Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Richard\AppData\Local\Temp\Temp1_SF_15-11-2012.zip\SF_15-11-2012\Mini111512-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18686.x86fre.vistasp2_gdr.120824-0336
Machine Name:
Kernel base = 0x8241e000 PsLoadedModuleList = 0x82535c70
Debug session time: Wed Nov 14 19:58:02.523 2012 (UTC - 5:00)
System Uptime: 0 days 0:17:30.175
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8263f000, 2, 0, bd01863f}
[B]Unable to load image \??\G:\CX\Games\CABAL\CABAL Online (SG MY)\GameGuard\dump_wmimmc.sys, Win32 error 0n2[/B]
*** [B]WARNING: Unable to verify timestamp for dump_wmimmc.sys[/B]
[B]*** ERROR: Module load completed but symbols could not be loaded for dump_wmimmc.sys[/B]
Probably caused by : [B]dump_wmimmc.sys[/B] ( dump_wmimmc+1063f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 8263f000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: bd01863f, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82555868
Unable to read MiSystemVaType memory at 82535420
8263f000
CURRENT_IRQL: 2
FAULTING_IP:
dump_wmimmc+1063f
bd01863f ?? ???
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: [B]VERIFIER_ENABLED_VISTA_MINIDUMP[/B]
BUGCHECK_STR: 0xD1
PROCESS_NAME: GameMon.des
TRAP_FRAME: ae3dd5c8 -- (.trap 0xffffffffae3dd5c8)
ErrCode = 00000000
eax=8263f000 ebx=89818030 ecx=00000000 edx=8263f000 esi=b3dc0f68 edi=881bfa50
eip=bd01863f esp=ae3dd63c ebp=ae3dd658 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
dump_wmimmc+0x1063f:
bd01863f ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from bd01863f to 8246bf99
STACK_TEXT:
ae3dd5c8 bd01863f badb0d00 8263f000 ae3dd5e8 nt!KiTrap0E+0x2e1
WARNING: Stack unwind information not available. Following frames may be wrong.
ae3dd638 881bfa50 00000007 00000003 000000ff dump_wmimmc+0x1063f
ae3dd658 bd00e937 8263f000 89818030 00000002 0x881bfa50
ae3dd678 bd0295d7 8263effe bd019f00 bd01a760 dump_wmimmc+0x6937
ae3dd6a8 bd058456 881bfa50 b3dc0f68 89818030 dump_wmimmc+0x215d7
ae3ddbc0 bd015811 8926ec98 00000001 bb2e4ff8 dump_wmimmc+0x50456
ae3ddc0c 827016be 89818030 b3dc0f68 8926ec98 dump_wmimmc+0xd811
ae3ddc30 82462951 b3dc0fd8 b3dc0f68 89818030 nt!IovCallDriver+0x23f
ae3ddc44 82664cd3 8926ec98 b3dc0f68 b3dc0fd8 nt!IofCallDriver+0x1b
ae3ddc64 82665478 89818030 8926ec98 0012df00 nt!IopSynchronousServiceTail+0x1d9
ae3ddd00 82666542 89818030 b3dc0f68 00000000 nt!IopXxxControlFile+0x6b7
ae3ddd34 82468c3a 00000280 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
ae3ddd34 0047931b 00000280 00000000 00000000 nt!KiFastCallEntry+0x12a
0012e8ac 00000000 00000000 00000000 00000000 0x47931b
STACK_COMMAND: kb
FOLLOWUP_IP:
dump_wmimmc+1063f
bd01863f ?? ???
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: dump_wmimmc+1063f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dump_wmimmc
IMAGE_NAME: dump_wmimmc.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4fa1085e
FAILURE_BUCKET_ID: 0xD1_VRF_dump_wmimmc+1063f
BUCKET_ID: 0xD1_VRF_dump_wmimmc+1063f
Followup: MachineOwner
---------
0: kd> lmtsmn
start end module name
8b69f000 8b6ac080 1394BUS 1394BUS.SYS Sat Jan 19 00:53:27 2008 (47919057)
8068b000 806d1000 acpi acpi.sys Sat Apr 11 00:19:03 2009 (49E01A37)
8d369000 8d3b1000 afd afd.sys Thu Apr 21 09:58:25 2011 (4DB03801)
80797000 8079f000 atapi atapi.sys Sat Apr 11 00:39:09 2009 (49E01EED)
8079f000 807bd000 ataport ataport.SYS Sat Apr 11 00:39:10 2009 (49E01EEE)
976b0000 976fd000 ATMFD ATMFD.DLL Wed Feb 16 09:02:23 2011 (4D5BD8EF)
8eba3000 8ebbe000 avgntflt avgntflt.sys Wed Nov 07 07:52:31 2012 (509A598F)
8ea75000 8ea98000 avipbb avipbb.sys Wed Nov 07 07:55:22 2012 (509A5A3A)
8ea69000 8ea75000 avkmgr avkmgr.sys Wed Nov 07 07:55:13 2012 (509A5A31)
8d2c9000 8d2d0000 Beep Beep.SYS Sat Jan 19 00:49:10 2008 (47918F56)
8048e000 80496000 BOOTVID BOOTVID.dll Sat Jan 19 02:27:15 2008 (4791A653)
a0591000 a05aa000 bowser bowser.sys Tue Feb 22 08:23:54 2011 (4D63B8EA)
97710000 9771e000 cdd cdd.dll Thu Jan 20 11:08:15 2011 (4D385DEF)
a6f9d000 a6fb3000 cdfs cdfs.sys Sat Jan 19 00:28:02 2008 (47918A62)
8e326000 8e33e000 cdrom cdrom.sys Sat Apr 11 00:39:17 2009 (49E01EF5)
804d7000 805b7000 CI CI.dll Sat Apr 11 02:25:22 2009 (49E037D2)
84da1000 84dc2000 CLASSPNP CLASSPNP.SYS Sat Apr 11 00:39:05 2009 (49E01EE9)
80496000 804d7000 CLFS CLFS.SYS Sat Apr 11 00:13:51 2009 (49E018FF)
8eacd000 8eada000 crashdmp crashdmp.sys Sat Apr 11 00:39:12 2009 (49E01EF0)
84dc2000 84dcb000 crcdisk crcdisk.sys Sat Jan 19 00:50:29 2008 (47918FA5)
8ea52000 8ea69000 dfsc dfsc.sys Thu Apr 14 10:59:03 2011 (4DA70BB7)
84d90000 84da1000 disk disk.sys Sat Apr 11 00:39:14 2009 (49E01EF2)
8d26c000 8d291000 drmk drmk.sys Sat Jan 19 01:53:02 2008 (47919E4E)
8eae5000 8eaed000 dump_atapi dump_atapi.sys Sat Apr 11 00:39:09 2009 (49E01EED)
8eada000 8eae5000 dump_dumpata dump_dumpata.sys Sat Apr 11 00:39:09 2009 (49E01EED)
[B]bd008000 bd086180 dump_wmimmc dump_wmimmc.sys Wed May 02 06:11:42 2012 (4FA1085E)[/B]
8eb6f000 8eb79000 Dxapi Dxapi.sys Sat Jan 19 00:36:12 2008 (47918C4C)
8e27a000 8e31a000 dxgkrnl dxgkrnl.sys Thu Jan 20 08:50:57 2011 (4D383DC1)
84d69000 84d90000 ecache ecache.sys Sat Apr 11 00:40:12 2009 (49E01F2C)
807ef000 807ff000 fileinfo fileinfo.sys Sat Jan 19 00:34:27 2008 (47918BE3)
807bd000 807ef000 fltmgr fltmgr.sys Sat Apr 11 00:13:59 2009 (49E01907)
8d2b9000 8d2c2000 Fs_Rec Fs_Rec.SYS Wed Feb 29 08:32:36 2012 (4F4E28F4)
84af4000 84b0f000 fwpkclnt fwpkclnt.sys Sat Apr 11 00:45:42 2009 (49E02076)
827d8000 8280b000 hal halmacpi.dll Sat Apr 11 00:13:13 2009 (49E018D9)
8b602000 8b68f000 HDAudBus HDAudBus.sys Sat Apr 11 00:42:41 2009 (49E01FC1)
84bf0000 84c00000 HIDCLASS HIDCLASS.SYS Sat Apr 11 00:42:47 2009 (49E01FC7)
8d2d9000 8d2df380 HIDPARSE HIDPARSE.SYS Sat Jan 19 00:53:16 2008 (4791904C)
8d2d0000 8d2d9000 hidusb hidusb.sys Sat Apr 11 00:42:48 2009 (49E01FC8)
a0507000 a0574000 HTTP HTTP.sys Sat Feb 20 15:53:31 2010 (4B804BCB)
84b0f000 84b1e000 intelppm intelppm.sys Sat Jan 19 00:27:20 2008 (47918A38)
8e3f3000 8e3fe000 kbdclass kbdclass.sys Sat Jan 19 00:49:14 2008 (47918F5A)
8eaaf000 8eab8000 kbdhid kbdhid.sys Sat Apr 11 00:38:40 2009 (49E01ED0)
80406000 8040d000 kdcom kdcom.dll Sat Apr 11 02:25:29 2009 (49E037D9)
84b90000 84bba000 ks ks.sys Sat Apr 11 00:38:47 2009 (49E01ED7)
82a01000 82a73000 ksecdd ksecdd.sys Fri Jun 01 17:56:07 2012 (4FC93A77)
a04b0000 a04c0000 lltdio lltdio.sys Sat Jan 19 00:55:03 2008 (479190B7)
8eb88000 8eba3000 luafv luafv.sys Sat Jan 19 00:30:35 2008 (47918AFB)
8040d000 8047d000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Apr 11 02:23:19 2009 (49E03757)
8eb79000 8eb88000 monitor monitor.sys Sat Jan 19 00:52:19 2008 (47919013)
84b85000 84b90000 mouclass mouclass.sys Sat Jan 19 00:49:14 2008 (47918F5A)
84c00000 84c08000 mouhid mouhid.sys Sat Jan 19 00:49:16 2008 (47918F5C)
80787000 80797000 mountmgr mountmgr.sys Sat Jan 19 00:49:13 2008 (47918F59)
a05aa000 a05bf000 mpsdrv mpsdrv.sys Sat Jan 19 00:54:45 2008 (479190A5)
a05bf000 a05e0000 mrxdav mrxdav.sys Sat Apr 11 00:14:39 2009 (49E0192F)
a05e0000 a05ff000 mrxsmb mrxsmb.sys Fri Apr 29 09:24:39 2011 (4DBABC17)
8ebbe000 8ebf7000 mrxsmb10 mrxsmb10.sys Wed Jul 06 11:31:46 2011 (4E147FE2)
84dcb000 84de3000 mrxsmb20 mrxsmb20.sys Fri Apr 29 09:24:41 2011 (4DBABC19)
8d31d000 8d328000 Msfs Msfs.SYS Sat Jan 19 00:28:08 2008 (47918A68)
806da000 806e2000 msisadrv msisadrv.sys Sat Jan 19 00:32:51 2008 (47918B83)
8e347000 8e376000 msiscsi msiscsi.sys Sat Apr 11 00:40:07 2009 (49E01F27)
82b7e000 82ba9000 msrpc msrpc.sys Sat Apr 11 00:37:32 2009 (49E01E8C)
84bba000 84bc4000 mssmbios mssmbios.sys Sat Jan 19 00:32:55 2008 (47918B87)
84d5a000 84d69000 mup mup.sys Sat Apr 11 00:14:12 2009 (49E01914)
82a73000 82b7e000 ndis ndis.sys Sat Apr 11 00:45:52 2009 (49E02080)
8e3d9000 8e3e4000 ndistapi ndistapi.sys Sat Jan 19 00:56:24 2008 (47919108)
a04ea000 a04f4000 ndisuio ndisuio.sys Sat Jan 19 00:55:40 2008 (479190DC)
8b7ad000 8b7d0000 ndiswan ndiswan.sys Sat Apr 11 00:46:31 2009 (49E020A7)
84bd1000 84be2000 NDProxy NDProxy.SYS Sat Jan 19 00:56:28 2008 (4791910C)
84be2000 84bf0000 netbios netbios.sys Sat Jan 19 00:55:45 2008 (479190E1)
8d3b1000 8d3e3000 netbt netbt.sys Sat Apr 11 00:45:35 2009 (49E0206F)
82ba9000 82be4000 NETIO NETIO.SYS Sat Apr 11 00:46:21 2009 (49E0209D)
8eaed000 8eb6f000 netr73 netr73.sys Sun May 24 03:36:40 2009 (4A18F908)
8d328000 8d336000 Npfs Npfs.SYS Sat Apr 11 00:14:01 2009 (49E01909)
8ea48000 8ea52000 nsiproxy nsiproxy.sys Sat Jan 19 00:55:50 2008 (479190E6)
8241e000 827d8000 nt ntkrpamp.exe Fri Aug 24 09:24:43 2012 (5037809B)
84c09000 84d19000 Ntfs Ntfs.sys Sat Apr 11 00:14:34 2009 (49E0192A)
8d2c2000 8d2c9000 Null Null.SYS Sat Jan 19 00:49:12 2008 (47918F58)
8e276000 8e27a000 nvBridge nvBridge.kmd Fri May 20 23:57:55 2011 (4DD73843)
8d291000 8d2b9000 nvhda32v nvhda32v.sys Tue Jul 03 11:24:41 2012 (4FF30EB9)
8d802000 8e276000 nvlddmkm nvlddmkm.sys Tue Oct 02 14:15:55 2012 (506B2F5B)
8b6ad000 8b7ac600 nvmfdx32 nvmfdx32.sys Fri Aug 01 14:37:49 2008 (489357FD)
a04c0000 a04ea000 nwifi nwifi.sys Sat Apr 11 00:43:27 2009 (49E01FEF)
8b68f000 8b69e300 ohci1394 ohci1394.sys Sat Apr 11 00:43:04 2009 (49E01FD8)
8d3e3000 8d3f9000 pacer pacer.sys Sat Apr 11 00:45:51 2009 (49E0207F)
80709000 80719000 partmgr partmgr.sys Tue Mar 20 13:18:52 2012 (4F68BBFC)
806e2000 80709000 pci pci.sys Sat Apr 11 00:19:16 2009 (49E01A44)
80772000 80779000 pciide pciide.sys Sat Apr 11 00:39:10 2009 (49E01EEE)
80779000 80787000 PCIIDEX PCIIDEX.SYS Sat Apr 11 00:39:09 2009 (49E01EED)
a6e82000 a6f60000 peauth peauth.sys Mon Oct 23 04:55:32 2006 (453C8384)
8d23f000 8d26c000 portcls portcls.sys Sat Apr 11 00:42:48 2009 (49E01FC8)
8047d000 8048e000 PSHED PSHED.dll Sat Apr 11 02:25:32 2009 (49E037DC)
8d336000 8d33f000 rasacd rasacd.sys Sat Jan 19 00:56:31 2008 (4791910F)
8e3c2000 8e3d9000 rasl2tp rasl2tp.sys Sat Jan 19 00:56:33 2008 (47919111)
8e3e4000 8e3f3000 raspppoe raspppoe.sys Sat Apr 11 00:46:30 2009 (49E020A6)
8b7d0000 8b7e4000 raspptp raspptp.sys Sat Jan 19 00:56:34 2008 (47919112)
8b7e4000 8b7f9000 rassstp rassstp.sys Sat Apr 11 00:46:40 2009 (49E020B0)
8ea0c000 8ea48000 rdbss rdbss.sys Sat Apr 11 00:14:26 2009 (49E01922)
8d30d000 8d315000 RDPCDD RDPCDD.sys Sat Jan 19 01:01:08 2008 (47919224)
8d315000 8d31d000 rdpencdd rdpencdd.sys Sat Jan 19 01:01:09 2008 (47919225)
a04f4000 a0507000 rspndr rspndr.sys Sat Jan 19 00:55:03 2008 (479190B7)
8d008000 8d23e300 RTKVHDA RTKVHDA.sys Wed Feb 11 07:38:05 2009 (4992C6AD)
a6f60000 a6f6a000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
8d355000 8d369000 smb smb.sys Sat Apr 11 00:45:22 2009 (49E02062)
84d52000 84d5a000 spldr spldr.sys Thu Jun 21 20:29:17 2007 (467B17DD)
a0400000 a04b0000 spsys spsys.sys Tue Mar 10 13:10:28 2009 (49B69F04)
a6e33000 a6e82000 srv srv.sys Fri Feb 18 09:03:28 2011 (4D5E7C30)
a6e0b000 a6e33000 srv2 srv2.sys Fri Apr 29 09:25:09 2011 (4DBABC35)
a0574000 a0591000 srvnet srvnet.sys Fri Apr 29 09:25:08 2011 (4DBABC34)
8d000000 8d005a00 ssmdrv ssmdrv.sys Tue May 05 06:05:18 2009 (4A000F5E)
8e376000 8e3b7000 storport storport.sys Sat Apr 11 00:39:19 2009 (49E01EF7)
8e3fe000 8e3ff380 swenum swenum.sys Sat Jan 19 00:49:20 2008 (47918F60)
84a0a000 84af4000 tcpip tcpip.sys Thu Mar 29 09:56:36 2012 (4F746A14)
a6f6a000 a6f76000 tcpipreg tcpipreg.sys Tue Dec 08 12:26:18 2009 (4B1E8C3A)
8e3b7000 8e3c2000 TDI TDI.SYS Sat Jan 19 00:57:10 2008 (47919136)
8d33f000 8d355000 tdx tdx.sys Sat Apr 11 00:45:56 2009 (49E02084)
84b75000 84b85000 termdd termdd.sys Sat Apr 11 00:51:14 2009 (49E021C2)
976a0000 976a9000 TSDDD TSDDD.dll unavailable (00000000)
84df6000 84dff000 tunmp tunmp.sys Sat Jan 19 00:55:40 2008 (479190DC)
84deb000 84df6000 tunnel tunnel.sys Thu Feb 18 06:28:13 2010 (4B7D244D)
84bc4000 84bd1000 umbus umbus.sys Sat Jan 19 00:53:40 2008 (47919064)
8ea98000 8eaaf000 usbccgp usbccgp.sys Sat Jan 19 00:53:29 2008 (47919059)
8d3f9000 8d3fa700 USBD USBD.SYS Sat Jan 19 00:53:17 2008 (4791904D)
84b66000 84b75000 usbehci usbehci.sys Sat Apr 11 00:42:52 2009 (49E01FCC)
805b7000 805ec000 usbhub usbhub.sys Sat Apr 11 00:43:14 2009 (49E01FE2)
84b1e000 84b28000 usbohci usbohci.sys Sat Apr 11 00:42:52 2009 (49E01FCC)
84b28000 84b66000 USBPORT USBPORT.SYS Sat Apr 11 00:42:55 2009 (49E01FCF)
8eab8000 8eacd000 USBSTOR USBSTOR.SYS Sat Apr 11 00:42:55 2009 (49E01FCF)
8d2e0000 8d2ec000 vga vga.sys Sat Jan 19 00:52:06 2008 (47919006)
8d2ec000 8d30d000 VIDEOPRT VIDEOPRT.SYS Sat Jan 19 00:52:10 2008 (4791900A)
80719000 80728000 volmgr volmgr.sys Sat Jan 19 00:49:51 2008 (47918F7F)
80728000 80772000 volmgrx volmgrx.sys Sat Apr 11 00:39:25 2009 (49E01EFD)
84d19000 84d52000 volsnap volsnap.sys Sat Apr 11 00:39:37 2009 (49E01F09)
82be4000 82bf7000 wanarp wanarp.sys Sat Jan 19 00:56:31 2008 (4791910F)
8e31a000 8e326000 watchdog watchdog.sys Sat Apr 11 00:22:43 2009 (49E01B13)
80602000 8067e000 Wdf01000 Wdf01000.sys Sat Jan 19 00:52:21 2008 (47919015)
8067e000 8068b000 WDFLDR WDFLDR.SYS Sat Jan 19 00:52:19 2008 (47919013)
97480000 97685000 win32k win32k.sys Wed Jul 04 10:02:34 2012 (4FF44CFA)
8e33e000 8e347000 wmiacpi wmiacpi.sys Sat Jan 19 00:32:47 2008 (47918B7F)
806d1000 806da000 WMILIB WMILIB.SYS Sat Jan 19 00:53:08 2008 (47919044)
a6f8b000 a6f9d000 WUDFPf WUDFPf.sys Sat Jan 19 00:52:49 2008 (47919031)
a6f76000 a6f8a580 WUDFRd WUDFRd.sys Sat Jan 19 00:53:04 2008 (47919040)
Unloaded modules:
84dcb000 84dd8000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
84dd8000 84de3000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
84de3000 84deb000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00008000
8d2d0000 8d2d9000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000