Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [I:\WINDOWS\Minidump\Mini021610-04.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: I:\WINDOWS\Symbols Executable search path is: Unable to load image ntoskrnl.exe, Win32 error 0n2 *** WARNING: Unable to verify timestamp for ntoskrnl.exe Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720 Debug session time: Tue Feb 16 18:41:44.703 2010 (GMT+3) System Uptime: 0 days 0:01:13.421 Unable to load image ntoskrnl.exe, Win32 error 0n2 *** WARNING: Unable to verify timestamp for ntoskrnl.exe Loading Kernel Symbols ............................................................... ..................................................... Loading User Symbols Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000007E, {c0000005, 80504a04, b84c3748, b84c3444} Probably caused by : hardware ( nt!iswctype+6 ) Followup: MachineOwner --------- 0: kd> !analyze -show Unknown bugcheck code (0) Unknown bugcheck description Arguments: Arg1: 00000000 Arg2: 00000000 Arg3: 00000000 Arg4: 00000000 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 80504a04, The address that the exception occurred at Arg3: b84c3748, Exception Record Address Arg4: b84c3444, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - FAULTING_IP: nt!iswctype+6 80504a04 0f2b4100 movntps xmmword ptr [ecx],xmm0 EXCEPTION_RECORD: b84c3748 -- (.exr 0xffffffffb84c3748) ExceptionAddress: 80504a04 (nt!iswctype+0x00000006) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000001 Parameter[1]: 3801d000 Attempt to write to address 3801d000 CONTEXT: b84c3444 -- (.cxr 0xffffffffb84c3444) eax=00000040 ebx=3801d000 ecx=3801d000 edx=00000000 esi=00000000 edi=00074429 eip=80504a04 esp=b84c3810 ebp=b84c3840 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246 nt!iswctype+0x6: 80504a04 0f2b4100 movntps xmmword ptr [ecx],xmm0 ds:0023:3801d000=???????????????????????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 4 DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000005 - EXCEPTION_PARAMETER1: 00000001 EXCEPTION_PARAMETER2: 3801d000 WRITE_ADDRESS: 3801d000 FOLLOWUP_IP: nt!iswctype+6 80504a04 0f2b4100 movntps xmmword ptr [ecx],xmm0 BUGCHECK_STR: 0x7E MISALIGNED_IP: nt!iswctype+6 80504a04 0f2b4100 movntps xmmword ptr [ecx],xmm0 LAST_CONTROL_TRANSFER: from 80698b94 to 80504a04 STACK_TEXT: b84c3840 80698b94 89bb5208 00000000 00000044 nt!iswctype+0x6 b84c3dac 805cffa2 80087000 00000000 00000000 nt!KdpSearchPageHitOffsets+0xd94 b84c3ddc 805460fe 8069790c 80087000 00000000 nt!IopQueryReconfiguration+0x70 b84c3df8 00000000 00000000 00000000 00001f80 nt!ExpRemovePoolTracker+0x8b SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!iswctype+6 FOLLOWUP_NAME: MachineOwner IMAGE_NAME: hardware DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .cxr 0xffffffffb84c3444 ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED BUCKET_ID: IP_MISALIGNED Followup: MachineOwner --------- 0: kd> .exr 0xffffffffb84c3748 ExceptionAddress: 80504a04 (nt!iswctype+0x00000006) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000001 Parameter[1]: 3801d000 Attempt to write to address 3801d000 0: kd> lm N T Unknown option 'N' Unknown option 'T' start end module name 804d7000 806e4000 nt M (pdb symbols) i:\windows\symbols\exe\ntoskrnl.pdb 806e4000 80704d00 hal (deferred) b2f92000 b2fd2a80 HTTP (deferred) b31db000 b322c880 srv (deferred) b3255000 b3281180 mrxdav (deferred) b341c000 b3446180 kmixer (deferred) b346a000 b347e480 wdmaud (deferred) b3867000 b3887a00 exFat (deferred) b3890000 b3893900 ndisuio (deferred) b3910000 b391ed80 sysaudio (deferred) b3bc8000 b3bdf900 dump_atapi (deferred) b3c18000 b3c27580 rspndr (deferred) b3ca8000 b3d17500 mrxsmb (deferred) b3d18000 b3d42e80 rdbss (deferred) b3d43000 b3d64d00 afd (deferred) b3d65000 b3d8a500 ipnat (deferred) b3d8b000 b3db2c00 netbt (deferred) b3db3000 b3e0b480 tcpip (deferred) b3e34000 b3e46600 ipsec (deferred) b3e47000 b4367000 kl1 (deferred) b4387000 b43d8000 klif (deferred) b43f8000 b43fa900 Dxapi (deferred) b65e0000 b663df00 update (deferred) b663e000 b666de80 rdpdr (deferred) b6af3000 b6b03e00 psched (deferred) b6ba4000 b6bba580 ndiswan (deferred) b6bbb000 b6bf2000 a7vtt2g7 (deferred) b6bf2000 b6c05900 parport (deferred) b6c06000 b6c28700 ks (deferred) b6c29000 b6c4ca80 portcls (deferred) b6c4d000 b6cf4c80 P17 (deferred) b6cf5000 b6d18200 USBPORT (deferred) b6d19000 b6d2cf00 VIDEOPRT (deferred) b6d2d000 b76f0040 nv4_mini (deferred) b7ca6000 b7ca9c80 mssmbios (deferred) b7cd6000 b7cefb80 Mup (deferred) b7cf0000 b7d1c980 NDIS (deferred) b7d1d000 b7da9600 Ntfs (deferred) b7daa000 b7dc0b00 KSecDD (deferred) b7dc1000 b7dd2f00 sr (deferred) b7dd3000 b7df2b00 fltMgr (deferred) b7df3000 b7e0a900 atapi (deferred) b7e0b000 b7e30800 dmio (deferred) b7e31000 b7e4fa00 ftdisk (deferred) b7e50000 b7e60b80 pci (deferred) b7e61000 b7e8ef80 ACPI (deferred) b7e8f000 b7ea6880 SCSIPORT (deferred) b7ea7000 b7fa7000 sptd (deferred) b80a8000 b80b1280 isapnp (deferred) b80b8000 b80c2580 MountMgr (deferred) b80c8000 b80d4b00 VolSnap (deferred) b80d8000 b80e0e00 disk (deferred) b80e8000 b80f4180 CLASSPNP (deferred) b80f8000 b8101200 PxHelp20 (deferred) b8108000 b8115000 klbg (deferred) b8158000 b8162e00 Fips (deferred) b8198000 b81a7900 Cdfs (deferred) b81d8000 b81e1f00 intelppm (deferred) b81e8000 b81f3400 dlkfet5b (deferred) b81f8000 b8206b00 drmk (deferred) b8208000 b8214f80 i8042prt (deferred) b8218000 b8221000 klmouflt (deferred) b8228000 b8237e00 serial (deferred) b8238000 b8242000 klim5 (deferred) b8248000 b8254880 rasl2tp (deferred) b8258000 b8262200 raspppoe (deferred) b8268000 b8273d00 raspptp (deferred) b8278000 b8280900 msgpc (deferred) b8288000 b8291f00 termdd (deferred) b8298000 b82a7600 cdrom (deferred) b82a8000 b82b6400 redbook (deferred) b82b8000 b82c1e80 NDProxy (deferred) b82d8000 b82e6880 usbhub (deferred) b82f8000 b8300700 wanarp (deferred) b8308000 b8310780 netbios (deferred) b8328000 b832e180 PCIIDEX (deferred) b8330000 b8334d00 PartMgr (deferred) b83b0000 b83b5080 usbuhci (deferred) b83b8000 b83bf600 usbehci (deferred) b83c0000 b83c6b00 fdc (deferred) b83c8000 b83ce100 kbdclass (deferred) b83d0000 b83d5b00 mouclass (deferred) b8438000 b843ca80 TDI (deferred) b8440000 b8444580 ptilink (deferred) b8448000 b844c080 raspti (deferred) b8450000 b8454c00 hamachi (deferred) b8470000 b8475200 vga (deferred) b8478000 b847ca80 Msfs (deferred) b8480000 b8487880 Npfs (deferred) b84a0000 b84a4500 watchdog (deferred) b84b8000 b84bb000 BOOTVID (deferred) b8578000 b857a400 Fs_Rec (deferred) b857c000 b857e980 gameenum (deferred) b8580000 b8583d80 serenum (deferred) b8584000 b8586280 rasacd (deferred) b8594000 b8596780 ndistapi (deferred) b85a8000 b85a9b80 kdcom (deferred) b85aa000 b85ab100 WMILIB (deferred) b85ac000 b85ad580 intelide (deferred) b85ae000 b85af700 dmload (deferred) b85b0000 b85b1480 speedfan (deferred) b85d0000 b85d1100 swenum (deferred) b85d4000 b85d5280 USBD (deferred) b85d8000 b85d9080 Beep (deferred) b85da000 b85db080 mnmdd (deferred) b85dc000 b85dd080 RDPCDD (deferred) b85ea000 b85eb100 dump_WMILIB (deferred) b85f4000 b85f5b00 ParVdm (deferred) b8670000 b8670d00 pciide (deferred) b8671000 b8671680 giveio (deferred) b8702000 b8702d00 dxgthk (deferred) b8733000 b8733c00 audstub (deferred) b875f000 b875fb80 Null (deferred) bd000000 bd011600 dxg (deferred) bd012000 bd60fe00 nv4_disp (deferred) bf800000 bf9c6100 win32k (deferred) bffa0000 bffe5c00 ATMFD (deferred) Unloaded modules: b8734000 b8735000 drmkaud.sys b35bf000 b35cc000 DMusic.sys b35cf000 b35dd000 swmidi.sys b3447000 b346a000 aec.sys b8666000 b8668000 splitter.sys b8318000 b8323000 imapi.sys b8468000 b846d000 Cdaudio.SYS b856c000 b856f000 Sfloppy.SYS