[FONT=Arial][SIZE=4]Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp1_Mini081710-01[1].zip\Mini081710-01.dmp][/SIZE][/FONT]
[FONT=Arial][SIZE=4]Mini Kernel Dump File: Only registers and stack trace are available[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Executable search path is: [/SIZE][/FONT]
[FONT=Arial][SIZE=4]Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Product: WinNt, suite: TerminalServer SingleUserTS Personal[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Built by: 6002.18267.x86fre.vistasp2_gdr.100608-0458[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Machine Name:[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Kernel base = 0x82036000 PsLoadedModuleList = 0x8214dc70[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Debug session time: Tue Aug 17 13:59:54.401 2010 (GMT-4)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]System Uptime: 0 days 0:00:13.275[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Loading Kernel Symbols[/SIZE][/FONT]
[FONT=Arial][SIZE=4].................................................[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Loading User Symbols[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*******************************************************************************[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* Bugcheck Analysis *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*******************************************************************************[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Use !analyze -v to get detailed debugging information.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]BugCheck A, {9dfc, 2, 0, 820ef313}[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Probably caused by : ntkrpamp.exe ( nt!RtlInsertElementGenericTableFullAvl+75 )[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Followup: MachineOwner[/SIZE][/FONT]
[FONT=Arial][SIZE=4]---------[/SIZE][/FONT]
[FONT=Arial][SIZE=4]0: kd> !analyze -v[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*******************************************************************************[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* Bugcheck Analysis *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*******************************************************************************[/SIZE][/FONT]
[FONT=Arial][SIZE=4]IRQL_NOT_LESS_OR_EQUAL (a)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]An attempt was made to access a pageable (or completely invalid) address at an[/SIZE][/FONT]
[FONT=Arial][SIZE=4]interrupt request level (IRQL) that is too high. This is usually[/SIZE][/FONT]
[FONT=Arial][SIZE=4]caused by drivers using improper addresses.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]If a kernel debugger is available get the stack backtrace.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arguments:[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arg1: 00009dfc, memory referenced[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arg2: 00000002, IRQL[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arg3: 00000000, bitfield :[/SIZE][/FONT]
[FONT=Arial][SIZE=4]bit 0 : value 0 = read operation, 1 = write operation[/SIZE][/FONT]
[FONT=Arial][SIZE=4]bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arg4: 820ef313, address which referenced memory[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Debugging Details:[/SIZE][/FONT]
[FONT=Arial][SIZE=4]------------------[/SIZE][/FONT]
[FONT=Arial][SIZE=4]READ_ADDRESS: GetPointerFromAddress: unable to read from 8216d868[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Unable to read MiSystemVaType memory at 8214d420[/SIZE][/FONT]
[FONT=Arial][SIZE=4]00009dfc [/SIZE][/FONT]
[FONT=Arial][SIZE=4]CURRENT_IRQL: 2[/SIZE][/FONT]
[FONT=Arial][SIZE=4]FAULTING_IP: [/SIZE][/FONT]
[FONT=Arial][SIZE=4]nt!RtlInsertElementGenericTableFullAvl+75[/SIZE][/FONT]
[FONT=Arial][SIZE=4]820ef313 394204 cmp dword ptr [edx+4],eax[/SIZE][/FONT]
[FONT=Arial][SIZE=4]CUSTOMER_CRASH_COUNT: 1[/SIZE][/FONT]
[FONT=Arial][SIZE=4]DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT[/SIZE][/FONT]
[FONT=Arial][SIZE=4]BUGCHECK_STR: 0xA[/SIZE][/FONT]
[FONT=Arial][SIZE=4]PROCESS_NAME: System[/SIZE][/FONT]
[FONT=Arial][SIZE=4]TRAP_FRAME: 8b36756c -- (.trap 0xffffffff8b36756c)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]ErrCode = 00000000[/SIZE][/FONT]
[FONT=Arial][SIZE=4]eax=871700d8 ebx=873b9cb8 ecx=873b9c01 edx=00009df8 esi=84b1ea90 edi=00009df8[/SIZE][/FONT]
[FONT=Arial][SIZE=4]eip=820ef313 esp=8b3675e0 ebp=8b3675ec iopl=0 nv up ei pl zr na pe nc[/SIZE][/FONT]
[FONT=Arial][SIZE=4]cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246[/SIZE][/FONT]
[FONT=Arial][SIZE=4]nt!RtlInsertElementGenericTableFullAvl+0x75:[/SIZE][/FONT]
[FONT=Arial][SIZE=4]820ef313 394204 cmp dword ptr [edx+4],eax ds:0023:00009dfc=????????[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Resetting default scope[/SIZE][/FONT]
[FONT=Arial][SIZE=4]LOCK_ADDRESS: 8216a600 -- (!locks 8216a600)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Resource @ nt!PiEngineLock (0x8216a600) Available[/SIZE][/FONT]
[FONT=Arial][SIZE=4]WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]1 total locks[/SIZE][/FONT]
[FONT=Arial][SIZE=4]PNP_TRIAGE: [/SIZE][/FONT]
[FONT=Arial][SIZE=4]Lock address : 0x8216a600[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Thread Count : 0[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Thread address: 0x00000000[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Thread wait : 0x0[/SIZE][/FONT]
[FONT=Arial][SIZE=4]LAST_CONTROL_TRANSFER: from 820ef313 to 82083fd9[/SIZE][/FONT]
[FONT=Arial][SIZE=4]STACK_TEXT: [/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b36756c 820ef313 badb0d00 00009df8 00000001 nt!KiTrap0E+0x2e1[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b3675ec 8204d073 84b1ea90 873b9cc8 00000004 nt!RtlInsertElementGenericTableFullAvl+0x75[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367610 820461fb 871700d8 873b9cc8 00000004 nt!RtlInsertElementGenericTableAvl+0x28[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b36762c 820463d9 00000000 87141f90 00000000 nt!VfAvlInsertReservedTreeNode+0x29[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367644 821c08f0 873b9cc8 0000b000 00000000 nt!VfTargetDriversAdd+0xb6[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367668 821c1de4 00000000 00000000 84b8cad0 nt!VfLoadDriver+0x1ef[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b3676b0 821c1aea 8b1b0560 8b3678b8 8b367720 nt!MiDriverLoadSucceeded+0x2d[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367730 821a15e7 8b3678b8 00000000 00000000 nt!MmLoadSystemImage+0x70c[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367924 82199cec 00000000 8b367900 8b367954 nt!IopLoadDriver+0x385[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367968 822092e1 8b1a7460 00000001 8b1a744c nt!PipCallDriverAddDeviceQueryRoutine+0x309[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b3679a0 82209611 00000001 8b367a98 821999e3 nt!RtlpCallQueryRegistryRoutine+0x28e[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367a0c 821984f4 40000000 8000006c 8b367a40 nt!RtlQueryRegistryValues+0x31b[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367af0 82197a27 00000000 8b367d38 82168550 nt!PipCallDriverAddDevice+0x2ff[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367cec 82042764 84b453d0 873d3390 8b367d38 nt!PipProcessDevNodeTree+0x15c[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367d44 820dbe22 00000000 00000000 84b8cad0 nt!PnpDeviceActionWorker+0x229[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367d7c 8220bc42 00000000 da8d12dd 00000000 nt!ExpWorkerThread+0xfd[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8b367dc0 82074f4e 820dbd25 00000001 00000000 nt!PspSystemThreadStartup+0x9d[/SIZE][/FONT]
[FONT=Arial][SIZE=4]00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16[/SIZE][/FONT]
[FONT=Arial][SIZE=4]STACK_COMMAND: kb[/SIZE][/FONT]
[FONT=Arial][SIZE=4]FOLLOWUP_IP: [/SIZE][/FONT]
[FONT=Arial][SIZE=4]nt!RtlInsertElementGenericTableFullAvl+75[/SIZE][/FONT]
[FONT=Arial][SIZE=4]820ef313 394204 cmp dword ptr [edx+4],eax[/SIZE][/FONT]
[FONT=Arial][SIZE=4]SYMBOL_STACK_INDEX: 1[/SIZE][/FONT]
[FONT=Arial][SIZE=4]SYMBOL_NAME: nt!RtlInsertElementGenericTableFullAvl+75[/SIZE][/FONT]
[FONT=Arial][SIZE=4]FOLLOWUP_NAME: MachineOwner[/SIZE][/FONT]
[FONT=Arial][SIZE=4]MODULE_NAME: nt[/SIZE][/FONT]
[FONT=Arial][SIZE=4]IMAGE_NAME: ntkrpamp.exe[/SIZE][/FONT]
[FONT=Arial][SIZE=4]DEBUG_FLR_IMAGE_TIMESTAMP: 4c0e557c[/SIZE][/FONT]
[FONT=Arial][SIZE=4]FAILURE_BUCKET_ID: 0xA_nt!RtlInsertElementGenericTableFullAvl+75[/SIZE][/FONT]
[FONT=Arial][SIZE=4]BUCKET_ID: 0xA_nt!RtlInsertElementGenericTableFullAvl+75[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Followup: MachineOwner[/SIZE][/FONT]
[FONT=Arial][SIZE=4]---------[/SIZE][/FONT]
[FONT=Arial][SIZE=4]0: kd> lmtsmn[/SIZE][/FONT]
[FONT=Arial][SIZE=4]start end module name[/SIZE][/FONT]
[FONT=Arial][SIZE=4]82738000 8277e000 acpi acpi.sys Sat Apr 11 00:19:03 2009 (49E01A37)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]83074000 8307c000 atapi atapi.sys Sat Apr 11 00:39:09 2009 (49E01EED)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8307c000 8309a000 ataport ataport.SYS Sat Apr 11 00:39:10 2009 (49E01EEE)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a9e9000 8a9f5000 ATITool ATITool.sys Fri Nov 10 08:08:51 2006 (455479E3)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8061b000 80623000 BOOTVID BOOTVID.dll Sat Jan 19 02:27:15 2008 (4791A653)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]80664000 80744000 CI CI.dll Sat Apr 11 02:25:22 2009 (49E037D2)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a9a8000 8a9c9000 CLASSPNP CLASSPNP.SYS Sat Apr 11 00:39:05 2009 (49E01EE9)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]80623000 80664000 CLFS CLFS.SYS Sat Apr 11 00:13:51 2009 (49E018FF)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a9d2000 8a9df000 crashdmp crashdmp.sys Sat Apr 11 00:39:12 2009 (49E01EF0)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a9c9000 8a9d2000 crcdisk crcdisk.sys Thu Nov 02 04:52:27 2006 (4549B1CB)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a997000 8a9a8000 disk disk.sys Sat Apr 11 00:39:14 2009 (49E01EF2)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a9df000 8a9e9000 dump_diskdump dump_diskdump.sys Sat Apr 11 00:39:11 2009 (49E01EEF)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a711000 8a72e000 dump_nvstor32 dump_nvstor32.sys Fri Oct 26 14:50:16 2007 (472236E8)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a970000 8a997000 ecache ecache.sys Sat Apr 11 00:40:12 2009 (49E01F2C)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8312a000 8313a000 fileinfo fileinfo.sys Sat Jan 19 00:34:27 2008 (47918BE3)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]830f8000 8312a000 fltmgr fltmgr.sys Sat Apr 11 00:13:59 2009 (49E01907)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a6ed000 8a708000 fwpkclnt fwpkclnt.sys Sat Apr 11 00:45:42 2009 (49E02076)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a96f000 8a96f680 giveio giveio.sys Wed Apr 03 22:33:25 1996 (316334F5)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]82003000 82036000 hal halmacpi.dll Sat Apr 11 00:13:13 2009 (49E018D9)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]80603000 8060a000 kdcom kdcom.dll Sat Apr 11 02:25:29 2009 (49E037D9)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]83143000 831b4000 ksecdd ksecdd.sys Mon Jun 15 08:48:53 2009 (4A364335)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]83064000 83074000 mountmgr mountmgr.sys Sat Jan 19 00:49:13 2008 (47918F59)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8277e000 82786000 msisadrv msisadrv.sys Sat Jan 19 00:32:51 2008 (47918B83)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8330b000 83336000 msrpc msrpc.sys Sat Apr 11 00:37:32 2009 (49E01E8C)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a960000 8a96f000 mup mup.sys Sat Apr 11 00:14:12 2009 (49E01914)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]83200000 8330b000 ndis ndis.sys Sat Apr 11 00:45:52 2009 (49E02080)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]83336000 83371000 NETIO NETIO.SYS Sat Apr 11 00:46:21 2009 (49E0209D)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]82036000 823ef000 nt ntkrpamp.exe Tue Jun 08 10:36:44 2010 (4C0E557C)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a80d000 8a91d000 Ntfs Ntfs.sys Sat Apr 11 00:14:34 2009 (49E0192A)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8309a000 830b7000 nvstor32 nvstor32.sys Fri Oct 26 14:50:16 2007 (472236E8)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]827ad000 827bc000 partmgr partmgr.sys Sat Apr 11 00:39:19 2009 (49E01EF7)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]82786000 827ad000 pci pci.sys Sat Apr 11 00:19:16 2009 (49E01A44)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8304f000 83056000 pciide pciide.sys Sat Apr 11 00:39:10 2009 (49E01EEE)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]83056000 83064000 PCIIDEX PCIIDEX.SYS Sat Apr 11 00:39:09 2009 (49E01EED)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8060a000 8061b000 PSHED PSHED.dll Sat Apr 11 02:25:32 2009 (49E037DC)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8313a000 83142b80 PxHelp20 PxHelp20.sys Fri Feb 02 16:23:57 2007 (45C3ABED)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a708000 8a711000 scmndisp scmndisp.sys Wed Jan 17 04:25:59 2007 (45ADEBA7)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]82712000 82738000 SCSIPORT SCSIPORT.SYS Sat Jan 19 00:49:44 2008 (47918F78)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a95e000 8a95f480 speedfan speedfan.sys Sun Sep 24 09:28:47 2006 (4516880F)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a956000 8a95e000 spldr spldr.sys Thu Jun 21 20:29:17 2007 (467B17DD)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]82609000 82709000 sptd sptd.sys Wed Mar 05 19:32:57 2008 (47CF3BB9)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]830b7000 830f8000 storport storport.sys Sat Apr 11 00:39:19 2009 (49E01EF7)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a603000 8a6ed000 tcpip tcpip.sys Wed Jun 16 09:45:41 2010 (4C18D585)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a9f5000 8aa00000 tunnel tunnel.sys Thu Feb 18 06:28:13 2010 (4B7D244D)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]827bc000 827cb000 volmgr volmgr.sys Sat Jan 19 00:49:51 2008 (47918F7F)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]83005000 8304f000 volmgrx volmgrx.sys Sat Apr 11 00:39:25 2009 (49E01EFD)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8a91d000 8a956000 volsnap volsnap.sys Sat Apr 11 00:39:37 2009 (49E01F09)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]80744000 807c0000 Wdf01000 Wdf01000.sys Sat Jan 19 00:52:21 2008 (47919015)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]807c0000 807cd000 WDFLDR WDFLDR.SYS Sat Jan 19 00:52:19 2008 (47919013)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]82709000 82712000 WMILIB WMILIB.SYS Sat Jan 19 00:53:08 2008 (47919044)[/SIZE][/FONT]