Thank you cybercore!
I did not install Virtual Server R2 2005 or Virtual PC 2004 on the machine, so I am not sure how to uninstall these.
I ran a Windows Update which contained several drivers including a Realtek device driver - hopefully that will resolve the issue.
I appreciate your time. Thank you,
Jared
[B]SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine
PROCESS_NAME: WMIADAP.exe (MS WMI Reverse Performance Adapter Maintenance Utility)
BugCheck 3B, {c0000005, fffff80002f5648c, fffff8800758de10, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+78 )[/B]
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-13556-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
Debug session time: Tue Dec 28 15:59:31.987 2010 (UTC - 5:00)
System Uptime: 0 days 0:41:40.671
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002ca12b3, fffff88007b5ff50, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
Followup: MachineOwner
---------
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ca12b3, Address of the instruction which caused the bugcheck
Arg3: fffff88007b5ff50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02ca12b3 488b09 mov rcx,qword ptr [rcx]
CONTEXT: fffff88007b5ff50 -- (.cxr 0xfffff88007b5ff50)
rax=0000000000010008 rbx=fffffa8013fa6010 rcx=0100612ecd1892f5
rdx=0100612ecd1892f5 rsi=0000000000000000 rdi=fffffa8017ddcd20
rip=fffff80002ca12b3 rsp=fffff88007b60920 rbp=fffff88007b60ca0
r8=0000000000005320 r9=0000000000000070 r10=0000000000000002
r11=0000000000000214 r12=0000000000010000 r13=fffffa80163885f0
r14=fffffa8016364060 r15=fffff880031db180
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
nt!IopCompleteRequest+0xae3:
fffff800`02ca12b3 488b09 mov rcx,qword ptr [rcx] ds:002b:0100612e`cd1892f5=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: sqlservr.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002ca12b3
STACK_TEXT:
fffff880`07b5f688 fffff800`02c80ca9 : 00000000`0000003b 00000000`c0000005 fffff800`02ca12b3 fffff880`07b5ff50 : nt!KeBugCheckEx
fffff880`07b5f690 fffff800`02c805fc : fffff880`07b606e8 fffff880`07b5ff50 00000000`00000000 fffff800`02cafc90 : nt!KiBugCheckDispatch+0x69
fffff880`07b5f7d0 fffff800`02ca740d : fffff800`02ea211c 00000000`00000000 fffff800`02c11000 fffff880`07b606e8 : nt!KiSystemServiceHandler+0x7c
fffff880`07b5f810 fffff800`02caea90 : fffff800`02dd11a0 fffff880`07b5f888 fffff880`07b606e8 fffff800`02c11000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`07b5f840 fffff800`02cbb9ef : fffff880`07b606e8 fffff880`07b5ff50 fffff880`00000000 fffffa80`17ddcd20 : nt!RtlDispatchException+0x410
fffff880`07b5ff20 fffff800`02c80d82 : fffff880`07b606e8 fffffa80`13fa6010 fffff880`07b60790 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`07b605b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`02c805fc b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-12495-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e86e50
Debug session time: Tue Dec 28 19:13:47.579 2010 (UTC - 5:00)
System Uptime: 0 days 1:41:36.875
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 48, {fffffa8013e06010, fffff80002d02530, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+3c1f0 )
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CANCEL_STATE_IN_COMPLETED_IRP (48)
This bugcheck indicates that an I/O Request Packet (IRP) that is to be
cancelled, has a cancel routine specified in it -- meaning that the packet
is in a state in which the packet can be cancelled -- however, the packet
no longer belongs to a driver, as it has entered I/O completion. This is
either a driver bug, or more than one driver is accessing the same packet,
which is not likely and much more difficult to find. The cancel routine
parameter will provide a clue as to which driver or stack is the culprit.
Arguments:
Arg1: fffffa8013e06010, Pointer to the IRP
Arg2: fffff80002d02530, Cancel routine set by the driver.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x48
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002d3476e to fffff80002cb9740
STACK_TEXT:
fffff880`080b6888 fffff800`02d3476e : 00000000`00000048 fffffa80`13e06010 fffff800`02d02530 00000000`00000000 : nt!KeBugCheckEx
fffff880`080b6890 fffff800`02f9f0b9 : fffff880`080b6c01 fffffa80`176e1f48 00000000`00000000 fffffa80`17625b30 : nt! ?? ::FNODOBFM::`string'+0x3c1f0
fffff880`080b68d0 fffff800`02f9ea2b : fffffa80`16306920 00000000`00000000 fffff880`080b6c20 00000000`00000000 : nt!IoCancelThreadIo+0x59
fffff880`080b6900 fffff800`02f77635 : 00000000`c0150014 00000000`00001700 00000000`78457300 00000000`00000000 : nt!PspExitThread+0x58b
fffff880`080b69c0 fffff800`02c961db : 00000000`00001660 00000000`000016a4 00000000`000016ac 00000000`000016b4 : nt!PsExitSpecialApc+0x1d
fffff880`080b69f0 fffff800`02c96620 : 00000000`0b745db0 fffff880`080b6a70 fffff800`02f7774c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`080b6a70 fffff800`02cb8a37 : fffffa80`176e1b60 00000000`031bf9c8 fffff880`080b6bc8 00000000`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`080b6bb0 00000000`7790030a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`031bf9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7790030a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+3c1f0
fffff800`02d3476e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+3c1f0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x48_nt!_??_::FNODOBFM::_string_+3c1f0
BUCKET_ID: X64_0x48_nt!_??_::FNODOBFM::_string_+3c1f0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-13868-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e46e50
Debug session time: Tue Dec 28 17:30:43.500 2010 (UTC - 5:00)
System Uptime: 0 days 1:29:39.780
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {2b0, 2, 0, fffff80002d3198c}
Probably caused by : ntkrnlmp.exe ( nt!PsCheckThreadCpuQuota+8c )
Followup: MachineOwner
---------
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000002b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002d3198c, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb10e0
00000000000002b0
CURRENT_IRQL: 2
FAULTING_IP:
nt!PsCheckThreadCpuQuota+8c
fffff800`02d3198c 394330 cmp dword ptr [rbx+30h],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: sidebar.exe
TRAP_FRAME: fffff88009025610 -- (.trap 0xfffff88009025610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=0000069600000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d3198c rsp=fffff880090257a0 rbp=fffff880031db180
r8=fffffa80137c6060 r9=0000000000000000 r10=0000000000000080
r11=00000000000f00ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
nt!PsCheckThreadCpuQuota+0x8c:
fffff800`02d3198c 394330 cmp dword ptr [rbx+30h],eax ds:58b8:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c78ca9 to fffff80002c79740
STACK_TEXT:
fffff880`090254c8 fffff800`02c78ca9 : 00000000`0000000a 00000000`000002b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`090254d0 fffff800`02c77920 : 00000000`00000000 00000000`00000280 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`09025610 fffff800`02d3198c : fffffa80`13bdfc20 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
fffff880`090257a0 fffff800`02c7fad2 : 00000000`00000001 fffff880`031db180 fffffa80`173894b0 fffffa80`137c6060 : nt!PsCheckThreadCpuQuota+0x8c
fffff880`090257d0 fffff800`02c7f5da : fffffa80`746c6644 fffff880`09025850 00000000`00000000 fffff800`02c7f900 : nt!SwapContext_PatchXRstor+0xec
fffff880`09025810 fffff800`02c80992 : ffffffff`fffffffe fffffa80`173894b0 00000000`0716f580 00000000`0000000a : nt!KiSwapContext+0x7a
fffff880`09025950 fffff800`02c842a1 : fffff880`09025ca0 fffffa80`173894b0 00000000`00000000 fffffa80`173895b8 : nt!KiCommitThreadWait+0x1d2
fffff880`090259e0 fffff800`02f74df7 : 00000000`00000000 fffff880`09025bc8 fffffa80`00000008 ffffbc35`00000000 : nt!KeRemoveQueueEx+0x301
fffff880`09025a90 fffff800`02c89aa6 : 00000000`00000000 fffff880`09025ba8 fffff880`09025bc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`09025b20 fffff800`02c78993 : fffffa80`173894b0 00000000`77244270 00000000`06836360 fffffa80`13fdd230 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`09025c20 00000000`7719165a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0716f798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7719165a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PsCheckThreadCpuQuota+8c
fffff800`02d3198c 394330 cmp dword ptr [rbx+30h],eax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PsCheckThreadCpuQuota+8c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!PsCheckThreadCpuQuota+8c
BUCKET_ID: X64_0xA_nt!PsCheckThreadCpuQuota+8c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-13197-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e3de50
Debug session time: Tue Dec 28 19:23:49.858 2010 (UTC - 5:00)
System Uptime: 0 days 0:04:46.542
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002f5648c, fffff8800758de10, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+78 )
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002f5648c, Address of the instruction which caused the bugcheck
Arg3: fffff8800758de10, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
nt!ObpQueryNameString+78
fffff800`02f5648c 4d8b92a0000000 mov r10,qword ptr [r10+0A0h]
CONTEXT: fffff8800758de10 -- (.cxr 0xfffff8800758de10)
rax=0000000000000040 rbx=fffffa8015652160 rcx=fffffa80156521d0
rdx=fffffa8013987000 rsi=0000000000000001 rdi=0000000000000000
rip=fffff80002f5648c rsp=fffff8800758e7e0 rbp=fffff8800758e940
r8=0000000000002000 r9=fffff8800758e958 r10=0000000000000000
r11=fffffa8013471402 r12=fffffa8013987000 r13=fffff80002c00000
r14=fffffa8013987000 r15=fffffa80156521a0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ObpQueryNameString+0x78:
fffff800`02f5648c 4d8b92a0000000 mov r10,qword ptr [r10+0A0h] ds:002b:00000000`000000a0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WMIADAP.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002f5648c
STACK_TEXT:
fffff880`0758e7e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpQueryNameString+0x78
FOLLOWUP_IP:
nt!ObpQueryNameString+78
fffff800`02f5648c 4d8b92a0000000 mov r10,qword ptr [r10+0A0h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpQueryNameString+78
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff8800758de10 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObpQueryNameString+78
BUCKET_ID: X64_0x3B_nt!ObpQueryNameString+78
Followup: MachineOwner
---------
start end module name
fffff880`03fb1000 fffff880`03fef000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f49000 fffff880`00fa0000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c09000 fffff880`02c93000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`019e6000 fffff880`019fc000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ff3000 fffff880`00ffe000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e8d000 fffff880`00e96000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01906000 fffff880`0190d000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f64000 fffff880`03f75000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05f68000 fffff880`05f86000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000 cdd cdd.dll unavailable (00000000)
fffff880`018d3000 fffff880`018fd000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cfd000 fffff880`00dbd000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0186d000 fffff880`0189d000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c9f000 fffff880`00cfd000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0118b000 fffff880`011fe000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`019d6000 fffff880`019e6000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05cff000 fffff880`05d0d000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ec3000 fffff880`03f46000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f46000 fffff880`03f64000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`019b2000 fffff880`019c1000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01200000 fffff880`01216000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`043dd000 fffff880`043ff000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05d19000 fffff880`05d22000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05d0d000 fffff880`05d19000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05d22000 fffff880`05d35000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05cf3000 fffff880`05cff000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10aa2000 fffff880`10b96000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`10b96000 fffff880`10bdc000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01119000 fffff880`0112d000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010cd000 fffff880`01119000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013e9000 fffff880`013f3000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01086000 fffff880`010c0000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`015ab000 fffff880`015f5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`031dc000 fffff800`03225000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`10bdc000 fffff880`10c00000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04344000 fffff880`043a0000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05c3b000 fffff880`05c54000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05c54000 fffff880`05c5c080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05c2d000 fffff880`05c3b000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05ea0000 fffff880`05f68000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f5000 fffff880`015fe000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03f9b000 fffff880`03fb1000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04260000 fffff880`0426f000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05c5d000 fffff880`05c6b000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc8000 fffff800`00bd2000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04280000 fffff880`042c3000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013be000 fffff880`013d8000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04200000 fffff880`04205200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05d66000 fffff880`05d7b000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05d43000 fffff880`05d66000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c47000 fffff880`00c8b000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`05d35000 fffff880`05d43000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0426f000 fffff880`0427e000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05c77000 fffff880`05c84000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dcd000 fffff880`00de7000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05f86000 fffff880`05f9e000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05f9e000 fffff880`05fcb000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05e00000 fffff880`05e4e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05e4e000 fffff880`05e71000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0196b000 fffff880`01976000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fa9000 fffff880`00fb3000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0112d000 fffff880`0118b000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02def000 fffff880`02dfa000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`014a3000 fffff880`014b5000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014b9000 fffff880`015ab000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01824000 fffff880`01830000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`01830000 fffff880`0185f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0432f000 fffff880`04344000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d07000 fffff880`02d16000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c93000 fffff880`02cd8000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01976000 fffff880`01987000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02de3000 fffff880`02def000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c00000 fffff800`031dc000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0121b000 fffff880`013be000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`05c6b000 fffff880`05c77000 NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
fffff880`018fd000 fffff880`01906000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10aa0000 fffff880`10aa1180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fe0e000 fffff880`10a9fe00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`02ce1000 fffff880`02d07000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e00000 fffff880`00e15000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fb3000 fffff880`00fe6000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e86000 fffff880`00e8d000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00dbd000 fffff880`00dcd000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d8000 fffff880`013e9000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06c9d000 fffff880`06d43000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`043a0000 fffff880`043dd000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c8b000 fffff880`00c9f000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`01800000 fffff880`01824000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`00c2a000 fffff880`00c45000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0421a000 fffff880`0423b000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0423b000 fffff880`04255000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d92000 fffff880`02de3000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04255000 fffff880`04260000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01950000 fffff880`01959000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`05e71000 fffff880`05e9f000 rdpdr rdpdr.sys Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`01959000 fffff880`01962000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01962000 fffff880`0196b000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`05d93000 fffff880`05dcb000 RDPWD RDPWD.SYS Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05d7b000 fffff880`05d93000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e67000 fffff880`03ebd000 Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`06d43000 fffff880`06d4e000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0149b000 fffff880`014a3000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07cd5000 fffff880`07d46000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`06c00000 fffff880`06c96000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06d8d000 fffff880`06df4000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06d4e000 fffff880`06d7b000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`0427e000 fffff880`0427f480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06d7b000 fffff880`06d8d000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019a5000 fffff880`019b2000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`06df4000 fffff880`06dff000 tdtcp tdtcp.sys Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`01987000 fffff880`019a5000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d7e000 fffff880`02d92000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00440000 fffff960`0044a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`05fcb000 fffff880`05fda000 tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`03f75000 fffff880`03f9b000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05c9f000 fffff880`05cf3000 udfs udfs.sys Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`042c3000 fffff880`042d5000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05c0e000 fffff880`05c2b000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05c2b000 fffff880`05c2cf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03e56000 fffff880`03e67000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042d5000 fffff880`0432f000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03e00000 fffff880`03e56000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05c84000 fffff880`05c9f000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0fe00000 fffff880`0fe0d000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fe6000 fffff880`00ff3000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0190d000 fffff880`0191b000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0191b000 fffff880`01940000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`02d31000 fffff880`02d7e000 vmm vmm.sys Tue Feb 12 06:38:20 2008 (47B1852C)
fffff880`019c1000 fffff880`019d6000 VMNetSrv VMNetSrv.sys Wed Jan 16 06:52:01 2008 (478DEFE1)
fffff880`0148b000 fffff880`0149b000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e15000 fffff880`00e2a000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d16000 fffff880`02d31000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01940000 fffff880`01950000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e96000 fffff880`00f3a000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f3a000 fffff880`00f49000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02cd8000 fffff880`02ce1000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`00390000 win32k win32k.sys Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`03fef000 fffff880`03ff8000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fa0000 fffff880`00fa9000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
Unloaded modules:
fffff880`0189d000 fffff880`018ab000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`018ab000 fffff880`018b7000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`018b7000 fffff880`018c0000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`018c0000 fffff880`018d3000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Thank you cybercore!
I did not install Virtual Server R2 2005 or Virtual PC 2004 on the machine, so I am not sure how to uninstall these.
I ran a Windows Update which contained several drivers including a Realtek device driver - hopefully that will resolve the issue.
I appreciate your time. Thank you,
Jared
BugCheck 3B, {c0000005, fffff800031bad9b, fffff880083a1d70, 0}
PROCESS_NAME: sidebar.exe
Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+2b )
BugCheck A, {230, 2, 0, fffff80002f7498c}
PROCESS_NAME: sqlservr.exe
Probably caused by : ntkrnlmp.exe ( nt!PsCheckThreadCpuQuota+8c )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031411-17487-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4e000 PsLoadedModuleList = 0xfffff800`0308be50
Debug session time: Fri Mar 11 22:56:53.604 2011 (UTC - 4:00)
System Uptime: 0 days 0:18:17.884
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031bad9b, fffff880083a1d70, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+2b )
Followup: MachineOwner
---------
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031bad9b, Address of the instruction which caused the bugcheck
Arg3: fffff880083a1d70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObDereferenceSecurityDescriptor+2b
fffff800`031bad9b f00fb14e10 lock cmpxchg dword ptr [rsi+10h],ecx
CONTEXT: fffff880083a1d70 -- (.cxr 0xfffff880083a1d70)
rax=00000000000b0000 rbx=0000000000000000 rcx=00000000000affff
rdx=0000000000000001 rsi=000000000007ffe0 rdi=0000000000000000
rip=fffff800031bad9b rsp=fffff880083a2740 rbp=fffffa8013706060
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff880083a2818 r12=0000000000000001 r13=fffffa80136b3a20
r14=fffffa80136b3b00 r15=fffff8a0030c5de0
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
nt!ObDereferenceSecurityDescriptor+0x2b:
fffff800`031bad9b f00fb14e10 lock cmpxchg dword ptr [rsi+10h],ecx ds:002b:00000000`0007fff0=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: sidebar.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800031bad9b
STACK_TEXT:
fffff880`083a2740 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x2b
FOLLOWUP_IP:
nt!ObDereferenceSecurityDescriptor+2b
fffff800`031bad9b f00fb14e10 lock cmpxchg dword ptr [rsi+10h],ecx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObDereferenceSecurityDescriptor+2b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff880083a1d70 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObDereferenceSecurityDescriptor+2b
BUCKET_ID: X64_0x3B_nt!ObDereferenceSecurityDescriptor+2b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031411-15787-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4c000 PsLoadedModuleList = 0xfffff800`03089e50
Debug session time: Mon Mar 14 16:08:46.248 2011 (UTC - 4:00)
System Uptime: 0 days 0:14:58.970
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {230, 2, 0, fffff80002f7498c}
Probably caused by : ntkrnlmp.exe ( nt!PsCheckThreadCpuQuota+8c )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000230, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f7498c, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f40e0
0000000000000230
CURRENT_IRQL: 2
FAULTING_IP:
nt!PsCheckThreadCpuQuota+8c
fffff800`02f7498c 394330 cmp dword ptr [rbx+30h],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: sqlservr.exe
TRAP_FRAME: fffff88003121b80 -- (.trap 0xfffff88003121b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000006
rdx=000002b600000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f7498c rsp=fffff88003121d10 rbp=fffff880030f9180
r8=fffffa80176a6060 r9=0000000000000000 r10=00000000000109b5
r11=0000000000027897 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
nt!PsCheckThreadCpuQuota+0x8c:
fffff800`02f7498c 394330 cmp dword ptr [rbx+30h],eax ds:41c0:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ebbca9 to fffff80002ebc740
STACK_TEXT:
fffff880`03121a38 fffff800`02ebbca9 : 00000000`0000000a 00000000`00000230 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03121a40 fffff800`02eba920 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03121b80 fffff800`02f7498c : fffff880`030fe140 fffffa80`133f9040 00000000`00000000 000002af`8bde4ae4 : nt!KiPageFault+0x260
fffff880`03121d10 fffff800`02ec2ad2 : fffff880`030fe140 fffff880`030f9180 00000000`00000000 fffffa80`176a6060 : nt!PsCheckThreadCpuQuota+0x8c
fffff880`03121d40 fffff800`02ec4f9d : fffff880`030f9180 fffff880`00000000 00000000`00000000 fffff800`02f75230 : nt!SwapContext_PatchXRstor+0xec
fffff880`03121d80 00000000`00000000 : fffff880`03122000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x10d
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PsCheckThreadCpuQuota+8c
fffff800`02f7498c 394330 cmp dword ptr [rbx+30h],eax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PsCheckThreadCpuQuota+8c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!PsCheckThreadCpuQuota+8c
BUCKET_ID: X64_0xA_nt!PsCheckThreadCpuQuota+8c
Followup: MachineOwner
---------
start end module name
fffff880`10bba000 fffff880`10bf8000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ed3000 fffff880`00f2a000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02ca2000 fffff880`02d2c000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fe10000 fffff880`0fe26000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`010dd000 fffff880`010e8000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`07400000 fffff880`0740b000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00fd8000 fffff880`00fe1000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`010b3000 fffff880`010dd000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`019cf000 fffff880`019d6000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`043bf000 fffff880`043d0000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06193000 fffff880`061b1000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000 cdd cdd.dll unavailable (00000000)
fffff880`0199c000 fffff880`019c6000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01936000 fffff880`01966000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d26000 fffff880`00d84000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0fe00000 fffff880`0fe10000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04c27000 fffff880`04c35000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0431e000 fffff880`043a1000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`043a1000 fffff880`043bf000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0430f000 fffff880`0431e000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01920000 fffff880`01936000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04d4d000 fffff880`04d6f000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`043f6000 fffff880`043ff000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04c35000 fffff880`04c41000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02c61000 fffff880`02c74000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04d92000 fffff880`04d9e000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`044db000 fffff880`045cf000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04400000 fffff880`04446000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01134000 fffff880`01148000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010e8000 fffff880`01134000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018e6000 fffff880`01920000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02e03000 fffff800`02e4c000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04446000 fffff880`0446a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04cb4000 fffff880`04d10000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04dba000 fffff880`04dd3000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04dd3000 fffff880`04ddb080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04dac000 fffff880`04dba000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`060cb000 fffff880`06193000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01497000 fffff880`014a0000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04200000 fffff880`04216000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04230000 fffff880`0423f000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04c0d000 fffff880`04c1b000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b99000 fffff800`00ba3000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0424e000 fffff880`04291000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04d6f000 fffff880`04d74200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02de0000 fffff880`02df5000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02c74000 fffff880`02c97000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cce000 fffff880`00d12000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04d9e000 fffff880`04dac000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0423f000 fffff880`0424e000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04c00000 fffff880`04c0d000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fbe000 fffff880`00fd8000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`061b1000 fffff880`061c9000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`061c9000 fffff880`061f6000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0645b000 fffff880`064a9000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`064a9000 fffff880`064cc000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01850000 fffff880`0185b000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f33000 fffff880`00f3d000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01148000 fffff880`011a6000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`04304000 fffff880`0430f000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01235000 fffff880`01247000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014a5000 fffff880`01597000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`044cd000 fffff880`044d9000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`060a0000 fffff880`060b3000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0fe4a000 fffff880`0fe79000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04c9f000 fffff880`04cb4000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02db6000 fffff880`02dc5000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d2c000 fffff880`02d71000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01597000 fffff880`015f7000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0185b000 fffff880`0186c000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`042f8000 fffff880`04304000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e4c000 fffff800`03428000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01258000 fffff880`013fb000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04c1b000 fffff880`04c27000 NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
fffff880`019c6000 fffff880`019cf000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b52000 fffff880`10b53180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fec0000 fffff880`10b51e00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`0604d000 fffff880`060a0000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d7a000 fffff880`02da0000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f7d000 fffff880`00f92000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f3d000 fffff880`00f70000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fa7000 fffff880`00fae000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fae000 fffff880`00fbe000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`064cc000 fffff880`06572000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04d10000 fffff880`04d4d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d12000 fffff880`00d26000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0fe26000 fffff880`0fe4a000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0fe79000 fffff880`0fe94000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0fe94000 fffff880`0feb5000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04216000 fffff880`04230000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`042a7000 fffff880`042f8000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0feb5000 fffff880`0fec0000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01835000 fffff880`0183e000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0750a000 fffff880`07538000 rdpdr rdpdr.sys Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`0183e000 fffff880`01847000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01847000 fffff880`01850000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`07552000 fffff880`0758a000 RDPWD RDPWD.SYS Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`01073000 fffff880`010ad000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`060b3000 fffff880`060cb000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`10b54000 fffff880`10bba000 Rt64win7 Rt64win7.sys Tue Nov 30 01:01:28 2010 (4CF49338)
fffff880`01475000 fffff880`0147f000 scmndisp scmndisp.sys Wed Jan 17 02:48:03 2007 (45ADD4B3)
fffff880`06572000 fffff880`0657d000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0148f000 fffff880`01497000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07474000 fffff880`0750a000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0740d000 fffff880`07474000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0657d000 fffff880`065aa000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`044d9000 fffff880`044da480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`065aa000 fffff880`065bc000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0188a000 fffff880`01897000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`07538000 fffff880`07543000 tdtcp tdtcp.sys Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`0186c000 fffff880`0188a000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c4d000 fffff880`02c61000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004e0000 fffff960`004ea000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`07543000 fffff880`07552000 tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`043d0000 fffff880`043f6000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04291000 fffff880`042a3000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04ddc000 fffff880`04df9000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04d90000 fffff880`04d91f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`045cf000 fffff880`045e0000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04c45000 fffff880`04c9f000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04477000 fffff880`044cd000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04d75000 fffff880`04d90000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0446a000 fffff880`04477000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f70000 fffff880`00f7d000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019d6000 fffff880`019e4000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01800000 fffff880`01825000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`02c00000 fffff880`02c4d000 vmm vmm.sys Tue Apr 07 09:25:54 2009 (49DB5462)
fffff880`045e9000 fffff880`045fe000 VMNetSrv VMNetSrv.sys Wed Jan 16 06:52:01 2008 (478DEFE1)
fffff880`0147f000 fffff880`0148f000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f92000 fffff880`00fa7000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d84000 fffff880`00de0000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011a6000 fffff880`011f2000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02da0000 fffff880`02db6000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02dc5000 fffff880`02de0000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01825000 fffff880`01835000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e20000 fffff880`00ec4000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ec4000 fffff880`00ed3000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d71000 fffff880`02d7a000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00380000 win32k win32k.sys unavailable (00000000)
fffff880`045e0000 fffff880`045e9000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f2a000 fffff880`00f33000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01897000 fffff880`018b8000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`0758a000 fffff880`075fb000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01966000 fffff880`01974000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01974000 fffff880`01980000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01980000 fffff880`01989000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01989000 fffff880`0199c000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Thank you cybercore!
The VMNetSrv.sys was removed the last time I had this issue, and was re-installed during a recent auto-update. I have removed it again and have added measures to avoid this in the future.