRequestInterrupt+0x90
0xffffd20374eca058 : 0xfffff807659a70d9 : nt!EtwpCCSwapTrace+0x1a9
0xffffd20374eca068 : 0xfffff807658f40df : nt!KeQueryPerformanceCounter+0x5f
0xffffd20374eca078 : 0xfffff807658e9e86 : nt!RtlGetExtendedContextLength2+0x46
0xffffd20374eca278 : 0xfffff80765a099ac : nt!KiExceptionDispatch+0x12c
0xffffd20374eca358 : 0xfffff807658f40df : nt!KeQueryPerformanceCounter+0x5f
0xffffd20374eca3c8 : 0xffffb89e9660a64e : win32kbase!HMUnlockObjectWorker+0xe
0xffffd20374eca458 : 0xfffff80765a05b43 : nt!KiPageFault+0x443
0xffffd20374eca460 : 0x0000000000000000 : Trap @ ffffd20374eca460
0xffffd20374eca4b8 : 0xfffff80765926f90 : nt!HalpApic1WriteIcr
0xffffd20374eca538 : 0xfffff80765882b80 : nt!KiWakeOtherQueueWaiters+0xb0
0xffffd20374eca588 : 0xfffff80765886c1a : nt!KeSetEvent+0xea
0xffffd20374eca5c8 : 0xffffb89e9660a64e : win32kbase!HMUnlockObjectWorker+0xe
0xffffd20374eca618 : 0xffffb89e97bea974 : win32kfull!TimersProc+0x114
0xffffd20374eca678 : 0xffffb89e9684d210 : win32kbase!gRemoteContext
0xffffd20374eca6a8 : 0xffffb89e97bea546 : win32kfull!RawInputThread+0x7f6
0xffffd20374eca6f0 : 0xffffb8c9006a01a0 : dt win32kbase!LegacyInputDispatcher
0xffffd20374eca778 : 0xffffb89e97ec3488 : !du "WinSta0_RIT"
0xffffd20374eca7a0 : 0xffffb89e97be9d50 : win32kfull!RawInputThread
0xffffd20374eca818 : 0xfffff8076580a248 : nt!ExReleaseResourceAndLeaveCriticalRegion+0x88
0xffffd20374eca838 : 0xffffb89e97be9d50 : win32kfull!RawInputThread
0xffffd20374eca868 : 0xffffb89e9667fc14 : win32kbase!xxxCreateSystemThreads+0xc4
0xffffd20374eca8d0 : 0xffffb89e9667fb50 : win32kbase!xxxCreateSystemThreads
0xffffd20374eca8f0 : 0xfffff8076621dde8 : nt!PsWin32CallBack
0xffffd20374eca8f8 : 0xffffb89e96b410d1 : win32k!W32CalloutDispatchThunk+0x31
0xffffd20374eca928 : 0xfffff807659478dc : nt!SeCaptureAtomTableCallout+0x4c
0xffffd20374eca930 : 0xffffa70fb66c2060 : !da "*SYSTEM*"
0xffffd20374eca968 : 0xffffb89e9667fb50 : win32kbase!xxxCreateSystemThreads
0xffffd20374eca998 : 0xffffb89e97c74a21 : win32kfull!NtUserCallNoParam+0x71
0xffffd20374eca9c8 : 0xffffb89e96b4474e : win32k!NtUserCallNoParam+0x16
0xffffd20374eca9f8 : 0xfffff80765a092b5 : nt!KiSystemServiceCopyEnd+0x25
0xffffd20374ecaa00 : 0xffffbe0500000005 : Trap @ ffffd20374ecaa00
fffff807`73750000 fffff807`756c3000 [HI]nvlddmkm[/HI] T (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_1c83a5d7cffd7bff\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: [HI]Thu Oct 1 05:08:42 2020[/HI] (5F75564A)