0: kd> !analyze -v Connected to Windows 1019041x64 target at(Wed Jan 2621:19:31.6582022 (UTC + 8:00)), ptr64 TRUE Loading Kernel Symbols ............................... Press ctrl-c(cdb, kd, ntsd)or ctrl-break(windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ................................ ................................................................ ................................................................ .... Loading User Symbols Loading unloaded module list .........Unable to enumerate user-mode unloaded modules, Win32 error 0n30 ************* Symbol Loading Error Summary ************** Module name Error SharedUserData No error - symbol load deferred You can troubleshoot most symbol related issues by turning on symbol loading diagnostics(!sym noisy)and repeating the command that caused symbols to be loaded. You should also verify that your symbol search path(.sympath) is correct. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* CRITICAL_STRUCTURE_CORRUPTION(109) This BugCheck is generated when the kernel detects that critical kernel code or data have been corrupted. There are generally three causes for a corruption: 1) A driver has inadvertently or deliberately modified critical kernel code or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx 2) A developer attempted to set a normal kernel breakpoint using a kernel debugger that was not attached when the system was booted. Normal breakpoints, "bp", can only be set if the debugger is attached at boot time. Hardware breakpoints, "ba", can be set at any time. 3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data. Arguments: Arg1: a3a00165d018d636, Reserved Arg2: b3b70dec229951b6, Reserved Arg3: fffff80556821c00, Failure type dependent information Arg4: 0000000000000001, Type of corrupted region, can be 0 : A generic data region 1 : Modification of a function or .pdata 2 : A processor IDT 3 : A processor GDT 4 : Type 1 process list corruption 5 : Type 2 process list corruption 6 : Debug routine modification 7 : Critical MSR modification 8 : Object type 9 : A processor IVT a : Modification of a system service function b : A generic session data region c : Modification of a session function or .pdata d : Modification of an import table e : Modification of a session import table f : Ps Win32 callout modification 10 : Debug switch routine modification 11 : IRP allocator modification 12 : Driver call dispatcher modification 13 : IRP completion dispatcher modification 14 : IRP deallocator modification 15 : A processor control register 16 : Critical floating point control register modification 17 : Local APIC modification 18 : Kernel notification callout modification 19 : Loaded module list modification 1a : Type 3 process list corruption 1b : Type 4 process list corruption 1c : Driver object corruption 1d : Executive callback object modification 1e : Modification of module padding 1f : Modification of a protected process 20 : A generic data region 21 : A page hash mismatch 22 : A session page hash mismatch 23 : Load config directory modification 24 : Inverted function table modification 25 : Session configuration modification 26 : An extended processor control register 27 : Type 1 pool corruption 28 : Type 2 pool corruption 29 : Type 3 pool corruption 2a : Type 4 pool corruption 2b : Modification of a function or .pdata 2c : Image integrity corruption 2d : Processor misconfiguration 2e : Type 5 process list corruption 2f : Process shadow corruption 30 : Retpoline code page corruption 101 : General pool corruption 102 : Modification of win32k.sys Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4921 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 9716 Key : Analysis.Init.CPU.mSec Value: 104374 Key : Analysis.Init.Elapsed.mSec Value: 7997335 Key : Analysis.Memory.CommitPeak.Mb Value: 159 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 109 BUGCHECK_P1: a3a00165d018d636 BUGCHECK_P2: b3b70dec229951b6 BUGCHECK_P3: fffff80556821c00 BUGCHECK_P4: 1 PROCESS_NAME: System STACK_TEXT: ffffef8f`dd527678 fffff805`599129c2 : ffffef8f`dd5277e0 fffff805`5977d2e0 00000000`0000010000000000`00000000 : nt!DbgBreakPointWithStatus ffffef8f`dd527680 fffff805`59911fa6 : 00000000`00000003 ffffef8f`dd5277e0 fffff805`5980bfb0 00000000`00000109 : nt!KiBugCheckDebugBreak+0x12 ffffef8f`dd5276e0 fffff805`597f71d7 : ffffc20d`3e50214e ffffef8f`dd527f30 00000000`00000000 ffffc20d`3e50f0a8 : nt!KeBugCheck2+0x946 ffffef8f`dd527df0 00000000`00000000 : 00000000`00000109 a3a00165`d018d636 b3b70dec`229951b6 fffff805`56821c00 : nt!KeBugCheckEx+0x107 SYMBOL_NAME: BPCOUNT_NONZERO MODULE_NAME: BPCOUNT_NONZERO IMAGE_NAME: BPCOUNT_NONZERO STACK_COMMAND: .cxr; .ecxr ; kb