Loading Dump File [C:\Users\Hans Hilgers\Downloads\Minidump\112910-22058-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*
Symbol information
Executable search path is:
Windows Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Kernel base = 0xfffff800`02c4e000 PsLoadedModuleList = 0xfffff800`02e8be50
Debug session time: Mon Nov 29 18:11:56.150 2010 (GMT+1)
System Uptime: 0 days 0:01:12.867
Loading Kernel Symbols
..............................................................................................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {e2, fffff980166e8a20, 18e95dc, 0}
Unable to load image \??\C:\Windows\system32\drivers\MiniIcpt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for MiniIcpt.sys
*** ERROR: Module load completed but symbols could not be loaded for MiniIcpt.sys
Probably caused by : MiniIcpt.sys ( MiniIcpt+3e00 )
Followup: MachineOwner
---------
2: kd> .reload
Loading Kernel Symbols
..............................................................................................................................................
Loading User Symbols
Loading unloaded module list
....
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Parameter 1 = 0x1000 .. 0x1020 - deadlock verifier error codes.
Typically the code is 0x1001 (deadlock detected) and you can
issue a '!deadlock' KD command to get more information.
Arguments:
Arg1: 00000000000000e2, IRP field is a user-mode address but Irp->RequestorMode is KernelMode.
Arg2: fffff980166e8a20, IRP address.
Arg3: 00000000018e95dc, User-mode address present as the value of an IRP field.
Arg4: 0000000000000000
Debugging Details:
------------------
Unable to load image \??\C:\Windows\system32\drivers\MiniIcpt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for MiniIcpt.sys
*** ERROR: Module load completed but symbols could not be loaded for MiniIcpt.sys
BUGCHECK_STR: 0xc4_e2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: GDScan.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800031483dc to fffff80002cbe740
STACK_TEXT:
fffff880`02af2518 fffff800`031483dc : 00000000`000000c4 00000000`000000e2 fffff980`166e8a20 00000000`018e95dc : nt!KeBugCheckEx
fffff880`02af2520 fffff800`0315874b : 00010001`0000000d fffff880`02af2670 fffff880`02af2698 fffff980`027d0bb0 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`02af2560 fffff800`03158795 : fffffa80`06c58c60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ViIrpCheckKernelAddressForIrp+0x6b
fffff880`02af25a0 fffff800`03160c2a : 00000000`00000000 ffff0000`03a0c572 fffff880`02af2750 fffff980`027d0bb0 : nt!ViIrpCheckBufferAddressByMethod+0x35
fffff880`02af25d0 fffff800`03164bb2 : fffff980`166e8a20 00000000`00000002 fffff980`190c2c12 00000000`018e9500 : nt!VfBeforeCallDriver+0x2a
fffff880`02af2630 fffff880`010e523f : fffff980`166e8fb8 fffff880`02af26e0 fffff980`190c2c30 fffffa80`06c58c60 : nt!IovCallDriver+0x502
fffff880`02af2690 fffff880`010e794a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff980`190c2c30 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`02af2720 fffff880`0111d0a5 : fffff980`0e30e4d0 00000000`00000023 fffff980`02ba8800 fffff980`190c2ce0 : fltmgr!FltPerformSynchronousIo+0x2ca
fffff880`02af27c0 fffff880`0111db28 : 00000000`00000000 fffffa80`0588b940 00000000`000900eb 00000000`00000000 : fltmgr!IssueControlOperation+0x395
fffff880`02af2850 fffff880`01120c28 : 00000000`00000000 fffff980`03972cd0 fffffa80`0588b940 00000000`000900eb : fltmgr!FltFsControlFile+0x48
fffff880`02af28b0 fffff880`018bde00 : fffff980`19126ee0 00000000`00000002 fffff980`191b6740 00000000`00000001 : fltmgr!FltvFsControlFile+0x68
fffff880`02af2900 fffff980`19126ee0 : 00000000`00000002 fffff980`191b6740 00000000`00000001 00000000`00000000 : MiniIcpt+0x3e00
fffff880`02af2908 00000000`00000002 : fffff980`191b6740 00000000`00000001 00000000`00000000 00000000`018e95dc : 0xfffff980`19126ee0
fffff880`02af2910 fffff980`191b6740 : 00000000`00000001 00000000`00000000 00000000`018e95dc fffffa80`00000400 : 0x2
fffff880`02af2918 00000000`00000001 : 00000000`00000000 00000000`018e95dc fffffa80`00000400 fffff880`02af2990 : 0xfffff980`191b6740
fffff880`02af2920 00000000`00000000 : 00000000`018e95dc fffffa80`00000400 fffff880`02af2990 fffffa80`00000000 : 0x1
fffff880`02af2928 00000000`018e95dc : fffffa80`00000400 fffff880`02af2990 fffffa80`00000000 fffff800`03160d86 : 0x0
fffff880`02af2930 fffffa80`00000400 : fffff880`02af2990 fffffa80`00000000 fffff800`03160d86 00000000`00000000 : 0x18e95dc
fffff880`02af2938 fffff880`02af2990 : fffffa80`00000000 fffff800`03160d86 00000000`00000000 00000000`00000000 : 0xfffffa80`00000400
fffff880`02af2940 fffffa80`00000000 : fffff800`03160d86 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff880`02af2990
fffff880`02af2948 fffff800`03160d86 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : 0xfffffa80`00000000
fffff880`02af2950 fffff800`03164c16 : fffff980`19126ee0 00000000`00000002 fffffa80`067dd390 fffffa80`03b5e118 : nt!VfBeforeCallDriver+0x186
fffff880`02af29b0 fffff800`02fd9707 : fffffa80`067dd390 fffff880`02af2ca0 fffffa80`067dd390 fffffa80`061c28d0 : nt!IovCallDriver+0x566
fffff880`02af2a10 fffff800`02fa2b1a : 00000000`00d0e4e8 00000000`000002fc 00000000`00000001 00000000`018e9510 : nt!IopXxxControlFile+0x607
fffff880`02af2b40 fffff800`02cbd993 : fffffa80`0634f7c0 00000000`00d0e488 fffff880`02af2bc8 00000000`00000001 : nt!NtFsControlFile+0x56
fffff880`02af2bb0 00000000`74f82dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00d0ed98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74f82dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
MiniIcpt+3e00
fffff880`018bde00 ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: MiniIcpt+3e00
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: MiniIcpt
IMAGE_NAME: MiniIcpt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c76f26a
FAILURE_BUCKET_ID: X64_0xc4_e2_VRF_MiniIcpt+3e00
BUCKET_ID: X64_0xc4_e2_VRF_MiniIcpt+3e00
Followup: MachineOwner
---------