Neto Junior
New Member
- Joined
- Jan 29, 2011
- Messages
- 10
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012911-38797-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
Debug session time: Sat Jan 29 01:34:11.208 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:58.112
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff80002aa9d29}
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002aa9d29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d050e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`02aa9d29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88002f1b610 -- (.trap 0xfffff88002f1b610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80024af528 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aa9d29 rsp=fffff88002f1b7a0 rbp=fffff880009e4180
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`02aa9d29 488b5108 mov rdx,qword ptr [rcx+8] ds:0004:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002accca9 to fffff80002acd740
STACK_TEXT:
fffff880`02f1b4c8 fffff800`02accca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1b4d0 fffff800`02acb920 : 00000000`00000001 fffffa80`03fbeb60 fffffa80`025196a8 fffff880`00e1b656 : nt!KiBugCheckDispatch+0x69
fffff880`02f1b610 fffff800`02aa9d29 : fffffa80`033a1010 fffff880`018da947 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x260
fffff880`02f1b7a0 fffff800`02aacfec : fffffa80`03fbeb60 00000000`00000002 00000000`00000000 fffffa80`024af528 : nt!KiInsertQueueApc+0x1e9
fffff880`02f1b7d0 fffff800`02ad055b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff880`02f1b830 fffff880`00e2c41a : 00000000`00004000 00000000`00000001 fffffa80`04dd76f0 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff880`02f1b910 fffff880`00e2c242 : fffffa80`04dd76f0 fffff880`00e2eb3b fffffa80`037b4010 fffffa80`02eb37d0 : ataport!IdeCompleteScsiIrp+0x62
fffff880`02f1b940 fffff880`00e26e32 : 00000000`00000000 00000000`00000000 fffffa80`02519500 fffffa80`02eb37d0 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`02f1b970 fffff880`00e2f7ed : fffffa80`025181a0 fffffa80`04dd76f0 00000000`00000000 fffffa80`04dd76f0 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`02f1baa0 fffff880`00e2f0ec : fffffa80`025181a0 00000000`00000000 fffffa80`025181a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`02f1bbd0 fffff800`02ad8bfc : fffff880`009e4180 00000000`08251b56 fffffa80`02518050 fffffa80`02518118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`02f1bc90 fffff800`02ad5eea : fffff880`009e4180 fffff880`009eef40 00000000`00000000 fffff880`00e2ef44 : nt!KiRetireDpcList+0x1bc
fffff880`02f1bd40 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00e2c41a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012911-36847-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
Debug session time: Sat Jan 29 02:15:58.457 2011 (UTC - 5:00)
System Uptime: 0 days 0:25:54.361
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002a6c5a1, 0, ffffffffffffffff}
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+1f1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a6c5a1, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiApcInterrupt+1f1
fffff800`02a6c5a1 48cf iretq
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc70e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: wow_helper.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88005b714d8 -- (.exr 0xfffff88005b714d8)
ExceptionAddress: fffff80002a6c5a1 (nt!KiApcInterrupt+0x00000000000001f1)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000008
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88005b71580 -- (.trap 0xfffff88005b71580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000001c1 rbx=0000000000000000 rcx=00000000000000cc
rdx=00000000000001c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a6c5a1 rsp=fffff88005b71718 rbp=fffffa80033a2667
r8=0000000000000002 r9=00000000000000c1 r10=00000000000000c1
r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po nc
nt!KiApcInterrupt+0x1f1:
fffff800`02a6c5a1 48cf iretq
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ac9a39 to fffff80002a8f740
STACK_TEXT:
fffff880`05b70d08 fffff800`02ac9a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02a6c5a1 00000000`00000000 : nt!KeBugCheckEx
fffff880`05b70d10 fffff800`02a8ed82 : fffff880`05b714d8 00000000`000001c1 fffff880`05b71580 00000000`0000003c : nt!KiDispatchException+0x1b9
fffff880`05b713a0 fffff800`02a8d68a : 00000000`00000000 fffffa80`033a2650 fffffa80`033a3970 00000000`0000003c : nt!KiExceptionDispatch+0xc2
fffff880`05b71580 fffff800`02a6c5a1 : fffffa80`0339b151 00000000`00000000 00000000`00000200 00000001`05b71740 : nt!KiGeneralProtectionFault+0x10a
fffff880`05b71718 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x1f1
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiApcInterrupt+1f1
fffff800`02a6c5a1 48cf iretq
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiApcInterrupt+1f1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiApcInterrupt+1f1
BUCKET_ID: X64_0x1E_c0000005_nt!KiApcInterrupt+1f1
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012911-33134-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
Debug session time: Sat Jan 29 06:11:37.037 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:50.941
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fbc30, 2, 1, fffff80002ad1cd8}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+28 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000fbc30, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ad1cd8, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d050e0
00000000000fbc30
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTryUnwaitThread+28
fffff800`02ad1cd8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: WUDFHost.exe
TRAP_FRAME: fffff8800581add0 -- (.trap 0xfffff8800581add0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800580d3e8 rbx=0000000000000000 rcx=fffff880009e4180
rdx=000007feff76b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ad1cd8 rsp=fffff8800581af60 rbp=0000000000000000
r8=0000000000000100 r9=0000000000000000 r10=0000000000000002
r11=fffffa8004f85590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff800`02ad1cd8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0 ds:3b60:00000000`00000040=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002accca9 to fffff80002acd740
STACK_TEXT:
fffff880`0581ac88 fffff800`02accca9 : 00000000`0000000a 00000000`000fbc30 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0581ac90 fffff800`02acb920 : 00000980`00000000 00000000`000fbbf0 fffff880`0581ae58 fffff8a0`029559e0 : nt!KiBugCheckDispatch+0x69
fffff880`0581add0 fffff800`02ad1cd8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0581af60 fffff800`02b48f74 : fffffa80`052865e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x28
fffff880`0581afc0 fffff800`02aaa0c7 : 00000000`000fbbd2 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3ca30
fffff880`0581b090 fffff800`02ad4b9d : fffffa80`04f03b60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`0581b110 fffff800`02ad0d4b : 00000000`00000000 00000000`00001f80 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3dd
fffff880`0581b1a0 fffff800`02dc92ef : fffffa80`00000005 fffff880`0581b4e0 00000000`00000001 00000000`00000006 : nt!KeWaitForMultipleObjects+0x271
fffff880`0581b450 fffff800`02dc9bf2 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000001 : nt!ObpWaitForMultipleObjects+0x294
fffff880`0581b920 fffff800`02acc993 : fffffa80`04f03b60 00000000`0185f878 fffff880`0581bb88 fffff8a0`029f4a00 : nt!NtWaitForMultipleObjects+0xe5
fffff880`0581bb70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTryUnwaitThread+28
fffff800`02ad1cd8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTryUnwaitThread+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012911-35240-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Sat Jan 29 06:13:15.852 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:06.632
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff80002a4fd29}
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a4fd29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cab0e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`02a4fd29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80005845610 -- (.trap 0xfffff80005845610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80052a3b98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a4fd29 rsp=fffff800058457a0 rbp=fffff80002bede80
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`02a4fd29 488b5108 mov rdx,qword ptr [rcx+8] ds:2240:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a72ca9 to fffff80002a73740
STACK_TEXT:
fffff800`058454c8 fffff800`02a72ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`058454d0 fffff800`02a71920 : 00000000`00000001 fffffa80`05674b60 fffffa80`025246a8 fffff880`00e1b656 : nt!KiBugCheckDispatch+0x69
fffff800`05845610 fffff800`02a4fd29 : fffffa80`033aa010 fffff880`01896947 fffffa80`055f2240 00000000`00000000 : nt!KiPageFault+0x260
fffff800`058457a0 fffff800`02a52fec : fffffa80`05674b60 00000000`00000002 00000000`00000000 fffffa80`052a3b98 : nt!KiInsertQueueApc+0x1e9
fffff800`058457d0 fffff800`02a7655b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`05845830 fffff880`00e2c41a : 00000000`00020000 00000000`00000001 fffffa80`04252010 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`05845910 fffff880`00e2c242 : fffffa80`04252010 fffff880`00e2eb3b fffffa80`04256b80 fffffa80`02f2c1b0 : ataport!IdeCompleteScsiIrp+0x62
fffff800`05845940 fffff880`00e26e32 : 00000000`00000000 00000000`00000000 fffffa80`02524500 fffffa80`02f2c1b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`05845970 fffff880`00e2f7ed : fffffa80`025231a0 fffffa80`04252010 00000000`00000000 fffffa80`04252010 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`05845aa0 fffff880`00e2f0ec : fffffa80`025231a0 00000000`00000000 fffffa80`025231a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`05845bd0 fffff800`02a7ebfc : fffff800`02bede80 00000000`09552696 fffffa80`02523050 fffffa80`02523118 : ataport!IdePortCompletionDpc+0x1a8
fffff800`05845c90 fffff800`02a7beea : fffff800`02bede80 fffff800`02bfbc40 00000000`00000000 fffff880`00e2ef44 : nt!KiRetireDpcList+0x1bc
fffff800`05845d40 00000000`00000000 : fffff800`05846000 fffff800`05840000 fffff800`05845d00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00e2c41a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
start end module name
fffff880`00f05000 fffff880`00f5c000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03a80000 fffff880`03b0a000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04000000 fffff880`04016000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ff1000 fffff880`00ffc000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0225d000 fffff880`02266000 aswFsBlk aswFsBlk.SYS Thu Dec 30 13:59:14 2010 (4D1CD682)
fffff880`02223000 fffff880`0225d000 aswMonFlt aswMonFlt.sys Thu Dec 30 13:59:25 2010 (4D1CD68D)
fffff880`03b0a000 fffff880`03b14000 aswRdr aswRdr.SYS Thu Dec 30 13:59:36 2010 (4D1CD698)
fffff880`01925000 fffff880`019a2000 aswSnx aswSnx.SYS Thu Dec 30 14:03:44 2010 (4D1CD790)
fffff880`03e9c000 fffff880`03ee5000 aswSP aswSP.SYS Thu Dec 30 14:03:38 2010 (4D1CD78A)
fffff880`01452000 fffff880`01462000 aswTdi aswTdi.SYS Thu Dec 30 14:02:22 2010 (4D1CD73E)
fffff880`00e1a000 fffff880`00e23000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e23000 fffff880`00e4d000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00870000 fffff960`008d1000 ATMFD ATMFD.DLL unavailable (00000000)
fffff880`019ab000 fffff880`019b2000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03be4000 fffff880`03bf5000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`022b4000 fffff880`022d2000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00650000 fffff960`00677000 cdd cdd.dll unavailable (00000000)
fffff880`018fb000 fffff880`01925000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cbd000 fffff880`00d7d000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01895000 fffff880`018c5000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c5f000 fffff880`00cbd000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0116e000 fffff880`011e1000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03de6000 fffff880`03df6000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`029aa000 fffff880`029b8000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03bc6000 fffff880`03be4000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03a68000 fffff880`03a77000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0187f000 fffff880`01895000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04a00000 fffff880`04a22000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`029c4000 fffff880`029cd000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`029b8000 fffff880`029c4000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`029cd000 fffff880`029e0000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`029e0000 fffff880`029ec000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03cf2000 fffff880`03de6000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03c00000 fffff880`03c46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`010fc000 fffff880`01110000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010b0000 fffff880`010fc000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01845000 fffff880`0187f000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03cdf000 fffff880`03cec000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02fdf000 fffff800`03028000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03c46000 fffff880`03c6a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`048ea000 fffff880`04903000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04903000 fffff880`0490b080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04bea000 fffff880`04bf8000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0491a000 fffff880`049e2000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f1000 fffff880`015fa000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04027000 fffff880`045fb5a0 igdkmd64 igdkmd64.sys Tue Jun 16 14:32:09 2009 (4A37E529)
fffff880`00fd9000 fffff880`00fe1000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03f0b000 fffff880`03f21000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03e3b000 fffff880`03e4a000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0490c000 fffff880`0491a000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9e000 fffff800`00ba1000 kdcom kdcom.dll Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`03e59000 fffff880`03e9c000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015b4000 fffff880`015df000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04be2000 fffff880`04be7200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02287000 fffff880`0229c000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02200000 fffff880`02223000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`058ff000 fffff880`05909000 LVPr2M64 LVPr2M64.sys Fri May 07 21:38:16 2010 (4BE4C088)
fffff880`02930000 fffff880`02981200 lvrs64 lvrs64.sys Tue Jul 27 04:00:02 2010 (4C4E9202)
fffff880`022ec000 fffff880`02914e00 lvuvc64 lvuvc64.sys Tue Jul 27 04:00:43 2010 (4C4E922B)
fffff880`00c07000 fffff880`00c4b000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`029ec000 fffff880`029fa000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03e4a000 fffff880`03e59000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0299d000 fffff880`029aa000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e00000 fffff880`00e1a000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`022d2000 fffff880`022ea000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`018c5000 fffff880`018f2000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`050d3000 fffff880`05121000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05121000 fffff880`05144000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01812000 fffff880`0181d000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f65000 fffff880`00f6f000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01110000 fffff880`0116e000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03a5d000 fffff880`03a68000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015df000 fffff880`015f1000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01462000 fffff880`01554000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04016000 fffff880`04022000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03f9b000 fffff880`03fca000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0487b000 fffff880`04890000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03b88000 fffff880`03b97000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03b14000 fffff880`03b59000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01554000 fffff880`015b4000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0181d000 fffff880`0182e000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03a51000 fffff880`03a5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a03000 fffff800`02fdf000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01244000 fffff880`013e7000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`019a2000 fffff880`019ab000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03b62000 fffff880`03b88000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00faf000 fffff880`00fc4000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f6f000 fffff880`00fa2000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fe1000 fffff880`00ff1000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05144000 fffff880`051ea000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04890000 fffff880`048cd000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c4b000 fffff880`00c5f000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03f77000 fffff880`03f9b000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03fca000 fffff880`03fe5000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03e00000 fffff880`03e21000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03e21000 fffff880`03e3b000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03a00000 fffff880`03a51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`019f5000 fffff880`019fe000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01800000 fffff880`01809000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01809000 fffff880`01812000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0106f000 fffff880`010a9000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`0229c000 fffff880`022b4000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03c6a000 fffff880`03cc1000 Rt64win7 Rt64win7.sys Mon Sep 20 03:38:09 2010 (4C970F61)
fffff880`04a24000 fffff880`04be1a00 RTKVHD64 RTKVHD64.sys Mon Jul 20 06:52:29 2009 (4A644C6D)
fffff880`051ea000 fffff880`051f5000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0144a000 fffff880`01452000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05869000 fffff880`058ff000 srv srv.sys Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`0503f000 fffff880`050a7000 srv2 srv2.sys Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`05000000 fffff880`0502d000 srvnet srvnet.sys Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`03df6000 fffff880`03df7480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0502d000 fffff880`0503f000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0182e000 fffff880`0183b000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011e1000 fffff880`011ff000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03bb2000 fffff880`03bc6000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`0104c000 fffff880`0106f000 Tpkd Tpkd.sys Wed Dec 23 14:32:16 2009 (4B327040)
fffff960`004f0000 fffff960`004fa000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`03ee5000 fffff880`03f0b000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03fe5000 fffff880`03ff7000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`02915000 fffff880`0292fc00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`048cd000 fffff880`048ea000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04be8000 fffff880`04be9f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03cce000 fffff880`03cdf000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04821000 fffff880`0487b000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03f21000 fffff880`03f77000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`02982000 fffff880`0299d000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`03cc1000 fffff880`03cce000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fa2000 fffff880`00faf000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019b2000 fffff880`019c0000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`019c0000 fffff880`019e5000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fc4000 fffff880`00fd9000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d7d000 fffff880`00dd9000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03b97000 fffff880`03bb2000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019e5000 fffff880`019f5000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e52000 fffff880`00ef6000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ef6000 fffff880`00f05000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03b59000 fffff880`03b62000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00040000 fffff960`0034f000 win32k win32k.sys unavailable (00000000)
fffff880`00f5c000 fffff880`00f65000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02266000 fffff880`02287000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`05909000 fffff880`0593a000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE)
Unloaded modules:
fffff880`018c5000 fffff880`018d3000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`018d3000 fffff880`018df000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`018df000 fffff880`018e8000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`018e8000 fffff880`018fb000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Re-Uploaded
How about the memory tab?
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012911-259772-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
Debug session time: Sat Jan 29 07:29:57.441 2011 (UTC - 5:00)
System Uptime: 0 days 0:09:18.345
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {2400000090, 2, 0, fffff80002a88995}
Probably caused by : msrpc.sys ( msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000002400000090, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a88995, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb90e0
0000002400000090
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiCommitThreadWait+1d5
fffff800`02a88995 488bbb90000000 mov rdi,qword ptr [rbx+90h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: aswRegSvr64.ex
TRAP_FRAME: fffff880051bf2b0 -- (.trap 0xfffff880051bf2b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff880051bf400
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a88995 rsp=fffff880051bf440 rbp=0000000000000001
r8=fffffa8004dbabb8 r9=0000000000000000 r10=fffffffffffffffe
r11=000000000008e310 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiCommitThreadWait+0x1d5:
fffff800`02a88995 488bbb90000000 mov rdi,qword ptr [rbx+90h] ds:00000000`00000090=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80ca9 to fffff80002a81740
STACK_TEXT:
fffff880`051bf168 fffff800`02a80ca9 : 00000000`0000000a 00000024`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`051bf170 fffff800`02a7f920 : 00000000`00000000 00000024`00000000 fffffa80`00000000 fffffa80`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`051bf2b0 fffff800`02a88995 : fffffa80`04ec9770 fffffa80`04ec9770 fffff800`02df0e00 fffff800`00000008 : nt!KiPageFault+0x260
fffff880`051bf440 fffff800`02a8acff : fffff800`02bfbe80 fffff800`02bfbe80 00000000`000000b0 fffffa80`0263cbe0 : nt!KiCommitThreadWait+0x1d5
fffff880`051bf4d0 fffff880`011281c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`046a9900 : nt!KeWaitForSingleObject+0x19f
fffff880`051bf570 fffff880`0112705d : fffffa80`04ec9770 fffff8a0`02404e40 00000000`00000001 fffffa80`cd637052 : msrpc!LRPC_CASSOCIATION::OpenSecurityContext+0x118
fffff880`051bf5e0 fffff880`0112737b : fffff8a0`0de11a10 00000000`00000000 fffff8a0`0de11a10 fffff8a0`02404e40 : msrpc!LRPC_BASE_BINDING_HANDLE::BaseBindingCopy+0x15d
fffff880`051bf720 fffff880`0112a9d2 : fffff8a0`02404e40 fffff8a0`02404e40 00000000`00000001 00000000`00000058 : msrpc!LRPC_FAST_BINDING_HANDLE::BindingCopy+0x8b
fffff880`051bf750 fffff960`003d44f3 : fffff8a0`02cb5130 fffff900`c35ca010 fffff700`01080488 00000000`000007ff : msrpc!RpcBindingCopy+0x42
fffff880`051bf780 fffff960`001526a9 : fffff900`c35ca010 00000000`00000000 fffffa80`04dbab30 00000000`00000000 : win32k!PlaySoundPostMessage+0x77
fffff880`051bf7e0 fffff960`001acfdd : fffff900`c35ca010 fffff880`051bfbe0 00000000`00000000 fffff900`c35ca010 : win32k!PostPlaySoundMessage+0x25
fffff880`051bf810 fffff960`001a403f : fffff900`c35ca010 fffff880`051bfbe0 00000000`ffffffff 00000000`00000000 : win32k!DestroyProcessInfo+0x125
fffff880`051bf840 fffff960`001a413a : fffffa80`04503800 fffff900`c35ca010 fffffa80`02ca0000 fffff8a0`00134001 : win32k!xxxUserProcessCallout+0x15f
fffff880`051bf890 fffff800`02d66a01 : fffffa80`045038c0 00000000`00000000 00000000`00000000 fffffa80`04ec9770 : win32k!W32pProcessCallout+0x4e
fffff880`051bf8c0 fffff800`02d3f635 : 00000000`00000002 fffff800`02d80101 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
fffff880`051bf980 fffff800`02a5e1db : fffffa80`02cabb01 fffffa80`03686710 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`051bf9b0 fffff800`02a5e620 : 00000000`0032ee00 fffff880`051bfa30 fffff800`02d3f74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`051bfa30 fffff800`02a80a37 : 00000000`000002ee 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`051bfb70 00000000`7707008a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0200f508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7707008a
STACK_COMMAND: kb
FOLLOWUP_IP:
msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
fffff880`011281c8 8b7710 mov esi,dword ptr [rdi+10h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: msrpc
IMAGE_NAME: msrpc.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc17c
FAILURE_BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
Followup: MachineOwner
---------
start end module name
fffff880`00fa1000 fffff880`00ff8000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03ad8000 fffff880`03b62000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02db0000 fffff880`02dc6000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00de1000 fffff880`00dec000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`05df6000 fffff880`05dff000 aswFsBlk aswFsBlk.SYS Thu Dec 30 13:59:14 2010 (4D1CD682)
fffff880`05dbc000 fffff880`05df6000 aswMonFlt aswMonFlt.sys Thu Dec 30 13:59:25 2010 (4D1CD68D)
fffff880`03b62000 fffff880`03b6c000 aswRdr aswRdr.SYS Thu Dec 30 13:59:36 2010 (4D1CD698)
fffff880`01905000 fffff880`01982000 aswSnx aswSnx.SYS Thu Dec 30 14:03:44 2010 (4D1CD790)
fffff880`03c17000 fffff880`03c60000 aswSP aswSP.SYS Thu Dec 30 14:03:38 2010 (4D1CD78A)
fffff880`01086000 fffff880`01096000 aswTdi aswTdi.SYS Thu Dec 30 14:02:22 2010 (4D1CD73E)
fffff880`00ee1000 fffff880`00eea000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00db7000 fffff880`00de1000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00840000 fffff960`008a1000 ATMFD ATMFD.DLL Thu May 27 00:11:31 2010 (4BFDF0F3)
fffff880`0198b000 fffff880`01992000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ac4000 fffff880`03ad5000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03587000 fffff880`035a5000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00750000 fffff960`00777000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`018db000 fffff880`01905000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01875000 fffff880`018a5000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d3f000 fffff880`00d9d000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01160000 fffff880`011d3000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`02da0000 fffff880`02db0000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03471000 fffff880`0347a000 cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`04c06000 fffff880`04c14000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03aa6000 fffff880`03ac4000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03a97000 fffff880`03aa6000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0185f000 fffff880`01875000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04dda000 fffff880`04dfc000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0459f000 fffff880`045a8000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04593000 fffff880`0459f000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`045a8000 fffff880`045bb000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05d05000 fffff880`05d11000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03c9c000 fffff880`03d90000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03d90000 fffff880`03dd6000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`010ee000 fffff880`01102000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010a2000 fffff880`010ee000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013db000 fffff880`013e5000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01825000 fffff880`0185f000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`015af000 fffff880`015f9000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`02d93000 fffff880`02da0000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02fed000 fffff800`03036000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e00000 fffff880`03e24000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`045e6000 fffff880`045ff000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04400000 fffff880`04408080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`045d8000 fffff880`045e6000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`034bf000 fffff880`03587000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`013f7000 fffff880`01400000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03e24000 fffff880`043f85a0 igdkmd64 igdkmd64.sys Tue Jun 16 14:32:09 2009 (4A37E529)
fffff880`00ed9000 fffff880`00ee1000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c86000 fffff880`03c9c000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`02c85000 fffff880`02c94000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04409000 fffff880`04417000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bab000 fffff800`00bae000 kdcom kdcom.dll Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`04492000 fffff880`044d5000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013b0000 fffff880`013ca000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04c00000 fffff880`04c05200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05621000 fffff880`05636000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05d99000 fffff880`05dbc000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`04800000 fffff880`0480a000 LVPr2M64 LVPr2M64.sys Fri May 07 21:38:16 2010 (4BE4C088)
fffff880`05d11000 fffff880`05d62200 lvrs64 lvrs64.sys Tue Jul 27 04:00:02 2010 (4C4E9202)
fffff880`056c1000 fffff880`05ce9e00 lvuvc64 lvuvc64.sys Tue Jul 27 04:00:43 2010 (4C4E922B)
fffff880`00ce7000 fffff880`00d2b000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`05d63000 fffff880`05d71000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`02c94000 fffff880`02ca3000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05d8c000 fffff880`05d99000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d9d000 fffff880`00db7000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`035a5000 fffff880`035bd000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`035bd000 fffff880`035ea000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`03400000 fffff880`0344e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0344e000 fffff880`03471000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019f0000 fffff880`019fb000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e09000 fffff880`00e13000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01102000 fffff880`01160000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03a8c000 fffff880`03a97000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`013e5000 fffff880`013f7000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014bd000 fffff880`015af000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02dea000 fffff880`02df6000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02c00000 fffff880`02c2f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04541000 fffff880`04556000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03be0000 fffff880`03bef000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03b6c000 fffff880`03bb1000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01800000 fffff880`01811000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03a80000 fffff880`03a8c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a11000 fffff800`02fed000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0120d000 fffff880`013b0000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01982000 fffff880`0198b000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03bba000 fffff880`03be0000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e53000 fffff880`00e68000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e13000 fffff880`00e46000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00cc0000 fffff880`00cd0000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013ca000 fffff880`013db000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04811000 fffff880`048b7000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04556000 fffff880`04593000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d2b000 fffff880`00d3f000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02dc6000 fffff880`02dea000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`02c2f000 fffff880`02c4a000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`02c4a000 fffff880`02c6b000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02c6b000 fffff880`02c85000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03a2f000 fffff880`03a80000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`019d5000 fffff880`019de000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019de000 fffff880`019e7000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019e7000 fffff880`019f0000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05636000 fffff880`0564e000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02cc8000 fffff880`02d1f000 Rt64win7 Rt64win7.sys Mon Sep 20 03:38:09 2010 (4C970F61)
fffff880`04c1c000 fffff880`04dd9a00 RTKVHD64 RTKVHD64.sys Mon Jul 20 06:52:29 2009 (4A644C6D)
fffff880`048b7000 fffff880`048c2000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`014ae000 fffff880`014b6000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`04969000 fffff880`049ff000 srv srv.sys Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`04901000 fffff880`04969000 srv2 srv2.sys Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`048c2000 fffff880`048ef000 srvnet srvnet.sys Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`02ca3000 fffff880`02ca4480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`048ef000 fffff880`04901000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01811000 fffff880`0181e000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011d3000 fffff880`011f1000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03a1b000 fffff880`03a2f000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`0148b000 fffff880`014ae000 Tpkd Tpkd.sys Wed Dec 23 14:32:16 2009 (4B327040)
fffff960`004f0000 fffff960`004fa000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`03c60000 fffff880`03c86000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`044d5000 fffff880`044e7000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05cea000 fffff880`05d04c00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`045bb000 fffff880`045d8000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04c14000 fffff880`04c15f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`02d82000 fffff880`02d93000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`044e7000 fffff880`04541000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`02d2c000 fffff880`02d82000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05d71000 fffff880`05d8c000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`02d1f000 fffff880`02d2c000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00e46000 fffff880`00e53000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01992000 fffff880`019a0000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`019a0000 fffff880`019c5000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e68000 fffff880`00e7d000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e7d000 fffff880`00ed9000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03a00000 fffff880`03a1b000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019c5000 fffff880`019d5000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eee000 fffff880`00f92000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f92000 fffff880`00fa1000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03bb1000 fffff880`03bba000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003ef000 win32k win32k.sys Sat Jun 19 00:31:59 2010 (4C1C483F)
fffff880`00e00000 fffff880`00e09000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05600000 fffff880`05621000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`0347a000 fffff880`034ab000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE)
Unloaded modules:
fffff880`0564e000 fffff880`056bf000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`018a5000 fffff880`018b3000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`018b3000 fffff880`018bf000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`018bf000 fffff880`018c8000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`018c8000 fffff880`018db000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000