Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\10679d1295300579-unknown-bsod-occuring-when-starting-games-011811-19890-01-dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03613000 PsLoadedModuleList = 0xfffff800`03850e50
Debug session time: Mon Jan 17 16:30:47.297 2011 (UTC - 5:00)
System Uptime: 0 days 0:25:21.624
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa7cffffffe0, 2, 1, fffff800036a8f9e}
Probably caused by : memory_corruption ( nt!MiRemoveAnyPage+13e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa7cffffffe0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800036a8f9e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800038bb0e0
 fffffa7cffffffe0 
CURRENT_IRQL:  2
FAULTING_IP: 
nt!MiRemoveAnyPage+13e
fffff800`036a8f9e f0410fba6c241000 lock bts dword ptr [r12+10h],0
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  Steam.exe
TRAP_FRAME:  fffff880094ad220 -- (.trap 0xfffff880094ad220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000007ffffff0000 rbx=0000000000000000 rcx=00000000000005c0
rdx=00000000000bf2c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800036bdc60 rsp=fffff880094ad3b0 rbp=fffff880094ad8e0
 r8=00000000000bf1d0  r9=fffff880094ad3e0 r10=fffff880094ad340
r11=fffff880094ad3a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiDispatchException+0x3df:
fffff800`036bdc60 418a07          mov     al,byte ptr [r15] ds:d3e0:00000000`00000000=??
Resetting default scope
EXCEPTION_RECORD:  fffff880094adb78 -- (.exr 0xfffff880094adb78)
ExceptionAddress: 00000000776a89d4
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000000006efde028
Attempt to read from address 000000006efde028
LAST_CONTROL_TRANSFER:  from fffff80003682ca9 to fffff80003683740
STACK_TEXT:  
fffff880`094acbd8 fffff800`03682ca9 : 00000000`0000000a fffffa7c`ffffffe0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`094acbe0 fffff800`03681920 : 00000000`000bdfff 00000000`000000e8 00000000`00000000 00000000`000bd000 : nt!KiBugCheckDispatch+0x69
fffff880`094acd20 fffff800`036a8f9e : 00000246`002b002b 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x260
fffff880`094aceb0 fffff800`036a12c7 : 00000000`00000002 fffff880`00000002 fffffa80`07858ec8 00000000`00000002 : nt!MiRemoveAnyPage+0x13e
fffff880`094acfd0 fffff800`0369d9c6 : 00000000`00000000 00000000`000bed00 fffff880`094ad220 fffff680`000005f0 : nt!MiResolveDemandZeroFault+0x577
fffff880`094ad0c0 fffff800`0368182e : 00000000`00000000 fffff880`094adb78 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x5c6
fffff880`094ad220 fffff800`036bdc60 : fffff880`094adb78 fffff880`094ad8e0 fffff880`094adc20 00000000`0018dd24 : nt!KiPageFault+0x16e
fffff880`094ad3b0 fffff800`03682d82 : fffff880`094adb78 00000000`77754728 fffff880`094adc20 00000000`77754724 : nt!KiDispatchException+0x3df
fffff880`094ada40 fffff800`036818fa : 00000000`00000000 00000000`77754728 00000000`00000001 fffffa80`079c24d0 : nt!KiExceptionDispatch+0xc2
fffff880`094adc20 00000000`776a89d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
00000000`000bf2c4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776a89d4
STACK_COMMAND:  kb
FOLLOWUP_IP: 
nt!MiRemoveAnyPage+13e
fffff800`036a8f9e f0410fba6c241000 lock bts dword ptr [r12+10h],0
SYMBOL_STACK_INDEX:  3
SYMBOL_NAME:  nt!MiRemoveAnyPage+13e
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
IMAGE_NAME:  memory_corruption
FAILURE_BUCKET_ID:  X64_0xA_nt!MiRemoveAnyPage+13e
BUCKET_ID:  X64_0xA_nt!MiRemoveAnyPage+13e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\10678d1295300576-unknown-bsod-occuring-when-starting-games-011811-25303-01-dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03603000 PsLoadedModuleList = 0xfffff800`03840e50
Debug session time: Mon Jan 17 16:33:51.657 2011 (UTC - 5:00)
System Uptime: 0 days 0:02:30.359
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41287, 60040, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000000060040
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR:  0x1a_41287
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
PROCESS_NAME:  DWWIN.EXE
CURRENT_IRQL:  0
TRAP_FRAME:  fffff880086a06c0 -- (.trap 0xfffff880086a06c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0008000a02280008 rbx=0000000000000000 rcx=0000000000060040
rdx=0008000a02280007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000367e960 rsp=fffff880086a0850 rbp=0000000000000000
 r8=0008000a02280008  r9=0000000000000000 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!ObFastReferenceObject+0x20:
fffff800`0367e960 f0480fb111      lock cmpxchg qword ptr [rcx],rdx ds:0488:00000000`00060040=0008000a02280008
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff8000361fb7a to fffff80003673740
STACK_TEXT:  
fffff880`086a0558 fffff800`0361fb7a : 00000000`0000001a 00000000`00041287 00000000`00060040 00000000`00000000 : nt!KeBugCheckEx
fffff880`086a0560 fffff800`0367182e : 00000000`00000001 00000000`000004b4 fffff800`03802800 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42ba5
fffff880`086a06c0 fffff800`0367e960 : fffff700`01080000 fffffa80`03504060 fffff680`003b6f30 fffffa80`03b533f8 : nt!KiPageFault+0x16e
fffff880`086a0850 fffff800`036e27d0 : 00000000`00000993 00000000`000004b4 00000000`00000000 fffffa80`053a8748 : nt!ObFastReferenceObject+0x20
fffff880`086a0880 fffff800`03699b83 : 99300001`1ac02025 80000001`1ac02121 fffff880`086a09f8 fffffa80`00000000 : nt! ?? ::FNODOBFM::`string'+0x29873
fffff880`086a0910 fffff800`0368f5be : 00000000`00000000 00000000`76de6110 fffff680`003b6f30 fffffa80`03b533f8 : nt!MiResolveProtoPteFault+0x1d3
fffff880`086a09b0 fffff800`0368d743 : 00000000`00000000 00000000`76de6110 00000000`00000000 fffff800`00000000 : nt!MiDispatchFault+0x1de
fffff880`086a0ac0 fffff800`0367182e : 00000000`00000000 00000000`00000000 00000000`0422f101 fffffa80`c0000034 : nt!MmAccessFault+0x343
fffff880`086a0c20 00000000`76d2cc66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0422f070 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d2cc66
STACK_COMMAND:  kb
FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+42ba5
fffff800`0361fb7a cc              int     3
SYMBOL_STACK_INDEX:  1
SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42ba5
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
Followup: MachineOwner
---------