kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pagable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000d, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 80500089, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: unable to read from 8054fdd8
unable to read from 8054f788
unable to read from 8054f660
unable to read from 805414e8
unable to read from 8054f678
unable to read from 8054f784
unable to read from 805414ec
unable to read from 8054f844
unable to read from 8054fd78
 0000000d 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiInsertTimerTable+2f
80500089 8b50fc           mov     edx,[eax-0x4]

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0xA

TRAP_FRAME:  8053fc88 -- (.trap ffffffff8053fc88)
ErrCode = 00000000
eax=00000011 ebx=00000000 ecx=8054f400 edx=41c06181 esi=859364a8 edi=00000003
eip=80500089 esp=8053fcfc ebp=8053fd08 iopl=0         nv up ei pl nz na po cy
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010207
nt!KiInsertTimerTable+2f:
80500089 8b50fc           mov     edx,[eax-0x4]     ds:0023:0000000d=????????
Resetting default context

LAST_CONTROL_TRANSFER:  from 804ffff2 to 80500089

STACK_TEXT:  
8053fd08 804ffff2 ffb3b4c0 ffffffff b0ad4650 nt!KiInsertTimerTable+0x2f
8053fd28 804f9ee5 ffb3b4c0 ffffffff 00000000 nt!KiInsertTreeTimer+0x7c
8053fd48 804f9e99 85936400 ffb3b4c0 ffffffff nt!KeSetTimerEx+0x49
8053fd60 eb4bcf81 859364a8 ffb3b4c0 ffffffff nt!KeSetTimer+0x17
8053fd78 b986db71 85936478 000001f4 b986db32 TDI!CTEStartTimer+0x3f
8053fd98 eb4bce47 85936478 00000000 804fff43 tcpip!IPTimeout+0xe9
8053fda4 804fff43 85936488 85936478 b203f4a0 TDI!CTEpTimerHandler+0xb
8053fea4 804ffe54 8053bcb0 8053bf40 ffdff000 nt!KiTimerListExpire+0xe7
8053fed0 805323c7 8054f520 00000000 00026a36 nt!KiTimerExpiration+0xb4
8053fee4 80532362 0000000e 00000000 00000000 nt!KiRetireDpcList+0x30
8053feec 00000000 00000000 00000000 00000000 nt!KiIdleLoop+0x26


FOLLOWUP_IP: 
TDI!CTEStartTimer+3f
eb4bcf81 6a01             push    0x1

FOLLOWUP_NAME:  MachineOwner

SYMBOL_NAME:  TDI!CTEStartTimer+3f

MODULE_NAME:  TDI

IMAGE_NAME:  TDI.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  3b6622bf

STACK_COMMAND:  .trap ffffffff8053fc88 ; kb

BUCKET_ID:  0xA_TDI!CTEStartTimer+3f

Followup: MachineOwner
 =