ADDITIONAL_DEBUG_TEXT:
You can run '.symfix; .reload' to try to fix the symbol path and load symbols.
MODULE_NAME: afd
FAULTING_MODULE: fffff8028e66d000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 509889c6
TRAP_FRAME: fffff88008be0cd0 -- (.trap 0xfffff88008be0cd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004d4b840 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff88008fb8860 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004a58c3f rsp=fffff88008be0e60 rbp=fffff88008be0ea0
r8=fffff88008be0e88 r9=0000000000000000 r10=fffffa8004adf528
r11=fffffa8004c1d7c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
afd+0x58c3f:
fffff880`04a58c3f ?? ???
Resetting default scope
EXCEPTION_RECORD: fffff88008be0c28 -- (.exr 0xfffff88008be0c28)
ExceptionAddress: fffff88004a58c3f (afd+0x0000000000058c3f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8028e6e7669 to fffff8028e6e8340
STACK_TEXT:
fffff880`08be0e60 fffffa80`04d78350 : 00000000`00000000 00000000`00000002 fffffa80`06188040 00000100`007f6cc1 : afd+0x58c3f
fffff880`08be0e68 00000000`00000000 : 00000000`00000002 fffffa80`06188040 00000100`007f6cc1 fffff880`08fb8678 : 0xfffffa80`04d78350
STACK_COMMAND: .trap 0xfffff88008be0cd0 ; kb
FOLLOWUP_IP:
afd+58c3f
fffff880`04a58c3f ?? ???
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: afd+58c3f
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: afd.sys
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
---------