BSOD


  1. Posts : 1
    Windows 7 Home
       #1

    BSOD


    Hi,

    Just found the BSOD posting instructions and have including the files. Hopefully, I was able to provide everything correctly.

    Windows 7 64bit
    OEM from Best Buy
    Bought in January 2009


    Thanks,
    Russell
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    IRQL_NOT_LESS_OR_EQUAL (a)
    This is usually caused by drivers using improper addresses.


    Update:

    WmXlCore.sys Thu Jan 24 18:01:22 2008
    Logitech gamepad

    Rt64win7.sys Thu Jul 30 07:58:43 2009
    Realtek 8136/8168/8169 PCI/PCIe Adapters

    rtl8192se.sys Fri Oct 02 01:33:48 2009
    Realtek RTL81892SE Wireless LAN PCI-E NIC

    RTKVHD64.sys Tue Jul 28 09:00:05 2009
    Realtek Audio

    atikmdag.sys Thu Jul 30 00:23:28 2009
    ATI

    pgeffect.sys Mon Jun 22 05:00:11 2009
    TOSHIBA Universal Camera

    SynTP.sys Mon Jul 20 20:07:29 2009
    Synaptics Touchpad

    tos_sps64.sys Wed Jun 24 01:31:09 2009
    Get all available Toshiba updates


    DMP

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121310-41901-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`0381a000 PsLoadedModuleList = 0xfffff800`03a57e50
    Debug session time: Mon Dec 13 09:29:16.227 2010 (UTC - 5:00)
    System Uptime: 0 days 0:01:14.053
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {90, 2, 0, fffff80003891995}
    
    Probably caused by : msrpc.sys ( msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000090, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003891995, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ac20e0
     0000000000000090 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiCommitThreadWait+1d5
    fffff800`03891995 488bbb90000000  mov     rdi,qword ptr [rbx+90h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  SmartFaceVWatc
    
    TRAP_FRAME:  fffff88007ad62f0 -- (.trap 0xfffff88007ad62f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff88007ad6440
    rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003891995 rsp=fffff88007ad6480 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000007e00 r10=0000000000000009
    r11=fffffa80033d433c r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!KiCommitThreadWait+0x1d5:
    fffff800`03891995 488bbb90000000  mov     rdi,qword ptr [rbx+90h] ds:00000000`00000090=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003889ca9 to fffff8000388a740
    
    STACK_TEXT:  
    fffff880`07ad61a8 fffff800`03889ca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`07ad61b0 fffff800`03888920 : fffffa80`05a73060 00000000`00000000 00000000`0986fd3a fffff800`03a04e80 : nt!KiBugCheckDispatch+0x69
    fffff880`07ad62f0 fffff800`03891995 : fffffa80`06688060 fffffa80`06688060 fffff800`03a19a20 fffff800`00000009 : nt!KiPageFault+0x260
    fffff880`07ad6480 fffff800`03893cff : fffff800`03a04e80 fffff800`03a04e80 00000000`0000006c fffffa80`06089940 : nt!KiCommitThreadWait+0x1d5
    fffff880`07ad6510 fffff880`0115c1c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`05ca3c00 : nt!KeWaitForSingleObject+0x19f
    fffff880`07ad65b0 fffff880`0115b05d : fffffa80`06688060 fffff8a0`02c87320 00000000`00000001 fffffa80`cd637052 : msrpc!LRPC_CASSOCIATION::OpenSecurityContext+0x118
    fffff880`07ad6620 fffff880`0115b37b : fffff8a0`03133e40 00000000`00000000 fffff8a0`03133e40 fffff8a0`02c87320 : msrpc!LRPC_BASE_BINDING_HANDLE::BaseBindingCopy+0x15d
    fffff880`07ad6760 fffff880`0115e9d2 : fffff8a0`02c87320 fffff8a0`02c87320 00000000`00000001 00000000`00000058 : msrpc!LRPC_FAST_BINDING_HANDLE::BindingCopy+0x8b
    fffff880`07ad6790 fffff960`003644f3 : fffff8a0`0308b3a0 fffff900`c29096a0 00000000`00000001 00000000`000007ff : msrpc!RpcBindingCopy+0x42
    fffff880`07ad67c0 fffff960`000e26a9 : fffff900`c29096a0 00000000`00000000 fffffa80`06529b30 00000000`00000000 : win32k!PlaySoundPostMessage+0x77
    fffff880`07ad6820 fffff960`0013d285 : 00000000`00000030 fffffa80`06688060 fffff880`07ad6c20 fffffa80`06529b30 : win32k!PostPlaySoundMessage+0x25
    fffff880`07ad6850 fffff960`001342cb : fffff900`c29096a0 fffff880`07ad6c20 00000000`ffffffff fffffa80`06529b30 : win32k!DestroyProcessInfo+0x125
    fffff880`07ad6880 fffff960`001343c6 : fffffa80`04b34500 fffff900`c29096a0 00020508`00000000 fffff8a0`002dd001 : win32k!xxxUserProcessCallout+0x15f
    fffff880`07ad68d0 fffff800`03b6fa01 : fffffa80`04b345e0 00000000`00000000 00000000`00000000 fffffa80`06688060 : win32k!W32pProcessCallout+0x4e
    fffff880`07ad6900 fffff800`03b48635 : 00000000`00000000 fffff800`03b89101 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`07ad69c0 fffff800`038671db : fffffa80`05bfc001 fffffa80`0665c010 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
    fffff880`07ad69f0 fffff800`03867620 : 00000000`00383930 fffff880`07ad6a70 fffff800`03b4874c 00000000`00000001 : nt!KiDeliverApc+0x2eb
    fffff880`07ad6a70 fffff800`03889a37 : 00000000`0000046e 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
    fffff880`07ad6bb0 00000000`779601ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
    00000000`02acf508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779601ea
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    fffff880`0115c1c8 8b7710          mov     esi,dword ptr [rdi+10h]
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: msrpc
    
    IMAGE_NAME:  msrpc.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc17c
    
    FAILURE_BUCKET_ID:  X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    
    BUCKET_ID:  X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000090, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003891995, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  0000000000000090 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiCommitThreadWait+1d5
    fffff800`03891995 488bbb90000000  mov     rdi,qword ptr [rbx+90h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  SmartFaceVWatc
    
    TRAP_FRAME:  fffff88007ad62f0 -- (.trap 0xfffff88007ad62f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff88007ad6440
    rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003891995 rsp=fffff88007ad6480 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000007e00 r10=0000000000000009
    r11=fffffa80033d433c r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!KiCommitThreadWait+0x1d5:
    fffff800`03891995 488bbb90000000  mov     rdi,qword ptr [rbx+90h] ds:00000000`00000090=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003889ca9 to fffff8000388a740
    
    STACK_TEXT:  
    fffff880`07ad61a8 fffff800`03889ca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`07ad61b0 fffff800`03888920 : fffffa80`05a73060 00000000`00000000 00000000`0986fd3a fffff800`03a04e80 : nt!KiBugCheckDispatch+0x69
    fffff880`07ad62f0 fffff800`03891995 : fffffa80`06688060 fffffa80`06688060 fffff800`03a19a20 fffff800`00000009 : nt!KiPageFault+0x260
    fffff880`07ad6480 fffff800`03893cff : fffff800`03a04e80 fffff800`03a04e80 00000000`0000006c fffffa80`06089940 : nt!KiCommitThreadWait+0x1d5
    fffff880`07ad6510 fffff880`0115c1c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`05ca3c00 : nt!KeWaitForSingleObject+0x19f
    fffff880`07ad65b0 fffff880`0115b05d : fffffa80`06688060 fffff8a0`02c87320 00000000`00000001 fffffa80`cd637052 : msrpc!LRPC_CASSOCIATION::OpenSecurityContext+0x118
    fffff880`07ad6620 fffff880`0115b37b : fffff8a0`03133e40 00000000`00000000 fffff8a0`03133e40 fffff8a0`02c87320 : msrpc!LRPC_BASE_BINDING_HANDLE::BaseBindingCopy+0x15d
    fffff880`07ad6760 fffff880`0115e9d2 : fffff8a0`02c87320 fffff8a0`02c87320 00000000`00000001 00000000`00000058 : msrpc!LRPC_FAST_BINDING_HANDLE::BindingCopy+0x8b
    fffff880`07ad6790 fffff960`003644f3 : fffff8a0`0308b3a0 fffff900`c29096a0 00000000`00000001 00000000`000007ff : msrpc!RpcBindingCopy+0x42
    fffff880`07ad67c0 fffff960`000e26a9 : fffff900`c29096a0 00000000`00000000 fffffa80`06529b30 00000000`00000000 : win32k!PlaySoundPostMessage+0x77
    fffff880`07ad6820 fffff960`0013d285 : 00000000`00000030 fffffa80`06688060 fffff880`07ad6c20 fffffa80`06529b30 : win32k!PostPlaySoundMessage+0x25
    fffff880`07ad6850 fffff960`001342cb : fffff900`c29096a0 fffff880`07ad6c20 00000000`ffffffff fffffa80`06529b30 : win32k!DestroyProcessInfo+0x125
    fffff880`07ad6880 fffff960`001343c6 : fffffa80`04b34500 fffff900`c29096a0 00020508`00000000 fffff8a0`002dd001 : win32k!xxxUserProcessCallout+0x15f
    fffff880`07ad68d0 fffff800`03b6fa01 : fffffa80`04b345e0 00000000`00000000 00000000`00000000 fffffa80`06688060 : win32k!W32pProcessCallout+0x4e
    fffff880`07ad6900 fffff800`03b48635 : 00000000`00000000 fffff800`03b89101 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`07ad69c0 fffff800`038671db : fffffa80`05bfc001 fffffa80`0665c010 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
    fffff880`07ad69f0 fffff800`03867620 : 00000000`00383930 fffff880`07ad6a70 fffff800`03b4874c 00000000`00000001 : nt!KiDeliverApc+0x2eb
    fffff880`07ad6a70 fffff800`03889a37 : 00000000`0000046e 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
    fffff880`07ad6bb0 00000000`779601ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
    00000000`02acf508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779601ea
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    fffff880`0115c1c8 8b7710          mov     esi,dword ptr [rdi+10h]
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: msrpc
    
    IMAGE_NAME:  msrpc.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc17c
    
    FAILURE_BUCKET_ID:  X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    
    BUCKET_ID:  X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    
    Followup: MachineOwner
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121310-93241-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03854000 PsLoadedModuleList = 0xfffff800`03a91e50
    Debug session time: Mon Dec 13 10:20:07.631 2010 (UTC - 5:00)
    System Uptime: 0 days 0:37:41.473
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 0, fffff800038e42b3}
    
    Probably caused by : win32k.sys ( win32k!GreLockVisRgn+19 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800038e42b3, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003afc0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+ae3
    fffff800`038e42b3 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  rundll32.exe
    
    IRP_ADDRESS:  ffffffffffffff89
    
    TRAP_FRAME:  fffff88006ef33a0 -- (.trap 0xfffff88006ef33a0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88006ef3728 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800038e42b3 rsp=fffff88006ef3530 rbp=fffff88006ef3680
     r8=fffffa8005bc0850  r9=fffff88006ef3630 r10=0000000000000002
    r11=fffffa8005bc0f40 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po cy
    nt!IopCompleteRequest+0xae3:
    fffff800`038e42b3 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800038c3ca9 to fffff800038c4740
    
    STACK_TEXT:  
    fffff880`06ef3258 fffff800`038c3ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`06ef3260 fffff800`038c2920 : fffffa80`04a0c4c0 fffffa80`05c6f660 fffffa80`04a0c500 fffff800`038f7f8c : nt!KiBugCheckDispatch+0x69
    fffff880`06ef33a0 fffff800`038e42b3 : fffffa80`043b6f68 fffffa80`042da400 00000000`0000007f 00000000`00000030 : nt!KiPageFault+0x260
    fffff880`06ef3530 fffff800`038a10c7 : 00000000`00000001 fffffa80`039371c0 00000000`00000000 fffffa80`00000000 : nt!IopCompleteRequest+0xae3
    fffff880`06ef3600 fffff800`038a1487 : fffffa80`051dcb60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`06ef3680 fffff800`038bade5 : fffff800`038d07e3 00000000`00000030 fffffa80`051dcb60 fffff900`c1ad3010 : nt!KiApcInterrupt+0xd7
    fffff880`06ef3818 fffff800`038d07e3 : 00000000`00000030 fffffa80`051dcb60 fffff900`c1ad3010 00000000`00000000 : nt!ExAcquireResourceSharedLite+0x5
    fffff880`06ef3820 fffff960`001f6db1 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff900`00000000 : nt!ExEnterPriorityRegionAndAcquireResourceShared+0x23
    fffff880`06ef3850 fffff960`00134313 : fffff900`c1ad3010 fffff880`06ef3c20 00000000`ffffffff fffffa80`03937060 : win32k!GreLockVisRgn+0x19
    fffff880`06ef3880 fffff960`001343c6 : fffffa80`0574e900 fffff900`c1ad3010 00000000`a0000000 fffffa80`05c64890 : win32k!xxxUserProcessCallout+0x1a7
    fffff880`06ef38d0 fffff800`03ba9a01 : fffffa80`0574e960 00000000`00000000 00000000`00000000 fffffa80`051dcb60 : win32k!W32pProcessCallout+0x4e
    fffff880`06ef3900 fffff800`03b82635 : 00000000`00000000 fffffa80`051dcb01 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`06ef39c0 fffff800`038a11db : 00000000`00000000 00000000`00000000 fffffa80`05c64960 00000000`00000000 : nt!PsExitSpecialApc+0x1d
    fffff880`06ef39f0 fffff800`038a1620 : 00000000`000ffb90 fffff880`06ef3a70 fffff800`03b8274c 00000000`00000001 : nt!KiDeliverApc+0x2eb
    fffff880`06ef3a70 fffff800`038c3a37 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
    fffff880`06ef3bb0 00000000`775dff1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
    00000000`00c5ee88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775dff1a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!GreLockVisRgn+19
    fffff960`001f6db1 488b1588331500  mov     rdx,qword ptr [win32k!ghsemDynamicModeChange (fffff960`0034a140)]
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  win32k!GreLockVisRgn+19
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dc13c
    
    FAILURE_BUCKET_ID:  X64_0xA_win32k!GreLockVisRgn+19
    
    BUCKET_ID:  X64_0xA_win32k!GreLockVisRgn+19
    
    Followup: MachineOwner
    ---------


    DRIVERS:

    Code:
    start             end                 module name
    fffff880`00f2b000 fffff880`00f82000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02cca000 fffff880`02d54000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0453d000 fffff880`04553000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`03a77000 fffff880`03a8c000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00dba000 fffff880`00dc5000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00d7c000 fffff880`00d85000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00d85000 fffff880`00daf000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`03ce0000 fffff880`042f7000   atikmdag atikmdag.sys Thu Jul 30 00:23:28 2009 (4A712040)
    fffff880`01880000 fffff880`01888000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
    fffff880`00ff3000 fffff880`00fff000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`018ad000 fffff880`018b4000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02ded000 fffff880`02dfe000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`02ac8000 fffff880`02ae6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00700000 fffff960`00727000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0122b000 fffff880`01255000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01850000 fffff880`01880000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d04000 fffff880`00d62000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03a8c000 fffff880`03a90500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`01377000 fffff880`013ea000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00fea000 fffff880`00ff3000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`0452d000 fffff880`0453d000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05612000 fffff880`05620000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02ca6000 fffff880`02cc4000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02c97000 fffff880`02ca6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0183a000 fffff880`01850000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04efa000 fffff880`04f1c000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`04f39000 fffff880`04f45000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`04f50000 fffff880`04f63000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`04f45000 fffff880`04f50000   dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`010ce000 fffff880`010f9000   dwprot   dwprot.sys   Mon Jul 26 08:54:08 2010 (4C4D8570)
    fffff880`05606000 fffff880`05612000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`042f7000 fffff880`043eb000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03c00000 fffff880`03c46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`010ba000 fffff880`010ce000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0106e000 fffff880`010ba000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`015e2000 fffff880`015ec000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01800000 fffff880`0183a000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`03a6f000 fffff880`03a77000   FwLnk    FwLnk.sys    Mon Jul 06 20:51:41 2009 (4A529C1D)
    fffff880`01000000 fffff880`0104a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`03c9b000 fffff880`03ca8000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`0380b000 fffff800`03854000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03a00000 fffff880`03a24000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`02a00000 fffff880`02ac8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`019db000 fffff880`019e4000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03a24000 fffff880`03a42000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03cc4000 fffff880`03cd3000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00ba6000 fffff800`00ba9000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
    fffff880`0441c000 fffff880`0445f000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`015b7000 fffff880`015d1000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01200000 fffff880`0122b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05600000 fffff880`05605200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`04fea000 fffff880`04fff000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04fa6000 fffff880`04fc9000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00ce3000 fffff880`00cf0000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`04f98000 fffff880`04fa6000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0451e000 fffff880`0452d000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`00d62000 fffff880`00d7c000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`011b7000 fffff880`011e4000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
    fffff880`02b6d000 fffff880`02b85000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`02b85000 fffff880`02bb2000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`02bb2000 fffff880`02c00000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`04e00000 fffff880`04e23000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`00daf000 fffff880`00dba000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`013f3000 fffff880`013fe000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f8b000 fffff880`00f95000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010f9000 fffff880`01157000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02c8c000 fffff880`02c97000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`019c9000 fffff880`019db000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0126b000 fffff880`0135d000   NDIS     NDIS.SYS     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04577000 fffff880`04583000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02b42000 fffff880`02b55000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`04583000 fffff880`045b2000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04ea8000 fffff880`04ebd000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02dde000 fffff880`02ded000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d54000 fffff880`02d99000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01157000 fffff880`011b7000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`011e4000 fffff880`011f5000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02c80000 fffff880`02c8c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`03854000 fffff800`03e30000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01414000 fffff880`015b7000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`019f7000 fffff880`01a00000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02aef000 fffff880`02b42000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02da2000 fffff880`02dc8000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fd5000 fffff880`00fea000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f95000 fffff880`00fc8000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00cc0000 fffff880`00cd0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`015d1000 fffff880`015e2000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06283000 fffff880`06329000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`04f91000 fffff880`04f97e80   pgeffect pgeffect.sys Mon Jun 22 05:00:11 2009 (4A3F481B)
    fffff880`04ebd000 fffff880`04efa000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00cf0000 fffff880`00d04000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`0136a000 fffff880`01376040   PxHlpa64 PxHlpa64.sys Tue Oct 20 14:08:42 2009 (4ADDFCAA)
    fffff880`04553000 fffff880`04577000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`045b2000 fffff880`045cd000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`045cd000 fffff880`045ee000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04400000 fffff880`0441a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02c2f000 fffff880`02c80000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`01255000 fffff880`0125e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0125e000 fffff880`01267000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`013ea000 fffff880`013f3000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0638d000 fffff880`063c5000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
    fffff880`0198f000 fffff880`019c9000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02b55000 fffff880`02b6d000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`03c53000 fffff880`03c91000   Rt64win7 Rt64win7.sys Thu Jul 30 07:58:43 2009 (4A718AF3)
    fffff880`05621000 fffff880`057ffd00   RTKVHD64 RTKVHD64.sys Tue Jul 28 09:00:05 2009 (4A6EF655)
    fffff880`03a91000 fffff880`03b99000   rtl8192se rtl8192se.sys Fri Oct 02 01:33:48 2009 (4AC590BC)
    fffff880`06329000 fffff880`06334000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`01987000 fffff880`0198f000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`0683f000 fffff880`068d5000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`06200000 fffff880`06267000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`06334000 fffff880`06361000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`0441a000 fffff880`0441b480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`044d3000 fffff880`0451c000   SynTP    SynTP.sys    Mon Jul 20 20:07:29 2009 (4A6506C1)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`06361000 fffff880`06373000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`03c91000 fffff880`03c9b000   tdcmdpst tdcmdpst.sys Thu Jul 30 04:39:35 2009 (4A715C47)
    fffff880`0135d000 fffff880`0136a000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`06373000 fffff880`0637e000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
    fffff880`0104a000 fffff880`01068000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02c1b000 fffff880`02c2f000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`0190d000 fffff880`01987000   tos_sps64 tos_sps64.sys Wed Jun 24 01:31:09 2009 (4A41BA1D)
    fffff960`005d0000 fffff960`005da000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0637e000 fffff880`0638d000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
    fffff880`03a42000 fffff880`03a68000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`01908000 fffff880`0190ce00   TVALZ_O  TVALZ_O.SYS  Mon Jul 13 22:19:26 2009 (4A5BEB2E)
    fffff880`03a68000 fffff880`03a6f000   TVALZFL  TVALZFL.sys  Fri Jun 19 06:05:44 2009 (4A3B62F8)
    fffff880`04470000 fffff880`04482000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`04f1c000 fffff880`04f39000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`0451c000 fffff880`0451df00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03cb3000 fffff880`03cc4000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04e4e000 fffff880`04ea8000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03ca8000 fffff880`03cb3000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03b99000 fffff880`03bef000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`04f63000 fffff880`04f90100   usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
    fffff880`00fc8000 fffff880`00fd5000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`015ec000 fffff880`015fa000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`00dc5000 fffff880`00dea000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`018bc000 fffff880`01908000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03c46000 fffff880`03c53000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02dc8000 fffff880`02dde000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`02c00000 fffff880`02c1b000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01400000 fffff880`01410000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e78000 fffff880`00f1c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f1c000 fffff880`00f2b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d99000 fffff880`02da2000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00070000 fffff960`0037f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
    fffff880`0445f000 fffff880`04462c00   WmBEnum  WmBEnum.sys  Thu Jan 24 18:01:30 2008 (479918CA)
    fffff880`00f82000 fffff880`00f8b000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`04463000 fffff880`0446f600   WmXlCore WmXlCore.sys Thu Jan 24 18:01:22 2008 (479918C2)
    fffff880`04fc9000 fffff880`04fea000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`068d5000 fffff880`06946000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`01888000 fffff880`01896000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01896000 fffff880`018a2000   dump_pciidex
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018a2000 fffff880`018ad000   dump_msahci.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    fffff880`019e4000 fffff880`019f7000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


  3. Posts : 3,139
    Systems 1 and 2: Windows 7 Enterprise x64, Win 8 Developer
       #3

    Welcome to SF.

    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If you can, upgrade your ATI Mobility driver:
    Driver c:\windows\system32\drivers\atikmdag.sys (8.1.1.921, 5.76 MB (6,037,504 bytes), 12/8/2009 5:24 PM)

    Also your realtec network controller:
    Driver c:\windows\system32\drivers\rt64win7.sys (7.5.730.2009, 231.00 KB (236,544 bytes), 12/8/2009 5:30 PM)

    And your realtec wireless adapter:
    Driver c:\windows\system32\drivers\rtl8192se.sys (2007.1.1002.2009, 924.50 KB (946,688 bytes), 12/8/2009 5:28 PM)

    If the above does not help (it certainly won't hurt), we can look at limiting the number of drivers at startup as part of our process of elimination.
      My Computer


  4. Posts : 1,618
    Win7 Home Premium x64 W10Pro&Home
       #4

    Disable SmartfaceVwatch in msconfig startup tab, and reboot...
      My Computer


 

Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 08:37.
Find Us