041911-31090-01.dmp
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Unable to load image Unknown_Module_00000000`000000b0, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`000000b0
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`000000b0
Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
!vad_reload -1 0xb0
fffffa80`09b772c0: Unable to get VAD.PrivateMemory
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
041911-24897-01.dmp
BugCheck 1E, {0, 0, 0, 0}
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
Exception Record Code: c0000005 (Access violation)
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
050311-22963-01.dmp
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.
Unable to load image sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
CURRENT_IRQL: 2
050311-23665-01.dmp
BugCheck 1A, {403, fffff6800007a748, 85800002962ea867, fffff6800007ab00}
MEMORY_MANAGEMENT (1a)
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+330bc )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-31090-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c1c000 PsLoadedModuleList = 0xfffff800`02e59e50
Debug session time: Tue Apr 19 11:57:09.418 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:18.869
Loading Kernel Symbols
................................................
Loading User Symbols
Loading unloaded module list
.......Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
....Missing image name, possible paged-out or corrupt data.
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 116, {fffffa800a5ee4e0, fffff8800cdaff08, ffffffffc000009a, 4}
Unable to load image Unknown_Module_00000000`000000b0, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`000000b0
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`000000b0
Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
!vad_reload -1 0xb0
fffffa80`09b772c0: Unable to get VAD.PrivateMemory
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa800a5ee4e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff8800cdaff08, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000004, Optional internal context dependent data.
Debugging Details:
------------------
Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
!vad_reload -1 0xb0
fffffa80`09b772c0: Unable to get VAD.PrivateMemory
FAULTING_IP:
+3537303537613334
fffff880`0cdaff08 4883ec28 sub rsp,28h
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: Óystem
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`026ceb88 fffff880`04262000 : 00000000`00000116 fffffa80`0a5ee4e0 fffff880`0cdaff08 ffffffff`c000009a : nt!KeBugCheckEx
fffff880`026ceb90 00000000`00000116 : fffffa80`0a5ee4e0 fffff880`0cdaff08 ffffffff`c000009a 00000000`00000004 : 0xfffff880`04262000
fffff880`026ceb98 fffffa80`0a5ee4e0 : fffff880`0cdaff08 ffffffff`c000009a 00000000`00000004 00000000`00000001 : Unknown_Module_00000000_000000b0+0x66
fffff880`026ceba0 fffff880`0cdaff08 : ffffffff`c000009a 00000000`00000004 00000000`00000001 fffffa80`0a5ee4e0 : 0xfffffa80`0a5ee4e0
fffff880`026ceba8 ffffffff`c000009a : 00000000`00000004 00000000`00000001 fffffa80`0a5ee4e0 fffff880`04235867 : 0xfffff880`0cdaff08
fffff880`026cebb0 00000000`00000004 : 00000000`00000001 fffffa80`0a5ee4e0 fffff880`04235867 fffff880`0cdaff08 : 0xffffffff`c000009a
fffff880`026cebb8 00000000`00000001 : fffffa80`0a5ee4e0 fffff880`04235867 fffff880`0cdaff08 fffffa80`0a61c000 : 0x4
fffff880`026cebc0 fffffa80`0a5ee4e0 : fffff880`04235867 fffff880`0cdaff08 fffffa80`0a61c000 00000000`00000000 : 0x1
fffff880`026cebc8 fffff880`04235867 : fffff880`0cdaff08 fffffa80`0a61c000 00000000`00000000 ffffffff`c000009a : 0xfffffa80`0a5ee4e0
fffff880`026cebd0 fffff880`0cdaff08 : fffffa80`0a61c000 00000000`00000000 ffffffff`c000009a ffffffff`ff676980 : 0xfffff880`04235867
fffff880`026cebd8 fffffa80`0a61c000 : 00000000`00000000 ffffffff`c000009a ffffffff`ff676980 fffffa80`0b9e3410 : 0xfffff880`0cdaff08
fffff880`026cebe0 00000000`00000000 : ffffffff`c000009a ffffffff`ff676980 fffffa80`0b9e3410 00000000`00000000 : 0xfffffa80`0a61c000
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x116_ANALYSIS_INCONCLUSIVE
BUCKET_ID: X64_0x116_ANALYSIS_INCONCLUSIVE
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-24897-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea5e50
Debug session time: Tue Apr 19 11:51:14.015 2011 (UTC - 4:00)
System Uptime: 0 days 0:44:29.856
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3164366330623263
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f1b9f8 -- (.exr 0xfffff88002f1b9f8)
ExceptionAddress: fffff80002ce43f2 (nt!KiTimerExpiration+0x00000000000000f2)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f1baa0 -- (.trap 0xfffff88002f1baa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=e56d695402170000 rbx=0000000000000000 rcx=fffffa800c28a060
rdx=0000000000000087 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ce43f2 rsp=fffff88002f1bc30 rbp=0000000000029c87
r8=fffffa800c402fe0 r9=00000000000000c0 r10=0000000000000087
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiTimerExpiration+0xf2:
fffff800`02ce43f2 48894808 mov qword ptr [rax+8],rcx ds:e56d6954`02170008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cd046e to fffff80002cd8710
STACK_TEXT:
fffff880`02f1aae8 fffff800`02cd046e : fffffa80`0a6aad30 fffffa80`00000001 fffff880`02f1b260 fffff800`02d05668 : nt!KeBugCheck
fffff880`02f1aaf0 fffff800`02cfe40d : fffff800`02ee6b7c fffff800`02e20ea4 fffff800`02c68000 fffff880`02f1b9f8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f1ab20 fffff800`02d05a90 : fffff800`02e27b34 fffff880`02f1ab98 fffff880`02f1b9f8 fffff800`02c68000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f1ab50 fffff800`02d129ef : fffff880`02f1b9f8 fffff880`02f1b260 fffff880`00000000 fffff880`009ea180 : nt!RtlDispatchException+0x410
fffff880`02f1b230 fffff800`02cd7d82 : fffff880`02f1b9f8 00000006`375bd239 fffff880`02f1baa0 fffff880`009ed668 : nt!KiDispatchException+0x16f
fffff880`02f1b8c0 fffff800`02cd668a : fffffa80`0b2d8000 fffff880`02f1bb00 00000000`00029c87 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02f1baa0 fffff800`02ce43f2 : 00000006`375b0ee6 fffff880`02f1bc58 00000000`00029c87 fffff880`009ed668 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f1bc30 fffff800`02ce3cb7 : 00000001`9607b7c0 00000001`00029c87 00000001`9607b7da 00000000`00000087 : nt!KiTimerExpiration+0xf2
fffff880`02f1bcd0 fffff800`02ce0eea : fffff880`009ea180 fffff880`009f4fc0 00000000`00000000 fffffa80`0b085210 : nt!KiRetireDpcList+0x277
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`02cd046e 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050311-22963-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c18000 PsLoadedModuleList = 0xfffff800`02e5de90
Debug session time: Tue May 3 22:10:13.948 2011 (UTC - 4:00)
System Uptime: 0 days 0:56:45.259
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {60000, 2, 0, fffff80002dc26fb}
Unable to load image sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+ca7 )
Followup: Pool_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000060000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80002dc26fb, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+ca7
fffff800`02dc26fb 488b00 mov rax,qword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: shift2u.exe
TRAP_FRAME: fffff880009b0a00 -- (.trap 0xfffff880009b0a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060000 rbx=0000000000000000 rcx=fffff80002e1fe10
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dc26fb rsp=fffff880009b0b90 rbp=0000000000000000
r8=fffffa800ae37100 r9=fffffa800ae370f8 r10=0000000000000001
r11=fffffa800ae37100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!ExDeferredFreePool+0xca7:
fffff800`02dc26fb 488b00 mov rax,qword ptr [rax] ds:9550:00000000`00060000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c97be9 to fffff80002c98640
STACK_TEXT:
fffff880`009b08b8 fffff800`02c97be9 : 00000000`0000000a 00000000`00060000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009b08c0 fffff800`02c96860 : fffffa80`0bcba220 fffffa80`0bcbaa90 fffffa80`0bd04020 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009b0a00 fffff800`02dc26fb : fffffa80`0bd21260 00000000`00000000 fffffa80`0af29530 fffff800`02c84e89 : nt!KiPageFault+0x260
fffff880`009b0b90 fffff800`02dc41a1 : 00000000`00000000 fffffa80`0d0719e0 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0xca7
fffff880`009b0c20 fffff880`0457d6f3 : fffffa80`0b823a90 fffffa80`0b7ce260 fffffa80`70627375 00000000`000003ed : nt!ExFreePoolWithTag+0x411
fffff880`009b0cd0 fffff880`0457dab7 : fffffa80`0d071902 fffffa80`0bd21260 00000000`ffffffff fffffa80`0aed4ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xb2f
fffff880`009b0db0 fffff880`0457b64f : fffffa80`0aed4ea8 fffffa80`0aed41a0 fffffa80`0aed5040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`009b0e10 fffff880`0456cf89 : fffffa80`0aed4050 00000000`00000000 fffffa80`0aed4e02 fffffa80`0aed4ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`009b0e50 fffff880`010e2ae8 : fffffa80`0af32000 fffffa80`0aed4ec0 fffffa80`0aed4e00 fffff880`009b0ef8 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`009b0e80 fffffa80`0af32000 : fffffa80`0aed4ec0 fffffa80`0aed4e00 fffff880`009b0ef8 00000000`00000000 : sptd+0x46ae8
fffff880`009b0e88 fffffa80`0aed4ec0 : fffffa80`0aed4e00 fffff880`009b0ef8 00000000`00000000 00000000`00000000 : 0xfffffa80`0af32000
fffff880`009b0e90 fffffa80`0aed4e00 : fffff880`009b0ef8 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`0aed4ec0
fffff880`009b0e98 fffff880`009b0ef8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`75302450 : 0xfffffa80`0aed4e00
fffff880`009b0ea0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`75302450 00000000`00000000 : 0xfffff880`009b0ef8
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+ca7
fffff800`02dc26fb 488b00 mov rax,qword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExDeferredFreePool+ca7
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+ca7
BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+ca7
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050311-23665-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c1b000 PsLoadedModuleList = 0xfffff800`02e60e90
Debug session time: Tue May 3 22:11:45.928 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:26.613
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {403, fffff6800007a748, 85800002962ea867, fffff6800007ab00}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+330bc )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800007a748
Arg3: 85800002962ea867
Arg4: fffff6800007ab00
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002c42ca6 to fffff80002c9b640
STACK_TEXT:
fffff880`068937a8 fffff800`02c42ca6 : 00000000`0000001a 00000000`00000403 fffff680`0007a748 85800002`962ea867 : nt!KeBugCheckEx
fffff880`068937b0 fffff800`02ccd627 : 00000000`00000000 fffff680`0007aff8 fffffa80`0c681b30 fffff880`06893a00 : nt! ?? ::FNODOBFM::`string'+0x330bc
fffff880`06893960 fffff800`02c88aef : fffffa80`00000000 00000000`112f8fff 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x41f
fffff880`06893b20 fffff800`02c9a8d3 : ffffffff`ffffffff 00000000`0095e5b0 00000000`0095e578 00000000`00008000 : nt!NtFreeVirtualMemory+0x61f
fffff880`06893c20 00000000`771a14fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0095e4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771a14fa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+330bc
fffff800`02c42ca6 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+330bc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc
BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc
Followup: MachineOwner
---------
start end module name
fffff880`047ad000 fffff880`047eb000 1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`0613e000 fffff880`06199000 a2djavs a2djavs.sys Wed Oct 20 06:51:47 2010 (4CBEC9C3)
fffff880`06123000 fffff880`0613e000 a2djusb a2djusb.sys Wed Oct 20 06:51:48 2010 (4CBEC9C4)
fffff880`0124b000 fffff880`0128f000 a4s27gsh a4s27gsh.SYS Sat Jul 17 06:58:04 2010 (4C418CBC)
fffff880`00f58000 fffff880`00faf000 ACPI ACPI.sys Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`042c4000 fffff880`0434d000 afd afd.sys Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`04610000 fffff880`04626000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`04152000 fffff880`04167000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e8a000 fffff880`00e95000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`1124d000 fffff880`11255000 ASACPI ASACPI.sys Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`04126000 fffff880`0412c000 AsIO AsIO.sys Mon Apr 06 03:21:08 2009 (49D9AD64)
fffff880`04120000 fffff880`04126000 AsUpIO AsUpIO.sys Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`011f3000 fffff880`011fc000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dc2000 fffff880`00dec000 ataport ataport.SYS Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`04631000 fffff880`047a0000 athrx athrx.sys Wed Jul 08 20:49:13 2009 (4A553E89)
fffff960`00900000 fffff960`00961000 ATMFD ATMFD.DLL Sat Feb 19 04:00:32 2011 (4D5F86B0)
fffff880`018bf000 fffff880`018c6000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0410f000 fffff880`04120000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff960`00690000 fffff960`006b7000 cdd cdd.dll Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`017d4000 fffff880`017fe000 cdrom cdrom.sys Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cc6000 fffff880`00d86000 CI CI.dll Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01850000 fffff880`01880000 CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c68000 fffff880`00cc6000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0138b000 fffff880`013fd000 cng cng.sys Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`04600000 fffff880`04610000 CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`060ed000 fffff880`060fb000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0406e000 fffff880`040f1000 csc csc.sys Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`040f1000 fffff880`0410f000 dfsc dfsc.sys Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`042b4000 fffff880`042c3000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0183a000 fffff880`01850000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04c60000 fffff880`04c82000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06107000 fffff880`06110000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`060fb000 fffff880`06107000 dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06110000 fffff880`06123000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0606b000 fffff880`06077000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`11eb4000 fffff880`11fa8000 dxgkrnl dxgkrnl.sys Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`11fa8000 fffff880`11fee000 dxgmms1 dxgmms1.sys Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`01319000 fffff880`0132d000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`012cd000 fffff880`01319000 fltmgr fltmgr.sys Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`01411000 fffff880`0141b000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01800000 fffff880`0183a000 fvevol fvevol.sys Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01acf000 fffff880`01b19000 fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`11240000 fffff880`1124d000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03205000 fffff800`0324e000 hal hal.dll Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`11200000 fffff880`11224000 HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`0600f000 fffff880`0606b000 HdAudio HdAudio.sys Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`061a7000 fffff880`061c0000 HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`061c0000 fffff880`061c8080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06199000 fffff880`061a7000 hidusb hidusb.sys Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`01bd3000 fffff880`01bdc000 hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`04d0c000 fffff880`04d1b000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`061d6000 fffff880`061e4000 kbdhid kbdhid.sys Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bca000 fffff800`00bd4000 kdcom kdcom.dll Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`04d2c000 fffff880`04d6f000 ks ks.sys Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`015e3000 fffff880`015fe000 ksecdd ksecdd.sys Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`017a9000 fffff880`017d4000 ksecpkg ksecpkg.sys Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`04c82000 fffff880`04c87200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`061e4000 fffff880`061f9000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04c88000 fffff880`04cab000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c47000 fffff880`00c54000 mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`06077000 fffff880`06085000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04d1b000 fffff880`04d2a000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`061c9000 fffff880`061d6000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e5c000 fffff880`00e76000 mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`01600000 fffff880`01631000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`01200000 fffff880`0120b000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011c7000 fffff880`011d1000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0132d000 fffff880`0138b000 msrpc msrpc.sys Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`042a9000 fffff880`042b4000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01bc1000 fffff880`01bd3000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01656000 fffff880`01749000 ndis ndis.sys Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`047f4000 fffff880`04800000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`06d34000 fffff880`06d47000 ndisuio ndisuio.sys Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`00c00000 fffff880`00c2f000 ndiswan ndiswan.sys Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`04ddb000 fffff880`04df0000 NDProxy NDProxy.SYS Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`043d7000 fffff880`043e6000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`0434d000 fffff880`04392000 netbt netbt.sys Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01749000 fffff880`017a9000 NETIO NETIO.SYS Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`0120b000 fffff880`0121c000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0429d000 fffff880`042a9000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c1b000 fffff800`03205000 nt ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01440000 fffff880`015e3000 Ntfs Ntfs.sys Thu Mar 10 22:39:39 2011 (4D79997B)
fffff880`018b6000 fffff880`018bf000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`11eb2000 fffff880`11eb3180 nvBridge nvBridge.kmd Wed Feb 23 02:34:23 2011 (4D64B87F)
fffff880`04c00000 fffff880`04c23000 nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D)
fffff880`11256000 fffff880`11eb1180 nvlddmkm nvlddmkm.sys Wed Feb 23 02:46:52 2011 (4D64BB6C)
fffff880`06ce1000 fffff880`06d34000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`0439b000 fffff880`043c1000 pacer pacer.sys Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`041d7000 fffff880`041f4000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`011de000 fffff880`011f3000 partmgr partmgr.sys Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00faf000 fffff880`00fe2000 pci pci.sys Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`01015000 fffff880`0101c000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`0101c000 fffff880`0102c000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01400000 fffff880`01411000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04c23000 fffff880`04c60000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c54000 fffff880`00c68000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0128f000 fffff880`012b3000 rasl2tp rasl2tp.sys Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`00fe2000 fffff880`00ffd000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04cc6000 fffff880`04ce7000 raspptp raspptp.sys Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`04ce7000 fffff880`04d01000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0424c000 fffff880`0429d000 rdbss rdbss.sys Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`04d01000 fffff880`04d0c000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0141b000 fffff880`01424000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01424000 fffff880`0142d000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0142d000 fffff880`01436000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01b87000 fffff880`01bc1000 rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`06d47000 fffff880`06d5f000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04167000 fffff880`041d7000 Rt64win7 Rt64win7.sys Mon Mar 21 09:20:32 2011 (4D8750A0)
fffff880`01198000 fffff880`011c7000 SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
fffff880`11fee000 fffff880`11ffa000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04200000 fffff880`0421d000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01b7d000 fffff880`01b87000 speedfan speedfan.sys Sat Dec 18 06:03:51 2010 (4D0C9517)
fffff880`01b75000 fffff880`01b7d000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01032000 fffff880`0118f000 sptd sptd.sys Tue Aug 24 02:13:12 2010 (4C7362F8)
fffff880`04d2a000 fffff880`04d2b480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`018cb000 fffff880`01acf000 tcpip tcpip.sys Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`0123e000 fffff880`0124b000 TDI TDI.SYS Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`0121c000 fffff880`0123e000 tdx tdx.sys Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`04238000 fffff880`0424c000 termdd termdd.sys Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00510000 fffff960`0051a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0412c000 fffff880`04152000 tunnel tunnel.sys Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`04d6f000 fffff880`04d81000 umbus umbus.sys Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`060d2000 fffff880`060ecc80 usbaudio usbaudio.sys Sat Nov 20 05:43:52 2010 (4CE7A668)
fffff880`06085000 fffff880`060a2000 usbccgp usbccgp.sys Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`060a2000 fffff880`060a3f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`1122f000 fffff880`11240000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04d81000 fffff880`04ddb000 usbhub usbhub.sys Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`11224000 fffff880`1122f000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04000000 fffff880`04056000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`060a4000 fffff880`060d1280 usbvideo usbvideo.sys Sat Nov 20 05:44:34 2010 (4CE7A692)
fffff880`011d1000 fffff880`011de000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01bdc000 fffff880`01bea000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01631000 fffff880`01656000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00d86000 fffff880`00dc2000 vmbus vmbus.sys Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`01b19000 fffff880`01b29000 vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`01000000 fffff880`01015000 volmgr volmgr.sys Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01b29000 fffff880`01b75000 volsnap volsnap.sys Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`047a0000 fffff880`047ad000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`043c1000 fffff880`043d7000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`0421d000 fffff880`04238000 wanarp wanarp.sys Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01bea000 fffff880`01bfa000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ea5000 fffff880`00f49000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f49000 fffff880`00f58000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04392000 fffff880`0439b000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`003a2000 win32k win32k.sys Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`00e76000 fffff880`00e8a000 winhv winhv.sys Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`047eb000 fffff880`047f4000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`0118f000 fffff880`01198000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01880000 fffff880`018a1000 WudfPf WudfPf.sys Sat Nov 20 05:42:44 2010 (4CE7A624)
Unloaded modules:
fffff880`01880000 fffff880`0188e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0188e000 fffff880`0189a000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0189a000 fffff880`018a3000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`018a3000 fffff880`018b6000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000