Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\Temp\Rar$DI00.250\Mini111710-09.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_qfe.100427-1650
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b1c0
Debug session time: Wed Nov 17 11:08:10.218 2010 (UTC - 5:00)
System Uptime: 0 days 0:03:10.774
Loading Kernel Symbols
...............................................................
.......................................
Loading User Symbols
Loading unloaded module list
.................................................
Unable to load image SiSGRV.dll, Win32 error 0n2
*** WARNING: Unable to verify timestamp for SiSGRV.dll
*** ERROR: Module load completed but symbols could not be loaded for SiSGRV.dll
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, bf054c76, f04f8b3c, 0}
Probably caused by : SiSGRV.dll ( SiSGRV+42c76 )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: bf054c76, The address that the exception occurred at
Arg3: f04f8b3c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
SiSGRV+42c76
bf054c76 8b848684000000 mov eax,dword ptr [esi+eax*4+84h]
TRAP_FRAME: f04f8b3c -- (.trap 0xfffffffff04f8b3c)
ErrCode = 00000000
eax=00000001 ebx=00000000 ecx=00000000 edx=000816b2 esi=e12c7010 edi=00060000
eip=bf054c76 esp=f04f8bb0 ebp=00000004 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
SiSGRV+0x42c76:
bf054c76 8b848684000000 mov eax,dword ptr [esi+eax*4+84h] ds:0023:e12c7098=00000000
Resetting default scope
CUSTOMER_CRASH_COUNT: 9
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: speed.exe
LAST_CONTROL_TRANSFER: from f7836622 to bf054c76
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
f04f8c1c f7836622 f04f8ce4 e11a2b00 00000000 SiSGRV+0x42c76
f04f8c68 bf000663 f04f8ce4 f04f8d64 0013fd54 watchdog!WdEnterMonitoredSection+0x10
f04f8d40 804de7ec 02400ef8 02400c87 001c76e0 dxg!DxD3dDrawPrimitives2+0x1b9
f04f8d40 7c90e514 02400ef8 02400c87 001c76e0 nt!KiFastCallEntry+0xf8
0013fd64 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
SiSGRV+42c76
bf054c76 8b848684000000 mov eax,dword ptr [esi+eax*4+84h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: SiSGRV+42c76
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: SiSGRV
IMAGE_NAME: SiSGRV.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 40a4a09d
FAILURE_BUCKET_ID: 0x8E_SiSGRV+42c76
BUCKET_ID: 0x8E_SiSGRV+42c76
Followup: MachineOwner
---------