Here is the new dump . Should i buy new ssd?
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*
Symbol information
Symbol search path is: SRV*C:\Windows\symbol_cache*
Symbol information
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.24000.amd64fre.win7sp1_ldr.171231-1547
Machine Name:
Kernel base = 0xfffff800`0324c000 PsLoadedModuleList = 0xfffff800`0348ba90
Debug session time: Sat Feb 10 19:35:47.104 2018 (UTC + 1:00)
System Uptime: 0 days 9:17:58.088
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffda018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a066f13554, 0, fffff88001457fd0, 5}
*** ERROR: Symbol file could not be found. Defaulted to export symbols for em006_64.dll -
*** ERROR: Module load completed but symbols could not be loaded for ehdrv.sys
Probably caused by : em006_64.dll ( em006_64!module_init_entry+ac7e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a066f13554, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88001457fd0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
READ_ADDRESS: fffff8a066f13554 Paged pool
FAULTING_IP:
Ntfs!memcmp+30
fffff880`01457fd0 8a01 mov al,byte ptr [rcx]
MM_INTERNAL_CODE: 5
IMAGE_NAME: em006_64.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 5a722660
FAULTING_MODULE: fffff88001449000 Ntfs
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: ekrn.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
TRAP_FRAME: fffff8800d05e9f0 -- (.trap 0xfffff8800d05e9f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800d05ee90 rbx=0000000000000000 rcx=fffff8a066f13554
rdx=ffffffffa21c24ba rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001457fd0 rsp=fffff8800d05eb88 rbp=00000000000000ea
r8=0000000000000004 r9=0000000000000000 r10=0000000000000017
r11=fffff8800d05ebd8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
Ntfs!memcmp+0x30:
fffff880`01457fd0 8a01 mov al,byte ptr [rcx] ds:fffff8a0`66f13554=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800033c43a6 to fffff800032f23a0
STACK_TEXT:
fffff880`0d05e898 fffff800`033c43a6 : 00000000`00000050 fffff8a0`66f13554 00000000`00000000 fffff880`0d05e9f0 : nt!KeBugCheckEx
fffff880`0d05e8a0 fffff800`032ffa8a : 00000000`00000000 fffff8a0`66f13554 00000000`00000000 fffff8a0`02f1a910 : nt!MmAccessFault+0x736
fffff880`0d05e9f0 fffff880`01457fd0 : fffff880`014f11c3 fffff880`0cf26960 fffff8a0`00372140 fffffa80`191bb180 : nt!KiPageFault+0x44a
fffff880`0d05eb88 fffff880`014f11c3 : fffff880`0cf26960 fffff8a0`00372140 fffffa80`191bb180 fffff880`0cf26b70 : Ntfs!memcmp+0x30
fffff880`0d05eb90 fffff880`014efb72 : fffffa80`1fd710f0 fffffa80`191bc358 fffff8a0`00372140 fffff8a0`02f2fa01 : Ntfs!NtfsFindPrefixHashEntry+0x2fa
fffff880`0d05ecc0 fffff880`014ee125 : fffffa80`1fd710f0 fffffa80`1eac6c60 fffff880`0d05ee90 fffff880`0d05eeb0 : Ntfs!NtfsFindStartingNode+0x452
fffff880`0d05ed90 fffff880`0145849d : fffffa80`1fd710f0 fffffa80`1eac6c60 fffff880`0cf26960 fffffa80`1da4c400 : Ntfs!NtfsCommonCreate+0x865
fffff880`0d05ef30 fffff800`032f5807 : fffff880`0cf268d0 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`0d05ef60 fffff800`032f57c8 : 00000000`00000000 fffff880`0d05f000 00000000`00000000 fffff800`03276207 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0cf26790 fffff800`03276207 : fffff8a0`02f2fe10 00000000`00000000 80000004`db006863 fffffa80`1da4c4a1 : nt!KiSwitchKernelStackContinue
fffff880`0cf267b0 fffff880`01458c1f : fffff880`01458480 fffff880`0cf268d0 fffffa80`1e9f1d01 fffff880`014f7b00 : nt!KeExpandKernelStackAndCalloutEx+0x437
fffff880`0cf268a0 fffff880`014f053c : 00000000`00000000 00000000`00000000 fffff880`0cf26b00 fffffa80`1eac6c60 : Ntfs!NtfsCommonCreateOnNewStack+0x4f
fffff880`0cf26900 fffff880`0100283f : fffffa80`191bb030 fffffa80`1eac6c60 00000000`00000000 00000000`00000000 : Ntfs!NtfsFsdCreate+0x1ac
fffff880`0cf26ab0 fffff880`010202b9 : fffffa80`1eac6c60 fffffa80`191b7010 fffffa80`1eac6c00 fffffa80`190a7de0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0cf26b40 fffff800`037397a2 : 00000000`00000005 00000000`00000040 fffffa80`1e107600 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`0cf26bf0 fffff800`03662554 : fffffa80`19060cd0 00000000`00000000 fffffa80`1de11450 00000000`00000701 : nt!IopParseDevice+0x14e2
fffff880`0cf26d50 fffff800`0354d076 : 00000000`00000000 fffff880`0cf26ed0 fffffa80`00000040 fffffa80`18babf30 : nt!ObpLookupObjectName+0x784
fffff880`0cf26e50 fffff800`03708708 : 00000000`00000001 00000000`00000000 fffffa80`656c6901 fffffa80`1eac6c60 : nt!ObOpenObjectByName+0x306
fffff880`0cf26f20 fffff800`0359973a : 00000000`068ae180 fffff800`00100001 00000000`068ae2c0 00000000`00000000 : nt!IopCreateFile+0xa08
fffff880`0cf26fd0 fffff880`041ae3ae : 00000000`068ae530 fffff880`0cf27200 00000000`00000000 00000000`068ae300 : nt!IoCreateFile+0x8a
fffff880`0cf27060 fffff880`041a71f1 : fffff880`0cf276f8 00000000`068ae180 00000000`00000000 fffff880`0cf27350 : em006_64!module_init_entry+0xac7e
fffff880`0cf27100 fffff880`041a36c3 : 00000000`068ae180 00000000`004b3064 fffffa80`190bad70 00000000`0000004c : em006_64!module_init_entry+0x3ac1
fffff880`0cf276a0 fffff880`0418589d : fffffa80`00002134 00000000`068ae180 00000000`0000004c 00000000`068ae180 : em006_64+0x16c3
fffff880`0cf276f0 fffff880`04180f7e : 00001e73`00000005 fffffa80`1e589460 00000000`068ae180 00000000`0000004c : ehdrv+0x1b89d
fffff880`0cf27740 fffff880`04180e0a : fffff880`0cf278a0 fffffa80`190bad70 fffff683`ff7a74e0 fffff800`032b1a27 : ehdrv+0x16f7e
fffff880`0cf277a0 fffff880`04180d88 : fffff880`0cf278a0 fffff880`0cf27b60 00000000`068ae180 00000000`0000004c : ehdrv+0x16e0a
fffff880`0cf27820 fffff880`041914b7 : 00000000`0000025c fffff800`0354e735 fffffa80`0e191200 000007fe`00000000 : ehdrv+0x16d88
fffff880`0cf27860 fffff800`0370a6ee : fffffa80`1bda8f20 00000000`00000000 00000000`00000000 00000000`068ae170 : ehdrv+0x274b7
fffff880`0cf278c0 fffff800`0359de26 : 00000000`00000090 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x6be
fffff880`0cf27a00 fffff800`03302283 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`068ae368 : nt!NtDeviceIoControlFile+0x56
fffff880`0cf27a70 00000000`770a991a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`068ae118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770a991a
STACK_COMMAND: kb
FOLLOWUP_IP:
em006_64!module_init_entry+ac7e
fffff880`041ae3ae e983010000 jmp em006_64!module_init_entry+0xae06 (fffff880`041ae536)
SYMBOL_STACK_INDEX: 14
SYMBOL_NAME: em006_64!module_init_entry+ac7e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: em006_64
IMAGE_VERSION: 0.0.1175.0
FAILURE_BUCKET_ID: X64_0x50_em006_64!module_init_entry+ac7e
BUCKET_ID: X64_0x50_em006_64!module_init_entry+ac7e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_em006_64!module_init_entry+ac7e
FAILURE_ID_HASH: {13fb2f1e-7c73-7eb6-410b-7a4b6f1adc2c}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a066f13554, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88001457fd0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
READ_ADDRESS: fffff8a066f13554 Paged pool
FAULTING_IP:
Ntfs!memcmp+30
fffff880`01457fd0 8a01 mov al,byte ptr [rcx]
MM_INTERNAL_CODE: 5
IMAGE_NAME: em006_64.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 5a722660
FAULTING_MODULE: fffff88001449000 Ntfs
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: ekrn.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
TRAP_FRAME: fffff8800d05e9f0 -- (.trap 0xfffff8800d05e9f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800d05ee90 rbx=0000000000000000 rcx=fffff8a066f13554
rdx=ffffffffa21c24ba rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001457fd0 rsp=fffff8800d05eb88 rbp=00000000000000ea
r8=0000000000000004 r9=0000000000000000 r10=0000000000000017
r11=fffff8800d05ebd8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
Ntfs!memcmp+0x30:
fffff880`01457fd0 8a01 mov al,byte ptr [rcx] ds:fffff8a0`66f13554=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800033c43a6 to fffff800032f23a0
STACK_TEXT:
fffff880`0d05e898 fffff800`033c43a6 : 00000000`00000050 fffff8a0`66f13554 00000000`00000000 fffff880`0d05e9f0 : nt!KeBugCheckEx
fffff880`0d05e8a0 fffff800`032ffa8a : 00000000`00000000 fffff8a0`66f13554 00000000`00000000 fffff8a0`02f1a910 : nt!MmAccessFault+0x736
fffff880`0d05e9f0 fffff880`01457fd0 : fffff880`014f11c3 fffff880`0cf26960 fffff8a0`00372140 fffffa80`191bb180 : nt!KiPageFault+0x44a
fffff880`0d05eb88 fffff880`014f11c3 : fffff880`0cf26960 fffff8a0`00372140 fffffa80`191bb180 fffff880`0cf26b70 : Ntfs!memcmp+0x30
fffff880`0d05eb90 fffff880`014efb72 : fffffa80`1fd710f0 fffffa80`191bc358 fffff8a0`00372140 fffff8a0`02f2fa01 : Ntfs!NtfsFindPrefixHashEntry+0x2fa
fffff880`0d05ecc0 fffff880`014ee125 : fffffa80`1fd710f0 fffffa80`1eac6c60 fffff880`0d05ee90 fffff880`0d05eeb0 : Ntfs!NtfsFindStartingNode+0x452
fffff880`0d05ed90 fffff880`0145849d : fffffa80`1fd710f0 fffffa80`1eac6c60 fffff880`0cf26960 fffffa80`1da4c400 : Ntfs!NtfsCommonCreate+0x865
fffff880`0d05ef30 fffff800`032f5807 : fffff880`0cf268d0 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`0d05ef60 fffff800`032f57c8 : 00000000`00000000 fffff880`0d05f000 00000000`00000000 fffff800`03276207 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0cf26790 fffff800`03276207 : fffff8a0`02f2fe10 00000000`00000000 80000004`db006863 fffffa80`1da4c4a1 : nt!KiSwitchKernelStackContinue
fffff880`0cf267b0 fffff880`01458c1f : fffff880`01458480 fffff880`0cf268d0 fffffa80`1e9f1d01 fffff880`014f7b00 : nt!KeExpandKernelStackAndCalloutEx+0x437
fffff880`0cf268a0 fffff880`014f053c : 00000000`00000000 00000000`00000000 fffff880`0cf26b00 fffffa80`1eac6c60 : Ntfs!NtfsCommonCreateOnNewStack+0x4f
fffff880`0cf26900 fffff880`0100283f : fffffa80`191bb030 fffffa80`1eac6c60 00000000`00000000 00000000`00000000 : Ntfs!NtfsFsdCreate+0x1ac
fffff880`0cf26ab0 fffff880`010202b9 : fffffa80`1eac6c60 fffffa80`191b7010 fffffa80`1eac6c00 fffffa80`190a7de0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0cf26b40 fffff800`037397a2 : 00000000`00000005 00000000`00000040 fffffa80`1e107600 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`0cf26bf0 fffff800`03662554 : fffffa80`19060cd0 00000000`00000000 fffffa80`1de11450 00000000`00000701 : nt!IopParseDevice+0x14e2
fffff880`0cf26d50 fffff800`0354d076 : 00000000`00000000 fffff880`0cf26ed0 fffffa80`00000040 fffffa80`18babf30 : nt!ObpLookupObjectName+0x784
fffff880`0cf26e50 fffff800`03708708 : 00000000`00000001 00000000`00000000 fffffa80`656c6901 fffffa80`1eac6c60 : nt!ObOpenObjectByName+0x306
fffff880`0cf26f20 fffff800`0359973a : 00000000`068ae180 fffff800`00100001 00000000`068ae2c0 00000000`00000000 : nt!IopCreateFile+0xa08
fffff880`0cf26fd0 fffff880`041ae3ae : 00000000`068ae530 fffff880`0cf27200 00000000`00000000 00000000`068ae300 : nt!IoCreateFile+0x8a
fffff880`0cf27060 fffff880`041a71f1 : fffff880`0cf276f8 00000000`068ae180 00000000`00000000 fffff880`0cf27350 : em006_64!module_init_entry+0xac7e
fffff880`0cf27100 fffff880`041a36c3 : 00000000`068ae180 00000000`004b3064 fffffa80`190bad70 00000000`0000004c : em006_64!module_init_entry+0x3ac1
fffff880`0cf276a0 fffff880`0418589d : fffffa80`00002134 00000000`068ae180 00000000`0000004c 00000000`068ae180 : em006_64+0x16c3
fffff880`0cf276f0 fffff880`04180f7e : 00001e73`00000005 fffffa80`1e589460 00000000`068ae180 00000000`0000004c : ehdrv+0x1b89d
fffff880`0cf27740 fffff880`04180e0a : fffff880`0cf278a0 fffffa80`190bad70 fffff683`ff7a74e0 fffff800`032b1a27 : ehdrv+0x16f7e
fffff880`0cf277a0 fffff880`04180d88 : fffff880`0cf278a0 fffff880`0cf27b60 00000000`068ae180 00000000`0000004c : ehdrv+0x16e0a
fffff880`0cf27820 fffff880`041914b7 : 00000000`0000025c fffff800`0354e735 fffffa80`0e191200 000007fe`00000000 : ehdrv+0x16d88
fffff880`0cf27860 fffff800`0370a6ee : fffffa80`1bda8f20 00000000`00000000 00000000`00000000 00000000`068ae170 : ehdrv+0x274b7
fffff880`0cf278c0 fffff800`0359de26 : 00000000`00000090 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x6be
fffff880`0cf27a00 fffff800`03302283 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`068ae368 : nt!NtDeviceIoControlFile+0x56
fffff880`0cf27a70 00000000`770a991a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`068ae118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770a991a
STACK_COMMAND: kb
FOLLOWUP_IP:
em006_64!module_init_entry+ac7e
fffff880`041ae3ae e983010000 jmp em006_64!module_init_entry+0xae06 (fffff880`041ae536)
SYMBOL_STACK_INDEX: 14
SYMBOL_NAME: em006_64!module_init_entry+ac7e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: em006_64
IMAGE_VERSION: 0.0.1175.0
FAILURE_BUCKET_ID: X64_0x50_em006_64!module_init_entry+ac7e
BUCKET_ID: X64_0x50_em006_64!module_init_entry+ac7e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_em006_64!module_init_entry+ac7e
FAILURE_ID_HASH: {13fb2f1e-7c73-7eb6-410b-7a4b6f1adc2c}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a066f13554, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88001457fd0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
READ_ADDRESS: fffff8a066f13554 Paged pool
FAULTING_IP:
Ntfs!memcmp+30
fffff880`01457fd0 8a01 mov al,byte ptr [rcx]
MM_INTERNAL_CODE: 5
IMAGE_NAME: em006_64.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 5a722660
FAULTING_MODULE: fffff88001449000 Ntfs
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: ekrn.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
TRAP_FRAME: fffff8800d05e9f0 -- (.trap 0xfffff8800d05e9f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800d05ee90 rbx=0000000000000000 rcx=fffff8a066f13554
rdx=ffffffffa21c24ba rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001457fd0 rsp=fffff8800d05eb88 rbp=00000000000000ea
r8=0000000000000004 r9=0000000000000000 r10=0000000000000017
r11=fffff8800d05ebd8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
Ntfs!memcmp+0x30:
fffff880`01457fd0 8a01 mov al,byte ptr [rcx] ds:fffff8a0`66f13554=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800033c43a6 to fffff800032f23a0
STACK_TEXT:
fffff880`0d05e898 fffff800`033c43a6 : 00000000`00000050 fffff8a0`66f13554 00000000`00000000 fffff880`0d05e9f0 : nt!KeBugCheckEx
fffff880`0d05e8a0 fffff800`032ffa8a : 00000000`00000000 fffff8a0`66f13554 00000000`00000000 fffff8a0`02f1a910 : nt!MmAccessFault+0x736
fffff880`0d05e9f0 fffff880`01457fd0 : fffff880`014f11c3 fffff880`0cf26960 fffff8a0`00372140 fffffa80`191bb180 : nt!KiPageFault+0x44a
fffff880`0d05eb88 fffff880`014f11c3 : fffff880`0cf26960 fffff8a0`00372140 fffffa80`191bb180 fffff880`0cf26b70 : Ntfs!memcmp+0x30
fffff880`0d05eb90 fffff880`014efb72 : fffffa80`1fd710f0 fffffa80`191bc358 fffff8a0`00372140 fffff8a0`02f2fa01 : Ntfs!NtfsFindPrefixHashEntry+0x2fa
fffff880`0d05ecc0 fffff880`014ee125 : fffffa80`1fd710f0 fffffa80`1eac6c60 fffff880`0d05ee90 fffff880`0d05eeb0 : Ntfs!NtfsFindStartingNode+0x452
fffff880`0d05ed90 fffff880`0145849d : fffffa80`1fd710f0 fffffa80`1eac6c60 fffff880`0cf26960 fffffa80`1da4c400 : Ntfs!NtfsCommonCreate+0x865
fffff880`0d05ef30 fffff800`032f5807 : fffff880`0cf268d0 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`0d05ef60 fffff800`032f57c8 : 00000000`00000000 fffff880`0d05f000 00000000`00000000 fffff800`03276207 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0cf26790 fffff800`03276207 : fffff8a0`02f2fe10 00000000`00000000 80000004`db006863 fffffa80`1da4c4a1 : nt!KiSwitchKernelStackContinue
fffff880`0cf267b0 fffff880`01458c1f : fffff880`01458480 fffff880`0cf268d0 fffffa80`1e9f1d01 fffff880`014f7b00 : nt!KeExpandKernelStackAndCalloutEx+0x437
fffff880`0cf268a0 fffff880`014f053c : 00000000`00000000 00000000`00000000 fffff880`0cf26b00 fffffa80`1eac6c60 : Ntfs!NtfsCommonCreateOnNewStack+0x4f
fffff880`0cf26900 fffff880`0100283f : fffffa80`191bb030 fffffa80`1eac6c60 00000000`00000000 00000000`00000000 : Ntfs!NtfsFsdCreate+0x1ac
fffff880`0cf26ab0 fffff880`010202b9 : fffffa80`1eac6c60 fffffa80`191b7010 fffffa80`1eac6c00 fffffa80`190a7de0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0cf26b40 fffff800`037397a2 : 00000000`00000005 00000000`00000040 fffffa80`1e107600 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`0cf26bf0 fffff800`03662554 : fffffa80`19060cd0 00000000`00000000 fffffa80`1de11450 00000000`00000701 : nt!IopParseDevice+0x14e2
fffff880`0cf26d50 fffff800`0354d076 : 00000000`00000000 fffff880`0cf26ed0 fffffa80`00000040 fffffa80`18babf30 : nt!ObpLookupObjectName+0x784
fffff880`0cf26e50 fffff800`03708708 : 00000000`00000001 00000000`00000000 fffffa80`656c6901 fffffa80`1eac6c60 : nt!ObOpenObjectByName+0x306
fffff880`0cf26f20 fffff800`0359973a : 00000000`068ae180 fffff800`00100001 00000000`068ae2c0 00000000`00000000 : nt!IopCreateFile+0xa08
fffff880`0cf26fd0 fffff880`041ae3ae : 00000000`068ae530 fffff880`0cf27200 00000000`00000000 00000000`068ae300 : nt!IoCreateFile+0x8a
fffff880`0cf27060 fffff880`041a71f1 : fffff880`0cf276f8 00000000`068ae180 00000000`00000000 fffff880`0cf27350 : em006_64!module_init_entry+0xac7e
fffff880`0cf27100 fffff880`041a36c3 : 00000000`068ae180 00000000`004b3064 fffffa80`190bad70 00000000`0000004c : em006_64!module_init_entry+0x3ac1
fffff880`0cf276a0 fffff880`0418589d : fffffa80`00002134 00000000`068ae180 00000000`0000004c 00000000`068ae180 : em006_64+0x16c3
fffff880`0cf276f0 fffff880`04180f7e : 00001e73`00000005 fffffa80`1e589460 00000000`068ae180 00000000`0000004c : ehdrv+0x1b89d
fffff880`0cf27740 fffff880`04180e0a : fffff880`0cf278a0 fffffa80`190bad70 fffff683`ff7a74e0 fffff800`032b1a27 : ehdrv+0x16f7e
fffff880`0cf277a0 fffff880`04180d88 : fffff880`0cf278a0 fffff880`0cf27b60 00000000`068ae180 00000000`0000004c : ehdrv+0x16e0a
fffff880`0cf27820 fffff880`041914b7 : 00000000`0000025c fffff800`0354e735 fffffa80`0e191200 000007fe`00000000 : ehdrv+0x16d88
fffff880`0cf27860 fffff800`0370a6ee : fffffa80`1bda8f20 00000000`00000000 00000000`00000000 00000000`068ae170 : ehdrv+0x274b7
fffff880`0cf278c0 fffff800`0359de26 : 00000000`00000090 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x6be
fffff880`0cf27a00 fffff800`03302283 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`068ae368 : nt!NtDeviceIoControlFile+0x56
fffff880`0cf27a70 00000000`770a991a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`068ae118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770a991a
STACK_COMMAND: kb
FOLLOWUP_IP:
em006_64!module_init_entry+ac7e
fffff880`041ae3ae e983010000 jmp em006_64!module_init_entry+0xae06 (fffff880`041ae536)
SYMBOL_STACK_INDEX: 14
SYMBOL_NAME: em006_64!module_init_entry+ac7e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: em006_64
IMAGE_VERSION: 0.0.1175.0
FAILURE_BUCKET_ID: X64_0x50_em006_64!module_init_entry+ac7e
BUCKET_ID: X64_0x50_em006_64!module_init_entry+ac7e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_em006_64!module_init_entry+ac7e
FAILURE_ID_HASH: {13fb2f1e-7c73-7eb6-410b-7a4b6f1adc2c}
Followup: MachineOwner