BSOD System_Service_Exeception

HHR

Joined
Feb 2, 2011
Messages
4
Reaction score
0
I have been recently getting this BSOD while playing Starcraft 2. Prior to this i have been getting loads more, but those seem to stop. No one else can tell me what happened. This is the error code that comes up after the computer restarts:

Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7600.2.0.0.768.3
Locale ID: 1033

Additional information about the problem:
BCCode: 3b
BCP1: 00000000C0000005
BCP2: 0000000000000000
BCP3: FFFFF880079D5B20
BCP4: 0000000000000000
OS Version: 6_1_7600
Service Pack: 0_0
Product: 768_1

Files that help describe the problem:
C:\Windows\Minidump\020211-38390-01.dmp
C:\Users\Mike\AppData\Local\Temp\WER-61562-0.sysdata.xml

Read our privacy statement online:
http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0409

If the online privacy statement is not available, please read our privacy statement offline:
C:\Windows\system32\en-US\erofflps.txt
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Uninstall AVG and install MSE as the replacement:

http://www.avg.com/us-en/download-tools

https://www.microsoft.com/security_essentials/




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020211-33796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02851000 PsLoadedModuleList = 0xfffff800`02a8ee50
Debug session time: Wed Feb  2 06:55:39.995 2011 (UTC - 5:00)
System Uptime: 0 days 1:55:22.495
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002b9a2fd, fffff88007b91b30, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3ed )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002b9a2fd, Address of the instruction which caused the bugcheck
Arg3: fffff88007b91b30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8]

CONTEXT:  fffff88007b91b30 -- (.cxr 0xfffff88007b91b30)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=fffff80002b9a2fd rsp=fffff88007b92500 rbp=fffff88007b92b00
 r8=fffff8a00001c6f8  r9=fffff88007b92b10 r10=0000000000000001
r11=fffff88007b922f0 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff88007b92a40 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!CmpGetSymbolicLink+0x3ed:
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8] ds:002b:00000000`007c4428=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b9b5eb to fffff80002b9a2fd

STACK_TEXT:  
fffff880`07b92500 fffff800`02b9b5eb : fffff980`007c4420 fffff980`007c4420 fffff880`07b92700 fffff880`07b92b10 : nt!CmpGetSymbolicLink+0x3ed
fffff880`07b92610 fffff800`02bbae84 : fffff800`02b9acc0 00000000`00000000 fffff980`40adab10 fffff800`02964a01 : nt!CmpParseKey+0x92b
fffff880`07b928e0 fffff800`02bbfe4d : fffff980`40adab10 fffff880`07b92a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`07b929e0 fffff800`02b9edcc : 00000000`00000001 00000000`00000000 00000000`00048601 00000000`000f32be : nt!ObOpenObjectByName+0x1cd
fffff880`07b92a90 fffff800`02ba1fca : 00000000`013de430 00000000`00020019 00000000`013ddf30 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`07b92be0 fffff800`028c0993 : 00000000`00000095 fffff880`07b92ca0 00000000`00000200 00000000`00020019 : nt!NtOpenKey+0x12
fffff880`07b92c20 00000000`7787fe7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`013dded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7787fe7a


FOLLOWUP_IP: 
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CmpGetSymbolicLink+3ed

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88007b91b30 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed

BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-49920-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a56e50
Debug session time: Tue Feb  1 15:46:12.743 2011 (UTC - 5:00)
System Uptime: 0 days 0:13:22.476
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80002b2dc06, c, 0, fffff800028b67a2}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+f13 )

Followup: Pool_corruption
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80002b2dc06, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028b67a2, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac10e0
 fffff80002b2dc06 

CURRENT_IRQL:  c

FAULTING_IP: 
nt!RtlDispatchException+122
fffff800`028b67a2 410fb60c24      movzx   ecx,byte ptr [r12]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff880031bd800 -- (.trap 0xfffff880031bd800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=f98046264f100002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002897951 rsp=fffff880031bd990 rbp=0000000000000000
 r8=0048bd4000490720  r9=0000000000000000 r10=0000000000000004
r11=0048bd400048baa0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiIpiSendRequest+0x201:
fffff800`02897951 49895008        mov     qword ptr [r8+8],rdx ds:4010:0048bd40`00490728=????????????????
Resetting default scope

EXCEPTION_RECORD:  fffff880031bd758 -- (.exr 0xfffff880031bd758)
ExceptionAddress: fffff80002897951 (nt!KiIpiSendRequest+0x0000000000000201)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

LAST_CONTROL_TRANSFER:  from fffff80002888ca9 to fffff80002889740

STACK_TEXT:  
fffff880`031bc5d8 fffff800`02888ca9 : 00000000`0000000a fffff800`02b2dc06 00000000`0000000c 00000000`00000000 : nt!KeBugCheckEx
fffff880`031bc5e0 fffff800`02887920 : 00000000`00000000 00000000`0000005a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031bc720 fffff800`028b67a2 : fffff800`02b2dc06 fffff880`031bc8f8 fffff880`031bd758 fffff800`02819000 : nt!KiPageFault+0x260
fffff880`031bc8b0 fffff800`028c39ef : fffff880`031bd758 fffff880`031bcfc0 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`031bcf90 fffff800`02888d82 : fffff880`031bd758 fffff800`02a03e80 fffff880`031bd800 00000000`00000001 : nt!KiDispatchException+0x16f
fffff880`031bd620 fffff800`0288768a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`031bd800 fffff800`02897951 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`031bd990 fffff800`0289ccc4 : fffff800`00000000 fffff880`00000001 00000000`00000000 fffff800`00000000 : nt!KiIpiSendRequest+0x201
fffff880`031bda50 fffff800`02939ab6 : 00000000`00000000 fffff800`02a03e80 fffff980`46264f10 00000000`00000018 : nt!KiIpiSendRequestEx+0x84
fffff880`031bda90 fffff800`0299080d : 00000000`00000001 fffff880`031bdb50 fffff6fc`c0231320 fffff980`46264f10 : nt!KeFlushSingleTb+0x126
fffff880`031bdb10 fffff800`029bc356 : 00000000`0000071f 00000000`74707249 00000000`08627e80 fffff800`02a18480 : nt!MmFreeSpecialPool+0x34d
fffff880`031bdc50 fffff800`02d2e1f6 : 4f4f4f4f`4f4f4f00 4f4f4f4f`00000000 4f4f4f4f`4f4f4f00 4f4f4f4f`4f4f4f00 : nt!ExDeferredFreePool+0xf13
fffff880`031bdd00 fffff800`02b2dc06 : fffff980`00440b60 fffff980`0009ab30 4f4f4f4f`4f4f4f4f 4f4f4f4f`4f4f4f4f : nt!ViPoolDelayFreeTrimThreadRoutine+0x46
fffff880`031bdd40 fffff800`02867c26 : fffff800`02a03e80 fffff980`00440b60 fffff800`02a11c40 4f4f4f4f`4f4f4f4f : nt!PspSystemThreadStartup+0x5a
fffff880`031bdd80 00000000`00000000 : fffff880`031be000 fffff880`031b8000 fffff880`031bda50 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+f13
fffff800`029bc356 90              nop

SYMBOL_STACK_INDEX:  b

SYMBOL_NAME:  nt!ExDeferredFreePool+f13

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0xA_VRFK_nt!ExDeferredFreePool+f13

BUCKET_ID:  X64_0xA_VRFK_nt!ExDeferredFreePool+f13

Followup: Pool_corruption
---------

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020211-38390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02852000 PsLoadedModuleList = 0xfffff800`02a8fe50
Debug session time: Wed Feb  2 07:50:34.659 2011 (UTC - 5:00)
System Uptime: 0 days 0:50:04.174
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, 0, fffff880079d5b20, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3f0 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: fffff880079d5b20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+13
00000000`00000000 ??              ???

CONTEXT:  fffff880079d5b20 -- (.cxr 0xfffff880079d5b20)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=0000000000000000 rsp=fffff880079d64f8 rbp=fffff880079d6b00
 r8=fffff8a00001c6f8  r9=fffff880079d6b10 r10=0000000000000001
r11=fffff880079d62d8 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff880079d6a40 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
00000000`00000000 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b9b300 to 0000000000000000

STACK_TEXT:  
fffff880`079d64f8 fffff800`02b9b300 : fffff980`06fcafb0 fffff800`02c72ae1 fffff880`079d6770 fffff880`079d6b10 : 0x0
fffff880`079d6500 fffff800`02b9c5eb : fffff980`007c4420 fffff980`007c4420 fffff880`079d6700 fffff880`079d6b10 : nt!CmpGetSymbolicLink+0x3f0
fffff880`079d6610 fffff800`02bbbe84 : fffff800`02b9bcc0 00000000`00000000 fffff980`6454cb10 00000000`00000001 : nt!CmpParseKey+0x92b
fffff880`079d68e0 fffff800`02bc0e4d : fffff980`6454cb10 fffff880`079d6a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`079d69e0 fffff800`02b9fdcc : 00000000`00000f00 00000000`00000000 fffff980`1ab32f01 fffff880`079d6aa8 : nt!ObOpenObjectByName+0x1cd
fffff880`079d6a90 fffff800`02ba1f0f : 00000000`05b1e880 00000000`00020019 00000000`05b1e908 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`079d6be0 fffff800`028c1993 : 00000000`00000001 000007ff`fffdb000 00000000`00000001 00000000`00000000 : nt!NtOpenKeyEx+0xf
fffff880`079d6c20 00000000`771b0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`05b1e818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771b0caa


FOLLOWUP_IP: 
nt!CmpGetSymbolicLink+3f0
fffff800`02b9b300 4885c0          test    rax,rax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!CmpGetSymbolicLink+3f0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff880079d5b20 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0

BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`00f99000 fffff880`00ff0000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03f33000 fffff880`03fbd000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04580000 fffff880`04596000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`041ce000 fffff880`041e3000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0115b000 fffff880`01166000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00ed7000 fffff880`00ee0000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0481f000 fffff880`04f8d000   atikmdag atikmdag.sys Tue Aug 03 21:39:08 2010 (4C58C4BC)
fffff880`04343000 fffff880`0438a000   atikmpag atikmpag.sys Tue Aug 03 21:15:45 2010 (4C58BF41)
fffff880`010a5000 fffff880`010b6000   avgfwd6a avgfwd6a.sys Sun Jul 11 21:38:24 2010 (4C3A7210)
fffff880`05b80000 fffff880`05bb4000   AVGIDSDriver AVGIDSDriver.Sys Tue Aug 03 18:24:45 2010 (4C58972D)
fffff880`017f6000 fffff880`01800000   AVGIDSEH AVGIDSEH.Sys Mon Sep 13 18:46:38 2010 (4C8EA9CE)
fffff880`05c9e000 fffff880`05caa000   AVGIDSFilter AVGIDSFilter.Sys Tue Aug 03 18:23:21 2010 (4C5896D9)
fffff880`04158000 fffff880`041a8000   avgldx64 avgldx64.sys Tue Dec 07 21:01:55 2010 (4CFEE713)
fffff880`01496000 fffff880`014a5000   avgmfx64 avgmfx64.sys Mon Sep 06 20:49:14 2010 (4C858C0A)
fffff880`017ec000 fffff880`017f6000   avgrkx64 avgrkx64.sys Mon Sep 06 20:49:37 2010 (4C858C21)
fffff880`03e8d000 fffff880`03eee000   avgtdia  avgtdia.sys  Fri Nov 12 06:08:42 2010 (4CDD203A)
fffff880`013ea000 fffff880`013f1000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`04147000 fffff880`04158000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05dc1000 fffff880`05ddf000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00650000 fffff960`00677000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`0146c000 fffff880`01496000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cb4000 fffff880`00d74000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00d9d000 fffff880`00dcd000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c56000 fffff880`00cb4000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014a8000 fffff880`0151b000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04570000 fffff880`04580000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03e70000 fffff880`03e7e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04129000 fffff880`04147000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0411a000 fffff880`04129000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01400000 fffff880`01416000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04299000 fffff880`042bb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05ae2000 fffff880`05af5000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05ab7000 fffff880`05ae2000   dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`03e7e000 fffff880`03e88000   dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`05af5000 fffff880`05b01000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04436000 fffff880`0452a000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`0452a000 fffff880`04570000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`011b2000 fffff880`011c6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01166000 fffff880`011b2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0152c000 fffff880`01536000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015bc000 fffff880`015f6000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02809000 fffff800`02852000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e4c000 fffff880`03e70000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04200000 fffff880`0425c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`041e3000 fffff880`041fc000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04812000 fffff880`0481a080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`042d8000 fffff880`042e6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05cf9000 fffff880`05dc1000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01664000 fffff880`0166d000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04000000 fffff880`0401e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04fae000 fffff880`04fbd000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0409f000 fffff880`040ad000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04fbd000 fffff880`05000000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d0000 fffff880`013ea000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`017c1000 fffff880`017ec000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`045f7000 fffff880`045fc200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05b53000 fffff880`05b68000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05b0f000 fffff880`05b32000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c35000 fffff880`00c42000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05b01000 fffff880`05b0f000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0401e000 fffff880`0402d000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00ddd000 fffff880`00df7000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05ddf000 fffff880`05df7000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05c00000 fffff880`05c2d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05c2d000 fffff880`05c7b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05c7b000 fffff880`05c9e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01089000 fffff880`01094000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`0410f000 fffff880`0411a000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01652000 fffff880`01664000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0166f000 fffff880`01761000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`045ba000 fffff880`045c6000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`045c6000 fffff880`045f5000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043e4000 fffff880`043f9000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03fec000 fffff880`03ffb000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03eee000 fffff880`03f33000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01761000 fffff880`017c1000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01094000 fffff880`010a5000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04103000 fffff880`0410f000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02852000 fffff800`02e2e000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0122d000 fffff880`013d0000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`015f6000 fffff880`015ff000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`042ee000 fffff880`04342080   nvmf6264 nvmf6264.sys Thu Aug 12 07:46:06 2010 (4C63DEFE)
fffff880`00d74000 fffff880`00d9d000   nvraid   nvraid.sys   Wed May 20 02:39:40 2009 (4A13A5AC)
fffff880`010ce000 fffff880`010f9000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
fffff880`03fc6000 fffff880`03fec000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ed0000 fffff880`00ed7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00dcd000 fffff880`00ddd000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0151b000 fffff880`0152c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05a00000 fffff880`05aa6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0425c000 fffff880`04299000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c42000 fffff880`00c56000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04596000 fffff880`045ba000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04400000 fffff880`0441b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04f8d000 fffff880`04fae000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0441b000 fffff880`04435000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`040b2000 fffff880`04103000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0106e000 fffff880`01077000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01077000 fffff880`01080000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01080000 fffff880`01089000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01582000 fffff880`015bc000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05b68000 fffff880`05b80000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05caa000 fffff880`05cb5000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0164a000 fffff880`01652000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06d20000 fffff880`06d91000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`06c8a000 fffff880`06d20000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06c23000 fffff880`06c8a000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`05cb5000 fffff880`05ce2000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`010f9000 fffff880`0115b000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`045f5000 fffff880`045f6480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05ce2000 fffff880`05cf4000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`011e4000 fffff880`011f1000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011c6000 fffff880`011e4000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03e38000 fffff880`03e4c000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00400000 fffff960`0040a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`041a8000 fffff880`041ce000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`01416000 fffff880`0146a000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`04800000 fffff880`04812000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`042bb000 fffff880`042d8000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`045fd000 fffff880`045fef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0408e000 fffff880`0409f000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`0438a000 fffff880`043e4000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`0402d000 fffff880`04038000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04038000 fffff880`0408e000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`013f1000 fffff880`013ff000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01200000 fffff880`01225000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01536000 fffff880`01582000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03e1d000 fffff880`03e38000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0105e000 fffff880`0106e000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ee6000 fffff880`00f8a000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f8a000 fffff880`00f99000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03fbd000 fffff880`03fc6000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00000000 fffff960`00310000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`00ff0000 fffff880`00ff9000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05b32000 fffff880`05b53000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`01416000 fffff880`01424000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01424000 fffff880`0142e000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`0142e000 fffff880`01459000   dump_nvstor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`01459000 fffff880`0146c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`03e00000 fffff880`03e1d000   serial.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001D000
 

HHR

Joined
Feb 2, 2011
Messages
4
Reaction score
0
Uninstall AVG and install MSE as the replacement:

http://www.avg.com/us-en/download-tools

https://www.microsoft.com/security_essentials/




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020211-33796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02851000 PsLoadedModuleList = 0xfffff800`02a8ee50
Debug session time: Wed Feb  2 06:55:39.995 2011 (UTC - 5:00)
System Uptime: 0 days 1:55:22.495
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002b9a2fd, fffff88007b91b30, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3ed )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002b9a2fd, Address of the instruction which caused the bugcheck
Arg3: fffff88007b91b30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8]

CONTEXT:  fffff88007b91b30 -- (.cxr 0xfffff88007b91b30)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=fffff80002b9a2fd rsp=fffff88007b92500 rbp=fffff88007b92b00
 r8=fffff8a00001c6f8  r9=fffff88007b92b10 r10=0000000000000001
r11=fffff88007b922f0 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff88007b92a40 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!CmpGetSymbolicLink+0x3ed:
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8] ds:002b:00000000`007c4428=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b9b5eb to fffff80002b9a2fd

STACK_TEXT:  
fffff880`07b92500 fffff800`02b9b5eb : fffff980`007c4420 fffff980`007c4420 fffff880`07b92700 fffff880`07b92b10 : nt!CmpGetSymbolicLink+0x3ed
fffff880`07b92610 fffff800`02bbae84 : fffff800`02b9acc0 00000000`00000000 fffff980`40adab10 fffff800`02964a01 : nt!CmpParseKey+0x92b
fffff880`07b928e0 fffff800`02bbfe4d : fffff980`40adab10 fffff880`07b92a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`07b929e0 fffff800`02b9edcc : 00000000`00000001 00000000`00000000 00000000`00048601 00000000`000f32be : nt!ObOpenObjectByName+0x1cd
fffff880`07b92a90 fffff800`02ba1fca : 00000000`013de430 00000000`00020019 00000000`013ddf30 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`07b92be0 fffff800`028c0993 : 00000000`00000095 fffff880`07b92ca0 00000000`00000200 00000000`00020019 : nt!NtOpenKey+0x12
fffff880`07b92c20 00000000`7787fe7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`013dded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7787fe7a


FOLLOWUP_IP: 
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CmpGetSymbolicLink+3ed

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88007b91b30 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed

BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-49920-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a56e50
Debug session time: Tue Feb  1 15:46:12.743 2011 (UTC - 5:00)
System Uptime: 0 days 0:13:22.476
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80002b2dc06, c, 0, fffff800028b67a2}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+f13 )

Followup: Pool_corruption
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80002b2dc06, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028b67a2, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac10e0
 fffff80002b2dc06 

CURRENT_IRQL:  c

FAULTING_IP: 
nt!RtlDispatchException+122
fffff800`028b67a2 410fb60c24      movzx   ecx,byte ptr [r12]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff880031bd800 -- (.trap 0xfffff880031bd800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=f98046264f100002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002897951 rsp=fffff880031bd990 rbp=0000000000000000
 r8=0048bd4000490720  r9=0000000000000000 r10=0000000000000004
r11=0048bd400048baa0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiIpiSendRequest+0x201:
fffff800`02897951 49895008        mov     qword ptr [r8+8],rdx ds:4010:0048bd40`00490728=????????????????
Resetting default scope

EXCEPTION_RECORD:  fffff880031bd758 -- (.exr 0xfffff880031bd758)
ExceptionAddress: fffff80002897951 (nt!KiIpiSendRequest+0x0000000000000201)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

LAST_CONTROL_TRANSFER:  from fffff80002888ca9 to fffff80002889740

STACK_TEXT:  
fffff880`031bc5d8 fffff800`02888ca9 : 00000000`0000000a fffff800`02b2dc06 00000000`0000000c 00000000`00000000 : nt!KeBugCheckEx
fffff880`031bc5e0 fffff800`02887920 : 00000000`00000000 00000000`0000005a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031bc720 fffff800`028b67a2 : fffff800`02b2dc06 fffff880`031bc8f8 fffff880`031bd758 fffff800`02819000 : nt!KiPageFault+0x260
fffff880`031bc8b0 fffff800`028c39ef : fffff880`031bd758 fffff880`031bcfc0 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`031bcf90 fffff800`02888d82 : fffff880`031bd758 fffff800`02a03e80 fffff880`031bd800 00000000`00000001 : nt!KiDispatchException+0x16f
fffff880`031bd620 fffff800`0288768a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`031bd800 fffff800`02897951 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`031bd990 fffff800`0289ccc4 : fffff800`00000000 fffff880`00000001 00000000`00000000 fffff800`00000000 : nt!KiIpiSendRequest+0x201
fffff880`031bda50 fffff800`02939ab6 : 00000000`00000000 fffff800`02a03e80 fffff980`46264f10 00000000`00000018 : nt!KiIpiSendRequestEx+0x84
fffff880`031bda90 fffff800`0299080d : 00000000`00000001 fffff880`031bdb50 fffff6fc`c0231320 fffff980`46264f10 : nt!KeFlushSingleTb+0x126
fffff880`031bdb10 fffff800`029bc356 : 00000000`0000071f 00000000`74707249 00000000`08627e80 fffff800`02a18480 : nt!MmFreeSpecialPool+0x34d
fffff880`031bdc50 fffff800`02d2e1f6 : 4f4f4f4f`4f4f4f00 4f4f4f4f`00000000 4f4f4f4f`4f4f4f00 4f4f4f4f`4f4f4f00 : nt!ExDeferredFreePool+0xf13
fffff880`031bdd00 fffff800`02b2dc06 : fffff980`00440b60 fffff980`0009ab30 4f4f4f4f`4f4f4f4f 4f4f4f4f`4f4f4f4f : nt!ViPoolDelayFreeTrimThreadRoutine+0x46
fffff880`031bdd40 fffff800`02867c26 : fffff800`02a03e80 fffff980`00440b60 fffff800`02a11c40 4f4f4f4f`4f4f4f4f : nt!PspSystemThreadStartup+0x5a
fffff880`031bdd80 00000000`00000000 : fffff880`031be000 fffff880`031b8000 fffff880`031bda50 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+f13
fffff800`029bc356 90              nop

SYMBOL_STACK_INDEX:  b

SYMBOL_NAME:  nt!ExDeferredFreePool+f13

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0xA_VRFK_nt!ExDeferredFreePool+f13

BUCKET_ID:  X64_0xA_VRFK_nt!ExDeferredFreePool+f13

Followup: Pool_corruption
---------

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020211-38390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02852000 PsLoadedModuleList = 0xfffff800`02a8fe50
Debug session time: Wed Feb  2 07:50:34.659 2011 (UTC - 5:00)
System Uptime: 0 days 0:50:04.174
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, 0, fffff880079d5b20, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3f0 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: fffff880079d5b20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+13
00000000`00000000 ??              ???

CONTEXT:  fffff880079d5b20 -- (.cxr 0xfffff880079d5b20)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=0000000000000000 rsp=fffff880079d64f8 rbp=fffff880079d6b00
 r8=fffff8a00001c6f8  r9=fffff880079d6b10 r10=0000000000000001
r11=fffff880079d62d8 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff880079d6a40 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
00000000`00000000 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b9b300 to 0000000000000000

STACK_TEXT:  
fffff880`079d64f8 fffff800`02b9b300 : fffff980`06fcafb0 fffff800`02c72ae1 fffff880`079d6770 fffff880`079d6b10 : 0x0
fffff880`079d6500 fffff800`02b9c5eb : fffff980`007c4420 fffff980`007c4420 fffff880`079d6700 fffff880`079d6b10 : nt!CmpGetSymbolicLink+0x3f0
fffff880`079d6610 fffff800`02bbbe84 : fffff800`02b9bcc0 00000000`00000000 fffff980`6454cb10 00000000`00000001 : nt!CmpParseKey+0x92b
fffff880`079d68e0 fffff800`02bc0e4d : fffff980`6454cb10 fffff880`079d6a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`079d69e0 fffff800`02b9fdcc : 00000000`00000f00 00000000`00000000 fffff980`1ab32f01 fffff880`079d6aa8 : nt!ObOpenObjectByName+0x1cd
fffff880`079d6a90 fffff800`02ba1f0f : 00000000`05b1e880 00000000`00020019 00000000`05b1e908 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`079d6be0 fffff800`028c1993 : 00000000`00000001 000007ff`fffdb000 00000000`00000001 00000000`00000000 : nt!NtOpenKeyEx+0xf
fffff880`079d6c20 00000000`771b0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`05b1e818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771b0caa


FOLLOWUP_IP: 
nt!CmpGetSymbolicLink+3f0
fffff800`02b9b300 4885c0          test    rax,rax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!CmpGetSymbolicLink+3f0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff880079d5b20 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0

BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0

Followup: MachineOwner
---------

Drivers:

Code:
start             end                 module name
fffff880`00f99000 fffff880`00ff0000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03f33000 fffff880`03fbd000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04580000 fffff880`04596000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`041ce000 fffff880`041e3000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0115b000 fffff880`01166000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00ed7000 fffff880`00ee0000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0481f000 fffff880`04f8d000   atikmdag atikmdag.sys Tue Aug 03 21:39:08 2010 (4C58C4BC)
fffff880`04343000 fffff880`0438a000   atikmpag atikmpag.sys Tue Aug 03 21:15:45 2010 (4C58BF41)
fffff880`010a5000 fffff880`010b6000   avgfwd6a avgfwd6a.sys Sun Jul 11 21:38:24 2010 (4C3A7210)
fffff880`05b80000 fffff880`05bb4000   AVGIDSDriver AVGIDSDriver.Sys Tue Aug 03 18:24:45 2010 (4C58972D)
fffff880`017f6000 fffff880`01800000   AVGIDSEH AVGIDSEH.Sys Mon Sep 13 18:46:38 2010 (4C8EA9CE)
fffff880`05c9e000 fffff880`05caa000   AVGIDSFilter AVGIDSFilter.Sys Tue Aug 03 18:23:21 2010 (4C5896D9)
fffff880`04158000 fffff880`041a8000   avgldx64 avgldx64.sys Tue Dec 07 21:01:55 2010 (4CFEE713)
fffff880`01496000 fffff880`014a5000   avgmfx64 avgmfx64.sys Mon Sep 06 20:49:14 2010 (4C858C0A)
fffff880`017ec000 fffff880`017f6000   avgrkx64 avgrkx64.sys Mon Sep 06 20:49:37 2010 (4C858C21)
fffff880`03e8d000 fffff880`03eee000   avgtdia  avgtdia.sys  Fri Nov 12 06:08:42 2010 (4CDD203A)
fffff880`013ea000 fffff880`013f1000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`04147000 fffff880`04158000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05dc1000 fffff880`05ddf000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00650000 fffff960`00677000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`0146c000 fffff880`01496000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cb4000 fffff880`00d74000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00d9d000 fffff880`00dcd000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c56000 fffff880`00cb4000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014a8000 fffff880`0151b000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04570000 fffff880`04580000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03e70000 fffff880`03e7e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04129000 fffff880`04147000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0411a000 fffff880`04129000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01400000 fffff880`01416000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04299000 fffff880`042bb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05ae2000 fffff880`05af5000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05ab7000 fffff880`05ae2000   dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`03e7e000 fffff880`03e88000   dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`05af5000 fffff880`05b01000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04436000 fffff880`0452a000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`0452a000 fffff880`04570000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`011b2000 fffff880`011c6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01166000 fffff880`011b2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0152c000 fffff880`01536000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015bc000 fffff880`015f6000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02809000 fffff800`02852000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e4c000 fffff880`03e70000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04200000 fffff880`0425c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`041e3000 fffff880`041fc000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04812000 fffff880`0481a080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`042d8000 fffff880`042e6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05cf9000 fffff880`05dc1000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01664000 fffff880`0166d000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04000000 fffff880`0401e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04fae000 fffff880`04fbd000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0409f000 fffff880`040ad000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04fbd000 fffff880`05000000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d0000 fffff880`013ea000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`017c1000 fffff880`017ec000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`045f7000 fffff880`045fc200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05b53000 fffff880`05b68000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05b0f000 fffff880`05b32000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c35000 fffff880`00c42000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05b01000 fffff880`05b0f000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0401e000 fffff880`0402d000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00ddd000 fffff880`00df7000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05ddf000 fffff880`05df7000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05c00000 fffff880`05c2d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05c2d000 fffff880`05c7b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05c7b000 fffff880`05c9e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01089000 fffff880`01094000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`0410f000 fffff880`0411a000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01652000 fffff880`01664000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0166f000 fffff880`01761000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`045ba000 fffff880`045c6000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`045c6000 fffff880`045f5000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043e4000 fffff880`043f9000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03fec000 fffff880`03ffb000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03eee000 fffff880`03f33000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01761000 fffff880`017c1000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01094000 fffff880`010a5000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04103000 fffff880`0410f000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02852000 fffff800`02e2e000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0122d000 fffff880`013d0000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`015f6000 fffff880`015ff000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`042ee000 fffff880`04342080   nvmf6264 nvmf6264.sys Thu Aug 12 07:46:06 2010 (4C63DEFE)
fffff880`00d74000 fffff880`00d9d000   nvraid   nvraid.sys   Wed May 20 02:39:40 2009 (4A13A5AC)
fffff880`010ce000 fffff880`010f9000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
fffff880`03fc6000 fffff880`03fec000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ed0000 fffff880`00ed7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00dcd000 fffff880`00ddd000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0151b000 fffff880`0152c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05a00000 fffff880`05aa6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0425c000 fffff880`04299000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c42000 fffff880`00c56000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04596000 fffff880`045ba000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04400000 fffff880`0441b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04f8d000 fffff880`04fae000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0441b000 fffff880`04435000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`040b2000 fffff880`04103000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0106e000 fffff880`01077000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01077000 fffff880`01080000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01080000 fffff880`01089000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01582000 fffff880`015bc000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05b68000 fffff880`05b80000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05caa000 fffff880`05cb5000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0164a000 fffff880`01652000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06d20000 fffff880`06d91000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`06c8a000 fffff880`06d20000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06c23000 fffff880`06c8a000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`05cb5000 fffff880`05ce2000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`010f9000 fffff880`0115b000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`045f5000 fffff880`045f6480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05ce2000 fffff880`05cf4000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`011e4000 fffff880`011f1000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011c6000 fffff880`011e4000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03e38000 fffff880`03e4c000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00400000 fffff960`0040a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`041a8000 fffff880`041ce000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`01416000 fffff880`0146a000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`04800000 fffff880`04812000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`042bb000 fffff880`042d8000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`045fd000 fffff880`045fef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0408e000 fffff880`0409f000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`0438a000 fffff880`043e4000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`0402d000 fffff880`04038000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04038000 fffff880`0408e000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`013f1000 fffff880`013ff000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01200000 fffff880`01225000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01536000 fffff880`01582000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03e1d000 fffff880`03e38000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0105e000 fffff880`0106e000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ee6000 fffff880`00f8a000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f8a000 fffff880`00f99000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03fbd000 fffff880`03fc6000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00000000 fffff960`00310000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`00ff0000 fffff880`00ff9000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05b32000 fffff880`05b53000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`01416000 fffff880`01424000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01424000 fffff880`0142e000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`0142e000 fffff880`01459000   dump_nvstor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`01459000 fffff880`0146c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`03e00000 fffff880`03e1d000   serial.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001D000
Is that all i need to do?
 

HHR

Joined
Feb 2, 2011
Messages
4
Reaction score
0
Well, i just had another crash again while playing Starcraft 2.
Error message:

Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7600.2.0.0.768.3
Locale ID: 1033

Additional information about the problem:
BCCode: cc
BCP1: FFFFF9805BBCAFB0
BCP2: 0000000000000001
BCP3: FFFFF800028D080C
BCP4: 0000000000000000
OS Version: 6_1_7600
Service Pack: 0_0
Product: 768_1

Files that help describe the problem:
C:\Windows\Minidump\020311-27187-01.dmp
C:\Users\Mike\AppData\Local\Temp\WER-55484-0.sysdata.xml

Read our privacy statement online:
http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0409

If the online privacy statement is not available, please read our privacy statement offline:
C:\Windows\system32\en-US\erofflps.txt
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Attach your CPU-Z snips of these tabs - MEMORY and SPD for each SLOT.




Crash Dumps:


Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020211-38390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02852000 PsLoadedModuleList = 0xfffff800`02a8fe50
Debug session time: Wed Feb  2 07:50:34.659 2011 (UTC - 5:00)
System Uptime: 0 days 0:50:04.174
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, 0, fffff880079d5b20, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3f0 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: fffff880079d5b20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+13
00000000`00000000 ??              ???

CONTEXT:  fffff880079d5b20 -- (.cxr 0xfffff880079d5b20)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=0000000000000000 rsp=fffff880079d64f8 rbp=fffff880079d6b00
 r8=fffff8a00001c6f8  r9=fffff880079d6b10 r10=0000000000000001
r11=fffff880079d62d8 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff880079d6a40 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
00000000`00000000 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b9b300 to 0000000000000000

STACK_TEXT:  
fffff880`079d64f8 fffff800`02b9b300 : fffff980`06fcafb0 fffff800`02c72ae1 fffff880`079d6770 fffff880`079d6b10 : 0x0
fffff880`079d6500 fffff800`02b9c5eb : fffff980`007c4420 fffff980`007c4420 fffff880`079d6700 fffff880`079d6b10 : nt!CmpGetSymbolicLink+0x3f0
fffff880`079d6610 fffff800`02bbbe84 : fffff800`02b9bcc0 00000000`00000000 fffff980`6454cb10 00000000`00000001 : nt!CmpParseKey+0x92b
fffff880`079d68e0 fffff800`02bc0e4d : fffff980`6454cb10 fffff880`079d6a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`079d69e0 fffff800`02b9fdcc : 00000000`00000f00 00000000`00000000 fffff980`1ab32f01 fffff880`079d6aa8 : nt!ObOpenObjectByName+0x1cd
fffff880`079d6a90 fffff800`02ba1f0f : 00000000`05b1e880 00000000`00020019 00000000`05b1e908 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`079d6be0 fffff800`028c1993 : 00000000`00000001 000007ff`fffdb000 00000000`00000001 00000000`00000000 : nt!NtOpenKeyEx+0xf
fffff880`079d6c20 00000000`771b0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`05b1e818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771b0caa


FOLLOWUP_IP: 
nt!CmpGetSymbolicLink+3f0
fffff800`02b9b300 4885c0          test    rax,rax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!CmpGetSymbolicLink+3f0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff880079d5b20 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0

BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020211-33796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02851000 PsLoadedModuleList = 0xfffff800`02a8ee50
Debug session time: Wed Feb  2 06:55:39.995 2011 (UTC - 5:00)
System Uptime: 0 days 1:55:22.495
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002b9a2fd, fffff88007b91b30, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3ed )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002b9a2fd, Address of the instruction which caused the bugcheck
Arg3: fffff88007b91b30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8]

CONTEXT:  fffff88007b91b30 -- (.cxr 0xfffff88007b91b30)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=fffff80002b9a2fd rsp=fffff88007b92500 rbp=fffff88007b92b00
 r8=fffff8a00001c6f8  r9=fffff88007b92b10 r10=0000000000000001
r11=fffff88007b922f0 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff88007b92a40 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!CmpGetSymbolicLink+0x3ed:
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8] ds:002b:00000000`007c4428=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b9b5eb to fffff80002b9a2fd

STACK_TEXT:  
fffff880`07b92500 fffff800`02b9b5eb : fffff980`007c4420 fffff980`007c4420 fffff880`07b92700 fffff880`07b92b10 : nt!CmpGetSymbolicLink+0x3ed
fffff880`07b92610 fffff800`02bbae84 : fffff800`02b9acc0 00000000`00000000 fffff980`40adab10 fffff800`02964a01 : nt!CmpParseKey+0x92b
fffff880`07b928e0 fffff800`02bbfe4d : fffff980`40adab10 fffff880`07b92a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`07b929e0 fffff800`02b9edcc : 00000000`00000001 00000000`00000000 00000000`00048601 00000000`000f32be : nt!ObOpenObjectByName+0x1cd
fffff880`07b92a90 fffff800`02ba1fca : 00000000`013de430 00000000`00020019 00000000`013ddf30 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`07b92be0 fffff800`028c0993 : 00000000`00000095 fffff880`07b92ca0 00000000`00000200 00000000`00020019 : nt!NtOpenKey+0x12
fffff880`07b92c20 00000000`7787fe7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`013dded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7787fe7a


FOLLOWUP_IP: 
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CmpGetSymbolicLink+3ed

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88007b91b30 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed

BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-49920-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a56e50
Debug session time: Tue Feb  1 15:46:12.743 2011 (UTC - 5:00)
System Uptime: 0 days 0:13:22.476
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80002b2dc06, c, 0, fffff800028b67a2}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+f13 )

Followup: Pool_corruption
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80002b2dc06, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028b67a2, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac10e0
 fffff80002b2dc06 

CURRENT_IRQL:  c

FAULTING_IP: 
nt!RtlDispatchException+122
fffff800`028b67a2 410fb60c24      movzx   ecx,byte ptr [r12]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff880031bd800 -- (.trap 0xfffff880031bd800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=f98046264f100002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002897951 rsp=fffff880031bd990 rbp=0000000000000000
 r8=0048bd4000490720  r9=0000000000000000 r10=0000000000000004
r11=0048bd400048baa0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiIpiSendRequest+0x201:
fffff800`02897951 49895008        mov     qword ptr [r8+8],rdx ds:4010:0048bd40`00490728=????????????????
Resetting default scope

EXCEPTION_RECORD:  fffff880031bd758 -- (.exr 0xfffff880031bd758)
ExceptionAddress: fffff80002897951 (nt!KiIpiSendRequest+0x0000000000000201)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

LAST_CONTROL_TRANSFER:  from fffff80002888ca9 to fffff80002889740

STACK_TEXT:  
fffff880`031bc5d8 fffff800`02888ca9 : 00000000`0000000a fffff800`02b2dc06 00000000`0000000c 00000000`00000000 : nt!KeBugCheckEx
fffff880`031bc5e0 fffff800`02887920 : 00000000`00000000 00000000`0000005a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031bc720 fffff800`028b67a2 : fffff800`02b2dc06 fffff880`031bc8f8 fffff880`031bd758 fffff800`02819000 : nt!KiPageFault+0x260
fffff880`031bc8b0 fffff800`028c39ef : fffff880`031bd758 fffff880`031bcfc0 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`031bcf90 fffff800`02888d82 : fffff880`031bd758 fffff800`02a03e80 fffff880`031bd800 00000000`00000001 : nt!KiDispatchException+0x16f
fffff880`031bd620 fffff800`0288768a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`031bd800 fffff800`02897951 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`031bd990 fffff800`0289ccc4 : fffff800`00000000 fffff880`00000001 00000000`00000000 fffff800`00000000 : nt!KiIpiSendRequest+0x201
fffff880`031bda50 fffff800`02939ab6 : 00000000`00000000 fffff800`02a03e80 fffff980`46264f10 00000000`00000018 : nt!KiIpiSendRequestEx+0x84
fffff880`031bda90 fffff800`0299080d : 00000000`00000001 fffff880`031bdb50 fffff6fc`c0231320 fffff980`46264f10 : nt!KeFlushSingleTb+0x126
fffff880`031bdb10 fffff800`029bc356 : 00000000`0000071f 00000000`74707249 00000000`08627e80 fffff800`02a18480 : nt!MmFreeSpecialPool+0x34d
fffff880`031bdc50 fffff800`02d2e1f6 : 4f4f4f4f`4f4f4f00 4f4f4f4f`00000000 4f4f4f4f`4f4f4f00 4f4f4f4f`4f4f4f00 : nt!ExDeferredFreePool+0xf13
fffff880`031bdd00 fffff800`02b2dc06 : fffff980`00440b60 fffff980`0009ab30 4f4f4f4f`4f4f4f4f 4f4f4f4f`4f4f4f4f : nt!ViPoolDelayFreeTrimThreadRoutine+0x46
fffff880`031bdd40 fffff800`02867c26 : fffff800`02a03e80 fffff980`00440b60 fffff800`02a11c40 4f4f4f4f`4f4f4f4f : nt!PspSystemThreadStartup+0x5a
fffff880`031bdd80 00000000`00000000 : fffff880`031be000 fffff880`031b8000 fffff880`031bda50 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+f13
fffff800`029bc356 90              nop

SYMBOL_STACK_INDEX:  b

SYMBOL_NAME:  nt!ExDeferredFreePool+f13

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0xA_VRFK_nt!ExDeferredFreePool+f13

BUCKET_ID:  X64_0xA_VRFK_nt!ExDeferredFreePool+f13

Followup: Pool_corruption
---------







Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020311-27187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0285b000 PsLoadedModuleList = 0xfffff800`02a98e50
Debug session time: Thu Feb  3 03:25:27.439 2011 (UTC - 5:00)
System Uptime: 0 days 8:39:17.939
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck CC, {fffff9805bbcafb0, 1, fffff800028d080c, 0}


Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42837 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_FREED_SPECIAL_POOL (cc)
Memory was referenced after it was freed.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff9805bbcafb0, memory referenced
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation
Arg3: fffff800028d080c, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, Mm internal code.

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b030e0
 fffff9805bbcafb0 

FAULTING_IP: 
nt!ObfDereferenceObject+2c
fffff800`028d080c f0480fc11f      lock xadd qword ptr [rdi],rbx

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xCC

PROCESS_NAME:  SC2.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88008bfc9c0 -- (.trap 0xfffff88008bfc9c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff9805bbcafe0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028d080c rsp=fffff88008bfcb50 rbp=fffff88008bfcca0
 r8=fffff980283e6bb8  r9=0000000000000000 r10=fffffffffffffffd
r11=fffff880009e7100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ObfDereferenceObject+0x2c:
fffff800`028d080c f0480fc11f      lock xadd qword ptr [rdi],rbx ds:afe0:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000294bf14 to fffff800028cb740

STACK_TEXT:  
fffff880`08bfc858 fffff800`0294bf14 : 00000000`00000050 fffff980`5bbcafb0 00000000`00000001 fffff880`08bfc9c0 : nt!KeBugCheckEx
fffff880`08bfc860 fffff800`028c982e : 00000000`00000001 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`08bfc9c0 fffff800`028d080c : fffff980`1d29cf20 fffff980`553b2b60 fffff8a0`02d7c000 00000000`742e2450 : nt!KiPageFault+0x16e
fffff880`08bfcb50 fffff800`02bc61ec : fffff880`08bfcca0 fffff980`5bbcafe0 00000000`00000000 fffff800`02bea000 : nt!ObfDereferenceObject+0x2c
fffff880`08bfcbb0 fffff800`028ca993 : fffff980`553b2b60 00000000`00000790 00000000`00000000 fffff980`5bbdafe0 : nt!NtWaitForSingleObject+0xcc
fffff880`08bfcc20 00000000`742e2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0d5ef0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x742e2dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+42837
fffff800`0294bf14 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42837

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xCC_VRFK_nt!_??_::FNODOBFM::_string_+42837

BUCKET_ID:  X64_0xCC_VRFK_nt!_??_::FNODOBFM::_string_+42837

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`00eff000 fffff880`00f56000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03eff000 fffff880`03f89000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0436d000 fffff880`04383000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`040e3000 fffff880`040f8000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`01105000 fffff880`01110000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00dcc000 fffff880`00dd5000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dd5000 fffff880`00dff000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0484a000 fffff880`04fb8000   atikmdag atikmdag.sys Tue Aug 03 21:39:08 2010 (4C58C4BC)
fffff880`04055000 fffff880`0409c000   atikmpag atikmpag.sys Tue Aug 03 21:15:45 2010 (4C58BF41)
fffff880`018ac000 fffff880`018b3000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ea9000 fffff880`03eba000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`061c4000 fffff880`061e2000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00670000 fffff960`00697000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`01848000 fffff880`01872000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cf2000 fffff880`00db2000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00e00000 fffff880`00e30000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c94000 fffff880`00cf2000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0435d000 fffff880`0436d000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05000000 fffff880`0500e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e8b000 fffff880`03ea9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03e7c000 fffff880`03e8b000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`019d5000 fffff880`019eb000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05171000 fffff880`05193000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05043000 fffff880`05056000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05018000 fffff880`05043000   dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`0500e000 fffff880`05018000   dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`05056000 fffff880`05062000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04223000 fffff880`04317000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04317000 fffff880`0435d000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`06859000 fffff880`0688f000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`0115c000 fffff880`01170000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01110000 fffff880`0115c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0199b000 fffff880`019d5000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02812000 fffff800`0285b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04197000 fffff880`041bb000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`050d8000 fffff880`05134000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`051c6000 fffff880`051df000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`051df000 fffff880`051e7080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`051b8000 fffff880`051c6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`060fc000 fffff880`061c4000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01992000 fffff880`0199b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`040f8000 fffff880`04116000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04fd2000 fffff880`04fe1000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`051e8000 fffff880`051f6000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bab000 fffff800`00bb5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04800000 fffff880`04843000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d8000 fffff880`013f2000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015cd000 fffff880`015f8000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05193000 fffff880`05198200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03fc7000 fffff880`03fdc000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`041bb000 fffff880`041de000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c73000 fffff880`00c80000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`0409c000 fffff880`040aa000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04116000 fffff880`04125000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00db2000 fffff880`00dcc000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`01872000 fffff880`018a3000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`0694b000 fffff880`0695b000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`061e2000 fffff880`061fa000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06000000 fffff880`0602d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0602d000 fffff880`0607b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0607b000 fffff880`0609e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0146c000 fffff880`01477000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f5f000 fffff880`00f69000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01170000 fffff880`011ce000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03e71000 fffff880`03e7c000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01980000 fffff880`01992000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0147b000 fffff880`0156d000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043a7000 fffff880`043b3000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`043b3000 fffff880`043e2000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`050c3000 fffff880`050d8000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03fb8000 fffff880`03fc7000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03eba000 fffff880`03eff000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0156d000 fffff880`015cd000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`0695b000 fffff880`06970000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`0121b000 fffff880`0122c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03e65000 fffff880`03e71000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0285b000 fffff800`02e37000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01235000 fffff880`013d8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018a3000 fffff880`018ac000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04000000 fffff880`04054080   nvmf6264 nvmf6264.sys Thu Aug 12 07:46:06 2010 (4C63DEFE)
fffff880`00fd3000 fffff880`00ffc000   nvraid   nvraid.sys   Wed May 20 02:39:40 2009 (4A13A5AC)
fffff880`01078000 fffff880`010a3000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
fffff880`03f92000 fffff880`03fb8000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fa9000 fffff880`00fbe000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f69000 fffff880`00f9c000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e30000 fffff880`00e37000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e37000 fffff880`00e47000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06638000 fffff880`066de000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05134000 fffff880`05171000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c80000 fffff880`00c94000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04383000 fffff880`043a7000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043e2000 fffff880`043fd000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04200000 fffff880`04221000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04fb8000 fffff880`04fd2000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03e14000 fffff880`03e65000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`018e6000 fffff880`018ef000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0145a000 fffff880`01463000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01463000 fffff880`0146c000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01946000 fffff880`01980000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01800000 fffff880`01818000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`066de000 fffff880`066e9000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0193e000 fffff880`01946000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06970000 fffff880`069e1000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`068b5000 fffff880`0694b000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06728000 fffff880`0678f000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`066e9000 fffff880`06716000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`010a3000 fffff880`01105000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`04221000 fffff880`04222480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06716000 fffff880`06728000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`013f2000 fffff880`013ff000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011ce000 fffff880`011ec000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03e00000 fffff880`03e14000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00510000 fffff960`0051a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`040bd000 fffff880`040e3000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04fe1000 fffff880`04ff3000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05199000 fffff880`051b6000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`051b6000 fffff880`051b7f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04186000 fffff880`04197000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`05069000 fffff880`050c3000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`04125000 fffff880`04130000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04130000 fffff880`04186000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f9c000 fffff880`00fa9000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`018b3000 fffff880`018c1000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`018c1000 fffff880`018e6000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fbe000 fffff880`00fd3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`018f2000 fffff880`0193e000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03fe4000 fffff880`03fff000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0144a000 fffff880`0145a000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e4c000 fffff880`00ef0000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ef0000 fffff880`00eff000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03f89000 fffff880`03f92000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00380000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`00f56000 fffff880`00f5f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`041de000 fffff880`041ff000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`06800000 fffff880`06831000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`0683e000 fffff880`06859000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001B000
fffff880`068a2000 fffff880`068ac000   hiber_storpo
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`067ba000 fffff880`067e5000   hiber_nvstor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`069e1000 fffff880`069f4000   hiber_dumpfv
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`06831000 fffff880`0683b000   hiber_storpo
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`0678f000 fffff880`067ba000   hiber_nvstor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`0688f000 fffff880`068a2000   hiber_dumpfv
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`069e1000 fffff880`069eb000   hiber_storpo
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`06800000 fffff880`0682b000   hiber_nvstor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`0682b000 fffff880`0683e000   hiber_dumpfv
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`019eb000 fffff880`019f9000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01800000 fffff880`0180a000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`0180a000 fffff880`01835000   dump_nvstor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`01835000 fffff880`01848000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`03fc7000 fffff880`03fe4000   serial.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001D000
 

HHR

Joined
Feb 2, 2011
Messages
4
Reaction score
0
Attach your CPU-Z snips of these tabs - MEMORY and SPD for each SLOT.




Crash Dumps:


Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020211-38390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02852000 PsLoadedModuleList = 0xfffff800`02a8fe50
Debug session time: Wed Feb  2 07:50:34.659 2011 (UTC - 5:00)
System Uptime: 0 days 0:50:04.174
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, 0, fffff880079d5b20, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3f0 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: fffff880079d5b20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+13
00000000`00000000 ??              ???

CONTEXT:  fffff880079d5b20 -- (.cxr 0xfffff880079d5b20)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=0000000000000000 rsp=fffff880079d64f8 rbp=fffff880079d6b00
 r8=fffff8a00001c6f8  r9=fffff880079d6b10 r10=0000000000000001
r11=fffff880079d62d8 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff880079d6a40 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
00000000`00000000 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b9b300 to 0000000000000000

STACK_TEXT:  
fffff880`079d64f8 fffff800`02b9b300 : fffff980`06fcafb0 fffff800`02c72ae1 fffff880`079d6770 fffff880`079d6b10 : 0x0
fffff880`079d6500 fffff800`02b9c5eb : fffff980`007c4420 fffff980`007c4420 fffff880`079d6700 fffff880`079d6b10 : nt!CmpGetSymbolicLink+0x3f0
fffff880`079d6610 fffff800`02bbbe84 : fffff800`02b9bcc0 00000000`00000000 fffff980`6454cb10 00000000`00000001 : nt!CmpParseKey+0x92b
fffff880`079d68e0 fffff800`02bc0e4d : fffff980`6454cb10 fffff880`079d6a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`079d69e0 fffff800`02b9fdcc : 00000000`00000f00 00000000`00000000 fffff980`1ab32f01 fffff880`079d6aa8 : nt!ObOpenObjectByName+0x1cd
fffff880`079d6a90 fffff800`02ba1f0f : 00000000`05b1e880 00000000`00020019 00000000`05b1e908 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`079d6be0 fffff800`028c1993 : 00000000`00000001 000007ff`fffdb000 00000000`00000001 00000000`00000000 : nt!NtOpenKeyEx+0xf
fffff880`079d6c20 00000000`771b0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`05b1e818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771b0caa


FOLLOWUP_IP: 
nt!CmpGetSymbolicLink+3f0
fffff800`02b9b300 4885c0          test    rax,rax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!CmpGetSymbolicLink+3f0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff880079d5b20 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0

BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020211-33796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02851000 PsLoadedModuleList = 0xfffff800`02a8ee50
Debug session time: Wed Feb  2 06:55:39.995 2011 (UTC - 5:00)
System Uptime: 0 days 1:55:22.495
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002b9a2fd, fffff88007b91b30, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3ed )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002b9a2fd, Address of the instruction which caused the bugcheck
Arg3: fffff88007b91b30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8]

CONTEXT:  fffff88007b91b30 -- (.cxr 0xfffff88007b91b30)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=fffff80002b9a2fd rsp=fffff88007b92500 rbp=fffff88007b92b00
 r8=fffff8a00001c6f8  r9=fffff88007b92b10 r10=0000000000000001
r11=fffff88007b922f0 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff88007b92a40 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!CmpGetSymbolicLink+0x3ed:
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8] ds:002b:00000000`007c4428=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b9b5eb to fffff80002b9a2fd

STACK_TEXT:  
fffff880`07b92500 fffff800`02b9b5eb : fffff980`007c4420 fffff980`007c4420 fffff880`07b92700 fffff880`07b92b10 : nt!CmpGetSymbolicLink+0x3ed
fffff880`07b92610 fffff800`02bbae84 : fffff800`02b9acc0 00000000`00000000 fffff980`40adab10 fffff800`02964a01 : nt!CmpParseKey+0x92b
fffff880`07b928e0 fffff800`02bbfe4d : fffff980`40adab10 fffff880`07b92a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`07b929e0 fffff800`02b9edcc : 00000000`00000001 00000000`00000000 00000000`00048601 00000000`000f32be : nt!ObOpenObjectByName+0x1cd
fffff880`07b92a90 fffff800`02ba1fca : 00000000`013de430 00000000`00020019 00000000`013ddf30 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`07b92be0 fffff800`028c0993 : 00000000`00000095 fffff880`07b92ca0 00000000`00000200 00000000`00020019 : nt!NtOpenKey+0x12
fffff880`07b92c20 00000000`7787fe7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`013dded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7787fe7a


FOLLOWUP_IP: 
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008          call    qword ptr [rax+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CmpGetSymbolicLink+3ed

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88007b91b30 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed

BUCKET_ID:  X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-49920-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a56e50
Debug session time: Tue Feb  1 15:46:12.743 2011 (UTC - 5:00)
System Uptime: 0 days 0:13:22.476
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80002b2dc06, c, 0, fffff800028b67a2}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+f13 )

Followup: Pool_corruption
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80002b2dc06, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028b67a2, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac10e0
 fffff80002b2dc06 

CURRENT_IRQL:  c

FAULTING_IP: 
nt!RtlDispatchException+122
fffff800`028b67a2 410fb60c24      movzx   ecx,byte ptr [r12]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff880031bd800 -- (.trap 0xfffff880031bd800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=f98046264f100002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002897951 rsp=fffff880031bd990 rbp=0000000000000000
 r8=0048bd4000490720  r9=0000000000000000 r10=0000000000000004
r11=0048bd400048baa0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiIpiSendRequest+0x201:
fffff800`02897951 49895008        mov     qword ptr [r8+8],rdx ds:4010:0048bd40`00490728=????????????????
Resetting default scope

EXCEPTION_RECORD:  fffff880031bd758 -- (.exr 0xfffff880031bd758)
ExceptionAddress: fffff80002897951 (nt!KiIpiSendRequest+0x0000000000000201)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

LAST_CONTROL_TRANSFER:  from fffff80002888ca9 to fffff80002889740

STACK_TEXT:  
fffff880`031bc5d8 fffff800`02888ca9 : 00000000`0000000a fffff800`02b2dc06 00000000`0000000c 00000000`00000000 : nt!KeBugCheckEx
fffff880`031bc5e0 fffff800`02887920 : 00000000`00000000 00000000`0000005a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031bc720 fffff800`028b67a2 : fffff800`02b2dc06 fffff880`031bc8f8 fffff880`031bd758 fffff800`02819000 : nt!KiPageFault+0x260
fffff880`031bc8b0 fffff800`028c39ef : fffff880`031bd758 fffff880`031bcfc0 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`031bcf90 fffff800`02888d82 : fffff880`031bd758 fffff800`02a03e80 fffff880`031bd800 00000000`00000001 : nt!KiDispatchException+0x16f
fffff880`031bd620 fffff800`0288768a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`031bd800 fffff800`02897951 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`031bd990 fffff800`0289ccc4 : fffff800`00000000 fffff880`00000001 00000000`00000000 fffff800`00000000 : nt!KiIpiSendRequest+0x201
fffff880`031bda50 fffff800`02939ab6 : 00000000`00000000 fffff800`02a03e80 fffff980`46264f10 00000000`00000018 : nt!KiIpiSendRequestEx+0x84
fffff880`031bda90 fffff800`0299080d : 00000000`00000001 fffff880`031bdb50 fffff6fc`c0231320 fffff980`46264f10 : nt!KeFlushSingleTb+0x126
fffff880`031bdb10 fffff800`029bc356 : 00000000`0000071f 00000000`74707249 00000000`08627e80 fffff800`02a18480 : nt!MmFreeSpecialPool+0x34d
fffff880`031bdc50 fffff800`02d2e1f6 : 4f4f4f4f`4f4f4f00 4f4f4f4f`00000000 4f4f4f4f`4f4f4f00 4f4f4f4f`4f4f4f00 : nt!ExDeferredFreePool+0xf13
fffff880`031bdd00 fffff800`02b2dc06 : fffff980`00440b60 fffff980`0009ab30 4f4f4f4f`4f4f4f4f 4f4f4f4f`4f4f4f4f : nt!ViPoolDelayFreeTrimThreadRoutine+0x46
fffff880`031bdd40 fffff800`02867c26 : fffff800`02a03e80 fffff980`00440b60 fffff800`02a11c40 4f4f4f4f`4f4f4f4f : nt!PspSystemThreadStartup+0x5a
fffff880`031bdd80 00000000`00000000 : fffff880`031be000 fffff880`031b8000 fffff880`031bda50 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+f13
fffff800`029bc356 90              nop

SYMBOL_STACK_INDEX:  b

SYMBOL_NAME:  nt!ExDeferredFreePool+f13

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0xA_VRFK_nt!ExDeferredFreePool+f13

BUCKET_ID:  X64_0xA_VRFK_nt!ExDeferredFreePool+f13

Followup: Pool_corruption
---------







Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020311-27187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0285b000 PsLoadedModuleList = 0xfffff800`02a98e50
Debug session time: Thu Feb  3 03:25:27.439 2011 (UTC - 5:00)
System Uptime: 0 days 8:39:17.939
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck CC, {fffff9805bbcafb0, 1, fffff800028d080c, 0}


Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42837 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_FREED_SPECIAL_POOL (cc)
Memory was referenced after it was freed.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff9805bbcafb0, memory referenced
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation
Arg3: fffff800028d080c, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, Mm internal code.

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b030e0
 fffff9805bbcafb0 

FAULTING_IP: 
nt!ObfDereferenceObject+2c
fffff800`028d080c f0480fc11f      lock xadd qword ptr [rdi],rbx

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xCC

PROCESS_NAME:  SC2.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88008bfc9c0 -- (.trap 0xfffff88008bfc9c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff9805bbcafe0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028d080c rsp=fffff88008bfcb50 rbp=fffff88008bfcca0
 r8=fffff980283e6bb8  r9=0000000000000000 r10=fffffffffffffffd
r11=fffff880009e7100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ObfDereferenceObject+0x2c:
fffff800`028d080c f0480fc11f      lock xadd qword ptr [rdi],rbx ds:afe0:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000294bf14 to fffff800028cb740

STACK_TEXT:  
fffff880`08bfc858 fffff800`0294bf14 : 00000000`00000050 fffff980`5bbcafb0 00000000`00000001 fffff880`08bfc9c0 : nt!KeBugCheckEx
fffff880`08bfc860 fffff800`028c982e : 00000000`00000001 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`08bfc9c0 fffff800`028d080c : fffff980`1d29cf20 fffff980`553b2b60 fffff8a0`02d7c000 00000000`742e2450 : nt!KiPageFault+0x16e
fffff880`08bfcb50 fffff800`02bc61ec : fffff880`08bfcca0 fffff980`5bbcafe0 00000000`00000000 fffff800`02bea000 : nt!ObfDereferenceObject+0x2c
fffff880`08bfcbb0 fffff800`028ca993 : fffff980`553b2b60 00000000`00000790 00000000`00000000 fffff980`5bbdafe0 : nt!NtWaitForSingleObject+0xcc
fffff880`08bfcc20 00000000`742e2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0d5ef0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x742e2dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+42837
fffff800`0294bf14 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42837

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xCC_VRFK_nt!_??_::FNODOBFM::_string_+42837

BUCKET_ID:  X64_0xCC_VRFK_nt!_??_::FNODOBFM::_string_+42837

Followup: MachineOwner
---------

Drivers:

Code:
start             end                 module name
fffff880`00eff000 fffff880`00f56000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03eff000 fffff880`03f89000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0436d000 fffff880`04383000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`040e3000 fffff880`040f8000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`01105000 fffff880`01110000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00dcc000 fffff880`00dd5000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dd5000 fffff880`00dff000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0484a000 fffff880`04fb8000   atikmdag atikmdag.sys Tue Aug 03 21:39:08 2010 (4C58C4BC)
fffff880`04055000 fffff880`0409c000   atikmpag atikmpag.sys Tue Aug 03 21:15:45 2010 (4C58BF41)
fffff880`018ac000 fffff880`018b3000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ea9000 fffff880`03eba000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`061c4000 fffff880`061e2000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00670000 fffff960`00697000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`01848000 fffff880`01872000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cf2000 fffff880`00db2000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00e00000 fffff880`00e30000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c94000 fffff880`00cf2000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0435d000 fffff880`0436d000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05000000 fffff880`0500e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e8b000 fffff880`03ea9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03e7c000 fffff880`03e8b000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`019d5000 fffff880`019eb000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05171000 fffff880`05193000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05043000 fffff880`05056000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05018000 fffff880`05043000   dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`0500e000 fffff880`05018000   dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`05056000 fffff880`05062000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04223000 fffff880`04317000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04317000 fffff880`0435d000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`06859000 fffff880`0688f000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`0115c000 fffff880`01170000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01110000 fffff880`0115c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0199b000 fffff880`019d5000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02812000 fffff800`0285b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04197000 fffff880`041bb000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`050d8000 fffff880`05134000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`051c6000 fffff880`051df000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`051df000 fffff880`051e7080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`051b8000 fffff880`051c6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`060fc000 fffff880`061c4000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01992000 fffff880`0199b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`040f8000 fffff880`04116000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04fd2000 fffff880`04fe1000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`051e8000 fffff880`051f6000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bab000 fffff800`00bb5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04800000 fffff880`04843000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d8000 fffff880`013f2000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015cd000 fffff880`015f8000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05193000 fffff880`05198200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03fc7000 fffff880`03fdc000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`041bb000 fffff880`041de000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c73000 fffff880`00c80000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`0409c000 fffff880`040aa000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04116000 fffff880`04125000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00db2000 fffff880`00dcc000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`01872000 fffff880`018a3000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`0694b000 fffff880`0695b000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`061e2000 fffff880`061fa000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06000000 fffff880`0602d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0602d000 fffff880`0607b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0607b000 fffff880`0609e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0146c000 fffff880`01477000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f5f000 fffff880`00f69000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01170000 fffff880`011ce000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03e71000 fffff880`03e7c000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01980000 fffff880`01992000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0147b000 fffff880`0156d000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043a7000 fffff880`043b3000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`043b3000 fffff880`043e2000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`050c3000 fffff880`050d8000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03fb8000 fffff880`03fc7000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03eba000 fffff880`03eff000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0156d000 fffff880`015cd000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`0695b000 fffff880`06970000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`0121b000 fffff880`0122c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03e65000 fffff880`03e71000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0285b000 fffff800`02e37000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01235000 fffff880`013d8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018a3000 fffff880`018ac000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04000000 fffff880`04054080   nvmf6264 nvmf6264.sys Thu Aug 12 07:46:06 2010 (4C63DEFE)
fffff880`00fd3000 fffff880`00ffc000   nvraid   nvraid.sys   Wed May 20 02:39:40 2009 (4A13A5AC)
fffff880`01078000 fffff880`010a3000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
fffff880`03f92000 fffff880`03fb8000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fa9000 fffff880`00fbe000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f69000 fffff880`00f9c000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e30000 fffff880`00e37000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e37000 fffff880`00e47000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06638000 fffff880`066de000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05134000 fffff880`05171000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c80000 fffff880`00c94000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04383000 fffff880`043a7000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043e2000 fffff880`043fd000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04200000 fffff880`04221000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04fb8000 fffff880`04fd2000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03e14000 fffff880`03e65000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`018e6000 fffff880`018ef000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0145a000 fffff880`01463000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01463000 fffff880`0146c000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01946000 fffff880`01980000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01800000 fffff880`01818000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`066de000 fffff880`066e9000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0193e000 fffff880`01946000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06970000 fffff880`069e1000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`068b5000 fffff880`0694b000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06728000 fffff880`0678f000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`066e9000 fffff880`06716000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`010a3000 fffff880`01105000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`04221000 fffff880`04222480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06716000 fffff880`06728000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`013f2000 fffff880`013ff000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011ce000 fffff880`011ec000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03e00000 fffff880`03e14000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00510000 fffff960`0051a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`040bd000 fffff880`040e3000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04fe1000 fffff880`04ff3000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05199000 fffff880`051b6000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`051b6000 fffff880`051b7f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04186000 fffff880`04197000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`05069000 fffff880`050c3000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`04125000 fffff880`04130000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04130000 fffff880`04186000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f9c000 fffff880`00fa9000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`018b3000 fffff880`018c1000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`018c1000 fffff880`018e6000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fbe000 fffff880`00fd3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`018f2000 fffff880`0193e000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03fe4000 fffff880`03fff000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0144a000 fffff880`0145a000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e4c000 fffff880`00ef0000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ef0000 fffff880`00eff000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03f89000 fffff880`03f92000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00380000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`00f56000 fffff880`00f5f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`041de000 fffff880`041ff000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`06800000 fffff880`06831000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`0683e000 fffff880`06859000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001B000
fffff880`068a2000 fffff880`068ac000   hiber_storpo
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`067ba000 fffff880`067e5000   hiber_nvstor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`069e1000 fffff880`069f4000   hiber_dumpfv
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`06831000 fffff880`0683b000   hiber_storpo
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`0678f000 fffff880`067ba000   hiber_nvstor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`0688f000 fffff880`068a2000   hiber_dumpfv
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`069e1000 fffff880`069eb000   hiber_storpo
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`06800000 fffff880`0682b000   hiber_nvstor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`0682b000 fffff880`0683e000   hiber_dumpfv
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`019eb000 fffff880`019f9000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01800000 fffff880`0180a000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`0180a000 fffff880`01835000   dump_nvstor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`01835000 fffff880`01848000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`03fc7000 fffff880`03fe4000   serial.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001D000

How do i attach a screen shot or a log of the memory and i don't know what SPD even stands for
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top