Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100210-22620-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50
..................................................
Loading User Symbols
Mini Kernel Dump does not contain unloaded driver list
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 124, {0, fffffa800831f8f8, 0, 0}
Probably caused by : hardware
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa800831f8f8, Address of the WHEA_ERROR_RECORD structure.
Arg3: 0000000000000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000000000, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
BUGCHECK_STR: 0x124_AuthenticAMD
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`031bd6f0 fffff800`02f0da89 : fffffa80`0831f8d0 fffffa80`06d38680 00000000`00000004 00000000`00000001 : nt!WheapCreateLiveTriageDump+0x6c
fffff880`031bdc10 fffff800`02def667 : fffffa80`0831f8d0 fffff800`02e685f8 fffffa80`06d38680 00000002`00000005 : nt!WheapCreateTriageDumpFromPreviousSession+0x49
fffff880`031bdc40 fffff800`02d57c45 : fffff800`02eca360 fffffa80`082b8158 fffffa80`082b8150 fffffa80`06d38680 : nt!WheapProcessWorkQueueItem+0x57
fffff880`031bdc80 fffff800`02cd0961 : fffff880`0113ae00 fffff800`02d57c20 fffffa80`06d38680 00000554`00000000 : nt!WheapWorkQueueWorkerRoutine+0x25
fffff880`031bdcb0 fffff800`02f67c06 : 00000554`00000000 fffffa80`06d38680 00000000`00000080 fffffa80`06d27040 : nt!ExpWorkerThread+0x111
fffff880`031bdd40 fffff800`02ca1c26 : fffff880`02f64180 fffffa80`06d38680 fffff880`02f6efc0 00000554`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031bdd80 00000000`00000000 : fffff880`031be000 fffff880`031b8000 fffff880`037ef540 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x124_AuthenticAMD_PROCESSOR_BUS_PRV
BUCKET_ID: X64_0x124_AuthenticAMD_PROCESSOR_BUS_PRV
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100310-22729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50
.......
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a00a216c88, 0, fffff880019dbb4e, 0}
Could not read faulting driver name
Probably caused by : luafv.sys ( luafv!LuafvFindTableNode+182 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a00a216c88, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880019dbb4e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb0e0
fffff8a00a216c88
FAULTING_IP:
luafv!LuafvFindTableNode+182
fffff880`019dbb4e 6641837d005c cmp word ptr [r13],5Ch
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: DungeonSiege2.
CURRENT_IRQL: 0
TRAP_FRAME: fffff88008f12080 -- (.trap 0xfffff88008f12080)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000219 rbx=0000000000000000 rcx=fffff8a006d17458
rdx=fffff88008f12300 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880019dbb4e rsp=fffff88008f12210 rbp=0000000000001068
r8=0000000000000001 r9=0000000000000002 r10=0064007200610048
r11=fffffa8007835b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
luafv!LuafvFindTableNode+0x182:
fffff880`019dbb4e 6641837d005c cmp word ptr [r13],5Ch ds:0001:00000000`00000000=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d43f14 to fffff80002cc3740
STACK_TEXT:
fffff880`08f11f18 fffff800`02d43f14 : 00000000`00000050 fffff8a0`0a216c88 00000000`00000000 fffff880`08f12080 : nt!KeBugCheckEx
fffff880`08f11f20 fffff800`02cc182e : 00000000`00000000 fffff8a0`06d17458 fffff8a0`06d17400 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`08f12080 fffff880`019dbb4e : fffff8a0`0a391438 00000000`00000022 fffff8a0`0a4eed08 fffff8a0`0222ac38 : nt!KiPageFault+0x16e
fffff880`08f12210 fffff880`019e2c0e : 00000000`00000000 fffff8a0`0a391400 fffffa80`00000004 fffff880`08f123b8 : luafv!LuafvFindTableNode+0x182
fffff880`08f12320 fffff880`019df10c : 00000000`00000000 fffff880`08f12500 fffffa80`0a30bd60 00000000`00000000 : luafv!LuafvQueryStoreFile+0x452
fffff880`08f12490 fffff880`0110c027 : fffffa80`0a30be80 00000000`0000004e fffff880`08f125b0 fffffa80`0a30bc00 : luafv!LuafvPreCreate+0x360
fffff880`08f12560 fffff880`0110e8ca : fffffa80`0788bb00 fffffa80`0788bb00 fffffa80`08657900 fffffa80`08651000 : fltmgr!FltpPerformPreCallbacks+0x2f7
fffff880`08f12660 fffff880`0112c2a3 : fffffa80`07aae350 fffffa80`07aae350 fffffa80`07aae350 fffffa80`6d4e6f49 : fltmgr!FltpPassThroughInternal+0x4a
fffff880`08f12690 fffff800`02fc6807 : 00000000`00000005 fffff800`02fc6260 fffffa80`070a0480 00000000`00000000 : fltmgr!FltpCreate+0x293
fffff880`08f12740 fffff800`02fbce84 : fffffa80`07c40cd0 00000000`00000000 fffffa80`071bf6d0 fffffa80`06d35801 : nt!IopParseDevice+0x5a7
fffff880`08f128d0 fffff800`02fc1e4d : fffffa80`071bf6d0 fffff880`08f12a30 00000000`00000040 fffffa80`06d358a0 : nt!ObpLookupObjectName+0x585
fffff880`08f129d0 fffff800`02fc8917 : 00000000`00000000 00000000`00000001 00000000`00ce2501 fffffa80`091e6278 : nt!ObOpenObjectByName+0x1cd
fffff880`08f12a80 fffff800`02fd2520 : 00000000`0008e2d8 fffff800`80100080 00000000`00000000 00000000`0008e2f0 : nt!IopCreateFile+0x2b7
fffff880`08f12b20 fffff800`02cc2993 : fffffa80`07835b60 00000000`0008e2f8 fffffa80`07835b60 fffff800`02fd93f0 : nt!NtCreateFile+0x78
fffff880`08f12bb0 00000000`7760040a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7760040a
STACK_COMMAND: kb
FOLLOWUP_IP:
luafv!LuafvFindTableNode+182
fffff880`019dbb4e 6641837d005c cmp word ptr [r13],5Ch
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: luafv!LuafvFindTableNode+182
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: luafv
IMAGE_NAME: luafv.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc295
FAILURE_BUCKET_ID: X64_0x50_luafv!LuafvFindTableNode+182
BUCKET_ID: X64_0x50_luafv!LuafvFindTableNode+182
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100310-23883-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c03000 PsLoadedModuleList = 0xfffff800`02e40e50
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 8, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eab0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
+0
00000000`00000000 ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: fffff88003329680 -- (.trap 0xfffff88003329680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80076baf6a
rdx=fffffdfffbc6e77e rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff88003329810 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=fffffa80076baf6a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c72ca9 to fffff80002c73740
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ?? ???
STACK_TEXT:
fffff880`03329538 fffff800`02c72ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff880`03329540 fffff800`02c71920 : 00000000`00000000 fffff880`02f64180 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03329680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02c71920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260
BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100110-21824-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c05000 PsLoadedModuleList = 0xfffff800`02e42e50
...............................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 1, fffff8800412ef28}
Probably caused by : ntkrnlmp.exe ( nt!PoIdle+53a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800412ef28, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ead0e0
0000000000000000
CURRENT_IRQL: 0
FAULTING_IP:
+0
fffff880`0412ef28 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from fffff80002c8324a to fffff88003f017f2
STACK_TEXT:
fffff800`00b9cc98 fffff800`02c8324a : 00000000`0032aa1f fffffa80`085d6548 fffff800`02dfdc40 00000000`00000001 : 0xfffff880`03f017f2
fffff800`00b9cca0 fffff800`02c7debc : fffff800`02defe80 fffff800`00000000 00000000`00000000 fffff880`01420c50 : nt!PoIdle+0x53a
fffff800`00b9cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PoIdle+53a
fffff800`02c8324a 0fba25f61318000f bt dword ptr [nt!PerfGlobalGroupMask+0x8 (fffff800`02e04648)],0Fh
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PoIdle+53a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xD1_nt!PoIdle+53a
BUCKET_ID: X64_0xD1_nt!PoIdle+53a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100810-30435- 01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002cc09cf, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KxNmiInterrupt+f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cc09cf, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KxNmiInterrupt+f
fffff800`02cc09cf 0f29742430 movaps xmmword ptr [rsp+30h],xmm6
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb0e0
0000000000000000
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88006b03838 -- (.exr 0xfffff88006b03838)
ExceptionAddress: fffff80002cc09cf (nt!KxNmiInterrupt+0x000000000000000f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
TRAP_FRAME: fffff88006b038e0 -- (.trap 0xfffff88006b038e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88006b03b78 rbx=0000000000000000 rcx=fffffa8009b3c011
rdx=fffffa800952e701 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cc09cf rsp=fffff88006b03a78 rbp=fffff88006b03ca0
r8=fffffa800952e700 r9=0000000000000000 r10=fffffa8006a25dc0
r11=fffff88006b03ba0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
nt!KxNmiInterrupt+0xf:
fffff800`02cc09cf 0f29742430 movaps xmmword ptr [rsp+30h],xmm6 ss:0018:fffff880`06b03aa8=fffffa80092cd790fffffa80092cd3d0
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cfda39 to fffff80002cc3740
STACK_TEXT:
fffff880`06b03068 fffff800`02cfda39 : 00000000`0000001e ffffffff`c0000005 fffff800`02cc09cf 00000000`00000000 : nt!KeBugCheckEx
fffff880`06b03070 fffff800`02cc2d82 : fffff880`06b03838 fffffa80`092cd3d0 fffff880`06b038e0 00000000`00b4f998 : nt!KiDispatchException+0x1b9
fffff880`06b03700 fffff800`02cc168a : fffffa80`0877f001 00000000`00000000 fffffa80`092cd3d0 fffff800`02cc95da : nt!KiExceptionDispatch+0xc2
fffff880`06b038e0 fffff800`02cc09cf : fffff800`02cc81fa 00000000`00000000 fffffa80`092cd4d8 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`06b03a78 fffffa80`092cd3d0 : 00000000`00b4f998 fffff880`06b03bc8 fffff8a0`02800060 00000000`00000000 : nt!KxNmiInterrupt+0xf
fffff880`06b03bb8 00000000`00b4f998 : fffff880`06b03bc8 fffff8a0`02800060 00000000`00000000 0000007f`fffffff8 : 0xfffffa80`092cd3d0
fffff880`06b03bc0 fffff880`06b03bc8 : fffff8a0`02800060 00000000`00000000 0000007f`fffffff8 00000000`00000000 : 0xb4f998
fffff880`06b03bc8 fffff8a0`02800060 : 00000000`00000000 0000007f`fffffff8 00000000`00000000 00000000`00000000 : 0xfffff880`06b03bc8
fffff880`06b03bd0 00000000`00000000 : 0000007f`fffffff8 00000000`00000000 00000000`00000000 00000000`00000644 : 0xfffff8a0`02800060
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KxNmiInterrupt+f
fffff800`02cc09cf 0f29742430 movaps xmmword ptr [rsp+30h],xmm6
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KxNmiInterrupt+f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_nt!KxNmiInterrupt+f
BUCKET_ID: X64_0x1E_nt!KxNmiInterrupt+f
Followup: MachineOwner
---------
3: kd> lmtn
start end module name
fffff800`00bd1000 fffff800`00bdb000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02c0a000 fffff800`02c53000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02c53000 fffff800`0322f000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00cc0000 fffff880`00cda000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00cda000 fffff880`00ce3000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00ce6000 fffff880`00cf3000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00cf3000 fffff880`00d07000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00d07000 fffff880`00d65000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d65000 fffff880`00d8f000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00d8f000 fffff880`00dd5000 mv61xx mv61xx.sys Fri Mar 20 05:48:21 2009 (49C31205)
fffff880`00e00000 fffff880`00e0a000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00e0a000 fffff880`00e3d000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00e3d000 fffff880`00e4a000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00e4a000 fffff880`00e5f000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00e5f000 fffff880`00e74000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e74000 fffff880`00ed0000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00ed0000 fffff880`00ed7000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00ed7000 fffff880`00ee7000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00eea000 fffff880`00f8e000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f8e000 fffff880`00f9d000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f9d000 fffff880`00ff4000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00ff4000 fffff880`00ffd000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0105c000 fffff880`0108b000 SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`0108b000 fffff880`01096000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`01096000 fffff880`010e2000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`010e2000 fffff880`010f6000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`010f6000 fffff880`01154000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01154000 fffff880`011c7000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`01200000 fffff880`01211000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`01211000 fffff880`0121b000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01241000 fffff880`013e4000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013e4000 fffff880`013fe000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`01408000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01408000 fffff880`01426000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`01426000 fffff880`01433000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`01439000 fffff880`0152b000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0152b000 fffff880`0158b000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`0158b000 fffff880`015b6000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`015b6000 fffff880`01600000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`01800000 fffff880`0180e000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`0180e000 fffff880`01833000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`01833000 fffff880`01843000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`01843000 fffff880`0184c000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`0184c000 fffff880`01855000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01855000 fffff880`0185e000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`0185e000 fffff880`01869000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01869000 fffff880`0187a000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01886000 fffff880`018c0000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`018c0000 fffff880`018d2000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`018d2000 fffff880`018db000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`018db000 fffff880`01915000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01915000 fffff880`0192b000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`0192b000 fffff880`0195b000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`0195b000 fffff880`01965000 avgrkx64 avgrkx64.sys Tue Sep 07 03:49:37 2010 (4C858C21)
fffff880`01965000 fffff880`0196f000 AVGIDSEH AVGIDSEH.Sys Tue Sep 14 01:46:38 2010 (4C8EA9CE)
fffff880`0196f000 fffff880`01977000 AtiPcie AtiPcie.sys Tue May 05 18:00:22 2009 (4A005486)
fffff880`019ad000 fffff880`019d7000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`019d7000 fffff880`019e6000 avgmfx64 avgmfx64.sys Tue Sep 07 03:49:14 2010 (4C858C0A)
fffff880`019e6000 fffff880`019ef000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`019ef000 fffff880`019f6000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`02c00000 fffff880`02c8a000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02c8a000 fffff880`02c93000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02c93000 fffff880`02cb9000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02cb9000 fffff880`02cc8000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02cc8000 fffff880`02ce5000 serial serial.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`02cf6000 fffff880`02d57000 avgtdia avgtdia.sys Tue Sep 07 03:52:11 2010 (4C858CBB)
fffff880`02d57000 fffff880`02d9c000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02d9c000 fffff880`02db7000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`02db7000 fffff880`02dcb000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03a19000 fffff880`03ae1000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`03ae1000 fffff880`03aff000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`03aff000 fffff880`03b17000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`03b17000 fffff880`03b44000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`03b44000 fffff880`03b92000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`03b92000 fffff880`03bb5000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`03bb5000 fffff880`03bc1000 AVGIDSFilter AVGIDSFilter.Sys Wed Aug 04 01:23:21 2010 (4C5896D9)
fffff880`03e3a000 fffff880`03e8b000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03e8b000 fffff880`03e97000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03e97000 fffff880`03ea2000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03ea2000 fffff880`03eb1000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03eb1000 fffff880`03ecf000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03ecf000 fffff880`03ee0000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03ee0000 fffff880`03f2f000 avgldx64 avgldx64.sys Tue Sep 07 03:49:29 2010 (4C858C19)
fffff880`03f2f000 fffff880`03f36000 AsIO AsIO.sys Mon Dec 17 11:11:49 2007 (47663D55)
fffff880`03f36000 fffff880`03f5c000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`03f5c000 fffff880`03f71000 amdppm amdppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`03f71000 fffff880`03fbb000 atikmpag atikmpag.sys Thu Aug 26 04:20:56 2010 (4C75C178)
fffff880`03fbb000 fffff880`03ff9000 1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`04000000 fffff880`04046000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`04046000 fffff880`0406a000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0406a000 fffff880`040b5000 Rt64win7 Rt64win7.sys Thu Nov 05 16:15:41 2009 (4AF2DE0D)
fffff880`040b5000 fffff880`040c0000 usbohci usbohci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`040cf000 fffff880`041c3000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`04400000 fffff880`04412000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`04437000 fffff880`0448d000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`0448d000 fffff880`0449e000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`0449e000 fffff880`044a6000 ASACPI ASACPI.sys Thu May 14 04:25:17 2009 (4A0B72FD)
fffff880`044a6000 fffff880`044b2000 serenum serenum.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`044b2000 fffff880`044bb000 wmiacpi wmiacpi.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`044bb000 fffff880`044cb000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`044cb000 fffff880`044e1000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`044e1000 fffff880`04505000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04505000 fffff880`04511000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04511000 fffff880`04540000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04540000 fffff880`0455b000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`0455b000 fffff880`0457c000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`0457c000 fffff880`04596000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`04596000 fffff880`045a5000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`045a5000 fffff880`045b4000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`045b4000 fffff880`045b5480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`045b6000 fffff880`045f9000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`04832000 fffff880`04fed000 atikmdag atikmdag.sys Thu Aug 26 04:47:22 2010 (4C75C7AA)
fffff880`05a00000 fffff880`05a0e000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`05a0e000 fffff880`05a31000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`05a31000 fffff880`05a52000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`05a52000 fffff880`05a67000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`05a67000 fffff880`05a7f000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`05aa7000 fffff880`05b01000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`05b01000 fffff880`05b16000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`05b16000 fffff880`05b36000 AtihdW76 AtihdW76.sys Thu Jul 15 15:46:49 2010 (4C3F0339)
fffff880`05b36000 fffff880`05b73000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`05b73000 fffff880`05b95000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`05b95000 fffff880`05b9a200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`05b9b000 fffff880`05bb6000 USBSTOR USBSTOR.SYS Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`05bb6000 fffff880`05bc4000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`05bc4000 fffff880`05bd0000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05bd0000 fffff880`05bd9000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05bd9000 fffff880`05bec000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`05bec000 fffff880`05bf8000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`06400000 fffff880`06419000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`06419000 fffff880`06421080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`06422000 fffff880`06430000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`06430000 fffff880`0643d000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`06441000 fffff880`065d2000 viahduaa viahduaa.sys Tue Jun 02 11:55:21 2009 (4A24E8F9)
fffff880`065d2000 fffff880`065ef000 usbccgp usbccgp.sys Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`065ef000 fffff880`065f0f00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`065f1000 fffff880`065ff000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`06c00000 fffff880`06c34000 AVGIDSDriver AVGIDSDriver.Sys Wed Aug 04 01:24:45 2010 (4C58972D)
fffff880`06c34000 fffff880`06c9c000 srv2 srv2.sys Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`06cfa000 fffff880`06da0000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`06da0000 fffff880`06dab000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`06dab000 fffff880`06dd8000 srvnet srvnet.sys Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`06dd8000 fffff880`06dea000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`08a74000 fffff880`08b0a000 srv srv.sys Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`08b0a000 fffff880`08b3b000 WUDFRd WUDFRd.sys Tue Jul 14 03:06:06 2009 (4A5BCBEE)
fffff960`000a0000 fffff960`003af000 win32k win32k.sys Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`004b0000 fffff960`004ba000 TSDDD TSDDD.dll Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff960`00720000 fffff960`00747000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`01977000 fffff880`01985000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01985000 fffff880`01991000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01991000 fffff880`0199a000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0199a000 fffff880`019ad000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000