Update:
gdrv.sys Tue Dec 11 07:22:37 2007
GIGABYTE
RtHDMIV.sys Thu Dec 25 11:30:18 2008
RTKVHDA.sys Tue Jan 20 08:10:46 2009
Realtek High Definition Audio
Rt86win7.sys Thu Feb 26 11:04:22 2009
Realtek 8101E/8168/8169
Replace Avast with MSE:
avast! Uninstall Utility
http://www.microsoft.com/security_essentials/
If crashes persist, attach your latest .dmp files.
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100710-15646-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82e0c000 PsLoadedModuleList = 0x82f54810
System Uptime: 0 days 5:01:20.821
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.................
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
POOL_CORRUPTION_IN_FILE_AREA (de)
A driver corrupted pool memory used for holding pages destined for disk.
This was discovered by the memory manager when dereferencing the file.
Arguments:
Arg1: 00000002
Arg2: a7bfa398
Arg3: c03ba249
Arg4: 53df88c0
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xDE
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 82eaed54 to 82ee8d10
STACK_TEXT:
9deeb90c 82eaed54 000000de 00000002 a7bfa398 nt!KeBugCheckEx+0x1e
9deeb98c 82ebe5b5 88a3b268 01000000 00053df8 nt!MmPurgeSection+0x7ef
9deeb9bc 8bc8b7ad 8561e130 00000000 00000000 nt!CcPurgeCacheSection+0xe2
9deebae0 8bca0a3f 9debfa24 a4189008 a3096d08 Ntfs!NtfsDeleteFile+0x8f2
9deebce0 8bc30456 9debfa24 88080960 162be792 Ntfs!NtfsCommonCleanup+0x1f49
9deebd1c 82e7c10e 9debf9d4 00000000 ffffffff Ntfs!NtfsCommonCleanupCallout+0x1d
9deebd1c 82e7c205 9debf9d4 00000000 ffffffff nt!KiSwapKernelStackAndExit+0x15a
9debf93c 00000000 00000000 00000000 00000000 nt!KiSwitchKernelStackAndCallout+0x31
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmPurgeSection+7ef
82eaed54 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MmPurgeSection+7ef
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xDE_nt!MmPurgeSection+7ef
BUCKET_ID: 0xDE_nt!MmPurgeSection+7ef
Followup: MachineOwner
---------
1: kd> lmtn
start end module name
80bd1000 80bd9000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA)
82e0c000 8321c000 nt ntkrpamp.exe Tue Jul 14 02:15:19 2009 (4A5BC007)
8321c000 83253000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
8b82a000 8b835000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:13:13 2009 (4A5BBF89)
8b835000 8b846000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0)
8b846000 8b84e000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2)
8b84e000 8b890000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8b890000 8b93b000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8)
8b93b000 8b9ac000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
8b9ac000 8b9ba000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8b9ba000 8b9c5000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C)
8b9c5000 8b9cec00 aswTdi aswTdi.SYS Tue Sep 07 17:52:23 2010 (4C8651A7)
8ba00000 8ba0b000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E)
8ba0b000 8ba19000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23)
8ba19000 8ba30000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A)
8ba32000 8ba7a000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F)
8ba7a000 8ba83000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A)
8ba83000 8ba8b000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
8ba8b000 8bab5000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
8bab5000 8bac0000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
8bac0000 8bad1000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27)
8bad1000 8bae1000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8bae1000 8bb2c000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D)
8bb2c000 8bb33000 pciide pciide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
8bb33000 8bb41000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13)
8bb41000 8bb57000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
8bb57000 8bb60000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8bb60000 8bb83000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16)
8bb83000 8bb8c000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F)
8bb8c000 8bbc0000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11)
8bbc0000 8bbd1000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
8bbd1000 8bbf2000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
8bbf2000 8bbfa000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
8bc00000 8bc0d000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
8bc0d000 8bc15000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4)
8bc17000 8bd46000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45)
8bd46000 8bd71000 msrpc msrpc.sys Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8bd71000 8bd84000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8bd84000 8bde1000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427)
8bde1000 8bdef000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8bdef000 8bdf8000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
8bdf8000 8be00000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8be03000 8beba000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58)
8beba000 8bef8000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63)
8bef8000 8bf1d000 ksecpkg ksecpkg.sys Tue Jul 14 02:34:00 2009 (4A5BC468)
8bf1d000 8bf2d000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8bf2d000 8bf5f000 fvevol fvevol.sys Tue Jul 14 02:13:01 2009 (4A5BBF7D)
8bf5f000 8bf70000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20)
8bf70000 8bf95000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
8bfc7000 8bfe6000 cdrom cdrom.sys Tue Jul 14 02:11:24 2009 (4A5BBF1C)
8bfe6000 8bfed000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10)
8bfed000 8bff4000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC)
8bff4000 8c000000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E)
8c000000 8c02d000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
8c02e000 8c177000 tcpip tcpip.sys Tue Jul 14 02:13:18 2009 (4A5BBF8E)
8c177000 8c1a8000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8c1a8000 8c1b0380 vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8c1b1000 8c1f0000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26)
8c1f0000 8c1f8000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB)
8c1f8000 8c200000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
8fe00000 8fe34000 ks ks.sys Tue Jul 14 02:45:13 2009 (4A5BC709)
8fe3a000 8fe94000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62)
8fe94000 8fe98100 aswRdr aswRdr.SYS Tue Sep 07 17:47:44 2010 (4C865090)
8fe99000 8fecb000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52)
8fecb000 8fed2000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
8fed2000 8fef1000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916)
8fef1000 8feff000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912)
8feff000 8ff19000 serial serial.sys Tue Jul 14 02:45:33 2009 (4A5BC71D)
8ff19000 8ff2c000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956)
8ff2c000 8ff3c000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF)
8ff3c000 8ff7d000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2)
8ff7d000 8ff87000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
8ff87000 8ff91000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8ff91000 8ff9d000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8ff9d000 8ffb5000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
8ffb5000 8ffcc000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947)
8ffcc000 8ffe3000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951)
8ffe3000 8fff0000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8fff0000 8fffe000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A)
90e00000 90e0d000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
90e0d000 90e0e380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
90e10000 90e74000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC)
90e74000 90e8c000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8)
90e8c000 90e9a000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
90e9a000 90ec0c80 aswSP aswSP.SYS Tue Sep 07 17:52:01 2010 (4C865191)
90ec1000 90ee2000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B)
90ee2000 90ef3000 amdppm amdppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
90ef3000 90efc000 wmiacpi wmiacpi.sys Tue Jul 14 02:19:16 2009 (4A5BC0F4)
90efc000 90f37000 atikmpag atikmpag.sys Thu Aug 26 04:20:36 2010 (4C75C164)
90f37000 90f82000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871)
90f82000 90f9a000 parport parport.sys Tue Jul 14 02:45:34 2009 (4A5BC71E)
90f9a000 90fac000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
90fac000 90fc4000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939)
90fc4000 90fcf000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
90fcf000 90ff1000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A)
90ff1000 90ffb000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20)
91600000 9162c000 1394ohci 1394ohci.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
9162c000 91637000 fdc fdc.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
91638000 91c9c000 atikmdag atikmdag.sys Thu Aug 26 04:43:45 2010 (4C75C6D1)
91c9c000 91d53000 dxgkrnl dxgkrnl.sys Tue Jul 14 02:26:15 2009 (4A5BC297)
91d53000 91d8c000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
91d8c000 91dab000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
91dab000 91dd0000 Rt86win7 Rt86win7.sys Thu Feb 26 11:04:22 2009 (49A65B16)
91dd0000 91dda000 usbohci usbohci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
91dda000 91de9000 usbehci usbehci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
91de9000 91df3000 serenum serenum.sys Tue Jul 14 02:45:27 2009 (4A5BC717)
91df3000 91e00000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
95c38000 95c7c000 usbhub usbhub.sys Tue Jul 14 02:52:06 2009 (4A5BC8A6)
95c7c000 95c86000 flpydisk flpydisk.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
95c86000 95c97000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933)
95c97000 95cbb680 RtHDMIV RtHDMIV.sys Thu Dec 25 11:30:18 2008 (495352AA)
95cbc000 95ceb000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864)
95ceb000 95d04000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5)
95d04000 95d89000 HTTP HTTP.sys Tue Jul 14 02:12:53 2009 (4A5BBF75)
95d89000 95dc4000 mrxsmb10 mrxsmb10.sys Tue Jul 14 02:14:34 2009 (4A5BBFDA)
97400000 9741b000 mrxsmb20 mrxsmb20.sys Tue Jul 14 02:14:29 2009 (4A5BBFD5)
9741b000 97422000 parvdm parvdm.sys Tue Jul 14 02:45:29 2009 (4A5BC719)
97428000 9765c7c0 RTKVHDA RTKVHDA.sys Tue Jan 20 08:10:46 2009 (49756AE6)
9765d000 97667000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
97667000 97674000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
97674000 9767f000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
9767f000 97688000 dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
97688000 97699000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
97699000 976b0000 USBSTOR USBSTOR.SYS Tue Jul 14 02:51:19 2009 (4A5BC877)
976b0000 976b1700 USBD USBD.SYS Tue Jul 14 02:51:05 2009 (4A5BC869)
976b2000 976bd000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286)
976bd000 976d4000 usbccgp usbccgp.sys Tue Jul 14 02:51:31 2009 (4A5BC883)
976d4000 976df000 hidusb hidusb.sys Tue Jul 14 02:51:04 2009 (4A5BC868)
976df000 976f2000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
976f2000 976f8480 HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
976f9000 97705000 kbdhid kbdhid.sys Tue Jul 14 02:45:09 2009 (4A5BC705)
97705000 97710000 mouhid mouhid.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
97710000 9772b000 luafv luafv.sys Tue Jul 14 02:15:44 2009 (4A5BC020)
9772b000 97762000 aswMonFlt aswMonFlt.sys Tue Sep 07 17:47:28 2010 (4C865080)
97762000 97764b00 aswFsBlk aswFsBlk.SYS Tue Sep 07 17:47:05 2010 (4C865069)
97765000 9777f000 WudfPf WudfPf.sys Tue Jul 14 02:50:13 2009 (4A5BC835)
9777f000 9778f000 lltdio lltdio.sys Tue Jul 14 02:53:18 2009 (4A5BC8EE)
9778f000 977a2000 rspndr rspndr.sys Tue Jul 14 02:53:20 2009 (4A5BC8F0)
977a2000 977bb000 bowser bowser.sys Tue Jul 14 02:14:21 2009 (4A5BBFCD)
977bb000 977cd000 mpsdrv mpsdrv.sys Tue Jul 14 02:52:52 2009 (4A5BC8D4)
977cd000 977f0000 mrxsmb mrxsmb.sys Tue Jul 14 02:14:24 2009 (4A5BBFD0)
97ad0000 97d1a000 win32k win32k.sys unavailable (00000000)
97d30000 97d39000 TSDDD TSDDD.dll unavailable (00000000)
97d60000 97d7e000 cdd cdd.dll unavailable (00000000)
a0407000 a049e000 peauth peauth.sys Tue Jul 14 03:35:44 2009 (4A5BD2E0)
a049e000 a04a8000 secdrv secdrv.SYS Wed Sep 13 16:18:32 2006 (45080528)
a04a8000 a04c9000 srvnet srvnet.sys Tue Jul 14 02:14:45 2009 (4A5BBFE5)
a04c9000 a04d6000 tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
a04d6000 a0525000 srv2 srv2.sys Tue Jul 14 02:14:52 2009 (4A5BBFEC)
a0525000 a0576000 srv srv.sys Tue Jul 14 02:15:10 2009 (4A5BBFFE)
a0576000 a05783e0 gdrv gdrv.sys Tue Dec 11 07:22:37 2007 (475E1E9D)
a0579000 a0599480 WUDFRd WUDFRd.sys Tue Jul 14 02:50:44 2009 (4A5BC854)
Unloaded modules:
a05e4000 a05ef000 hiber_atapor
Timestamp: unavailable (00000000)
Checksum: 00000000
a05ef000 a05f8000 hiber_atapi.
Timestamp: unavailable (00000000)
Checksum: 00000000
a059a000 a05ab000 hiber_dumpfv
Timestamp: unavailable (00000000)
Checksum: 00000000
a05bf000 a05ca000 hiber_atapor
Timestamp: unavailable (00000000)
Checksum: 00000000
a05ca000 a05d3000 hiber_atapi.
Timestamp: unavailable (00000000)
Checksum: 00000000
a05d3000 a05e4000 hiber_dumpfv
Timestamp: unavailable (00000000)
Checksum: 00000000
a059a000 a05a5000 hiber_atapor
Timestamp: unavailable (00000000)
Checksum: 00000000
a05a5000 a05ae000 hiber_atapi.
Timestamp: unavailable (00000000)
Checksum: 00000000
a05ae000 a05bf000 hiber_dumpfv
Timestamp: unavailable (00000000)
Checksum: 00000000
a8227000 a8291000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
a8291000 a829c000 hiber_atapor
Timestamp: unavailable (00000000)
Checksum: 00000000
a829c000 a82a5000 hiber_atapi.
Timestamp: unavailable (00000000)
Checksum: 00000000
a82a5000 a82b6000 hiber_dumpfv
Timestamp: unavailable (00000000)
Checksum: 00000000
8bf95000 8bfa2000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8bfa2000 8bfad000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8bfad000 8bfb6000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8bfb6000 8bfc7000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100510-14554-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82e16000 PsLoadedModuleList = 0x82f5e810
System Uptime: 0 days 0:02:48.425
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
....
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 00000003, Process
Arg2: 872d1490, Terminating object
Arg3: 872d15fc, Process image file name
Arg4: 8303ed50, Explanatory message (ascii)
Debugging Details:
------------------
PROCESS_OBJECT: 872d1490
IMAGE_NAME: csrss.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: csrss
FAULTING_MODULE: 00000000
PROCESS_NAME: csrss.exe
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0xF4_C0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
STACK_TEXT:
9eeafc9c 830f207b 000000f4 00000003 872d1490 nt!KeBugCheckEx+0x1e
9eeafcc0 83075e44 8303ed50 872d15fc 872d1700 nt!PspCatchCriticalBreak+0x71
9eeafcf0 83077cdf 872d1490 87bd4730 c0000005 nt!PspTerminateAllThreads+0x2d
9eeafd24 82e5942a ffffffff c0000005 0268ebd4 nt!NtTerminateProcess+0x1a2
9eeafd24 771664f4 ffffffff c0000005 0268ebd4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0268ebd4 00000000 00000000 00000000 00000000 0x771664f4
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: 0xF4_C0000005_IMAGE_csrss.exe
BUCKET_ID: 0xF4_C0000005_IMAGE_csrss.exe
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100110-14898-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82e16000 PsLoadedModuleList = 0x82f5e810
System Uptime: 0 days 7:10:54.811
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
..............
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fe154c6c, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 82f36067, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
Unable to load image \SystemRoot\System32\win32k.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82f7e718
Unable to read MiSystemVaType memory at 82f5e160
fe154c6c
FAULTING_IP:
nt!ExAllocatePoolWithTag+4b7
82f36067 897004 mov dword ptr [eax+4],esi
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
TRAP_FRAME: a46636dc -- (.trap 0xffffffffa46636dc)
ErrCode = 00000002
eax=fe154c68 ebx=8f963e00 ecx=fe2d6c68 edx=fe354c68 esi=8f964080 edi=8f963e04
eip=82f36067 esp=a4663750 ebp=a4663798 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!ExAllocatePoolWithTag+0x4b7:
82f36067 897004 mov dword ptr [eax+4],esi ds:0023:fe154c6c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82e5c5f8 to 82e9b8e3
STACK_TEXT:
a46636c4 82e5c5f8 00000001 fe154c6c 00000000 nt!MmAccessFault+0x106
a46636c4 82f36067 00000001 fe154c6c 00000000 nt!KiTrap0E+0xdc
a4663798 979db868 00000021 00000130 706d5447 nt!ExAllocatePoolWithTag+0x4b7
WARNING: Stack unwind information not available. Following frames may be wrong.
a46637ac 979e9e73 00000130 706d5447 a46638e4 win32k+0xcb868
a46637c0 979e9e27 00000120 706d5447 a46637f0 win32k+0xd9e73
a46637d0 979ea101 00000120 a4663cfc fe63e3e0 win32k+0xd9e27
a46637f0 979eacfa ffbbe050 0000000d a4663cfc win32k+0xda101
a4663b38 9795af67 a4663cfc 00000159 0000030a win32k+0xdacfa
a4663bb4 979bfb07 02030398 ffbbe06c 00001000 win32k+0x4af67
a4663d24 82e593cc 00000099 021279d4 021279f0 win32k+0xafb07
a4663d34 76e464f4 badb0d00 021279d4 00000000 nt!KiFastCallEntry+0xcc
a4663d38 badb0d00 021279d4 00000000 00000000 0x76e464f4
a4663d3c 021279d4 00000000 00000000 00000000 0xbadb0d00
a4663d40 00000000 00000000 00000000 00000000 0x21279d4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k+cb868
979db868 ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k+cb868
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: 0x50_win32k+cb868
BUCKET_ID: 0x50_win32k+cb868
Followup: MachineOwner
---------