Стек такой:
Код:
> k
# Child-SP RetAddr Call Site
00 ffff828a`72dbd148 fffff807`5cc9af74 nt!KeBugCheckEx
01 ffff828a`72dbd150 fffff807`5ca62d02 nt!MiInPagePageTable+0x1e0f34
02 ffff828a`72dbd330 fffff807`5ca625a8 nt!MiResolvePageTablePage+0x1d2
03 ffff828a`72dbd3a0 fffff807`5ca61fbb nt!MiUserFault+0x208
04 ffff828a`72dbd430 fffff807`5cc27929 nt!MmAccessFault+0x13b
05 ffff828a`72dbd550 fffff807`5ca9f5b0 nt!KiPageFault+0x369
06 ffff828a`72dbd6e8 fffff807`5cb210d1 nt!MI_READ_PTE_LOCK_FREE
07 ffff828a`72dbd6f0 fffff807`5f1760ad nt!MmBuildMdlForNonPagedPool+0x231
08 ffff828a`72dbd780 fffff807`663cea6f ndis!NdisAllocateMdl+0x3d
09 ffff828a`72dbd7c0 00000000`00000000 bcmwl63a+0x8ea6f
Модуль в стеке этот:
Код:
> lmvm bcmwl63a
Browse full module list
start end module name
fffff807`66340000 fffff807`66dfc000 bcmwl63a T (no symbols)
Loaded symbol image file: bcmwl63a.sys
Image path: bcmwl63a.sys
Image name: bcmwl63a.sys
Browse all global symbols functions data
Timestamp: Tue Jul 7 06:14:09 2015 (559B27E1)
CheckSum: 00AC5E1A
ImageSize: 00ABC000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Что-то, беспроводное, от "Broadcom".