Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Multiple crashes with no reason


08 Sep 2010   #11

Windows 7 Ultimate 32 bit
 
 

I am glad we are making progress; that is good news. But we want to get you BSOD free.

Error code 1E, KMODE_EXCEPTION_NOT_HANDLED. Usual causes are Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.

Code:
Kernel base = 0xfffff800`02a5f000 PsLoadedModuleList = 0xfffff800`02c9ce50
Debug session time: Tue Sep  7 20:28:21.261 2010 (GMT-4)
System Uptime: 0 days 0:41:56.712
Loading Kernel Symbols
...............................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff8800104391f, 0, 58434ffe}

Probably caused by : fltmgr.sys ( fltmgr!FltpPassThrough+f )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800104391f, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000058434ffe, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
fltmgr!FltpPassThrough+f
fffff880`0104391f 498bb0b8000000  mov     rsi,qword ptr [r8+0B8h]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000058434ffe

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d070e0
 0000000058434ffe 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff88002849d08 -- (.exr 0xfffff88002849d08)
ExceptionAddress: fffff8800104391f (fltmgr!FltpPassThrough+0x000000000000000f)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000058434ffe
Attempt to read from address 0000000058434ffe

TRAP_FRAME:  fffff88002849db0 -- (.trap 0xfffff88002849db0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004dd8010 rbx=0000000000000000 rcx=fffff88002849fe0
rdx=fffffa8004752a40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800104391f rsp=fffff88002849f40 rbp=0000000000000001
 r8=0000000058434f46  r9=000000000000000c r10=fffffa8003d21090
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
fltmgr!FltpPassThrough+0xf:
fffff880`0104391f 498bb0b8000000  mov     rsi,qword ptr [r8+0B8h] ds:f000:00000000`58434ffe=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b09a39 to fffff80002acf740

STACK_TEXT:  
fffff880`02849538 fffff800`02b09a39 : 00000000`0000001e ffffffff`c0000005 fffff880`0104391f 00000000`00000000 : nt!KeBugCheckEx
fffff880`02849540 fffff800`02aced82 : fffff880`02849d08 fffff880`02849fe0 fffff880`02849db0 fffffa80`056ad330 : nt!KiDispatchException+0x1b9
fffff880`02849bd0 fffff800`02acd8fa : 00000000`00000000 fffff880`02849fe0 fffffa80`0510a000 fffff800`02c81300 : nt!KiExceptionDispatch+0xc2
fffff880`02849db0 fffff880`0104391f : fffffa80`00004001 fffffa80`065e80b8 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`02849f40 fffff880`010426c7 : 00000000`00000001 fffff800`02dd49f0 fffff880`0284a100 00000000`00000801 : fltmgr!FltpPassThrough+0xf
fffff880`02849fc0 fffffa80`04590010 : 00000000`00000b60 fffffa80`04dd8108 fffffa80`045ba1d0 fffffa80`065e80e8 : fltmgr!FltpDispatch+0xb7
fffff880`0284a020 00000000`00000b60 : fffffa80`04dd8108 fffffa80`045ba1d0 fffffa80`065e80e8 00000000`000000d6 : 0xfffffa80`04590010
fffff880`0284a028 fffffa80`04dd8108 : fffffa80`045ba1d0 fffffa80`065e80e8 00000000`000000d6 00000000`00000000 : 0xb60
fffff880`0284a030 fffffa80`045ba1d0 : fffffa80`065e80e8 00000000`000000d6 00000000`00000000 00000000`00000001 : 0xfffffa80`04dd8108
fffff880`0284a038 fffffa80`065e80e8 : 00000000`000000d6 00000000`00000000 00000000`00000001 fffffa80`056ad330 : 0xfffffa80`045ba1d0
fffff880`0284a040 00000000`000000d6 : 00000000`00000000 00000000`00000001 fffffa80`056ad330 fffffa80`045ba1d0 : 0xfffffa80`065e80e8
fffff880`0284a048 00000000`00000000 : 00000000`00000001 fffffa80`056ad330 fffffa80`045ba1d0 fffffa80`0434e738 : 0xd6


STACK_COMMAND:  kb

FOLLOWUP_IP: 
fltmgr!FltpPassThrough+f
fffff880`0104391f 498bb0b8000000  mov     rsi,qword ptr [r8+0B8h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  fltmgr!FltpPassThrough+f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: fltmgr

IMAGE_NAME:  fltmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc11f

FAILURE_BUCKET_ID:  X64_0x1E_fltmgr!FltpPassThrough+f

BUCKET_ID:  X64_0x1E_fltmgr!FltpPassThrough+f

Followup: MachineOwner
---------
The dump indicates a hardware/driver problem.I still find an obsolete driver on your system. The dumps shows a memory error, c0000005 (Access violation). As I stated previously, that driver may not be the cause of your crash; but it is not helping the stability of your system.

Rtnic64.sys Mon Mar 31 01:39:38 2008 - Realtek Ethernet NIC driver Realtek

This driver really needs to be updated; it is a pre-Windows 7 driver.


My System SpecsSystem Spec
.

09 Sep 2010   #12

Windows 7 ultimate x64
 
 

@ttran

I stopped the driver verifier just after the check so that's not the issue..
I've also ran the system file check again and found no issues.

@CarlTR6

That's rather strange as i've seen the update manager adding a driver for that network card but i went ahead and updated the driver myself just to be on the safe side...

I did get two more BSOD's last night but they started after i installed poweriso and the drivers for my xbox 360 controller but i removed them both afterwords and it was stable again..

I've attached the dumps anyway, just to be sure.

Thank you,

Shadowcast
My System SpecsSystem Spec
09 Sep 2010   #13

Windows 7 Ultimate 32 bit
 
 

Your dumps verify what you stated above. They don't show the specific causes and they blame two MS system drivers which are involved in running Poweriso and Xbox.

Error code D1, DRIVER_IRQL_NOT_LESS_OR_EQUAL - usual causes are device drivers.

Error code 3B, SYSTEM_SERVICE_EXCEPTION - usual cause are System service, Device driver, graphics driver, ?memory.

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\Downloads\090910-18673-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a16000 PsLoadedModuleList = 0xfffff800`02c53e50
Debug session time: Wed Sep  8 20:03:45.356 2010 (GMT-4)
System Uptime: 0 days 0:05:56.213
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {100, 2, 0, fffff8800165f6c6}

Unable to load image \SystemRoot\system32\DRIVERS\klim6.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for klim6.sys
*** ERROR: Module load completed but symbols could not be loaded for klim6.sys
Probably caused by : wanarp.sys ( wanarp!WanNdisReceivePackets+317 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000100, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800165f6c6, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbe0e0
 0000000000000100 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip!IpFlcReceivePackets+1f6
fffff880`0165f6c6 488b36          mov     rsi,qword ptr [rsi]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80000ba1fd0 -- (.trap 0xfffff80000ba1fd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8006733c30 rbx=0000000000000000 rcx=fffffa8004ce9270
rdx=fffffa8006db4a30 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800165f6c6 rsp=fffff80000ba2160 rbp=fffffa8004ce9138
 r8=0000000000000000  r9=0000000000000000 r10=fffffa8003e21882
r11=0000000000000100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
tcpip!IpFlcReceivePackets+0x1f6:
fffff880`0165f6c6 488b36          mov     rsi,qword ptr [rsi] ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a85ca9 to fffff80002a86740

STACK_TEXT:  
fffff800`00ba1e88 fffff800`02a85ca9 : 00000000`0000000a 00000000`00000100 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1e90 fffff800`02a84920 : 00000000`00000001 fffff880`0176e9a0 00000000`00000000 00000000`00000801 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1fd0 fffff880`0165f6c6 : 00028770`00000011 fffffa80`04ce9000 00000000`00000100 00000000`00000101 : nt!KiPageFault+0x260
fffff800`00ba2160 fffff880`02d90377 : fffffa80`06733c30 00000000`00000100 00000000`00000101 fffffa80`06aaa990 : tcpip!IpFlcReceivePackets+0x1f6
fffff800`00ba2360 fffff880`014f10eb : 00000000`00000002 00000000`00000000 00000000`00000000 fffffa80`05930840 : wanarp!WanNdisReceivePackets+0x317
fffff800`00ba2410 fffff880`014bb165 : fffffa80`00000000 00000000`00000000 00000000`00000000 fffff880`03e99b70 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff800`00ba2480 fffff880`0143da24 : fffffa80`054181a0 00ba2950`fffff800 00000000`00000000 fffffa80`0592a9d0 : ndis!ndisMDispatchReceiveNetBufferLists+0x375
fffff800`00ba2900 fffff880`0143d9e9 : 00000000`00000000 00000000`00000001 fffffa80`0690fb70 fffff880`02d3b2c9 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff800`00ba2940 fffff880`0143d980 : fffa8005`00000000 fffffa80`068bb6ff fffffa80`068bb6d0 fffff880`03e546fc : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff800`00ba2980 fffff880`02d3d5fc : 00000000`00000001 00000000`00000000 fffffa80`0690fa40 00000000`00000001 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff800`00ba29c0 fffff880`0143d9e9 : fffffa80`05947890 00000000`00000000 00000000`00000001 fffff880`02d5c117 : pacer!PcFilterReceiveNetBufferLists+0x10c
fffff800`00ba2a40 fffff880`0143d980 : 00000000`00000002 fffff880`02d5e0f0 fffff800`00ba2a40 fffff800`00ba2a98 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff800`00ba2a80 fffff880`02d5b6eb : fffffa80`06eaa250 00000000`00000000 00000000`00000002 fffffa80`05925ad0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff800`00ba2ac0 fffffa80`06eaa250 : 00000000`00000000 00000000`00000002 fffffa80`05925ad0 fffff880`00000001 : klim6+0x26eb
fffff800`00ba2ac8 00000000`00000000 : 00000000`00000002 fffffa80`05925ad0 fffff880`00000001 fffffa80`06eaa250 : 0xfffffa80`06eaa250


STACK_COMMAND:  kb

FOLLOWUP_IP: 
wanarp!WanNdisReceivePackets+317
fffff880`02d90377 f0834350ff      lock add dword ptr [rbx+50h],0FFFFFFFFh

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  wanarp!WanNdisReceivePackets+317

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: wanarp

IMAGE_NAME:  wanarp.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcced

FAILURE_BUCKET_ID:  X64_0xD1_wanarp!WanNdisReceivePackets+317

BUCKET_ID:  X64_0xD1_wanarp!WanNdisReceivePackets+317

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\Downloads\090910-20607-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a02000 PsLoadedModuleList = 0xfffff800`02c3fe50
Debug session time: Wed Sep  8 19:49:46.295 2010 (GMT-4)
System Uptime: 0 days 0:52:19.153
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff960001264b4, fffff8800992a140, 0}

Unable to load image \SystemRoot\System32\win32k.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : win32k.sys ( win32k+c64b4 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960001264b4, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800992a140, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
win32k+c64b4
fffff960`001264b4 f30f7f808c010000 movdqu  xmmword ptr [rax+18Ch],xmm0

CONTEXT:  fffff8800992a140 -- (.cxr 0xfffff8800992a140)
rax=000000000101020d rbx=fffff900c00bf010 rcx=0000000000000000
rdx=fffff900c1e8d380 rsi=fffff900c06bb010 rdi=fffffa8005aff9a0
rip=fffff960001264b4 rsp=fffff8800992ab10 rbp=fffff8800992aca0
 r8=0000000000000002  r9=fffff900c06bb210 r10=fffff900c0200000
r11=fffff900c06bb084 r12=0000000000000001 r13=0000000000000000
r14=fffff900c2a55010 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
win32k+0xc64b4:
fffff960`001264b4 f30f7f808c010000 movdqu  xmmword ptr [rax+18Ch],xmm0 ds:002b:00000000`01010399=????????????????????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  winamp.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff960001264b4

STACK_TEXT:  
fffff880`0992ab10 00000000`00000000 : 00000001`00000001 fffff900`c00bf010 fffff960`000da9e1 00000000`00000000 : win32k+0xc64b4


FOLLOWUP_IP: 
win32k+c64b4
fffff960`001264b4 f30f7f808c010000 movdqu  xmmword ptr [rax+18Ch],xmm0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k+c64b4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c4840

STACK_COMMAND:  .cxr 0xfffff8800992a140 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_win32k+c64b4

BUCKET_ID:  X64_0x3B_win32k+c64b4

Followup: MachineOwner
---------
I am going to ask some of the gaming guys to take at look at this. I am not a gamer and they may have some insight into setting up Xbox.

I do find an obsolete driver that could very easily play into this.

Rtnic64.sys Mon Mar 31 01:39:38 2008 - Realtek Ethernet NIC driver Realtek. Update this driver; it is very out of date for Win 7. Reboot and let's see what happens. If you are still having trouble after that, I will get help from the gaming guys.

Keep us posted.
My System SpecsSystem Spec
.


09 Sep 2010   #14

Windows 7 ultimate x64
 
 

Well, seems that something is still wrong... got 3 more BSOD's.

I've tried looking for a more recent driver for the ethernet controller but i already have the latest one ...

I don't think the software for the xbox controller is an issue anymore, as it seems to run just great without it.

I've attached the new dumps.


Thank you,
Shadowcast
My System SpecsSystem Spec
09 Sep 2010   #15

Windows 7 Ultimate 32 bit
 
 

One of the dump files is corrupted. Let me suggest that you use zip instead of rar to avoid one possible source of corruption when uploading dump files.

Error code 124, WHEA_UNCORRECTABLE_ERROR. This is the dump that was corrupted.

Error code 3B, SYSTEM_SERVICE_EXCEPTION - usual cause are System service, Device driver, graphics driver, ?memory.

Error code 1E, KMODE_EXCEPTION_NOT_HANDLED - usual causes are Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.

Both of the remaining dumps indicate memory corruption, 0xc0000005.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 124, {0, fffffa8005172028, b2000040, 800}

Unable to load image Unknown_Module_00000000`00144042, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00144042
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00144042
Unknown module 'Unknown_Module_00000000_00144042' found on stack, using vad to reload module.
!vad_reload -1 0x144042
Unable to read KTHREAD address fffffa800876abd0
Failed to get new vadroot
Unable to load image PSHED.dll, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PSHED.dll
*** ERROR: Module load completed but symbols could not be loaded for PSHED.dll
---------

Kernel base = 0xfffff800`02a02000 PsLoadedModuleList = 0xfffff800`02c3fe50
Debug session time: Wed Sep  8 19:49:46.295 2010 (GMT-4)
System Uptime: 0 days 0:52:19.153
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff960001264b4, fffff8800992a140, 0}

Unable to load image \SystemRoot\System32\win32k.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : win32k.sys ( win32k+c64b4 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960001264b4, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800992a140, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
win32k+c64b4
fffff960`001264b4 f30f7f808c010000 movdqu  xmmword ptr [rax+18Ch],xmm0

CONTEXT:  fffff8800992a140 -- (.cxr 0xfffff8800992a140)
rax=000000000101020d rbx=fffff900c00bf010 rcx=0000000000000000
rdx=fffff900c1e8d380 rsi=fffff900c06bb010 rdi=fffffa8005aff9a0
rip=fffff960001264b4 rsp=fffff8800992ab10 rbp=fffff8800992aca0
 r8=0000000000000002  r9=fffff900c06bb210 r10=fffff900c0200000
r11=fffff900c06bb084 r12=0000000000000001 r13=0000000000000000
r14=fffff900c2a55010 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
win32k+0xc64b4:
fffff960`001264b4 f30f7f808c010000 movdqu  xmmword ptr [rax+18Ch],xmm0 ds:002b:00000000`01010399=????????????????????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  winamp.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff960001264b4

STACK_TEXT:  
fffff880`0992ab10 00000000`00000000 : 00000001`00000001 fffff900`c00bf010 fffff960`000da9e1 00000000`00000000 : win32k+0xc64b4


FOLLOWUP_IP: 
win32k+c64b4
fffff960`001264b4 f30f7f808c010000 movdqu  xmmword ptr [rax+18Ch],xmm0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k+c64b4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c4840

STACK_COMMAND:  .cxr 0xfffff8800992a140 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_win32k+c64b4

BUCKET_ID:  X64_0x3B_win32k+c64b4

Followup: MachineOwner
---------

Kernel base = 0xfffff800`02c4b000 PsLoadedModuleList = 0xfffff800`02e88e50
Debug session time: Thu Sep  9 10:20:53.337 2010 (GMT-4)
System Uptime: 0 days 1:48:36.194
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+5cab952f01eadf7c
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000ba2558 -- (.exr 0xfffff80000ba2558)
ExceptionAddress: fffff80002cc02d6 (nt!KiDeferredReadyThread+0x00000000000003f6)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000ba2600 -- (.trap 0xfffff80000ba2600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000f rbx=0000000000000000 rcx=fffffa8005b61b60
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cc02d6 rsp=fffff80000ba2790 rbp=0000000000000000
 r8=0000000000000008  r9=0000000000000008 r10=fffff80002c4b000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiDeferredReadyThread+0x3f6:
fffff800`02cc02d6 a12003000080f7ffff mov   eax,dword ptr [FFFFF78000000320h] ds:fffff780`00000320=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cb346e to fffff80002cbb710

STACK_TEXT:  
fffff800`00ba1648 fffff800`02cb346e : 00000000`00000000 00000000`00000000 fffff800`00ba1dc0 fffff800`02ce8668 : nt!KeBugCheck
fffff800`00ba1650 fffff800`02ce140d : fffff800`02ec9b7c fffff800`02e03e84 fffff800`02c4b000 fffff800`00ba2558 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00ba1680 fffff800`02ce8a90 : fffff800`02e0aa40 fffff800`00ba16f8 fffff800`00ba2558 fffff800`02c4b000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00ba16b0 fffff800`02cf59ef : fffff800`00ba2558 fffff800`00ba1dc0 fffff800`00000000 fffffa80`06f5b6d0 : nt!RtlDispatchException+0x410
fffff800`00ba1d90 fffff800`02cbad82 : fffff800`00ba2558 fffff800`02e35e80 fffff800`00ba2600 fffff800`02e35e80 : nt!KiDispatchException+0x16f
fffff800`00ba2420 fffff800`02cb968a : fffff800`00ba2700 00000000`00000001 fffffa80`070063b0 fffff880`0487fc07 : nt!KiExceptionDispatch+0xc2
fffff800`00ba2600 fffff800`02cc02d6 : fffffa80`06be1da8 fffffa80`063833b0 00000000`00000000 fffffa80`06be1da0 : nt!KiGeneralProtectionFault+0x10a
fffff800`00ba2790 fffff800`02cc6e67 : fffffa80`06be1da0 fffffa80`08ad5ce0 fffffa80`08ad5ce0 00000000`00000000 : nt!KiDeferredReadyThread+0x3f6
fffff800`00ba2810 fffff800`02cc74be : 0000000f`2bf46e5e fffff800`00ba2e88 00000000`00065fa6 fffff800`02e39748 : nt!KiProcessExpiredTimerList+0x157
fffff800`00ba2e60 fffff800`02cc6cb7 : fffff800`02e35ec1 fffffa80`00065fa6 fffffa80`058f12b0 00000000`000000a6 : nt!KiTimerExpiration+0x1be
fffff800`00ba2f00 fffff800`02cc1865 : 00000000`00000000 fffffa80`05b61b60 00000000`00000000 fffff880`0147bd80 : nt!KiRetireDpcList+0x277
fffff800`00ba2fb0 fffff800`02cc167c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`079068c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02cb346e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------
You definitely have a hardware/hardware related problem. I cannot say that that 2008 driver is causing the crashes; but I can safely say it is not helping your system's stability. It is a pre Win 7 driver.

I would like for you to follow this tutorial and upload all the information requested. We need to know your system information in order to help you sort this thing out.

http://www.sevenforums.com/crashes-d...tructions.html

For example, I do not know if your computer is desktop or a laptop. If you have a desktop, I recommend that you upgrade your network adapter card to one compatible with Windows 7 if there is not an updated driver for your existing card.
My System SpecsSystem Spec
10 Sep 2010   #16

Windows 7 ultimate x64
 
 

Well, i`ve collected all the info and attached the archive.

Yes, the system is a desktop.

If nothing else works i will directly change the network adapter



Thank you,
Shadowcast
My System SpecsSystem Spec
10 Sep 2010   #17

Windows 7 Ultimate 32 bit
 
 

Thank you very much for the info. I am glad you have a desktop; that makes things easier. It is good to see that you have updated that Ethernet driver. Good job.

Your Perfmon report shows that Kaspersky is still installed. Ttran mention that in his post:
Quote:
Remove Kaspersky for testing purpose:
Removal tool for Kaspersky Lab products
Install MSE for testing, it is known for BSODs free:
Security Essentials Software Support | Microsoft Security Essentials
Kaspersky in a known cause of crashes on some Win 7 systems. Be sure to uninstall it using the removal tool linked above. Install MSE and make sure Windows Firewall is turned on. You can try Kaspersky again after you get your system running smoothly; but I do not recommend doing so.

Your most recent crashes show error code 124 and 1E.

Error code 1E, KMODE_EXCEPTION_NOT_HANDLED - ususal causes are Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.

Error code 124, WHEA_UNCORRECTABLE_ERROR - possible causes are Hardware, Incompatibility, May be driver corruption.

Error code 124 is not a nice to see. It definitely says there is a hardware problem. If you are overclocking anything, return to default values.Please read this article on your bugcheck 124: [2-Int] Stop 0x124 - what it means and what to try.

You have already run Memtest and your memory appears to be OK.

1. Uninstall Kaspersky.

2. Monitor
your temps with Speedfan.

3.
Do a CPU stress test as well, using Prime95. Be sure to watch you CPU temp during the Prime test. Post back with the results of the Prime test.

4. Go down the list in
[2-Int] Stop 0x124 - what it means and what to try.

Code:
Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e3de50
Debug session time: Fri Sep 10 03:58:30.260 2010 (GMT-4)
System Uptime: 0 days 17:36:55.728
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 124, {0, fffffa80050a2028, b2000040, 800}

Probably caused by : hardware

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa80050a2028, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000b2000040, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000000800, Low order 32-bits of the MCi_STATUS value.

Debugging Details:
------------------


BUGCHECK_STR:  0x124_GenuineIntel

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  f

STACK_TEXT:  
fffff880`009eea58 fffff800`031ee903 : 00000000`00000124 00000000`00000000 fffffa80`050a2028 00000000`b2000040 : nt!KeBugCheckEx
fffff880`009eea60 fffff800`02d86593 : 00000000`00000001 fffffa80`04c92ea0 00000000`00000000 fffffa80`04c92ef0 : hal!HalBugCheckSystem+0x1e3
fffff880`009eeaa0 fffff800`031ee5c8 : 00000000`00000728 fffffa80`04c92ea0 fffff880`009eee30 fffff880`009eee00 : nt!WheaReportHwError+0x263
fffff880`009eeb00 fffff800`031edf1a : fffffa80`04c92ea0 fffff880`009eee30 fffffa80`04c92ea0 00000000`00000000 : hal!HalpMcaReportError+0x4c
fffff880`009eec50 fffff800`031eddd5 : 00000000`00000004 00000000`00000001 fffff880`009eeeb0 00000000`00000000 : hal!HalpMceHandler+0x9e
fffff880`009eec90 fffff800`031e1e88 : 00000000`00000000 fffff880`009e6180 00000000`00000000 00000000`00000000 : hal!HalpMceHandlerWithRendezvous+0x55
fffff880`009eecc0 fffff800`02c6efec : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalHandleMcheck+0x40
fffff880`009eecf0 fffff800`02c6ee53 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxMcheckAbort+0x6c
fffff880`009eee30 fffff880`02cdb9c2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x153
fffff880`02f1bc98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!C1Halt+0x2


STACK_COMMAND:  kb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  X64_0x124_GenuineIntel_PROCESSOR_BUS

BUCKET_ID:  X64_0x124_GenuineIntel_PROCESSOR_BUS

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_system_info.zip\Windows_NT6_BSOD_jcgriff2\090910-35927-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4b000 PsLoadedModuleList = 0xfffff800`02e88e50
Debug session time: Thu Sep  9 10:20:53.337 2010 (GMT-4)
System Uptime: 0 days 1:48:36.194
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+5ccf952f01f9de54
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000ba2558 -- (.exr 0xfffff80000ba2558)
ExceptionAddress: fffff80002cc02d6 (nt!KiDeferredReadyThread+0x00000000000003f6)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000ba2600 -- (.trap 0xfffff80000ba2600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000f rbx=0000000000000000 rcx=fffffa8005b61b60
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cc02d6 rsp=fffff80000ba2790 rbp=0000000000000000
 r8=0000000000000008  r9=0000000000000008 r10=fffff80002c4b000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiDeferredReadyThread+0x3f6:
fffff800`02cc02d6 a12003000080f7ffff mov   eax,dword ptr [FFFFF78000000320h] ds:fffff780`00000320=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cb346e to fffff80002cbb710

STACK_TEXT:  
fffff800`00ba1648 fffff800`02cb346e : 00000000`00000000 00000000`00000000 fffff800`00ba1dc0 fffff800`02ce8668 : nt!KeBugCheck
fffff800`00ba1650 fffff800`02ce140d : fffff800`02ec9b7c fffff800`02e03e84 fffff800`02c4b000 fffff800`00ba2558 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00ba1680 fffff800`02ce8a90 : fffff800`02e0aa40 fffff800`00ba16f8 fffff800`00ba2558 fffff800`02c4b000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00ba16b0 fffff800`02cf59ef : fffff800`00ba2558 fffff800`00ba1dc0 fffff800`00000000 fffffa80`06f5b6d0 : nt!RtlDispatchException+0x410
fffff800`00ba1d90 fffff800`02cbad82 : fffff800`00ba2558 fffff800`02e35e80 fffff800`00ba2600 fffff800`02e35e80 : nt!KiDispatchException+0x16f
fffff800`00ba2420 fffff800`02cb968a : fffff800`00ba2700 00000000`00000001 fffffa80`070063b0 fffff880`0487fc07 : nt!KiExceptionDispatch+0xc2
fffff800`00ba2600 fffff800`02cc02d6 : fffffa80`06be1da8 fffffa80`063833b0 00000000`00000000 fffffa80`06be1da0 : nt!KiGeneralProtectionFault+0x10a
fffff800`00ba2790 fffff800`02cc6e67 : fffffa80`06be1da0 fffffa80`08ad5ce0 fffffa80`08ad5ce0 00000000`00000000 : nt!KiDeferredReadyThread+0x3f6
fffff800`00ba2810 fffff800`02cc74be : 0000000f`2bf46e5e fffff800`00ba2e88 00000000`00065fa6 fffff800`02e39748 : nt!KiProcessExpiredTimerList+0x157
fffff800`00ba2e60 fffff800`02cc6cb7 : fffff800`02e35ec1 fffffa80`00065fa6 fffffa80`058f12b0 00000000`000000a6 : nt!KiTimerExpiration+0x1be
fffff800`00ba2f00 fffff800`02cc1865 : 00000000`00000000 fffffa80`05b61b60 00000000`00000000 fffff880`0147bd80 : nt!KiRetireDpcList+0x277
fffff800`00ba2fb0 fffff800`02cc167c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`079068c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02cb346e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------

My System SpecsSystem Spec
Reply

 Multiple crashes with no reason




Thread Tools



Similar help and support threads for2: Multiple crashes with no reason
Thread Forum
Every game I play crashes for no reason? Gaming
Multiple different BSOD. Cannot find reason. BSOD Help and Support
BSOD random crashes, no rhyme or reason BSOD Help and Support
BSOD, Crashes without a reason. BSOD Help and Support
I Installed Windows 7, then for some reason it just randomly crashes. BSOD Help and Support
Untimely System Crashes-Reason? BSOD Help and Support
Bsod Crashes Also, No known reason BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 04:07 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33