mm causing blue screen error in XP x64 ?

This forum is for reporting bugs in MediaMonkey for Windows 4. Note that version 4 is no longer actively maintained as it has been replaced by version 5.

Moderator: Gurus

Teknojnky
Posts: 5537
Joined: Tue Sep 06, 2005 11:01 pm
Contact:

mm causing blue screen error in XP x64 ?

Post by Teknojnky »

edit: I just ran 16+ hours with blue screen with only mm 2 running, [s]I am starting to think that it may either be related to MM 3 (the mediamonkey.exe indicated in below doesnt have a path) or somehow related to running both mm 2.5 and 3 simultaniously.

I will experiment some more to see if I can trigger it without mm2 running.[/s]

edit 2: not more than a couple minutes when I edited this post above, I blue screened (only mm2 had been running the whole time).

As an aside, no strikethru bbcode makes me sad.

--------------------------------------------------------------------------------


I recently built a new computer, quad core q6600, 4 gig ram, x38 motherboard.

I had been getting infuriatingly random blue screen errors, "page fault in non-paged area".

I came across an article which helped me get the right tools to help figure out what was the root cause of the error; http://apcmag.com/7577/beat_those_bluescreen_blues

So I loaded up the mini dumps and so I see this..

Code: Select all

Loading Dump File [C:\WINDOWS\Minidump\Mini110107-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\windows\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_gdr.070321-2337
Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140
Debug session time: Thu Nov  1 07:06:09.859 2007 (GMT-6)
System Uptime: 0 days 7:02:23.098
Loading Kernel Symbols
......................................................................................................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa8009304000, 0, fffff97fff17efd4, 0}


Could not read faulting driver name


Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8009304000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff97fff17efd4, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name



READ_ADDRESS:  fffffa8009304000 

FAULTING_IP: 
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h]

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  MediaMonkey.exe

CURRENT_IRQL:  1

TRAP_FRAME:  fffffadfc12fdbb0 -- (.trap 0xfffffadfc12fdbb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8009303fd0
rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000
rip=fffff97fff17efd4 rsp=fffffadfc12fdd40 rbp=000000001035cdd8
 r8=0000000000000000  r9=fffffa8009303fd0 r10=000008f400000000
r11=fffffa8009303fd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32k!NtUserfnINDEVICECHANGE+0x1bb:
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h] ds:8f86:00000000`76647385=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800010a6072 to fffff8000102e890

STACK_TEXT:  
fffffadf`c12fdad8 fffff800`010a6072 : 00000000`00000050 fffffa80`09304000 00000000`00000000 fffffadf`c12fdbb0 : nt!KeBugCheckEx
fffffadf`c12fdae0 fffff800`0102d459 : 00000000`00000000 fffffadf`c12fdc30 fffffa80`0349e800 00000000`0000002c : nt!MmAccessFault+0xa1f
fffffadf`c12fdbb0 fffff97f`ff17efd4 : 00000000`00000000 00000000`1035cdd8 00000000`00000000 00000000`0000002c : nt!KiPageFault+0x119
fffffadf`c12fdd40 fffff97f`ff0a5a31 : fffff97f`f7c773f0 00000000`000902a2 00000000`0000002c fffffa80`09303fd0 : win32k!NtUserfnINDEVICECHANGE+0x1bb
fffffadf`c12fdde0 fffff800`0102e33d : 00000000`00000000 00000000`00000001 fffffadf`c12fe0a0 fffff800`01031286 : win32k!NtUserMessageCall+0x142
fffffadf`c12fde80 00000000`6b2b5e8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x3
00000000`0a4bd6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6b2b5e8a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32k!NtUserfnINDEVICECHANGE+1bb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  45e6f310

FAILURE_BUCKET_ID:  X64_0x50_win32k!NtUserfnINDEVICECHANGE+1bb

BUCKET_ID:  X64_0x50_win32k!NtUserfnINDEVICECHANGE+1bb

Followup: MachineOwner
---------

I don't know what to make of it, although it appears to point at mediamonkey.exe
Last edited by Teknojnky on Wed Nov 21, 2007 7:10 pm, edited 3 times in total.
Teknojnky
Posts: 5537
Joined: Tue Sep 06, 2005 11:01 pm
Contact:

Post by Teknojnky »

and here is a full memory dmp

Code: Select all

Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Complete Dump File: Full address space is available

************************************************************
WARNING: Dump file has been truncated.  Data may be missing.
************************************************************
Symbol search path is: SRV*c:\windows\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_gdr.070321-2337
Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140
Debug session time: Tue Nov 20 18:44:41.671 2007 (GMT-6)
System Uptime: 0 days 16:22:25.400
Loading Kernel Symbols
............................................................................................................................................
Loading User Symbols
.....
Loading unloaded module list
.......................
Loading Wow64 Symbols
.........................................................................................................................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa8004e36000, 0, fffff97fff17efd4, 0}

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************
Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )

Followup: MachineOwner
---------

1: kd> .reload
Loading Kernel Symbols
............................................................................................................................................
Loading User Symbols
.....
Loading unloaded module list
.......................
Loading Wow64 Symbols
.........................................................................................................................................................
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8004e36000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff97fff17efd4, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************

READ_ADDRESS:  fffffa8004e36000 Paged pool

FAULTING_IP: 
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h]

MM_INTERNAL_CODE:  0

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  45e6f310

MODULE_NAME: win32k

FAULTING_MODULE: fffff97fff000000 win32k

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  MediaMonkey.exe

CURRENT_IRQL:  1

TRAP_FRAME:  fffffadf8b2a3bb0 -- (.trap 0xfffffadf8b2a3bb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8004e35fd0
rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000
rip=fffff97fff17efd4 rsp=fffffadf8b2a3d40 rbp=0000000000186ba8
 r8=0000000000000000  r9=fffffa8004e35fd0 r10=0000094400000000
r11=fffffa8004e35fd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32k!NtUserfnINDEVICECHANGE+0x1bb:
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h] ds:ba3a:7385=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800010a6072 to fffff8000102e890

STACK_TEXT:  
fffffadf`8b2a3ad8 fffff800`010a6072 : 00000000`00000050 fffffa80`04e36000 00000000`00000000 fffffadf`8b2a3bb0 : nt!KeBugCheckEx
fffffadf`8b2a3ae0 fffff800`0102d459 : fffffadf`8b2a3dc0 fffff800`01031286 00000000`00000000 00000000`00008006 : nt!MmAccessFault+0xa1f
fffffadf`8b2a3bb0 fffff97f`ff17efd4 : 00000000`00000000 00000000`00186ba8 00000000`00000000 00000000`0000002c : nt!KiPageFault+0x119
fffffadf`8b2a3d40 fffff97f`ff0a5a31 : fffff97f`f7d224e0 00000000`0004082e 00000000`0000002c fffffa80`04e35fd0 : win32k!NtUserfnINDEVICECHANGE+0x1bb
fffffadf`8b2a3de0 fffff800`0102e33d : fffff6fb`7dbed000 00000000`00000000 fffffadf`9aa223b0 fffffadf`8b2a3f70 : win32k!NtUserMessageCall+0x142
fffffadf`8b2a3e80 00000000`6b2b5e8a : 00000000`6b29c512 0074006e`006f0043 0053006c`006f0072 0043005c`00740065 : nt!KiSystemServiceCopyEnd+0x3
00000000`0e23d6d8 00000000`6b29c512 : 0074006e`006f0043 0053006c`006f0072 0043005c`00740065 00000000`78b823a9 : wow64win!NtUserMessageCall+0xa
00000000`0e23d6e0 00000000`6b2afe8f : 00000000`00000000 00000000`6b290b08 00000000`6b28f460 00000000`00000219 : wow64win!whNT32NtUserMessageCallCB+0x32
00000000`0e23d730 00000000`6b29c647 : 00000000`7ef70000 00000000`7ef6e000 00000000`00000000 00000000`7ef70000 : wow64win!Wow64DoMessageThunk+0xaf
00000000`0e23d790 00000000`6b006866 : 00000000`0e1ffd70 00000000`0e1ffdac 00000000`7ef70000 00000000`7ef6e000 : wow64win!whNtUserMessageCall+0x127
00000000`0e23d820 00000000`78b83c7d : 00000000`00000000 00000000`00000000 00000000`00186ba8 00000000`ffffffff : wow64!Wow64SystemServiceEx+0xd6
00000000`0e23e0e0 00000000`6b006a5a : 00000000`0e23e6d0 00000000`0000001c 00000000`0e23e8b0 00000000`00000038 : wow64cpu!ServiceNoTurbo+0x28
00000000`0e23e170 00000000`6b0097f4 : 00000000`00000038 00000000`00000005 fffffadf`8b29e480 00000000`77ef55c9 : wow64!RunCpuSimulation+0xa
00000000`0e23e1a0 00000000`6b2961c5 : 00000000`00000000 00000000`0e23e790 00000000`0e23e640 00000000`0e23e728 : wow64!Wow64KiUserCallbackDispatcher+0x114
00000000`0e23e4e0 00000000`77ef317f : 00000000`00020019 fffffadf`9a9cd7a0 00000000`0e1fff20 fffffadf`8b2a4c70 : wow64win!whcbfnINDEVICECHANGE+0x195
00000000`0e23e6d0 00000000`6b2b5e7a : 00000000`6b29c464 00000000`00020019 00000000`6b00e47c 00000000`00150000 : ntdll!KiUserCallbackDispatcherContinue
00000000`0e23e7c8 00000000`6b29c464 : 00000000`00020019 00000000`6b00e47c 00000000`00150000 00000000`00153730 : wow64win!ZwUserGetMessage+0xa
00000000`0e23e7d0 00000000`6b006866 : 00000000`00000000 00000000`7ef70000 00000000`0e1fff08 00000000`7ef6e000 : wow64win!whNtUserGetMessage+0x34
00000000`0e23e830 00000000`78b83c7d : 00000000`0e1fe254 00000000`0000000c 00000000`00000000 00000000`0e1fff44 : wow64!Wow64SystemServiceEx+0xd6
00000000`0e23f0f0 00000000`00000000 : fffffa80`03ea7920 fffff800`01037d2b fffffadf`8b2a46e0 00000000`00008006 : wow64cpu!ServiceNoTurbo+0x28


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32k!NtUserfnINDEVICECHANGE+1bb

FOLLOWUP_NAME:  MachineOwner

FAILURE_BUCKET_ID:  X64_0x50_win32k!NtUserfnINDEVICECHANGE+1bb

BUCKET_ID:  X64_0x50_win32k!NtUserfnINDEVICECHANGE+1bb

Followup: MachineOwner
---------
Teknojnky
Posts: 5537
Joined: Tue Sep 06, 2005 11:01 pm
Contact:

Post by Teknojnky »

more

Code: Select all

Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Complete Dump File: Full address space is available

************************************************************
WARNING: Dump file has been truncated.  Data may be missing.
************************************************************
Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path.           *
* Use .symfix to have the debugger choose a symbol path.                   *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is: 
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
*                                                                   *
* The Symbol Path can be set by:                                    *
*   using the _NT_SYMBOL_PATH environment variable.                 *
*   using the -y <symbol_path> argument when starting the debugger. *
*   using .sympath and .sympath+                                    *
*********************************************************************
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for ntkrnlmp.exe - 
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_gdr.070321-2337
Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140
Debug session time: Wed Nov 21 01:13:51.484 2007 (GMT-6)
System Uptime: 0 days 6:27:22.224
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
*                                                                   *
* The Symbol Path can be set by:                                    *
*   using the _NT_SYMBOL_PATH environment variable.                 *
*   using the -y <symbol_path> argument when starting the debugger. *
*   using .sympath and .sympath+                                    *
*********************************************************************
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for ntkrnlmp.exe - 
Loading Kernel Symbols
...........................................................................................................................................
Loading User Symbols
.....
Loading unloaded module list
....................*** ERROR: Module load completed but symbols could not be loaded for ntdll.dll

Loading Wow64 Symbols
....................................................................................................................................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa8006348000, 0, fffff97fff17efd4, 0}

*** ERROR: Module load completed but symbols could not be loaded for mssmbios.sys
***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: nt!_KPRCB                                     ***
***                                                                   ***
*************************************************************************
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for win32k.sys - 
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for wow64cpu.dll - 
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for wow64win.dll - 
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for wow64.dll - 
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: nt!_KPRCB                                     ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: nt!_KPRCB                                     ***
***                                                                   ***
*************************************************************************
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for kernel32.dll - 
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************
Probably caused by : win32k.sys ( win32k!EngLineTo+165d4 )

Followup: MachineOwner
---------

Verbose mode ON.
2: kd> .reload
Loading symbols for fffff800`01000000     ntkrnlmp.exe ->   ntkrnlmp.exe
ModLoad: fffff800`01000000 fffff800`01491000   ntkrnlmp.exe
Loading Kernel Symbols
.ModLoad: fffff800`00800000 fffff800`0085e000   hal.dll 
.ModLoad: fffffadf`90bfb000 fffffadf`90c05000   kdcom.dll
.ModLoad: fffffadf`90c0b000 fffffadf`90c14000   \WINDOWS\system32\BOOTVID.dll
.ModLoad: fffffadf`9079e000 fffffadf`907f2000   ACPI.sys
.ModLoad: fffffadf`90c1b000 fffffadf`90c24000   \WINDOWS\system32\DRIVERS\WMILIB.SYS
.ModLoad: fffffadf`9077d000 fffffadf`9079e000   pci.sys 
.ModLoad: fffffadf`90c2b000 fffffadf`90c34000   isapnp.sys
.ModLoad: fffffadf`90766000 fffffadf`9077cd00   ohci1394.sys
.ModLoad: fffffadf`90752000 fffffadf`90765a00   \WINDOWS\system32\DRIVERS\1394BUS.SYS
.ModLoad: fffffadf`90ffb000 fffffadf`91002000   pciide.sys
.ModLoad: fffffadf`90c3b000 fffffadf`90c4b000   \WINDOWS\system32\DRIVERS\PCIIDEX.SYS
.ModLoad: fffffadf`9073c000 fffffadf`90752000   MountMgr.sys
.ModLoad: fffffadf`906fc000 fffffadf`9073c000   ftdisk.sys
.ModLoad: fffffadf`91002000 fffffadf`91009000   dmload.sys
.ModLoad: fffffadf`906b5000 fffffadf`906fc000   dmio.sys
.ModLoad: fffffadf`9066a000 fffffadf`906b5000   volsnap.sys
.ModLoad: fffffadf`90654000 fffffadf`9066a000   sbp2port.sys
.ModLoad: fffffadf`90c4b000 fffffadf`90c5b000   PartMgr.sys
.ModLoad: fffffadf`90627000 fffffadf`90654000   atapi.sys
.ModLoad: fffffadf`90524000 fffffadf`90627000   iaStor.sys
.ModLoad: fffffadf`9050f000 fffffadf`90524000   jraid.sys
.ModLoad: fffffadf`904de000 fffffadf`9050f000   \WINDOWS\system32\DRIVERS\SCSIPORT.SYS
.ModLoad: fffffadf`904c9000 fffffadf`904de000   disk.sys
.ModLoad: fffffadf`904ac000 fffffadf`904c9000   \WINDOWS\system32\DRIVERS\CLASSPNP.SYS
.ModLoad: fffffadf`9046e000 fffffadf`904ac000   fltMgr.sys
.ModLoad: fffffadf`9044b000 fffffadf`9046e000   sr.sys  
.ModLoad: fffffadf`90417000 fffffadf`9044b000   KSecDD.sys
.ModLoad: fffffadf`90312000 fffffadf`90417000   Ntfs.sys
.ModLoad: fffffadf`902ac000 fffffadf`90312000   NDIS.sys
.ModLoad: fffffadf`90278000 fffffadf`902ac000   Mup.sys 
.ModLoad: fffffadf`90c5b000 fffffadf`90c66000   crcdisk.sys
.ModLoad: fffffadf`90d7b000 fffffadf`90d85000   \SystemRoot\system32\DRIVERS\tunmp.sys
.ModLoad: fffffadf`90906000 fffffadf`90918000   \SystemRoot\system32\DRIVERS\intelppm.sys
.ModLoad: fffffadf`8f1db000 fffffadf`8faefa00   \SystemRoot\system32\DRIVERS\nv4_mini.sys
.ModLoad: fffffadf`8f1b8000 fffffadf`8f1db000   \SystemRoot\system32\DRIVERS\VIDEOPRT.SYS
.ModLoad: fffffadf`90d3b000 fffffadf`90d44000   \SystemRoot\system32\DRIVERS\watchdog.sys
.ModLoad: fffffadf`90ff3000 fffffadf`90ffaf00   \SystemRoot\system32\DRIVERS\usbuhci.sys
.ModLoad: fffffadf`8f17e000 fffffadf`8f1b8000   \SystemRoot\system32\DRIVERS\USBPORT.SYS
.ModLoad: fffffadf`90ceb000 fffffadf`90cf5c80   \SystemRoot\system32\DRIVERS\usbehci.sys
.ModLoad: fffffadf`8f140000 fffffadf`8f17e000   \SystemRoot\system32\DRIVERS\HDAudBus.sys
.ModLoad: fffffadf`8f129000 fffffadf`8f140000   \SystemRoot\system32\DRIVERS\imapi.sys
.ModLoad: fffffadf`911c9000 fffffadf`911d0000   \SystemRoot\System32\Drivers\ElbyDelay.sys
.ModLoad: fffffadf`90d2b000 fffffadf`90d39000   \SystemRoot\System32\Drivers\ElbyCDFL.sys
.ModLoad: fffffadf`8f0c5000 fffffadf`8f0e3000   \SystemRoot\System32\Drivers\AnyDVD.sys
.ModLoad: fffffadf`8f0aa000 fffffadf`8f0c5000   \SystemRoot\system32\DRIVERS\cdrom.sys
.ModLoad: fffffadf`8f094000 fffffadf`8f0aa000   \SystemRoot\system32\DRIVERS\redbook.sys
.ModLoad: fffffadf`8f04b000 fffffadf`8f094000   \SystemRoot\system32\DRIVERS\ks.sys
.ModLoad: fffffadf`8f029000 fffffadf`8f04b000   \SystemRoot\system32\DRIVERS\Rtenic64.sys
.ModLoad: fffffadf`8f00d000 fffffadf`8f029000   \SystemRoot\system32\DRIVERS\nic1394.sys
.ModLoad: fffffadf`90dbb000 fffffadf`90dc9000   \SystemRoot\system32\DRIVERS\fdc.sys
.ModLoad: fffffadf`8eff8000 fffffadf`8f00d000   \SystemRoot\system32\DRIVERS\VMNetSrv.sys
.ModLoad: fffffadf`90f6b000 fffffadf`90f73000   \SystemRoot\system32\DRIVERS\audstub.sys
.ModLoad: fffffadf`91201000 fffffadf`91206e80   \SystemRoot\system32\drivers\ksthunk.sys
.ModLoad: fffffadf`8efd2000 fffffadf`8eff8000   \SystemRoot\system32\DRIVERS\rasl2tp.sys
.ModLoad: fffffadf`90d6b000 fffffadf`90d75000   \SystemRoot\system32\DRIVERS\ndistapi.sys
.ModLoad: fffffadf`8efa6000 fffffadf`8efd2000   \SystemRoot\system32\DRIVERS\ndiswan.sys
.ModLoad: fffffadf`8ef92000 fffffadf`8efa6000   \SystemRoot\system32\DRIVERS\raspppoe.sys
.ModLoad: fffffadf`8ef6f000 fffffadf`8ef92000   \SystemRoot\system32\DRIVERS\raspptp.sys
.ModLoad: fffffadf`90e2b000 fffffadf`90e3a000   \SystemRoot\system32\DRIVERS\TDI.SYS
.ModLoad: fffffadf`8ef4f000 fffffadf`8ef6f000   \SystemRoot\system32\DRIVERS\psched.sys
.ModLoad: fffffadf`8ef39000 fffffadf`8ef4f000   \SystemRoot\system32\DRIVERS\msgpc.sys
.ModLoad: fffffadf`90deb000 fffffadf`90df8000   \SystemRoot\system32\DRIVERS\ptilink.sys
.ModLoad: fffffadf`90d5b000 fffffadf`90d66000   \SystemRoot\system32\DRIVERS\raspti.sys
.ModLoad: fffffadf`8ee42000 fffffadf`8ee99000   \SystemRoot\system32\DRIVERS\rdpdr.sys
.ModLoad: fffffadf`8ee2c000 fffffadf`8ee42000   \SystemRoot\system32\DRIVERS\termdd.sys
.ModLoad: fffffadf`90cfb000 fffffadf`90d09000   \SystemRoot\system32\DRIVERS\kbdclass.sys
.ModLoad: fffffadf`90d1b000 fffffadf`90d28000   \SystemRoot\system32\DRIVERS\mouclass.sys
.ModLoad: fffffadf`91409000 fffffadf`9140a400   \SystemRoot\system32\DRIVERS\swenum.sys
.ModLoad: fffffadf`8ee00000 fffffadf`8ee2c000   \SystemRoot\system32\DRIVERS\update.sys
.ModLoad: fffffadf`90ccb000 fffffadf`90cd8000   \SystemRoot\system32\DRIVERS\mssmbios.sys
.ModLoad: fffffadf`90cbb000 fffffadf`90cc7000   \SystemRoot\system32\DRIVERS\flpydisk.sys
.ModLoad: fffffadf`8edec000 fffffadf`8ee00000   \SystemRoot\System32\Drivers\NDProxy.SYS
.ModLoad: fffffadf`8ea86000 fffffadf`8eaa6000   \SystemRoot\system32\DRIVERS\usbhub.sys
.ModLoad: fffffadf`91413000 fffffadf`91414d80   \SystemRoot\system32\DRIVERS\USBD.SYS
.ModLoad: fffffadf`8def7000 fffffadf`8e386000   \SystemRoot\system32\drivers\RTKHDA64.SYS
.ModLoad: fffffadf`8deb7000 fffffadf`8def7000   \SystemRoot\system32\drivers\portcls.sys
.ModLoad: fffffadf`90ddb000 fffffadf`90de5000   \SystemRoot\System32\Drivers\Fs_Rec.SYS
.ModLoad: fffffadf`90fab000 fffffadf`90fb3000   \SystemRoot\System32\Drivers\Null.SYS
.ModLoad: fffffadf`8fd86000 fffffadf`8fd8d000   \SystemRoot\System32\Drivers\Beep.SYS
.ModLoad: fffffadf`90dfb000 fffffadf`90e05200   \SystemRoot\system32\DRIVERS\HIDPARSE.SYS
.ModLoad: fffffadf`90cdb000 fffffadf`90ce9000   \SystemRoot\System32\drivers\vga.sys
.ModLoad: fffffadf`90dab000 fffffadf`90db5000   \SystemRoot\System32\Drivers\mnmdd.SYS
.ModLoad: fffffadf`90d9b000 fffffadf`90da5000   \SystemRoot\System32\DRIVERS\RDPCDD.sys
.ModLoad: fffffadf`90d4b000 fffffadf`90d58000   \SystemRoot\System32\Drivers\Msfs.SYS
.ModLoad: fffffadf`8d748000 fffffadf`8d75c000   \SystemRoot\System32\Drivers\Npfs.SYS
.ModLoad: fffffadf`90e5b000 fffffadf`90e65000   \SystemRoot\system32\DRIVERS\rasacd.sys
.ModLoad: fffffadf`8d71d000 fffffadf`8d748000   \SystemRoot\system32\DRIVERS\ipsec.sys
.ModLoad: fffffadf`8d628000 fffffadf`8d71d000   \SystemRoot\system32\DRIVERS\tcpip.sys
.ModLoad: fffffadf`90d8b000 fffffadf`90d99000   \SystemRoot\System32\Drivers\aswTdi.SYS
.ModLoad: fffffadf`8d5ea000 fffffadf`8d628000   \SystemRoot\system32\DRIVERS\ipnat.sys
.ModLoad: fffffadf`90919000 fffffadf`9092b000   \SystemRoot\system32\DRIVERS\wanarp.sys
.ModLoad: fffffadf`8d590000 fffffadf`8d5ea000   \SystemRoot\system32\DRIVERS\netbt.sys
.ModLoad: fffffadf`8d570000 fffffadf`8d590000   \SystemRoot\system32\DRIVERS\arp1394.sys
.ModLoad: fffffadf`8d514000 fffffadf`8d56fa00   \SystemRoot\system32\DRIVERS\tcpip6.sys
.ModLoad: fffffadf`8d4f6000 fffffadf`8d514000   \SystemRoot\system32\DRIVERS\smb.sys
.ModLoad: fffffadf`8d4e1000 fffffadf`8d4f6000   \SystemRoot\system32\DRIVERS\Ip6Fw.sys
.ModLoad: fffffadf`8d494000 fffffadf`8d4e1000   \SystemRoot\System32\drivers\afd.sys
.ModLoad: fffffadf`9092c000 fffffadf`9093e000   \SystemRoot\system32\DRIVERS\netbios.sys
.ModLoad: fffffadf`8d447000 fffffadf`8d494000   \??\C:\WINDOWS\system32\Drivers\vmm.sys
.ModLoad: fffffadf`8fd16000 fffffadf`8fd1d000   \??\C:\WINDOWS\SysWOW64\speedfan.sys
.ModLoad: fffffadf`8d3f6000 fffffadf`8d447000   \SystemRoot\system32\DRIVERS\rdbss.sys
.ModLoad: fffffadf`8d329000 fffffadf`8d3f6000   \SystemRoot\system32\DRIVERS\mrxsmb.sys
.ModLoad: fffffadf`9093f000 fffffadf`90951000   \SystemRoot\System32\Drivers\Fips.SYS
.ModLoad: fffffadf`90e4b000 fffffadf`90e55000   \SystemRoot\System32\Drivers\ElbyCDIO.sys
.ModLoad: fffffadf`90c9b000 fffffadf`90ca6000   \SystemRoot\System32\Drivers\Aavmker4.SYS
.ModLoad: fffffadf`8d139000 fffffadf`8d158000   \SystemRoot\System32\Drivers\Udfs.SYS
.ModLoad: fffffadf`8d036000 fffffadf`8d139000   \SystemRoot\System32\Drivers\dump_iaStor.sys
.ModLoad: fffff97f`ff000000 fffff97f`ff460000   \SystemRoot\System32\win32k.sys
.ModLoad: fffffadf`8d78c000 fffffadf`8d798000   \SystemRoot\System32\drivers\Dxapi.sys
.ModLoad: fffff97f`ff460000 fffff97f`ff488000   \SystemRoot\System32\drivers\dxg.sys
.ModLoad: fffff97f`ff488000 fffff97f`ffc95600   \SystemRoot\System32\nv4_disp.dll
.ModLoad: fffff97f`ffc96000 fffff97f`ffd0a000   \SystemRoot\System32\ATMFD.DLL
.ModLoad: fffffadf`8d1b8000 fffffadf`8d1c4000   \SystemRoot\system32\DRIVERS\ndisuio.sys
.ModLoad: fffffadf`8c79b000 fffffadf`8c7bc000   \SystemRoot\System32\Drivers\aswMon2.SYS
.ModLoad: fffffadf`8c3ec000 fffffadf`8c435000   \SystemRoot\system32\DRIVERS\mrxdav.sys
.ModLoad: fffffadf`90feb000 fffffadf`90ff3000   \SystemRoot\system32\DRIVERS\CdaC15BA.sys
.ModLoad: fffffadf`90fcb000 fffffadf`90fd3000   \SystemRoot\system32\DRIVERS\CdaD10BA.sys
.ModLoad: fffffadf`8c30f000 fffffadf`8c3a6000   \SystemRoot\System32\Drivers\HTTP.sys
.ModLoad: fffffadf`8c149000 fffffadf`8c20d000   \SystemRoot\system32\DRIVERS\srv.sys
.ModLoad: fffffadf`90edb000 fffffadf`90ee3000   \SystemRoot\system32\DRIVERS\secdrv.sys
.ModLoad: fffffadf`8d7ac000 fffffadf`8d7ba000   \??\C:\WINDOWS\nvoclk64.sys
.ModLoad: fffffadf`90e0b000 fffffadf`90e14000   \SystemRoot\System32\Drivers\aswRdr.SYS
.ModLoad: fffffadf`8b8a1000 fffffadf`8b8d5000   \SystemRoot\system32\drivers\wdmaud.sys
.ModLoad: fffffadf`8b830000 fffffadf`8b85b000   \SystemRoot\system32\drivers\sysaudio.sys
.ModLoad: fffffadf`8d158000 fffffadf`8d166000   \SystemRoot\System32\Drivers\TDTCP.SYS
.ModLoad: fffffadf`8b5db000 fffffadf`8b619000   \SystemRoot\System32\Drivers\RDPWD.SYS
.ModLoad: fffffadf`8b5aa000 fffffadf`8b5b1000   \??\C:\DOCUME~1\Tekno\LOCALS~1\Temp\ALSysIO64.sys
.ModLoad: fffffadf`90f93000 fffffadf`90f9b000   \??\C:\WINDOWS\system32\Drivers\PROCEXP111.SYS
.ModLoad: fffffadf`88fa2000 fffffadf`88fda000   \SystemRoot\system32\drivers\kmixer.sys
.ModLoad: fffffadf`88da5000 fffffadf`88dbf000   \SystemRoot\system32\drivers\swmidi.sys
.ModLoad: fffffadf`87d75000 fffffadf`87d7f700   \SystemRoot\system32\DRIVERS\usbccgp.sys
.ModLoad: fffffadf`87cf5000 fffffadf`87cff000   \SystemRoot\system32\DRIVERS\hidusb.sys
.ModLoad: fffffadf`879f0000 fffffadf`87a05000   \SystemRoot\system32\DRIVERS\HIDCLASS.SYS
.ModLoad: fffffadf`87be5000 fffffadf`87bf1000   \SystemRoot\system32\DRIVERS\kbdhid.sys
.ModLoad: fffffadf`8c0ca000 fffffadf`8c0dc000   \SystemRoot\system32\DRIVERS\LHidFilt.Sys
.ModLoad: fffffadf`883ff000 fffffadf`8840d000   \SystemRoot\system32\DRIVERS\WDFLDR.SYS
.ModLoad: fffffadf`8791a000 fffffadf`879f0000   \SystemRoot\system32\DRIVERS\Wdf01000.sys
.ModLoad: fffffadf`87a85000 fffffadf`87a8f000   \SystemRoot\system32\DRIVERS\mouhid.sys
.ModLoad: fffffadf`8a278000 fffffadf`8a28b000   \SystemRoot\system32\DRIVERS\LMouFilt.Sys

Loading User Symbols
.ModLoad: 00000000`00400000 00000000`008d2000   J:\Program Files\MediaMonkey\MediaMonkey.exe
.ModLoad: 00000000`77ec0000 00000000`77ff9000   C:\WINDOWS\system32\ntdll.dll
.ModLoad: 00000000`6b000000 00000000`6b046000   C:\WINDOWS\system32\wow64.dll
.ModLoad: 00000000`6b280000 00000000`6b2ca000   C:\WINDOWS\system32\wow64win.dll
.ModLoad: 00000000`78b80000 00000000`78b89000   C:\WINDOWS\system32\wow64cpu.dll

Loading unloaded module list
....................Loading symbols for 00000000`77ec0000        ntdll.dll ->   ntdll.dll

Loading Wow64 Symbols
.Force unload of J:\Program Files\MediaMonkey\MediaMonkey.exe
ModLoad: 00000000`00400000 00000000`008d2000   J:\Program Files\MediaMonkey\MediaMonkey.exe
.ModLoad: 00000000`7d600000 00000000`7d6f0000   C:\WINDOWS\system32\ntdll.dll
.ModLoad: 00000000`7d4c0000 00000000`7d5f0000   C:\WINDOWS\syswow64\kernel32.dll
.ModLoad: 00000000`7d930000 00000000`7da00000   C:\WINDOWS\syswow64\user32.dll
.ModLoad: 00000000`7d800000 00000000`7d890000   C:\WINDOWS\syswow64\GDI32.dll
.ModLoad: 00000000`009a0000 00000000`00a3b000   C:\WINDOWS\syswow64\ADVAPI32.dll
.ModLoad: 00000000`7da20000 00000000`7db00000   C:\WINDOWS\syswow64\RPCRT4.dll
.ModLoad: 00000000`7d8d0000 00000000`7d920000   C:\WINDOWS\syswow64\Secur32.dll
.ModLoad: 00000000`00a40000 00000000`00acb000   C:\WINDOWS\syswow64\oleaut32.dll
.ModLoad: 00000000`77ba0000 00000000`77bfa000   C:\WINDOWS\syswow64\msvcrt.dll
.ModLoad: 00000000`77670000 00000000`777a9000   C:\WINDOWS\syswow64\ole32.dll
.ModLoad: 00000000`71bd0000 00000000`71be1000   C:\WINDOWS\syswow64\mpr.dll
.ModLoad: 00000000`77b90000 00000000`77b98000   C:\WINDOWS\syswow64\version.dll
.ModLoad: 00000000`7dbd0000 00000000`7dcd3000   C:\WINDOWS\WinSxS\WOW64_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.3959_x-ww_5FA17F4E\comctl32.dll
.ModLoad: 00000000`00ad0000 00000000`00b22000   C:\WINDOWS\syswow64\SHLWAPI.dll
.ModLoad: 00000000`7dee0000 00000000`7df40000   C:\WINDOWS\system32\imm32.dll
.ModLoad: 00000000`73070000 00000000`73097000   C:\WINDOWS\system32\winspool.drv
.ModLoad: 00000000`7c8d0000 00000000`7d0cf000   C:\WINDOWS\syswow64\shell32.dll
.ModLoad: 00000000`762b0000 00000000`762f9000   C:\WINDOWS\syswow64\comdlg32.dll
.ModLoad: 00000000`76aa0000 00000000`76acd000   C:\WINDOWS\system32\winmm.dll
.ModLoad: 00000000`10000000 00000000`1007a000   J:\Program Files\MediaMonkey\ID3Lib.dll
.ModLoad: 00000000`00b30000 00000000`00b83000   J:\Program Files\MediaMonkey\akrip32.dll
.ModLoad: 00000000`71c00000 00000000`71c17000   C:\WINDOWS\system32\WS2_32.dll
.ModLoad: 00000000`71bf0000 00000000`71bf8000   C:\WINDOWS\system32\WS2HELP.dll
.ModLoad: 00000000`00b90000 00000000`00bb5000   J:\Program Files\MediaMonkey\UNZIP32.DLL
.ModLoad: 00000000`00bc0000 00000000`00bd8000   J:\Program Files\MediaMonkey\Equalize.dll
.ModLoad: 00000000`00be0000 00000000`00bed000   J:\Program Files\MediaMonkey\MMHelper.dll
.ModLoad: 00000000`748d0000 00000000`748d8000   C:\WINDOWS\system32\cfgmgr32.dll
.ModLoad: 00000000`770e0000 00000000`771e8000   C:\WINDOWS\system32\setupapi.dll
.ModLoad: 00000000`00bf0000 00000000`00cc9000   J:\Program Files\MediaMonkey\hpCDBurn.dll
.ModLoad: 00000000`00cd0000 00000000`00cd6000   J:\Program Files\MediaMonkey\ogg.dll
.ModLoad: 00000000`00ce0000 00000000`00df1000   J:\Program Files\MediaMonkey\vorbis.dll
.ModLoad: 00000000`00e00000 00000000`00e11000   J:\Program Files\MediaMonkey\libresample.dll
.ModLoad: 00000000`4d7a0000 00000000`4d7ba000   C:\WINDOWS\system32\ODBCCP32.DLL
.ModLoad: 00000000`71bb0000 00000000`71bb9000   C:\WINDOWS\system32\wsock32.dll
.ModLoad: 00000000`66500000 00000000`6650a000   C:\WINDOWS\system32\wbsys.dll
.ModLoad: 00000000`02a50000 00000000`02a55000   C:\WINDOWS\system32\WNASPI32.DLL
.ModLoad: 00000000`02be0000 00000000`02bf7000   C:\WINDOWS\system32\odbcint.dll
.ModLoad: 00000000`5e9a0000 00000000`5e9b7000   C:\WINDOWS\system32\olepro32.dll
.ModLoad: 00000000`66800000 00000000`6680e000   C:\WINDOWS\system32\wbload.dll
.ModLoad: 00000000`66000000 00000000`66086000   C:\Program Files (x86)\Stardock\Object Desktop\WindowBlinds\WBLIND.dll
.ModLoad: 00000000`7df50000 00000000`7dfc0000   C:\WINDOWS\system32\UXTHEME.DLL
.ModLoad: 00000000`76280000 00000000`76285000   C:\WINDOWS\system32\msimg32.dll
.ModLoad: 00000000`66600000 00000000`66617000   C:\Program Files (x86)\Stardock\Object Desktop\WindowBlinds\wbhelp.dll
.ModLoad: 00000000`63560000 00000000`63595000   D:\PROGRAM FILES X64\FRAPS\FRAPS.DLL
.ModLoad: 00000000`10100000 00000000`1010f000   C:\Program Files\Logitech\SetPoint\x86\lgscroll.dll
.ModLoad: 00000000`78130000 00000000`781cb000   C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6B128700\MSVCR80.dll
.ModLoad: 00000000`7c420000 00000000`7c4a7000   C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6B128700\MSVCP80.dll
.ModLoad: 00000000`030f0000 00000000`03111000   C:\WINDOWS\system32\NTMARTA.DLL
.ModLoad: 00000000`76f10000 00000000`76f3e000   C:\WINDOWS\syswow64\WLDAP32.dll
.ModLoad: 00000000`7e020000 00000000`7e02f000   C:\WINDOWS\system32\SAMLIB.dll
.ModLoad: 00000000`75da0000 00000000`75e5d000   C:\WINDOWS\system32\SXS.DLL
.ModLoad: 00000000`77210000 00000000`772bb000   C:\WINDOWS\syswow64\wininet.dll
.ModLoad: 00000000`761b0000 00000000`76243000   C:\WINDOWS\syswow64\CRYPT32.dll
.ModLoad: 00000000`76190000 00000000`761a2000   C:\WINDOWS\syswow64\MSASN1.dll
.ModLoad: 00000000`777b0000 00000000`77833000   C:\WINDOWS\system32\CLBCatQ.DLL
.ModLoad: 00000000`77010000 00000000`770d6000   C:\WINDOWS\system32\COMRes.dll
.ModLoad: 00000000`035f0000 00000000`038b5000   C:\WINDOWS\system32\xpsp2res.dll
.ModLoad: 00000000`77980000 00000000`77af3000   C:\WINDOWS\SysWOW64\shdocvw.dll
.ModLoad: 00000000`75360000 00000000`753de000   C:\WINDOWS\syswow64\CRYPTUI.dll
.ModLoad: 00000000`76bb0000 00000000`76bdb000   C:\WINDOWS\syswow64\WINTRUST.dll
.ModLoad: 00000000`76c10000 00000000`76c38000   C:\WINDOWS\syswow64\imagehlp.dll
.ModLoad: 00000000`71c40000 00000000`71c97000   C:\WINDOWS\syswow64\NETAPI32.dll
.ModLoad: 00000000`48890000 00000000`488cd000   C:\WINDOWS\system32\ODBC32.DLL
.ModLoad: 00000000`4c220000 00000000`4c264000   C:\WINDOWS\system32\odbcjt32.dll
.ModLoad: 00000000`1b000000 00000000`1b16f000   C:\WINDOWS\system32\msjet40.dll
.ModLoad: 00000000`1b5d0000 00000000`1b665000   C:\WINDOWS\system32\mswstr10.dll
.ModLoad: 00000000`4ced0000 00000000`4cede000   C:\WINDOWS\system32\odbcji32.dll
.ModLoad: 00000000`1b2c0000 00000000`1b2cd000   C:\WINDOWS\system32\msjter40.dll
.ModLoad: 00000000`1b2d0000 00000000`1b2f6000   C:\WINDOWS\system32\MSJINT40.DLL
.ModLoad: 00000000`1b800000 00000000`1b83a000   C:\WINDOWS\SysWOW64\msjtes40.dll
.ModLoad: 00000000`0f9a0000 00000000`0f9ab000   C:\WINDOWS\system32\VBAJET32.DLL
.ModLoad: 00000000`0f9c0000 00000000`0fa22000   C:\WINDOWS\system32\expsrv.dll
.ModLoad: 00000000`0a4a0000 00000000`0a4d2000   J:\Program Files\MediaMonkey\Plugins\in_ape.dll
.ModLoad: 00000000`0a4f0000 00000000`0a504000   J:\Program Files\MediaMonkey\Plugins\in_cda.dll
.ModLoad: 00000000`0a520000 00000000`0a530000   J:\Program Files\MediaMonkey\Plugins\in_dsmp3.dll
.ModLoad: 00000000`0a540000 00000000`0a55c000   J:\Program Files\MediaMonkey\Plugins\in_flac.dll
.ModLoad: 00000000`0b090000 00000000`0b147000   J:\Program Files\MediaMonkey\Plugins\in_mad.dll
.ModLoad: 00000000`0a590000 00000000`0a5ad000   J:\Program Files\MediaMonkey\Plugins\in_midi.dll
.ModLoad: 00000000`0b150000 00000000`0b1f0000   J:\Program Files\MediaMonkey\Plugins\in_mp4.dll
.ModLoad: 00000000`0b1f0000 00000000`0b22c000   J:\Program Files\MediaMonkey\Plugins\in_mpc.dll
.ModLoad: 00000000`0b230000 00000000`0b257000   J:\Program Files\MediaMonkey\Plugins\in_vorbis.dll
.ModLoad: 00000000`0a5b0000 00000000`0a5c0000   J:\Program Files\MediaMonkey\Plugins\in_wav.dll
.ModLoad: 00000000`0b260000 00000000`0b296000   J:\Program Files\MediaMonkey\Plugins\in_wma.dll
.ModLoad: 00000000`0b2b0000 00000000`0b2bd000   J:\Program Files\MediaMonkey\Plugins\out_ds.dll
.ModLoad: 00000000`0b2c0000 00000000`0b2cd000   J:\Program Files\MediaMonkey\Plugins\out_ds_wa521.dll
.ModLoad: 00000000`7c340000 00000000`7c396000   C:\WINDOWS\system32\MSVCR71.dll
.ModLoad: 00000000`0b2e0000 00000000`0b30e000   J:\Program Files\MediaMonkey\Plugins\out_MMDS.dll
.ModLoad: 00000000`73e50000 00000000`73eab000   C:\WINDOWS\system32\dsound.dll
.ModLoad: 00000000`0b460000 00000000`0b467000   J:\Program Files\MediaMonkey\Plugins\out_wave.dll
.ModLoad: 00000000`0b470000 00000000`0b4ab000   J:\Program Files\MediaMonkey\Plugins\gen_audioscrobbler.dll
.ModLoad: 00000000`76e90000 00000000`76ecf000   C:\WINDOWS\system32\RASAPI32.dll
.ModLoad: 00000000`76e40000 00000000`76e52000   C:\WINDOWS\system32\rasman.dll
.ModLoad: 00000000`76e60000 00000000`76e8f000   C:\WINDOWS\system32\TAPI32.dll
.ModLoad: 00000000`76e30000 00000000`76e3c000   C:\WINDOWS\system32\rtutils.dll
.ModLoad: 00000000`0b4b0000 00000000`0b515000   C:\WINDOWS\system32\MSVCP60.dll
.ModLoad: 00000000`722f0000 00000000`722f5000   C:\WINDOWS\system32\sensapi.dll
.ModLoad: 00000000`76920000 00000000`769e2000   C:\WINDOWS\system32\USERENV.dll
.ModLoad: 00000000`772c0000 00000000`7736f000   C:\WINDOWS\syswow64\urlmon.dll
.ModLoad: 00000000`7db30000 00000000`7dbb0000   C:\WINDOWS\system32\mswsock.dll
.ModLoad: 00000000`5f270000 00000000`5f2ca000   C:\WINDOWS\system32\hnetcfg.dll
.ModLoad: 00000000`57b80000 00000000`57b87000   C:\WINDOWS\System32\wship6.dll
.ModLoad: 00000000`76ed0000 00000000`76efa000   C:\WINDOWS\system32\DNSAPI.dll
.ModLoad: 00000000`76f70000 00000000`76f77000   C:\WINDOWS\System32\winrnr.dll
.ModLoad: 00000000`74dc0000 00000000`74dcf000   C:\WINDOWS\system32\pnrpnsp.dll
.ModLoad: 00000000`76f80000 00000000`76f85000   C:\WINDOWS\system32\rasadhlp.dll
.ModLoad: 00000000`71ae0000 00000000`71ae8000   C:\WINDOWS\System32\wshtcpip.dll
.ModLoad: 00000000`0bf90000 00000000`0bfaf000   J:\Program Files\MediaMonkey\Plugins\f_ape.dll
.ModLoad: 00000000`0c210000 00000000`0c224000   J:\Program Files\MediaMonkey\Plugins\f_flac.dll
.ModLoad: 00000000`0c330000 00000000`0c355000   J:\Program Files\MediaMonkey\Plugins\f_flac_codec.dll
.ModLoad: 00000000`0c360000 00000000`0c37f000   J:\Program Files\MediaMonkey\Plugins\f_mpc.dll
.ModLoad: 00000000`0c480000 00000000`0c4b7000   J:\Program Files\MediaMonkey\Plugins\f_ogg.dll
.ModLoad: 00000000`0c4d0000 00000000`0c4e7000   J:\Program Files\MediaMonkey\Plugins\f_wave.dll
.ModLoad: 00000000`0c5f0000 00000000`0c635000   J:\Program Files\MediaMonkey\Plugins\d_iPod.dll
.ModLoad: 00000000`0a350000 00000000`0a376000   J:\Program Files\MediaMonkey\Plugins\d_USBMass1.dll
.ModLoad: 00000000`0c740000 00000000`0c766000   J:\Program Files\MediaMonkey\Plugins\d_USBMass2.dll
.ModLoad: 00000000`0c870000 00000000`0c8b2000   J:\Program Files\MediaMonkey\Plugins\d_WMDM.dll
.ModLoad: 00000000`0c8c0000 00000000`0c8e0000   J:\Program Files\MediaMonkey\WMAuth.dll
.ModLoad: 00000000`57380000 00000000`57398000   C:\WINDOWS\SysWOW64\msscript.ocx
.ModLoad: 00000000`73460000 00000000`734c2000   C:\WINDOWS\SysWOW64\vbscript.dll
.ModLoad: 00000000`4d890000 00000000`4d8c8000   C:\Program Files (x86)\Common Files\System\ado\msadox.dll
.ModLoad: 00000000`74a50000 00000000`74a6a000   C:\WINDOWS\system32\MSDART.DLL
.ModLoad: 00000000`4bbe0000 00000000`4bc72000   C:\Program Files (x86)\Common Files\System\ado\msado15.dll
.ModLoad: 00000000`4c850000 00000000`4c8c9000   C:\Program Files (x86)\Common Files\System\Ole DB\oledb32.dll
.ModLoad: 00000000`4dbb0000 00000000`4dbc1000   C:\Program Files (x86)\Common Files\System\Ole DB\OLEDB32R.DLL
.ModLoad: 00000000`4a710000 00000000`4a855000   C:\WINDOWS\SysWOW64\comsvcs.dll
.ModLoad: 00000000`1b570000 00000000`1b5c4000   C:\WINDOWS\SysWOW64\msjetoledb40.dll
.ModLoad: 00000000`640f0000 00000000`640fe000   C:\Program Files (x86)\Common Files\System\ado\msadrh15.dll
.ModLoad: 00000000`736f0000 00000000`73715000   C:\WINDOWS\SysWOW64\scrrun.dll
.ModLoad: 00000000`73eb0000 00000000`73fd1000   C:\WINDOWS\SysWOW64\MFC42.dll
.ModLoad: 00000000`76050000 00000000`760e5000   C:\WINDOWS\SysWOW64\shdoclc.dll
.ModLoad: 00000000`0d3e0000 00000000`0d6e2000   C:\WINDOWS\SysWOW64\mshtml.dll
.ModLoad: 00000000`74490000 00000000`744b7000   C:\WINDOWS\SysWOW64\msls31.dll
.ModLoad: 00000000`76b70000 00000000`76b7b000   C:\WINDOWS\SysWOW64\PSAPI.DLL
.ModLoad: 00000000`74540000 00000000`745d3000   C:\WINDOWS\system32\MLANG.dll
.ModLoad: 00000000`72d70000 00000000`72d79000   C:\WINDOWS\system32\wdmaud.drv
.ModLoad: 00000000`72d60000 00000000`72d68000   C:\WINDOWS\system32\msacm32.drv
.ModLoad: 00000000`77b70000 00000000`77b84000   C:\WINDOWS\system32\MSACM32.dll
.ModLoad: 00000000`77b60000 00000000`77b67000   C:\WINDOWS\system32\midimap.dll
.ModLoad: 00000000`73e20000 00000000`73e24000   C:\WINDOWS\system32\KsUser.dll
.ModLoad: 00000000`76f90000 00000000`77001000   C:\WINDOWS\SysWOW64\jscript.dll
.ModLoad: 00000000`75e60000 00000000`75e87000   C:\WINDOWS\system32\apphelp.dll
.ModLoad: 00000000`0e510000 00000000`0e562000   C:\WINDOWS\syswow64\MSWMDM.dll
.ModLoad: 00000000`15110000 00000000`1536a000   C:\WINDOWS\syswow64\WMVCore.DLL
.ModLoad: 00000000`11c70000 00000000`11ca9000   C:\WINDOWS\syswow64\WMASF.DLL
.ModLoad: 00000000`0df10000 00000000`0df34000   D:\Program Files X32\Trillian\events.dll
.ModLoad: 00000000`0c0d0000 00000000`0c109000   C:\WINDOWS\syswow64\MsPMSP.dll
.ModLoad: 00000000`0dbf0000 00000000`0dc2b000   C:\WINDOWS\syswow64\cewmdm.dll
.ModLoad: 00000000`72e50000 00000000`72f67000   C:\WINDOWS\SysWOW64\msxml3.dll
.ModLoad: 00000000`57250000 00000000`57268000   C:\WINDOWS\SysWOW64\wshom.ocx
.ModLoad: 00000000`744c0000 00000000`744eb000   C:\WINDOWS\SysWOW64\msimtf.dll
.ModLoad: 00000000`4b3c0000 00000000`4b410000   C:\WINDOWS\SysWOW64\MSCTF.dll
.ModLoad: 00000000`58800000 00000000`58946000   C:\WINDOWS\SysWOW64\msxml6.dll
.ModLoad: 00000000`64610000 00000000`6461c000   C:\WINDOWS\system32\ImgUtil.dll
.ModLoad: 00000000`5e120000 00000000`5e12d000   C:\WINDOWS\SysWOW64\pngfilt.dll
.ModLoad: 00000000`70f20000 00000000`70f35000   C:\WINDOWS\SysWOW64\amstream.dll
.ModLoad: 00000000`73860000 00000000`738ac000   C:\WINDOWS\SysWOW64\DDRAW.dll
.ModLoad: 00000000`73b30000 00000000`73b36000   C:\WINDOWS\SysWOW64\DCIMAN32.dll
.ModLoad: 00000000`755d0000 00000000`75739000   C:\WINDOWS\SysWOW64\quartz.dll
.ModLoad: 00000000`76500000 00000000`76511000   C:\WINDOWS\SysWOW64\devenum.dll
.ModLoad: 00000000`73800000 00000000`73807000   C:\WINDOWS\system32\msdmo.dll
.ModLoad: 00000000`72d20000 00000000`72d38000   C:\WINDOWS\SysWOW64\l3codecx.ax
.ModLoad: 00000000`027f0000 00000000`027fd000   J:\Program Files\MediaMonkey3\MMHelper.dll
.ModLoad: 00000000`74ac0000 00000000`74b33000   C:\WINDOWS\SysWOW64\mshtmled.dll

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8006348000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff97fff17efd4, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

Loading symbols for fffffadf`90ccb000     mssmbios.sys ->   mssmbios.sys
Loading symbols for fffff97f`ff000000       win32k.sys ->   win32k.sys
Loading symbols for 00000000`6b280000     wow64win.dll ->   wow64win.dll
Loading symbols for 00000000`6b000000        wow64.dll ->   wow64.dll
Loading symbols for 00000000`78b80000     wow64cpu.dll ->   wow64cpu.dll
Loading symbols for 00000000`63560000        FRAPS.DLL ->   FRAPS.DLL
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for FRAPS.DLL - 
Loading symbols for 00000000`0e510000       MSWMDM.dll ->   MSWMDM.dll
Loading symbols for 00000000`7d4c0000     kernel32.dll ->   kernel32.dll
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************

READ_ADDRESS:  fffffa8006348000 Paged pool

FAULTING_IP: 
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h]

MM_INTERNAL_CODE:  0

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  45e6f310

MODULE_NAME: win32k

FAULTING_MODULE: fffff97fff000000 win32k

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  MediaMonkey.exe

CURRENT_IRQL:  1

TRAP_FRAME:  fffffadf8c8f8bb0 -- (.trap 0xfffffadf8c8f8bb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8006347fd0
rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000
rip=fffff97fff17efd4 rsp=fffffadf8c8f8d40 rbp=000000000f8e5d38
 r8=0000000000000000  r9=fffffa8006347fd0 r10=0000087000000000
r11=fffffa8006347fd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32k!NtUserfnINDEVICECHANGE+0x1bb:
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h] ds:86fa:7385=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800010a6072 to fffff8000102e890

STACK_TEXT:  
fffffadf`8c8f8ad8 fffff800`010a6072 : 00000000`00000050 fffffa80`06348000 00000000`00000000 fffffadf`8c8f8bb0 : nt!KeBugCheckEx
fffffadf`8c8f8ae0 fffff800`0102d459 : 00000000`00000000 00000000`0000002c 00000000`00000000 00001f80`00060001 : nt!MmAccessFault+0xa1f
fffffadf`8c8f8bb0 fffff97f`ff17efd4 : 00000000`00000000 00000000`0f8e5d38 00000000`00000000 00000000`0000002c : nt!KiPageFault+0x119
fffffadf`8c8f8d40 fffff97f`ff0a5a31 : fffff97f`f7d2c100 00000000`001007d6 00000000`0000002c fffffa80`06347fd0 : win32k!NtUserfnINDEVICECHANGE+0x1bb
fffffadf`8c8f8de0 fffff800`0102e33d : fffff6fb`7dbed000 00000000`00000000 fffffadf`99f5b940 fffff800`01031286 : win32k!NtUserMessageCall+0x142
fffffadf`8c8f8e80 00000000`6b2b5e8a : 00000000`6b29c512 0074006e`006f0043 0053006c`006f0072 0043005c`00740065 : nt!KiSystemServiceCopyEnd+0x3
00000000`0b65d6d8 00000000`6b29c512 : 0074006e`006f0043 0053006c`006f0072 0043005c`00740065 00000000`78b823a9 : wow64win!NtUserMessageCall+0xa
00000000`0b65d6e0 00000000`6b2afe8f : 00000000`00000000 00000000`6b290b08 00000000`6b28f460 00000000`00000219 : wow64win!whNT32NtUserMessageCallCB+0x32
00000000`0b65d730 00000000`6b29c647 : 00000000`7ef82000 00000000`7ef80000 00000000`00000000 00000000`7ef82000 : wow64win!Wow64DoMessageThunk+0xaf
00000000`0b65d790 00000000`6b006866 : 00000000`0c0cfd70 00000000`0c0cfdac 00000000`7ef82000 00000000`7ef80000 : wow64win!whNtUserMessageCall+0x127
00000000`0b65d820 00000000`78b83c7d : 00000000`00000000 00000000`00000000 00000000`0f8e5d38 00000000`ffffffff : wow64!Wow64SystemServiceEx+0xd6
00000000`0b65e0e0 00000000`6b006a5a : 00000000`0b65e6d0 00000000`0000001c 00000000`0b65e8b0 00000000`00000038 : wow64cpu!ServiceNoTurbo+0x28
00000000`0b65e170 00000000`6b0097f4 : 00000000`00000038 00000000`00000005 fffffadf`8c8f3480 00000000`77ef55c9 : wow64!RunCpuSimulation+0xa
00000000`0b65e1a0 00000000`6b2961c5 : 00000000`00000000 00000000`0b65e790 00000000`0b65e640 00000000`0b65e728 : wow64!Wow64KiUserCallbackDispatcher+0x114
00000000`0b65e4e0 00000000`77ef317f : 00000000`00000000 fffffadf`996d9660 00000000`0c0cff20 fffffadf`8c8f9c70 : wow64win!whcbfnINDEVICECHANGE+0x195
00000000`0b65e6d0 00000000`6b2b5e7a : 00000000`6b29c464 00000000`00020019 00003270`7636937d 00000000`00150000 : ntdll!KiUserCallbackDispatcherContinue
00000000`0b65e7c8 00000000`6b29c464 : 00000000`00020019 00003270`7636937d 00000000`00150000 00000000`00158a00 : wow64win!ZwUserGetMessage+0xa
00000000`0b65e7d0 00000000`6b006866 : 00000000`00000000 00000000`7ef82000 00000000`0c0cff08 00000000`7ef80000 : wow64win!whNtUserGetMessage+0x34
00000000`0b65e830 00000000`78b83c7d : 00000000`0c0ce254 00000000`0000000c 00000000`00000000 00000000`0c0cff44 : wow64!Wow64SystemServiceEx+0xd6
00000000`0b65f0f0 fffff800`01025817 : fffffa80`05b4dd80 fffff800`01037d2b fffffadf`8c8f96e0 00000000`00008006 : wow64cpu!ServiceNoTurbo+0x28
fffffadf`8c8f9580 fffff97f`00000001 : fffffadf`8c8f9650 fffffadf`00000060 00000000`00000000 00000000`0123c100 : nt!KiDeferredReadyThread+0x52b
fffffadf`8c8f95c0 fffffadf`8c8f9650 : fffffadf`00000060 00000000`00000000 00000000`0123c100 fffffadf`00000219 : 0xfffff97f`00000001
fffffadf`8c8f95c8 fffffadf`00000060 : 00000000`00000000 00000000`0123c100 fffffadf`00000219 00000000`00008006 : 0xfffffadf`8c8f9650
fffffadf`8c8f95d0 00000000`00000000 : 00000000`0123c100 fffffadf`00000219 00000000`00008006 00000000`6356be60 : 0xfffffadf`00000060
fffffadf`8c8f95d8 00000000`0123c100 : fffffadf`00000219 00000000`00008006 00000000`6356be60 00000000`77ccae80 : 0x0
fffffadf`8c8f95e0 fffffadf`00000219 : 00000000`00008006 00000000`6356be60 00000000`77ccae80 00000000`00000068 : 0x123c100
fffffadf`8c8f95e8 00000000`00008006 : 00000000`6356be60 00000000`77ccae80 00000000`00000068 00000000`00000001 : 0xfffffadf`00000219
fffffadf`8c8f95f0 00000000`6356be60 : 00000000`77ccae80 00000000`00000068 00000000`00000001 00000000`00000050 : 0x8006
fffffadf`8c8f95f8 00000000`77ccae80 : 00000000`00000068 00000000`00000001 00000000`00000050 00000006`00000038 : FRAPS!FrapsProcCALLWND
fffffadf`8c8f9600 00000000`00000068 : 00000000`00000001 00000000`00000050 00000006`00000038 00000000`00000000 : 0x77ccae80
fffffadf`8c8f9608 00000000`00000001 : 00000000`00000050 00000006`00000038 00000000`00000000 00000000`00000870 : 0x68
fffffadf`8c8f9610 00000000`00000050 : 00000006`00000038 00000000`00000000 00000000`00000870 00000000`00332ff8 : 0x1
fffffadf`8c8f9618 00000006`00000038 : 00000000`00000000 00000000`00000870 00000000`00332ff8 11d21a96`b5804878 : 0x50
fffffadf`8c8f9620 00000000`00000000 : 00000000`00000870 00000000`00332ff8 11d21a96`b5804878 326da0c9`a000fd8f : 0x6`00000038
fffffadf`8c8f9628 00000000`00000870 : 00000000`00332ff8 11d21a96`b5804878 326da0c9`a000fd8f 00000000`ffffffff : 0x0
fffffadf`8c8f9630 00000000`00332ff8 : 11d21a96`b5804878 326da0c9`a000fd8f 00000000`ffffffff fffffadf`8c8f9b98 : 0x870
fffffadf`8c8f9638 11d21a96`b5804878 : 326da0c9`a000fd8f 00000000`ffffffff fffffadf`8c8f9b98 fffff97f`f7d2c100 : 0x332ff8
fffffadf`8c8f9640 326da0c9`a000fd8f : 00000000`ffffffff fffffadf`8c8f9b98 fffff97f`f7d2c100 fffffadf`996d96a8 : 0x11d21a96`b5804878
fffffadf`8c8f9648 00000000`ffffffff : fffffadf`8c8f9b98 fffff97f`f7d2c100 fffffadf`996d96a8 00000000`00000000 : 0x326da0c9`a000fd8f
fffffadf`8c8f9650 fffffadf`8c8f9b98 : fffff97f`f7d2c100 fffffadf`996d96a8 00000000`00000000 00000000`00000000 : 0xffffffff
fffffadf`8c8f9658 fffff97f`f7d2c100 : fffffadf`996d96a8 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffadf`8c8f9b98
fffffadf`8c8f9660 fffffadf`996d96a8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff97f`f7d2c100
fffffadf`8c8f9668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffadf`996d96a8
fffffadf`8c8f9670 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f9678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f9680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f9688 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f9690 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f9698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f96a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f96a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f96b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f96b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffffadf`8c8f96c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000038`000000a0 : 0x0
fffffadf`8c8f96c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000038`000000a0 00000000`00000001 : 0x0
fffffadf`8c8f96d0 00000000`00000000 : 00000000`00000000 00000038`000000a0 00000000`00000001 fffffadf`8c8f9780 : 0x0
fffffadf`8c8f96d8 00000000`00000000 : 00000038`000000a0 00000000`00000001 fffffadf`8c8f9780 00000000`00000060 : 0x0
fffffadf`8c8f96e0 00000038`000000a0 : 00000000`00000001 fffffadf`8c8f9780 00000000`00000060 00000000`00000000 : 0x0
fffffadf`8c8f96e8 00000000`00000001 : fffffadf`8c8f9780 00000000`00000060 00000000`00000000 00000000`0123c100 : 0x38`000000a0
fffffadf`8c8f96f0 fffffadf`8c8f9780 : 00000000`00000060 00000000`00000000 00000000`0123c100 00000000`00000219 : 0x1
fffffadf`8c8f96f8 00000000`00000060 : 00000000`00000000 00000000`0123c100 00000000`00000219 00000000`00008006 : 0xfffffadf`8c8f9780
fffffadf`8c8f9700 00000000`00000000 : 00000000`0123c100 00000000`00000219 00000000`00008006 00000000`0e522c45 : 0x60
fffffadf`8c8f9708 00000000`0123c100 : 00000000`00000219 00000000`00008006 00000000`0e522c45 00000000`77c422c0 : 0x0
fffffadf`8c8f9710 00000000`00000219 : 00000000`00008006 00000000`0e522c45 00000000`77c422c0 00000000`00000068 : 0x123c100
fffffadf`8c8f9718 00000000`00008006 : 00000000`0e522c45 00000000`77c422c0 00000000`00000068 00000000`00000001 : 0x219
fffffadf`8c8f9720 00000000`0e522c44 : 00000000`77c422c0 00000000`00000068 00000000`00000001 00000000`00000050 : 0x8006
fffffadf`8c8f9728 00000000`77c422c0 : 00000000`00000068 00000000`00000001 00000000`00000050 00000006`00000038 : MSWMDM!CDeviceCache::Release+0x3c
fffffadf`8c8f9730 00000000`00000068 : 00000000`00000001 00000000`00000050 00000006`00000038 00000000`00000000 : 0x77c422c0
fffffadf`8c8f9738 00000000`00000001 : 00000000`00000050 00000006`00000038 00000000`00000000 00000000`00000800 : 0x68
fffffadf`8c8f9740 00000000`00000050 : 00000006`00000038 00000000`00000000 00000000`00000800 fffff800`011b4dc0 : 0x1
fffffadf`8c8f9748 00000006`00000038 : 00000000`00000000 00000000`00000800 fffff800`011b4dc0 fffff800`01031095 : 0x50
fffffadf`8c8f9750 00000000`00000000 : 00000000`00000800 fffff800`011b4dc0 fffff800`01031095 326da0c9`a000fd8f : 0x6`00000038
fffffadf`8c8f9758 00000000`00000800 : fffff800`011b4dc0 fffff800`01031095 326da0c9`a000fd8f 00000000`ffffffff : 0x0
fffffadf`8c8f9760 fffff800`011b4dc0 : fffff800`01031095 326da0c9`a000fd8f 00000000`ffffffff fffffadf`8c8f9790 : 0x800
fffffadf`8c8f9768 fffff800`01031095 : 326da0c9`a000fd8f 00000000`ffffffff fffffadf`8c8f9790 00001f80`000200bd : nt!KiTimerTableListHead


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32k!NtUserfnINDEVICECHANGE+1bb

FOLLOWUP_NAME:  MachineOwner

FAILURE_BUCKET_ID:  X64_0x50_win32k!NtUserfnINDEVICECHANGE+1bb

BUCKET_ID:  X64_0x50_win32k!NtUserfnINDEVICECHANGE+1bb

Followup: MachineOwner
---------

paulmt
Posts: 1170
Joined: Tue Jul 18, 2006 6:06 pm

Post by paulmt »

1st.
Nice system :D

2cnd.
What memory did you use? My understanding is that the x38 chipset supports ECC mem but only on DDR2 if your using DDR3 then ECC is not supported.

I only ask because I have seen intermittent BSOD caused by the inclusion or exclusion of ECC mem depending on the circumstance.
Teknojnky
Posts: 5537
Joined: Tue Sep 06, 2005 11:01 pm
Contact:

Post by Teknojnky »

I tried 2 different sets of OCZ DDR 2, one was ddr2-1066 and the current is ddr2-800.

I ran memtest 10+ hours on both and never got errors, I've also replaced the video. I was about ready to RMA the board and/or cpu when I found the above info.
Teknojnky
Posts: 5537
Joined: Tue Sep 06, 2005 11:01 pm
Contact:

Post by Teknojnky »

and again... only mm2 had been running the whole time

Code: Select all

Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Complete Dump File: Full address space is available

************************************************************
WARNING: Dump file has been truncated.  Data may be missing.
************************************************************
Symbol search path is: SRV*c:\windows\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_gdr.070321-2337
Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140
Debug session time: Wed Nov 21 17:49:54.203 2007 (GMT-6)
System Uptime: 0 days 16:18:53.314
Loading Kernel Symbols
.............................................................................................................................................
Loading User Symbols
.....
Loading unloaded module list
....................
Loading Wow64 Symbols
................................................................................................................................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa800d8d2000, 0, fffff97fff17efd4, 0}

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************
Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa800d8d2000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff97fff17efd4, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: kernel32!pNlsUserInfo                         ***
***                                                                   ***
*************************************************************************

READ_ADDRESS:  fffffa800d8d2000 Paged pool

FAULTING_IP: 
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h]

MM_INTERNAL_CODE:  0

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  45e6f310

MODULE_NAME: win32k

FAULTING_MODULE: fffff97fff000000 win32k

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  MediaMonkey.exe

CURRENT_IRQL:  1

TRAP_FRAME:  fffffadf8bc84bb0 -- (.trap 0xfffffadf8bc84bb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000008006 rcx=fffffa800d8d1fd0
rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000
rip=fffff97fff17efd4 rsp=fffffadf8bc84d40 rbp=00000000111b8de8
 r8=0000000000000000  r9=fffffa800d8d1fd0 r10=000008c000000000
r11=fffffa800d8d1fd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32k!NtUserfnINDEVICECHANGE+0x1bb:
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h] ds:916f:7385=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800010a6072 to fffff8000102e890

STACK_TEXT:  
fffffadf`8bc84ad8 fffff800`010a6072 : 00000000`00000050 fffffa80`0d8d2000 00000000`00000000 fffffadf`8bc84bb0 : nt!KeBugCheckEx
fffffadf`8bc84ae0 fffff800`0102d459 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffadf`90c7b101 : nt!MmAccessFault+0xa1f
fffffadf`8bc84bb0 fffff97f`ff17efd4 : 00000000`00000000 00000000`111b8de8 00000000`00000000 00000000`0000002c : nt!KiPageFault+0x119
fffffadf`8bc84d40 fffff97f`ff0a5a31 : fffff97f`f7daf9f0 00000000`00080528 00000000`0000002c fffffa80`0d8d1fd0 : win32k!NtUserfnINDEVICECHANGE+0x1bb
fffffadf`8bc84de0 fffff800`0102e33d : fffff6fb`7dbed000 00000000`00000000 fffffadf`9a40df90 fffff800`01031286 : win32k!NtUserMessageCall+0x142
fffffadf`8bc84e80 00000000`6b2b5e8a : 00000000`6b29c512 0074006e`006f0043 0053006c`006f0072 0043005c`00740065 : nt!KiSystemServiceCopyEnd+0x3
00000000`0a48d6d8 00000000`6b29c512 : 0074006e`006f0043 0053006c`006f0072 0043005c`00740065 00000000`78b823a9 : wow64win!NtUserMessageCall+0xa
00000000`0a48d6e0 00000000`6b2afe8f : 00000000`00000000 00000000`6b290b08 00000000`6b28f460 00000000`00000219 : wow64win!whNT32NtUserMessageCallCB+0x32
00000000`0a48d730 00000000`6b29c647 : 00000000`7ef94000 00000000`7ef92000 00000000`00000000 00000000`7ef94000 : wow64win!Wow64DoMessageThunk+0xaf
00000000`0a48d790 00000000`6b006866 : 00000000`0b5bfd70 00000000`0b5bfdac 00000000`7ef94000 00000000`7ef92000 : wow64win!whNtUserMessageCall+0x127
00000000`0a48d820 00000000`78b83c7d : 00000000`00000000 00000000`00000000 00000000`111b8de8 00000000`ffffffff : wow64!Wow64SystemServiceEx+0xd6
00000000`0a48e0e0 00000000`6b006a5a : 00000000`0a48e6d0 00000000`0000001c 00000000`0a48e8b0 00000000`00000038 : wow64cpu!ServiceNoTurbo+0x28
00000000`0a48e170 00000000`6b0097f4 : 00000000`00000038 00000000`00000005 fffffadf`8bc7f480 00000000`77ef55c9 : wow64!RunCpuSimulation+0xa
00000000`0a48e1a0 00000000`6b2961c5 : 00000000`00000000 00000000`0a48e790 00000000`0a48e640 00000000`0a48e728 : wow64!Wow64KiUserCallbackDispatcher+0x114
00000000`0a48e4e0 00000000`77ef317f : 00000000`000000fa fffffadf`99d2a2d0 00000000`0b5bff20 fffffadf`8bc85c70 : wow64win!whcbfnINDEVICECHANGE+0x195
00000000`0a48e6d0 00000000`6b2b5e7a : 00000000`6b29c464 00000000`00020019 00007f6d`c6e39a46 00000000`00150000 : ntdll!KiUserCallbackDispatcherContinue
00000000`0a48e7c8 00000000`6b29c464 : 00000000`00020019 00007f6d`c6e39a46 00000000`00150000 00000000`001502c8 : wow64win!ZwUserGetMessage+0xa
00000000`0a48e7d0 00000000`6b006866 : 00000000`00000000 00000000`7ef94000 00000000`0b5bff08 00000000`7ef92000 : wow64win!whNtUserGetMessage+0x34
00000000`0a48e830 00000000`78b83c7d : 00000000`0b5be254 00000000`0000000c 00000000`00000000 00000000`0b5bff44 : wow64!Wow64SystemServiceEx+0xd6
00000000`0a48f0f0 00000000`00000000 : fffffa80`03b8f920 fffff800`01037d2b fffffadf`8bc856e0 00000000`00008006 : wow64cpu!ServiceNoTurbo+0x28


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff17efd4 8b4630          mov     eax,dword ptr [rsi+30h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32k!NtUserfnINDEVICECHANGE+1bb

FOLLOWUP_NAME:  MachineOwner

FAILURE_BUCKET_ID:  X64_0x50_win32k!NtUserfnINDEVICECHANGE+1bb

BUCKET_ID:  X64_0x50_win32k!NtUserfnINDEVICECHANGE+1bb

Followup: MachineOwner
---------

Post Reply