Here is the readout of the memory.dmp check
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000411, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e7984c, address which referenced memory
Debugging Details:
------------------
Page 11c0b5 not present in the dump file. Type ".hh dbgerr004" for details
WRITE_ADDRESS: 0000000000000411
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeWaitForSingleObject+13c
fffff800`02e7984c f00fba2e07 lock bts dword ptr [rsi],7
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: audiodg.exe
TRAP_FRAME: fffff8800618c250 -- (.trap 0xfffff8800618c250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000cc2 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e7984c rsp=fffff8800618c3e0 rbp=0000000000000000
r8=fffff78000000008 r9=0000000000000000 r10=0000000000000000
r11=fffff88002f63180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x13c:
fffff800`02e7984c f00fba2e07 lock bts dword ptr [rsi],7 ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e6fb69 to fffff80002e70600
STACK_TEXT:
fffff880`0618c108 fffff800`02e6fb69 : 00000000`0000000a 00000000`00000411 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0618c110 fffff800`02e6e7e0 : 00000001`06060000 00000000`00000000 fffff880`0618c258 fffff880`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0618c250 fffff800`02e7984c : 00000000`00000000 00000000`00000000 fffffa80`0590f820 fffffa80`0590d930 : nt!KiPageFault+0x260
fffff880`0618c3e0 fffff880`0518d6e8 : 00000000`00000000 fffff800`00000000 fffff880`00000000 fffffa80`0590dc00 : nt!KeWaitForSingleObject+0x13c
fffff880`0618c480 fffff880`0514a06b : 00000000`00000002 00000000`c0000001 fffffa80`06423a70 00000000`00000001 : RTKVHD64+0x1826e8
fffff880`0618c4d0 fffff880`052936da : 00000014`00008004 00000000`00000000 00000000`00000000 00000000`00000001 : RTKVHD64+0x13f06b
fffff880`0618c5d0 fffff880`05291b42 : fffffa80`06445c40 fffffa80`067281d0 00000000`00000001 fffffa80`054b98b0 : portcls!CPortPinWaveRT:
istributeDeviceState+0x8a
fffff880`0618c630 fffff880`04536815 : fffffa80`054b98b0 fffffa80`050b4b70 fffffa80`067281d0 00000000`00000000 : portcls!CPortPinWaveRT:
owerNotify+0x772
fffff880`0618c670 fffff880`0454253f : fffffa80`054b98b0 00000000`00000004 fffff880`0618c790 fffff8a0`03829fc0 : ks!KspPropertyHandler+0x735
fffff880`0618c6e0 fffff880`0527c944 : fffff880`0618c790 fffff8a0`03829fc0 fffffa80`054b98b0 fffffa80`054b9ae8 : ks!KsPropertyHandler+0x1b
fffff880`0618c730 fffff880`05291055 : 00000000`00d5e200 fffffa80`054b98b0 fffffa80`06445c40 fffff880`0525f0cb : portcls!PcHandlePropertyWithTable+0x64
fffff880`0618c760 fffff880`0527bfa1 : fffffa80`054b98b0 fffffa80`050b4cc0 fffffa80`050b4cc0 fffff800`0316970c : portcls!CPortPinWaveRT:
eviceIoControl+0x1c1
fffff880`0618c7c0 fffff880`0453601b : 00000000`c000000d fffffa80`050b4cc0 fffffa80`050b4b70 fffff800`03111166 : portcls!DispatchDeviceIoControl+0x79
fffff880`0618c7f0 fffff880`0527b06c : 00000000`c0000001 fffffa80`01c0bc60 fffffa80`054b9ae8 00000000`c0000001 : ks!KsDispatchIrp+0xdb
fffff880`0618c820 fffff880`0514fe26 : fffffa80`054b98b0 fffffa80`050b4cc0 fffff880`00000000 fffff880`0618c860 : portcls!PcDispatchIrp+0x5c
fffff880`0618c850 fffff880`052c0674 : fffffa80`054b9ae8 fffffa80`0560d680 fffffa80`054b98b0 fffffa80`0560d680 : RTKVHD64+0x144e26
fffff880`0618c880 fffff880`052bdc21 : 00000000`00000001 fffffa80`054b9b30 fffff880`0618cb00 fffffa80`05f93700 : ksthunk!CKernelFilterDevice::SynchronousForwardIrp+0x70
fffff880`0618c8e0 fffff880`052bda87 : fffffa80`054b9802 fffffa80`054b98b0 00000000`00000000 fffff880`0618ca20 : ksthunk!CKSThunkDevice::CheckIrpForStackAdjustmentNative+0x171
fffff880`0618c980 fffff880`052bd79b : 00000000`00000001 fffffa80`054b9b30 fffffa80`0560d680 fffffa80`054b98b0 : ksthunk!CKSThunkDevice:
ispatchIoctl+0xcf
fffff880`0618c9b0 fffff800`0318c6b7 : fffffa80`063e6720 fffff880`0618cca0 fffffa80`00000000 fffffa80`063e6720 : ksthunk!CKernelFilterDevice:
ispatchIrp+0x93
fffff880`0618ca10 fffff800`0318cf16 : 00000000`00d5e0a0 00000000`000003b9 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`0618cb40 fffff800`02e6f853 : fffffa80`064f7550 00000000`00d5e088 fffff880`0618cbc8 00000000`00000001 : nt!NtDeviceIoControlFile+0x56
fffff880`0618cbb0 00000000`7714ff2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00d5e058 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7714ff2a
STACK_COMMAND: kb
FOLLOWUP_IP:
RTKVHD64+1826e8
fffff880`0518d6e8 3b6b30 cmp ebp,dword ptr [rbx+30h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: RTKVHD64+1826e8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: RTKVHD64
IMAGE_NAME: RTKVHD64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b02934c
FAILURE_BUCKET_ID: X64_0xA_RTKVHD64+1826e8
BUCKET_ID: X64_0xA_RTKVHD64+1826e8
Followup: MachineOwner
---------