************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 44 Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\072125-9718-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (32 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Kernel base = 0xfffff806`e0400000 PsLoadedModuleList = 0xfffff806`e12f4aa0 Debug session time: Mon Jul 21 13:05:47.371 2025 (UTC + 8:00) System Uptime: 0 days 0:05:07.018 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .................. Loading User Symbols PEB is paged out (Peb.Ldr = 00000016`2722b018). Type ".hh dbgerr001" for details Loading unloaded module list ......... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff806`e0900a70 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8b8d`57e0cd40=000000000000003b 0: kd> !analyze -v Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .................. Loading User Symbols PEB is paged out (Peb.Ldr = 00000016`2722b018). Type ".hh dbgerr001" for details Loading unloaded module list ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff8067398ab01, Address of the instruction which caused the BugCheck Arg3: ffff8b8d57e0d680, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 890 Key : Analysis.Elapsed.mSec Value: 974 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 312 Key : Analysis.Init.Elapsed.mSec Value: 5659 Key : Analysis.Memory.CommitPeak.Mb Value: 112 Key : Analysis.Version.DbgEng Value: 10.0.27829.1001 Key : Analysis.Version.Description Value: 10.2503.24.01 amd64fre Key : Analysis.Version.Ext Value: 1.2503.24.1 Key : Bugcheck.Code.LegacyAPI Value: 0x3b Key : Bugcheck.Code.TargetModel Value: 0x3b Key : Dump.Attributes.AsUlong Value: 0x2180c Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.InsufficientDumpfileSize Value: 1 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Dump.Attributes.RequiredDumpfileSize Value: 0x8531c788 Key : Failure.Bucket Value: AV_fileinfo!FIStreamGetInfo Key : Failure.Exception.IP.Address Value: 0xfffff8067398ab01 Key : Failure.Exception.IP.Module Value: Ntfs Key : Failure.Exception.IP.Offset Value: 0x11ab01 Key : Failure.Hash Value: {4208bcc6-91e2-e73b-a278-6cd4f5d7c241} Key : Hypervisor.Enlightenments.ValueHex Value: 0x7417df84 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 55185662 Key : Hypervisor.Flags.ValueHex Value: 0x34a10fe Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 0x3f7 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8067398ab01 BUGCHECK_P3: ffff8b8d57e0d680 BUGCHECK_P4: 0 FILE_IN_CAB: 072125-9718-01.dmp DUMP_FILE_ATTRIBUTES: 0x2180c Insufficient Dumpfile Size Kernel Generated Triage Dump FAULTING_THREAD: ffffc50ba2bf5080 CONTEXT: ffff8b8d57e0d680 -- (.cxr 0xffff8b8d57e0d680) rax=00000000000b2a99 rbx=ffff8b8d57e0e250 rcx=df287cb391e10000 rdx=ffff8f0829126400 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8067398ab01 rsp=ffff8b8d57e0e0d0 rbp=ffffe68be5f04660 r8=ffffc50b81bdb0b1 r9=ffff8f0829126400 r10=0000000000000004 r11=ffff8b8d57e0de80 r12=0000000000000000 r13=ffff8b8d57e0e850 r14=0000000000000030 r15=ffffe68be5f04668 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 Ntfs!NtfsLookupInFileRecord+0xb1: fffff806`7398ab01 8b06 mov eax,dword ptr [rsi] ds:002b:00000000`00000000=???????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: SetupHost.exe STACK_TEXT: ffff8b8d`57e0e0d0 fffff806`739bccb8 : ffff8b8d`57e0e850 ffffe68b`e42761b0 ffffe68b`e5f047c0 ffffe68b`e4276000 : Ntfs!NtfsLookupInFileRecord+0xb1 ffff8b8d`57e0e160 fffff806`739bca7a : ffff8b8d`57e0e850 ffffe68b`e4276050 fffff806`73984080 ffff8b8d`57e0ebc4 : Ntfs!NtfsWalkUpTree+0x1f8 ffff8b8d`57e0e310 fffff806`739bc6ce : 00000000`00000000 ffff8b8d`57e0e4d0 ffffe68b`e4276050 fffff806`7202a978 : Ntfs!NtfsBuildNormalizedNameWithTxfIsolation+0x9a ffff8b8d`57e0e3a0 fffff806`739bc1c7 : ffffe68b`e42761b0 00000000`00000000 00000000`000000fc ffff8b8d`57e0e850 : Ntfs!NtfsBuildNormalizedNameWithSystemSpecialCases+0x11e ffff8b8d`57e0e400 fffff806`739b6a75 : ffff8b8d`57e0e850 ffffe68b`e4276050 ffffe68b`e42761b0 ffff8b8d`c00000d8 : Ntfs!NtfsQueryNameInfo+0x507 ffff8b8d`57e0e580 fffff806`739b6063 : ffff8b8d`57e0e850 ffffc50b`9e390560 ffff8b8d`57e0e801 ffff8b8d`000000f8 : Ntfs!NtfsCommonQueryInformation+0x485 ffff8b8d`57e0e700 fffff806`739b5ef0 : ffff8b8d`57e0e850 ffffc50b`9e390560 ffffc50b`9e390560 00000000`00000000 : Ntfs!NtfsFsdDispatchSwitch+0x153 ffff8b8d`57e0e830 fffff806`e06987ed : 00000000`000000fc fffff806`e06a8418 00000000`00000010 00000000`00000004 : Ntfs!NtfsFsdDispatchWait+0x40 ffff8b8d`57e0eb00 fffff806`7206cfd9 : ffffc50b`a481da40 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0xcd ffff8b8d`57e0eb40 fffff806`7206c895 : ffff8b8d`57e0ec60 ffffc50b`99dfd9b0 00000000`00000000 00000000`00000000 : FLTMGR!FltpGetFileName+0x1e9 ffff8b8d`57e0ec00 fffff806`7206bca8 : 00000000`00000000 ffff8b8d`57e00000 ffffc50b`99dfd9b0 fffff806`e062077e : FLTMGR!FltpGetNormalizedFileName+0x1d5 ffff8b8d`57e0ec80 fffff806`72030666 : ffffc50b`8dddfc28 ffffc50b`99dfd9b0 ffffc50b`a481da40 ffffc50b`99dfd9b0 : FLTMGR!FltpCreateFileNameInformation+0x248 ffff8b8d`57e0ecf0 fffff806`72030029 : ffff8b8d`57e0ee00 00000000`00008000 ffffc50b`a2aa5600 ffffc50b`a2aa5788 : FLTMGR!FltpGetFileNameInformation+0x5c6 ffff8b8d`57e0ed90 fffff806`73773f9c : ffffc50b`99dfd9b0 ffffe68b`e505cd60 00000000`00000001 ffffc50b`8dac28a0 : FLTMGR!FltGetFileNameInformation+0x209 ffff8b8d`57e0ee20 fffff806`7377340e : ffffc50b`a20f0998 ffff8b8d`57e0f008 ffff8b8d`57e0f300 fffff806`0005e3ce : fileinfo!FIStreamGetInfo+0x10c ffff8b8d`57e0ef00 fffff806`7201adda : ffffe68b`e505cd60 ffffc50b`a20f08b0 00000000`00000000 ffffc50b`00000000 : fileinfo!FIPostCreateCallback+0x23e ffff8b8d`57e0ef80 fffff806`72019c3f : ffffc50b`a20f0800 000000c8`00000000 ffffe68b`e00cddb8 00000000`00000000 : FLTMGR!FltpPerformPostCallbacksWorker+0xc5a ffff8b8d`57e0f110 fffff806`720261a6 : ffffc50b`a20f08b0 ffff8b8d`57e09000 00000000`00000008 00000000`00000000 : FLTMGR!FltpProcessIoCompletion+0x4f ffff8b8d`57e0f1a0 fffff806`7201d114 : 00000000`00000000 00000000`1000000c ffffc50b`a1eebed0 ffffc50b`a481da00 : FLTMGR!FltpPassThroughCompletionWorker+0x3a6 ffff8b8d`57e0f210 fffff806`720757fe : ffff8b8d`57e0f2e0 ffff8b8d`00000008 00000000`00000000 ffffc50b`a1eebed0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x3b4 ffff8b8d`57e0f2a0 fffff806`e06987ed : ffffc50b`a481da00 ffffc50b`8dabbd20 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x37e ffff8b8d`57e0f350 fffff806`e0c5ae25 : 00000000`00000005 ffff8b8d`57e0f640 ffffc50b`8dabbd20 ffffc50b`8dc799b0 : nt!IofCallDriver+0xcd ffff8b8d`57e0f390 fffff806`e0c58ef2 : fffff806`e0c5a740 00000000`00000040 ffff8b8d`57e0f640 ffff8b8d`57e0f788 : nt!IopParseDevice+0x6e5 ffff8b8d`57e0f540 fffff806`e0c56b81 : ffffc50b`a2f71a01 ffff8b8d`57e0f788 ffffc50b`00000040 ffffc50b`817ccb50 : nt!ObpLookupObjectName+0xe32 ffff8b8d`57e0f700 fffff806`e0d71efa : ffffc50b`00000000 ffffc50b`817ccb50 ffffc50b`9aaf57b0 00000000`00000001 : nt!ObOpenObjectByNameEx+0x201 ffff8b8d`57e0f850 fffff806`e0d71a69 : 00000016`27c7d688 00000000`c11d0080 00000016`27c7d710 00000016`27c7d6b8 : nt!IopCreateFile+0x47a ffff8b8d`57e0f920 fffff806`e0ab7c55 : 00000000`00000000 00000000`00000000 ffff8b8d`00000102 ffffc50b`9c0567e0 : nt!NtCreateFile+0x79 ffff8b8d`57e0f9b0 00007ffe`91b025a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000016`27c7d618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`91b025a4 SYMBOL_NAME: fileinfo!FIStreamGetInfo+10c MODULE_NAME: fileinfo IMAGE_NAME: fileinfo.sys IMAGE_VERSION: 10.0.26100.1150 STACK_COMMAND: .cxr 0xffff8b8d57e0d680 ; kb BUCKET_ID_FUNC_OFFSET: 10c FAILURE_BUCKET_ID: AV_fileinfo!FIStreamGetInfo OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {4208bcc6-91e2-e73b-a278-6cd4f5d7c241} Followup: MachineOwner --------- 0: kd> lmvm fileinfo Browse full module list start end module name fffff806`73760000 fffff806`7377d000 fileinfo (pdb symbols) C:\ProgramData\Dbg\sym\fileinfo.pdb\FF6CC0FCE09C827B62132DD1A2F93B9F1\fileinfo.pdb Loaded symbol image file: fileinfo.sys Mapped memory image file: C:\ProgramData\Dbg\sym\fileinfo.sys\E7D4AA871d000\fileinfo.sys Image path: fileinfo.sys Image name: fileinfo.sys Browse all global symbols functions data Symbol Reload Image was built with /Brepro flag. Timestamp: E7D4AA87 (This is a reproducible build file hash, not a timestamp) CheckSum: 00029659 ImageSize: 0001D000 File version: 10.0.26100.1150 Product version: 10.0.26100.1150 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.7 Driver File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: FileInfo.sys OriginalFilename: FileInfo.sys ProductVersion: 10.0.26100.1150 FileVersion: 10.0.26100.1150 (WinBuild.160101.0800) FileDescription: FileInfo Filter Driver LegalCopyright: © Microsoft Corporation. All rights reserved. 0: kd> .cxr 0xffff8b8d57e0d680 ; kb rax=00000000000b2a99 rbx=ffff8b8d57e0e250 rcx=df287cb391e10000 rdx=ffff8f0829126400 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8067398ab01 rsp=ffff8b8d57e0e0d0 rbp=ffffe68be5f04660 r8=ffffc50b81bdb0b1 r9=ffff8f0829126400 r10=0000000000000004 r11=ffff8b8d57e0de80 r12=0000000000000000 r13=ffff8b8d57e0e850 r14=0000000000000030 r15=ffffe68be5f04668 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 Ntfs!NtfsLookupInFileRecord+0xb1: fffff806`7398ab01 8b06 mov eax,dword ptr [rsi] ds:002b:00000000`00000000=???????? *** Stack trace for last set context - .thread/.cxr resets it # RetAddr : Args to Child : Call Site 00 fffff806`739bccb8 : ffff8b8d`57e0e850 ffffe68b`e42761b0 ffffe68b`e5f047c0 ffffe68b`e4276000 : Ntfs!NtfsLookupInFileRecord+0xb1 01 fffff806`739bca7a : ffff8b8d`57e0e850 ffffe68b`e4276050 fffff806`73984080 ffff8b8d`57e0ebc4 : Ntfs!NtfsWalkUpTree+0x1f8 02 fffff806`739bc6ce : 00000000`00000000 ffff8b8d`57e0e4d0 ffffe68b`e4276050 fffff806`7202a978 : Ntfs!NtfsBuildNormalizedNameWithTxfIsolation+0x9a 03 fffff806`739bc1c7 : ffffe68b`e42761b0 00000000`00000000 00000000`000000fc ffff8b8d`57e0e850 : Ntfs!NtfsBuildNormalizedNameWithSystemSpecialCases+0x11e 04 fffff806`739b6a75 : ffff8b8d`57e0e850 ffffe68b`e4276050 ffffe68b`e42761b0 ffff8b8d`c00000d8 : Ntfs!NtfsQueryNameInfo+0x507 05 fffff806`739b6063 : ffff8b8d`57e0e850 ffffc50b`9e390560 ffff8b8d`57e0e801 ffff8b8d`000000f8 : Ntfs!NtfsCommonQueryInformation+0x485 06 fffff806`739b5ef0 : ffff8b8d`57e0e850 ffffc50b`9e390560 ffffc50b`9e390560 00000000`00000000 : Ntfs!NtfsFsdDispatchSwitch+0x153 07 fffff806`e06987ed : 00000000`000000fc fffff806`e06a8418 00000000`00000010 00000000`00000004 : Ntfs!NtfsFsdDispatchWait+0x40 08 fffff806`7206cfd9 : ffffc50b`a481da40 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0xcd 09 fffff806`7206c895 : ffff8b8d`57e0ec60 ffffc50b`99dfd9b0 00000000`00000000 00000000`00000000 : FLTMGR!FltpGetFileName+0x1e9 0a fffff806`7206bca8 : 00000000`00000000 ffff8b8d`57e00000 ffffc50b`99dfd9b0 fffff806`e062077e : FLTMGR!FltpGetNormalizedFileName+0x1d5 0b fffff806`72030666 : ffffc50b`8dddfc28 ffffc50b`99dfd9b0 ffffc50b`a481da40 ffffc50b`99dfd9b0 : FLTMGR!FltpCreateFileNameInformation+0x248 0c fffff806`72030029 : ffff8b8d`57e0ee00 00000000`00008000 ffffc50b`a2aa5600 ffffc50b`a2aa5788 : FLTMGR!FltpGetFileNameInformation+0x5c6 0d fffff806`73773f9c : ffffc50b`99dfd9b0 ffffe68b`e505cd60 00000000`00000001 ffffc50b`8dac28a0 : FLTMGR!FltGetFileNameInformation+0x209 0e fffff806`7377340e : ffffc50b`a20f0998 ffff8b8d`57e0f008 ffff8b8d`57e0f300 fffff806`0005e3ce : fileinfo!FIStreamGetInfo+0x10c 0f fffff806`7201adda : ffffe68b`e505cd60 ffffc50b`a20f08b0 00000000`00000000 ffffc50b`00000000 : fileinfo!FIPostCreateCallback+0x23e 10 fffff806`72019c3f : ffffc50b`a20f0800 000000c8`00000000 ffffe68b`e00cddb8 00000000`00000000 : FLTMGR!FltpPerformPostCallbacksWorker+0xc5a 11 fffff806`720261a6 : ffffc50b`a20f08b0 ffff8b8d`57e09000 00000000`00000008 00000000`00000000 : FLTMGR!FltpProcessIoCompletion+0x4f 12 fffff806`7201d114 : 00000000`00000000 00000000`1000000c ffffc50b`a1eebed0 ffffc50b`a481da00 : FLTMGR!FltpPassThroughCompletionWorker+0x3a6 13 fffff806`720757fe : ffff8b8d`57e0f2e0 ffff8b8d`00000008 00000000`00000000 ffffc50b`a1eebed0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x3b4 14 fffff806`e06987ed : ffffc50b`a481da00 ffffc50b`8dabbd20 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x37e 15 fffff806`e0c5ae25 : 00000000`00000005 ffff8b8d`57e0f640 ffffc50b`8dabbd20 ffffc50b`8dc799b0 : nt!IofCallDriver+0xcd 16 fffff806`e0c58ef2 : fffff806`e0c5a740 00000000`00000040 ffff8b8d`57e0f640 ffff8b8d`57e0f788 : nt!IopParseDevice+0x6e5 17 fffff806`e0c56b81 : ffffc50b`a2f71a01 ffff8b8d`57e0f788 ffffc50b`00000040 ffffc50b`817ccb50 : nt!ObpLookupObjectName+0xe32 18 fffff806`e0d71efa : ffffc50b`00000000 ffffc50b`817ccb50 ffffc50b`9aaf57b0 00000000`00000001 : nt!ObOpenObjectByNameEx+0x201 19 fffff806`e0d71a69 : 00000016`27c7d688 00000000`c11d0080 00000016`27c7d710 00000016`27c7d6b8 : nt!IopCreateFile+0x47a 1a fffff806`e0ab7c55 : 00000000`00000000 00000000`00000000 ffff8b8d`00000102 ffffc50b`9c0567e0 : nt!NtCreateFile+0x79 1b 00007ffe`91b025a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 1c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`91b025a4