Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Andrew\Desktop\Minidump\MEMORY (2).DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: srv*c:\cache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`02a10000 PsLoadedModuleList = 0xfffff800`02c55670 Debug session time: Sun Nov 20 11:12:57.948 2011 (UTC - 5:00) System Uptime: 6 days 23:21:42.500 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ............................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {8, 2, 0, fffff88002e8a43a} Probably caused by : afd.sys ( afd!AfdTLReleaseIndications+1a ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000008, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff88002e8a43a, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 0000000000000008 CURRENT_IRQL: 2 FAULTING_IP: afd!AfdTLReleaseIndications+1a fffff880`02e8a43a 488b4108 mov rax,qword ptr [rcx+8] DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff80000b9c210 -- (.trap 0xfffff80000b9c210) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff88002e8cba0 rbx=0000000000000000 rcx=0000000000000000 rdx=fffff80000b9c3c0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88002e8a43a rsp=fffff80000b9c3a0 rbp=0000000000000000 r8=0000000000000025 r9=0000000000000000 r10=3d506b2000010317 r11=0000000000000002 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc afd!AfdTLReleaseIndications+0x1a: fffff880`02e8a43a 488b4108 mov rax,qword ptr [rcx+8] ds:010d:0008=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002a8c1e9 to fffff80002a8cc40 STACK_TEXT: fffff800`00b9c0c8 fffff800`02a8c1e9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`00b9c0d0 fffff800`02a8ae60 : fffffa80`053ff840 fffffa80`0545b1a0 00000000`00000000 fffffa80`08ca5518 : nt!KiBugCheckDispatch+0x69 fffff800`00b9c210 fffff880`02e8a43a : 00000000`00000000 fffff880`016b300a fffff800`00b9c4e8 00000000`0000af00 : nt!KiPageFault+0x260 fffff800`00b9c3a0 fffff880`02ec90cd : fffffa80`08533190 fffff800`00b9c4e8 00000000`00000000 fffffa80`03cef660 : afd!AfdTLReleaseIndications+0x1a fffff800`00b9c3f0 fffff880`02e8bc11 : fffffa80`00000025 fffffa80`08ca5518 fffffa80`08ca54d0 fffffa80`0412f370 : afd!AfdReturnBuffer+0xbd fffff800`00b9c430 fffff880`02e891e3 : 00000000`000003e8 00000000`00000025 fffffa80`08ca55b8 00000000`23e97564 : afd!AfdUpdateConnectionForTimerWheel+0x1d1 fffff800`00b9c4b0 fffff800`02a985fc : fffff800`00b9c650 00000000`00000000 00000000`00000001 00000000`00000003 : afd!AfdTimerWheelHandler+0x1d7 fffff800`00b9c530 fffff800`02a98496 : fffff880`02ea5760 00000000`024d520b 00000000`00000000 fffff880`0ff6b095 : nt!KiProcessTimerDpcTable+0x6c fffff800`00b9c5a0 fffff800`02a9837e : 0000057a`cf799810 fffff800`00b9cc18 00000000`024d520b fffff800`02c053e8 : nt!KiProcessExpiredTimerList+0xc6 fffff800`00b9cbf0 fffff800`02a98167 : 0000015b`fba28fc7 0000015b`024d520b 0000015b`fba28f12 00000000`0000000b : nt!KiTimerExpiration+0x1be fffff800`00b9cc90 fffff800`02a8496a : fffff800`02c02e80 fffff800`02c10cc0 00000000`00000002 fffff880`00000000 : nt!KiRetireDpcList+0x277 fffff800`00b9cd40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd00 00000000`00000000 : nt!KiIdleLoop+0x5a STACK_COMMAND: kb FOLLOWUP_IP: afd!AfdTLReleaseIndications+1a fffff880`02e8a43a 488b4108 mov rax,qword ptr [rcx+8] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: afd!AfdTLReleaseIndications+1a FOLLOWUP_NAME: MachineOwner MODULE_NAME: afd IMAGE_NAME: afd.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4db4dd96 FAILURE_BUCKET_ID: X64_0xD1_afd!AfdTLReleaseIndications+1a BUCKET_ID: X64_0xD1_afd!AfdTLReleaseIndications+1a Followup: MachineOwner ---------