Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD Suspect: Isolated


25 Oct 2010   #1

Windows 7 Ultimate
 
 
BSOD Suspect: Isolated

I posted earlier in the forums but my thread has had no attention.

I dont know if any of the genius on here can help me but I bring something new to the table for you to feast upon.

I have been repeatedly presented with an error on BS which ready:

'system is attempting to access memory beyond the end of allocation something..'

Also there is a mention of a 'system-driver conflict'.

I express again as I did earlier that following instruction I think I can minidump and send the info needed but as for the system health report my Performance Monitor just gives up after the 60 seconds with an Error and timeout.

This stupid BS is making me very angry and I have no idea what to do or how to do it.

Please, help!

Regards.

My System SpecsSystem Spec
.

25 Oct 2010   #2

Windows 7 x64
 
 

Where's you attachment? Give link plz.
My System SpecsSystem Spec
25 Oct 2010   #3

Windows 7 Ultimate
 
 

I was unsure as to what link you mean, but if you are referring to my first post please find it here>>

http://www.sevenforums.com/crashes-d...-possible.html

Many thanks

On Edit:

Please find the dump enclosed. Looking forward to any responses to my prob. Thanks all again,

Best.
My System SpecsSystem Spec
.


26 Oct 2010   #4

Windows 7 x64
 
 

You got too many outdated drivers 2006-2008. A few of them directly caused your bsod crashes. Update them and uninstall Avast as it was also involved.

Alright,

PAGE_FAULT_BEYOND_END_OF_ALLOCATION (cd)
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
PROCESS_NAME: LManager.exe
0xCD_VRF_dump_wmimmc+6db9 (C:\Program Files\Rappelz\GameGuard\)


PAGE_FAULT_IN_NONPAGED_AREA (50)
PROCESS_NAME: dwm.exe
MODULE_NAME: hardware
IP_MISALIGNED


IRQL_NOT_LESS_OR_EQUAL (a)
PROCESS_NAME: msnmsgr.exe
0xA_pacer!PcFilterSendNetBufferLists+256
aswTdi.SYS
mdvrmng.sys


UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
PROCESS_NAME: SFrame.exe
Probably caused by : hardware ( nt!KiTrap0E+c )
IP_MISALIGNED


DRIVER_CORRUPTED_EXPOOL (c5)
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
Probably caused by : fileinfo.sys ( fileinfo!FIStreamQueryWorker+76 )


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
PROCESS_NAME: System
Probably caused by : netw5v32.sys ( netw5v32+1bb58f )


~~~~~~~~~~~



What to do:


1. Uninstall Avast, Malware bytes is enough for now:

avast! Uninstall Utility





2. Update - visit your notebook support as well as mnufacturers' support sites:


C:\Program Files\Rappelz\GameGuard\
Gameguard - Disable or remove

netw5v32.sys
Intel® Wireless WiFi Link Adapter

b57nd60x.sys Sun Apr 26 14:15:34 2009
Broadcom NetXtreme Gigabit Ethernet Driver

DKbFltr.sys Thu Mar 26 05:10:12 2009
Dritek 64-bit PS/2 Keyboard

iaStor.sys Fri Jun 05 04:42:33 2009
Intel Matrix Storage

mdvrmng.sys Mon May 28 17:37:13 2007
SmartRoaming Client - update or remove

rimsptsk.sys Thu Jun 25 10:10:46 2009
Ricoh Memorystick Controller

RTKVHDA.sys Thu Jul 23 12:55:58 2009
Realtek Audio

SCDEmu.SYS Mon Nov 09 05:21:19 2009
PowerISO

SynTP.sys Wed May 09 22:16:25 2007
Synaptics Touchpad

tdrpm251.sys Fri Jul 31 17:00:11 2009
Acronis Try&Decide

timntr.sys Mon Aug 17 10:16:54 2009
Acronis True Image

VSTCNXT3.SYS Thu Oct 16 03:29:13 2008
Conexant SoftK56 Modem

winbondcir.sys Wed Mar 28 08:51:32 2007
Winbond CIR Transceiver Winbond Electronics Corporation






Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\102510-43430-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e16000 PsLoadedModuleList = 0x82f5e810
Debug session time: Mon Oct 25 22:25:32.935 2010 (UTC - 5:00)
System Uptime: 1 days 3:22:49.762
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
.....................
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_BEYOND_END_OF_ALLOCATION (cd)
N bytes of memory was allocated and more than N bytes are being referenced.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 8fcb3000, memory referenced
Arg2: 00000000, value 0 = read operation, 1 = write operation
Arg3: 82ed9cb2, if non-zero, the address which referenced memory.
Arg4: 00000000, Mm internal code.

Debugging Details:
------------------

Unable to load image \??\C:\Program Files\Rappelz\GameGuard\dump_wmimmc.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dump_wmimmc.sys
*** ERROR: Module load completed but symbols could not be loaded for dump_wmimmc.sys

READ_ADDRESS: GetPointerFromAddress: unable to read from 82f7e718
Unable to read MiSystemVaType memory at 82f5e160
 8fcb3000 

FAULTING_IP: 
nt!_output_l+50e
82ed9cb2 663918          cmp     word ptr [eax],bx

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xCD

PROCESS_NAME:  LManager.exe

CURRENT_IRQL:  0

TRAP_FRAME:  97bbf0d0 -- (.trap 0xffffffff97bbf0d0)
ErrCode = 00000000
eax=8fcb3000 ebx=00000000 ecx=7fffffee edx=8fcb2fe0 esi=97bbf473 edi=00000007
eip=82ed9cb2 esp=97bbf144 ebp=97bbf3a0 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!_output_l+0x50e:
82ed9cb2 663918          cmp     word ptr [eax],bx        ds:0023:8fcb3000=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82e5c638 to 82e9b903

STACK_TEXT:  
97bbf0b8 82e5c638 00000000 8fcb3000 00000000 nt!MmAccessFault+0x106
97bbf0b8 82ed9cb2 00000000 8fcb3000 00000000 nt!KiTrap0E+0xdc
97bbf3a0 82eda611 97bbf3c4 97bbf473 00000000 nt!_output_l+0x50e
97bbf3e4 82eda11a 97bbf828 00000400 97bbf41c nt!_vsnprintf_l+0x72
97bbf400 9058ddb9 97bbf828 00000400 97bbf41c nt!_vsnprintf+0x18
WARNING: Stack unwind information not available. Following frames may be wrong.
97bbfc28 905a0d59 000000a0 90588dc0 9369f19c dump_wmimmc+0x6db9
97bbfc88 9058b5be 00000114 000b2054 00000114 dump_wmimmc+0x19d59
97bbfccc 9058b6d6 751fa08f 00000114 000b2054 dump_wmimmc+0x45be
97bbfd34 770664f4 badb0d00 0012fbd4 00000000 dump_wmimmc+0x46d6
97bbfd38 badb0d00 0012fbd4 00000000 00000000 0x770664f4
97bbfd3c 0012fbd4 00000000 00000000 00000000 0xbadb0d00
97bbfd40 00000000 00000000 00000000 00000000 0x12fbd4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dump_wmimmc+6db9
9058ddb9 ??              ???

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  dump_wmimmc+6db9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dump_wmimmc

IMAGE_NAME:  dump_wmimmc.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c162f49

FAILURE_BUCKET_ID:  0xCD_VRF_dump_wmimmc+6db9

BUCKET_ID:  0xCD_VRF_dump_wmimmc+6db9

Followup: MachineOwner


           
    Loaded symbol image file: dump_wmimmc.sys
    Image path: \??\C:\Program Files\Rappelz\GameGuard\dump_wmimmc.sys
    Image name: dump_wmimmc.sys
















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\092310-48937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e4e000 PsLoadedModuleList = 0x82f96810
Debug session time: Thu Sep 23 18:05:27.102 2010 (UTC - 5:00)
System Uptime: 0 days 0:02:20.803
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
......
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffd5d78d, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 830e101d, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 82fb6718
Unable to read MiSystemVaType memory at 82f96160
 ffd5d78d 

FAULTING_IP: 
nt!NtQueryInformationJobObject+10
830e101d f6              ???

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

TRAP_FRAME:  9fdd5c9c -- (.trap 0xffffffff9fdd5c9c)
ErrCode = 00000000
eax=000000e8 ebx=830e100d ecx=8a4bf318 edx=830e100d esi=02c0ecdc edi=00000000
eip=830e101d esp=9fdd5d10 ebp=9fdd5d34 iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
nt!NtQueryInformationJobObject+0x10:
830e101d f6              ???
Resetting default scope

MISALIGNED_IP: 
nt!NtQueryInformationJobObject+10
830e101d f6              ???

LAST_CONTROL_TRANSFER:  from 82e94638 to 82ed3903

STACK_TEXT:  
9fdd5c84 82e94638 00000000 ffd5d78d 00000000 nt!MmAccessFault+0x106
9fdd5c84 830e101d 00000000 ffd5d78d 00000000 nt!KiTrap0E+0xdc
9fdd5d34 76e764f4 badb0d00 02c0ecc8 00000000 nt!NtQueryInformationJobObject+0x10
WARNING: Frame IP not in any known module. Following frames may be wrong.
9fdd5d38 badb0d00 02c0ecc8 00000000 00000000 0x76e764f4
9fdd5d3c 02c0ecc8 00000000 00000000 00000000 0xbadb0d00
9fdd5d40 00000000 00000000 00000000 00000000 0x2c0ecc8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!NtQueryInformationJobObject+10
830e101d f6              ???

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!NtQueryInformationJobObject+10

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

BUCKET_ID:  IP_MISALIGNED

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\093010-36816-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e55000 PsLoadedModuleList = 0x82f9d810
Debug session time: Thu Sep 30 05:17:48.548 2010 (UTC - 5:00)
System Uptime: 0 days 8:32:34.390
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {368fc777, 2, 0, 82eda89d}

*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
*** WARNING: Unable to verify timestamp for aswRdr.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswRdr.SYS
*** WARNING: Unable to verify timestamp for mdvrmng.sys
*** ERROR: Module load completed but symbols could not be loaded for mdvrmng.sys
Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferLists+256 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 368fc777, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82eda89d, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 82fbd718
Unable to read MiSystemVaType memory at 82f9d160
 368fc777 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MmAccessFault+a0
82eda89d 8b06            mov     eax,dword ptr [esi]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  msnmsgr.exe

TRAP_FRAME:  a397f110 -- (.trap 0xffffffffa397f110)
ErrCode = 00000000
eax=db3ab0c7 ebx=00000000 ecx=a397f1e0 edx=00004700 esi=8823d224 edi=886ef0e0
eip=8ba7fc96 esp=a397f184 ebp=a397f198 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
ndis!ndisMAllocSGList+0x10:
8ba7fc96 8b4d08          mov     ecx,dword ptr [ebp+8] ss:0010:a397f1a0=886ef0e0
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82eda89d to 82e9b82b

STACK_TEXT:  
a397f01c 82eda89d badb0d00 00000080 00000000 nt!KiTrap0E+0x2cf
a397f0f8 82e9b638 00000000 8b565308 00000000 nt!MmAccessFault+0xa0
a397f0f8 8ba7fc96 00000000 8b565308 00000000 nt!KiTrap0E+0xdc
a397f198 8ba87464 886ef0e0 8823d224 85efae00 ndis!ndisMAllocSGList+0x10
a397f1c0 8ba8730a a397f1e0 a397f1e0 00000000 ndis!ndisMSendPacketsXToMiniport+0xc1
a397f228 8ba1f59d 886ef0e0 85efae48 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
a397f248 8ba1f623 85efae48 85efae48 00000000 ndis!ndisFilterSendNetBufferLists+0x87
a397f260 90de5c20 88938858 85efae48 00000000 ndis!NdisFSendNetBufferLists+0x38
a397f2dc 8ba1f474 85d04730 01efae48 00000000 pacer!PcFilterSendNetBufferLists+0x256
a397f308 8ba83d8c 886ef0e0 85efae48 00000000 ndis!ndisSendNBLToFilter+0xf2
a397f338 90c1bbf8 88940a60 85efae48 00000000 ndis!NdisSendNetBufferLists+0x162
a397f394 8bca1861 02ca4bd8 00000000 88260002 wanarp!WanIpSendPackets+0x1f4
a397f3e8 8bca1573 8bd21d98 00000000 00000000 tcpip!IppFragmentPackets+0x2e2
a397f420 8bca9313 8bd21d98 8826baac 8826bb48 tcpip!IppDispatchSendPacketHelper+0x266
a397f4c0 8bcaf3ae 0026baac a397f5a0 85a5a130 tcpip!IppPacketizeDatagrams+0x8d6
a397f540 8bcaf635 00000000 00000007 8bd21d98 tcpip!IppSendDatagramsCommon+0x652
a397f560 8bc8f3a8 88260788 a397f578 a397f6e0 tcpip!IpNlpSendDatagrams+0x4b
a397f5ec 8bc8f339 88260788 a397f6e0 858829a0 tcpip!IppSlowSendDatagram+0x31
a397f64c 8bc926c4 88260788 00000001 a397f6e0 tcpip!IpNlpFastSendDatagram+0xefd
a397f79c 8bc96555 859aedf8 00000000 00000001 tcpip!TcpTcbSend+0x78b
a397f7bc 8bc943e9 859aedf8 85c20020 00000000 tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0x157
a397f81c 8bc968e6 859aedf8 a397f91c 00000000 tcpip!TcpEnqueueTcbSend+0x3ca
a397f838 82ee4faa a397f8c8 856ef5d6 00000000 tcpip!TcpTlConnectionSendCalloutRoutine+0x17
a397f8a0 8bc95aab 8bc968cf a397f8c8 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
a397f8d8 90daed27 859aed01 a397f900 85a1a150 tcpip!TcpTlConnectionSend+0x73
a397f93c 90db42e3 00e11008 85a1a150 85a1a1e4 tdx!TdxSendConnection+0x1d7
a397f958 82e914bc 8836add8 85a1a150 88420768 tdx!TdxTdiDispatchInternalDeviceControl+0x115
a397f970 90dcf23b 334ad9d6 00000000 85a1a208 nt!IofCallDriver+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
a397f9a8 90dca977 88420738 85a1a150 8836add8 aswTdi+0x523b
a397f9f0 82e914bc 8836add8 85a1a150 88442a78 aswTdi+0x977
a397fa08 90dd44d8 884429c0 a397fa2c 82e914bc nt!IofCallDriver+0x63
a397fa14 82e914bc 884429c0 85a1a150 8a3d7608 aswRdr+0x4d8
a397fa2c 8b41be15 85b893a0 8a3d7608 a397fab8 nt!IofCallDriver+0x63
a397fa48 82e914bc 00000001 00000000 85a1a820 mdvrmng+0x1e15
a397fa60 8b7bfa0e 28ed4a96 a397fb20 00000001 nt!IofCallDriver+0x63
a397fab0 8b7ac542 00000000 8b7ac542 85df9630 afd!AfdFastConnectionSend+0x2a6
a397fc28 830af985 89a97a01 00000001 0050f83c afd!AfdFastIoDeviceControl+0x53d
a397fcd0 830b253a 8841ae10 000008b0 00000000 nt!IopXxxControlFile+0x2d0
a397fd04 82e9844a 00000db8 000008b0 00000000 nt!NtDeviceIoControlFile+0x2a
a397fd04 773964f4 00000db8 000008b0 00000000 nt!KiFastCallEntry+0x12a
0050f890 00000000 00000000 00000000 00000000 0x773964f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
pacer!PcFilterSendNetBufferLists+256
90de5c20 5b              pop     ebx

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  pacer!PcFilterSendNetBufferLists+256

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: pacer

IMAGE_NAME:  pacer.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc916

FAILURE_BUCKET_ID:  0xA_pacer!PcFilterSendNetBufferLists+256

BUCKET_ID:  0xA_pacer!PcFilterSendNetBufferLists+256

Followup: MachineOwner










Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\101510-40575-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e03000 PsLoadedModuleList = 0x82f4b810
Debug session time: Fri Oct 15 03:19:03.390 2010 (UTC - 5:00)
System Uptime: 0 days 0:42:27.231
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, 801de000, 0, 0}

Probably caused by : hardware ( nt!KiTrap0E+c )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 801de000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  SFrame.exe

CURRENT_IRQL:  0

MISALIGNED_IP: 
nt!KiTrap0E+c
82e49568 a0bb300000      mov     al,byte ptr ds:[000030BBh]

LAST_CONTROL_TRANSFER:  from 00000000 to 82e49568

STACK_TEXT:  
084dfee8 00000000 00000000 00000000 00000000 nt!KiTrap0E+0xc


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiTrap0E+c
82e49568 a0bb300000      mov     al,byte ptr ds:[000030BBh]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiTrap0E+c

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

BUCKET_ID:  IP_MISALIGNED

Followup: MachineOwner
---------













Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\102410-40232-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e46000 PsLoadedModuleList = 0x82f8e810
Debug session time: Sun Oct 24 07:31:03.596 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:53.422
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C5, {ddacb008, 2, 0, 82f6605b}

Probably caused by : fileinfo.sys ( fileinfo!FIStreamQueryWorker+76 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is
caused by drivers that have corrupted the system pool.  Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: ddacb008, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 82f6605b, address which referenced memory

Debugging Details:
------------------


BUGCHECK_STR:  0xC5_2

CURRENT_IRQL:  2

FAULTING_IP: 
nt!ExAllocatePoolWithTag+4ab
82f6605b 3932            cmp     dword ptr [edx],esi

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

TRAP_FRAME:  8873d724 -- (.trap 0xffffffff8873d724)
ErrCode = 00000000
eax=82f7bb70 ebx=82f7b8c0 ecx=9dacb008 edx=ddacb008 esi=82f7bb70 edi=82f7b8c4
eip=82f6605b esp=8873d798 ebp=8873d7e4 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!ExAllocatePoolWithTag+0x4ab:
82f6605b 3932            cmp     dword ptr [edx],esi  ds:0023:ddacb008=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82f6605b to 82e8c82b

STACK_TEXT:  
8873d724 82f6605b badb0d00 ddacb008 00000003 nt!KiTrap0E+0x2cf
8873d7e4 8306a080 00000000 000000b0 e56c6946 nt!ExAllocatePoolWithTag+0x4ab
8873d810 83069eea 946f8300 8873d838 00000080 nt!ObpAllocateObject+0xe2
8873d844 8308aed5 00000000 857e0938 8873d880 nt!ObCreateObject+0x128
8873d89c 8308629a 8873d96c 8c7c0b78 8c716a38 nt!IopAllocRealFileObject+0x50
8873d990 8306726b 8c716a38 877e0938 946f8308 nt!IopParseDevice+0xac4
8873da0c 8308d2d9 00000000 8873da60 00000240 nt!ObpLookupObjectName+0x4fa
8873da68 8308562b 8873db90 857e0938 00010000 nt!ObOpenObjectByName+0x165
8873dae4 830bce29 8cfa97d4 00100001 8873db90 nt!IopCreateFile+0x673
8873db40 85d3cde3 8cfa97d4 00100001 8873db90 nt!IoCreateFileEx+0x9e
8873dbd0 85d3e033 00000000 00000000 8cfa9758 fltmgr!FltpNormalizeNameFromCache+0xe5
8873dbfc 85d3edf4 01fa9758 00000000 8cfa9758 fltmgr!FltpExpandShortNames+0x2b5
8873dc18 85d3f505 8cfa0000 00000000 918ed574 fltmgr!FltpGetNormalizedFileNameWorker+0xae
8873dc30 85d3c765 8cfa9758 00000000 8cfa9758 fltmgr!FltpGetNormalizedFileName+0x19
8873dc48 85d26b21 8cfa9758 9db180f0 00000000 fltmgr!FltpCreateFileNameInformation+0x81
8873dc78 85d3ccd9 9d3ebfd4 00000001 00000000 fltmgr!FltpGetFileNameInformation+0x321
8873dc8c 85d594e0 9db180f0 8cf34008 8cfa9758 fltmgr!FltGetFileNameInformationUnsafe+0x59
8873dccc 85d433c8 8af175f8 8cf34008 00000899 fileinfo!FIStreamQueryWorker+0x76
8873dd00 82eb3f3b 00000000 00000000 857de4c0 fltmgr!FltpProcessGenericWorkItem+0x38
8873dd50 830546d3 00000001 a0a7514e 00000000 nt!ExpWorkerThread+0x10d
8873dd90 82f060f9 82eb3e2e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


STACK_COMMAND:  kb

FOLLOWUP_IP: 
fileinfo!FIStreamQueryWorker+76
85d594e0 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  11

SYMBOL_NAME:  fileinfo!FIStreamQueryWorker+76

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: fileinfo

IMAGE_NAME:  fileinfo.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18f

FAILURE_BUCKET_ID:  0xC5_2_VRF_fileinfo!FIStreamQueryWorker+76

BUCKET_ID:  0xC5_2_VRF_fileinfo!FIStreamQueryWorker+76

Followup: MachineOwner



























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\102410-36613-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e3b000 PsLoadedModuleList = 0x82f83810
Debug session time: Sun Oct 24 03:27:28.264 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:31.106
Loading Kernel Symbols
...............................................................
................................................................
.......
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {75, 2, 1, 91fbe58f}

Unable to load image \SystemRoot\system32\DRIVERS\netw5v32.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for netw5v32.sys
*** ERROR: Module load completed but symbols could not be loaded for netw5v32.sys
Probably caused by : netw5v32.sys ( netw5v32+1bb58f )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000075, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 91fbe58f, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82fa3718
Unable to read MiSystemVaType memory at 82f83160
 00000075 

CURRENT_IRQL:  2

FAULTING_IP: 
netw5v32+1bb58f
91fbe58f 0000            add     byte ptr [eax],al

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  8d9381f4 -- (.trap 0xffffffff8d9381f4)
ErrCode = 00000002
eax=00000075 ebx=00000000 ecx=887ad000 edx=881bbca0 esi=887ad000 edi=887ad05c
eip=91fbe58f esp=8d938268 ebp=8d93827c iopl=0         nv up ei ng nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00210282
netw5v32+0x1bb58f:
91fbe58f 0000            add     byte ptr [eax],al          ds:0023:00000075=??
Resetting default scope

LOCK_ADDRESS:  82fa0f60 -- (!locks 82fa0f60)

Resource @ nt!PiEngineLock (0x82fa0f60)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
	Lock address  : 0x82fa0f60
	Thread Count  : 0
	Thread address: 0x00000000
	Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from 91fbe58f to 82e8182b

STACK_TEXT:  
8d9381f4 91fbe58f badb0d00 881bbca0 00000000 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
8d93827c 91fb761c 887ad000 00000000 920b5830 netw5v32+0x1bb58f
8d9384a4 91e13690 887ad000 887f97b0 887fbfe0 netw5v32+0x1b461c
8d9384d4 91e14525 887f97b0 00000000 887f97b0 netw5v32+0x10690
8d9384ec 91e11379 887f97b0 887fbfe0 882d8c10 netw5v32+0x11525
8d938508 91f94c4d 881bb5d0 00000004 00000001 netw5v32+0xe379
8d9385b8 91e04bdb 882d8c10 882d8008 8b8175c0 netw5v32+0x191c4d
8d9385e8 920922c3 00000000 881b9f84 00000003 netw5v32+0x1bdb
8d938618 8b885368 880d30e0 92437f50 8d938670 netw5v32+0x28f2c3
8d9388e4 8b884aea 87f5b920 880d30e0 87f5b788 ndis!ndisMInitializeAdapter+0x76b
8d93891c 8b884963 87f5b920 880d3028 87e1d860 ndis!ndisInitializeAdapter+0x10a
8d938944 8b881247 880d3028 8817af94 8817afb8 ndis!ndisPnPStartDevice+0x130
8d938988 82e774bc 880d3028 8817af00 8d938a10 ndis!ndisPnPDispatch+0x62f
8d9389a0 82fe3d78 00000000 85ed6568 87d66008 nt!IofCallDriver+0x63
8d9389bc 82e4f479 8d9389ec 82e4eb67 87d66008 nt!PnpAsynchronousCall+0x92
8d938a20 82fe9bf4 82e4eb67 87d66008 85eba6f0 nt!PnpStartDevice+0xe1
8d938a7c 82fe9abd 87d66008 0000003d 00000000 nt!PnpStartDeviceNode+0x12c
8d938a98 82fe28b9 00000000 00000001 00000000 nt!PipProcessStartPhase1+0x62
8d938c94 82fc6a42 855fb008 87f539c0 8d938cc8 nt!PipProcessDevNodeTree+0x188
8d938cd4 82e4ef9c 87f539c0 82f9ee80 855cba70 nt!PiProcessStartSystemDevices+0x6d
8d938d00 82ea8f3b 00000000 00000000 855cba70 nt!PnpDeviceActionWorker+0x241
8d938d50 830496d3 00000001 ab681a7a 00000000 nt!ExpWorkerThread+0x10d
8d938d90 82efb0f9 82ea8e2e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


STACK_COMMAND:  kb

FOLLOWUP_IP: 
netw5v32+1bb58f
91fbe58f 0000            add     byte ptr [eax],al

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  netw5v32+1bb58f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netw5v32

IMAGE_NAME:  netw5v32.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c0406d7

FAILURE_BUCKET_ID:  0xD1_netw5v32+1bb58f

BUCKET_ID:  0xD1_netw5v32+1bb58f

Followup: MachineOwner
---------









Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\092110-43586-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e03000 PsLoadedModuleList = 0x82f4b810
Debug session time: Tue Sep 21 19:49:16.405 2010 (UTC - 5:00)
System Uptime: 0 days 8:12:42.246
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
....................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {d, 0, 0, 0}

Probably caused by : hardware ( nt!KiSystemFatalException+f )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_d

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  audiodg.exe

CURRENT_IRQL:  1b

EXCEPTION_RECORD:  aa1f1ce0 -- (.exr 0xffffffffaa1f1ce0)
ExceptionAddress: 00000000
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000008
   Parameter[1]: 00000000
Attempt to execute non-executable address 00000000

TRAP_FRAME:  aa1f1d34 -- (.trap 0xffffffffaa1f1d34)
ErrCode = 00000014
eax=02455400 ebx=00a2eea0 ecx=00a2eea0 edx=00000002 esi=00000000 edi=000001e0
eip=00000000 esp=024a070c ebp=00000000 iopl=0         nv up ei pl zr na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010246
001b:00000000 ??              ???
Resetting default scope

MISALIGNED_IP: 
nt!RtlpCopyExtendedContext+17
82ec08db 0085c00f8c9e    add     byte ptr [ebp-6173F040h],al

LAST_CONTROL_TRANSFER:  from 82ebd477 to 82e49f6b

STACK_TEXT:  
aa1f1284 82ebd477 badb0d00 00000001 001dcdc6 nt!KiSystemFatalException+0xf
aa1f12f4 82ec2df7 82e3cc74 aa1f1318 aa1f131c nt!RtlLookupFunctionTable+0x48
aa1f1320 82ebbff8 aa1f13b0 00000000 aa1f17d0 nt!RtlIsValidHandler+0x1b
aa1f13a0 82ec0352 aa1f17d0 aa1f13b0 00010017 nt!RtlDispatchException+0x76
aa1f17b4 82e47036 aa1f17d0 00000000 aa1f1824 nt!KiDispatchException+0x17c
aa1f181c 82e46fea aa1f18a4 82ec08db badb0d00 nt!CommonDispatchException+0x4a
aa1f18a4 82ec0510 00000001 024a06f4 aa1f1c68 nt!Kei386EoiHelper+0x192
aa1f18a8 00000000 024a06f4 aa1f1c68 0001003f nt!KiDispatchException+0x338


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemFatalException+f
82e49f6b c3              ret

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiSystemFatalException+f

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

BUCKET_ID:  IP_MISALIGNED

Followup: MachineOwner
---------






































Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\102610-40965-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e39000 PsLoadedModuleList = 0x82f81810
Debug session time: Tue Oct 26 03:00:19.339 2010 (UTC - 5:00)
System Uptime: 0 days 0:25:41.165
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
.....
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_BEYOND_END_OF_ALLOCATION (cd)
N bytes of memory was allocated and more than N bytes are being referenced.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 8fb3b000, memory referenced
Arg2: 00000000, value 0 = read operation, 1 = write operation
Arg3: 82efccb2, if non-zero, the address which referenced memory.
Arg4: 00000000, Mm internal code.

Debugging Details:
------------------

Unable to load image \??\C:\Program Files\Rappelz\GameGuard\dump_wmimmc.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dump_wmimmc.sys
*** ERROR: Module load completed but symbols could not be loaded for dump_wmimmc.sys

READ_ADDRESS: GetPointerFromAddress: unable to read from 82fa1718
Unable to read MiSystemVaType memory at 82f81160
 8fb3b000 

FAULTING_IP: 
nt!_output_l+50e
82efccb2 663918          cmp     word ptr [eax],bx

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xCD

PROCESS_NAME:  LManager.exe

CURRENT_IRQL:  0

TRAP_FRAME:  8817a0d0 -- (.trap 0xffffffff8817a0d0)
ErrCode = 00000000
eax=8fb3b000 ebx=00000000 ecx=7fffffee edx=8fb3afe0 esi=8817a473 edi=00000007
eip=82efccb2 esp=8817a144 ebp=8817a3a0 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!_output_l+0x50e:
82efccb2 663918          cmp     word ptr [eax],bx        ds:0023:8fb3b000=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82e7f638 to 82ebe903

STACK_TEXT:  
8817a0b8 82e7f638 00000000 8fb3b000 00000000 nt!MmAccessFault+0x106
8817a0b8 82efccb2 00000000 8fb3b000 00000000 nt!KiTrap0E+0xdc
8817a3a0 82efd611 8817a3c4 8817a473 00000000 nt!_output_l+0x50e
8817a3e4 82efd11a 8817a828 00000400 8817a41c nt!_vsnprintf_l+0x72
8817a400 9f87ddb9 8817a828 00000400 8817a41c nt!_vsnprintf+0x18
WARNING: Stack unwind information not available. Following frames may be wrong.
8817ac28 9f890d59 000000a0 9f878dc0 92b6719c dump_wmimmc+0x6db9
8817ac88 9f87b5be 00000114 000b2054 00000114 dump_wmimmc+0x19d59
8817accc 9f87b6d6 75aaa08f 00000114 000b2054 dump_wmimmc+0x45be
8817ad34 777c64f4 badb0d00 0012fbd4 00000000 dump_wmimmc+0x46d6
8817ad38 badb0d00 0012fbd4 00000000 00000000 0x777c64f4
8817ad3c 0012fbd4 00000000 00000000 00000000 0xbadb0d00
8817ad40 00000000 00000000 00000000 00000000 0x12fbd4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dump_wmimmc+6db9
9f87ddb9 ??              ???

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  dump_wmimmc+6db9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dump_wmimmc

IMAGE_NAME:  dump_wmimmc.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c162f49

FAILURE_BUCKET_ID:  0xCD_VRF_dump_wmimmc+6db9

BUCKET_ID:  0xCD_VRF_dump_wmimmc+6db9

Followup: MachineOwner
---------



9f877000 9f8cf100   dump_wmimmc T (no symbols)           
    Loaded symbol image file: dump_wmimmc.sys
    Image path: \??\C:\Program Files\Rappelz\GameGuard\dump_wmimmc.sys
    Image name: dump_wmimmc.sys
    Timestamp:        Mon Jun 14 16:31:53 2010 (4C162F49)



916a3000 916cf000   1394ohci 1394ohci.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
85a8b000 85ad3000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
85d81000 85ddb000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
8ff81000 8ff93000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
85d33000 85d3c000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
9200c000 9200eb00   aswFsBlk aswFsBlk.SYS Tue Sep 07 17:47:05 2010 (4C865069)
85bc3000 85bfa000   aswMonFlt aswMonFlt.sys Tue Sep 07 17:47:28 2010 (4C865080)
8edd5000 8edd9100   aswRdr   aswRdr.SYS   Tue Sep 07 17:47:44 2010 (4C865090)
8f702000 8f728c80   aswSP    aswSP.SYS    Tue Sep 07 17:52:01 2010 (4C865191)
8edcb000 8edd4c00   aswTdi   aswTdi.SYS   Tue Sep 07 17:52:23 2010 (4C8651A7)
85cfd000 85d06000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
85d06000 85d29000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
91667000 916a3000   b57nd60x b57nd60x.sys Sun Apr 26 14:15:34 2009 (49F44256)
85b32000 85b3d000   BATTC    BATTC.SYS    Tue Jul 14 02:19:15 2009 (4A5BC0F3)
8ed37000 8ed3e000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
8f6f4000 8f702000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
858a9000 858b1000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
9b123000 9b13c000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
95d90000 95dae000   cdd      cdd.dll      Tue Jul 14 04:04:18 2009 (4A5BD992)
8ed11000 8ed30000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
858f3000 8599e000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
90ddc000 90dea000   circlass circlass.sys Tue Jul 14 02:51:17 2009 (4A5BC875)
865c7000 865ec000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
858b1000 858f3000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
917de000 917e1700   CmBatt   CmBatt.sys   Tue Jul 14 02:19:18 2009 (4A5BC0F6)
85f95000 85ff2000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
85b2a000 85b32000   compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
917eb000 917f8000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
925a3000 925b0000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
8f678000 8f6dc000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
8f6dc000 8f6f4000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
8f66c000 8f678000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
865b6000 865c7000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
9178c000 91796000   DKbFltr  DKbFltr.sys  Thu Mar 26 05:10:12 2009 (49CAF214)
924fc000 92515000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
925b0000 925c1000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
8ec21000 8ecfb000   dump_iaStor dump_iaStor.sys Fri Jun 05 04:42:33 2009 (4A287809)
9f877000 9f8cf100   dump_wmimmc dump_wmimmc.sys Mon Jun 14 16:31:53 2010 (4C162F49)
925c1000 925cb000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
8fe0d000 8fec4000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
8fec4000 8fefd000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
9b000000 9b02a000   fastfat  fastfat.SYS  Tue Jul 14 02:14:01 2009 (4A5BBFB9)
85d70000 85d81000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
85d3c000 85d70000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
85e00000 85e09000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
86584000 865b6000   fvevol   fvevol.sys   Sat Sep 26 05:24:21 2009 (4ABD7B55)
86349000 8637a000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
82e02000 82e39000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
8ff62000 8ff81000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
921e2000 921f5000   HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
921d3000 921e2000   hidir    hidir.sys    Tue Jul 14 02:51:04 2009 (4A5BC868)
921f5000 921fb480   HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
92598000 925a3000   hidusb   hidusb.sys   Tue Jul 14 02:51:04 2009 (4A5BC868)
9b09e000 9b123000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
8657c000 86584000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
91774000 9178c000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
8599e000 859e9000   iaNvStor iaNvStor.sys Thu Jul 02 03:54:06 2009 (4A4C052E)
85c23000 85cfd000   iaStor   iaStor.sys   Fri Jun 05 04:42:33 2009 (4A287809)
85b98000 85b9f000   intelide intelide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
8f74a000 8f75c000   intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
91796000 917a3000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
92000000 9200c000   kbdhid   kbdhid.sys   Tue Jul 14 02:45:09 2009 (4A5BC705)
80bcf000 80bd7000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
8f75c000 8f790000   ks       ks.sys       Thu Mar 04 05:57:52 2010 (4B8F2FC0)
85f82000 85f95000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
86123000 86148000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:04:22 2009 (4B21C4C6)
8f7e5000 8f7f5000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
925d6000 925f1000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
9f86f000 9f872780   mbam     mbam.sys     Thu Apr 29 20:14:15 2010 (4BD9BE67)
85820000 85898000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
9221a000 9222e000   mdvrmng  mdvrmng.sys  Mon May 28 17:37:13 2007 (465AE919)
921c6000 921d3000   modem    modem.sys    Tue Jul 14 02:55:24 2009 (4A5BC96C)
925cb000 925d6000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
917d1000 917de000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
92552000 9255d000   mouhid   mouhid.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
85bad000 85bc3000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
9b13c000 9b14e000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
9b14e000 9b171000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:32:02 2010 (4B88CA72)
9b171000 9b1ac000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
9b1ac000 9b1c7000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
85d29000 85d33000   msahci   msahci.sys   Tue Jul 14 02:45:50 2009 (4A5BC72E)
8ed90000 8ed9b000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
85adc000 85ae4000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
9f875000 9f876700   MSPCLOCK MSPCLOCK.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
9f873000 9f874580   MSPQM    MSPQM.sys    Tue Jul 14 02:45:07 2009 (4A5BC703)
85f57000 85f82000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8f662000 8f66c000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8656c000 8657c000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8602e000 860e5000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
8ffab000 8ffb6000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
9b07b000 9b08b000   ndisuio  ndisuio.sys  Tue Jul 14 02:53:51 2009 (4A5BC90F)
8ffb6000 8ffd8000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
8f7d4000 8f7e5000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
8ec00000 8ec0e000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
86400000 86432000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
860e5000 86123000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
91008000 91667000   NETwLv32 NETwLv32.sys Mon Aug 16 17:26:04 2010 (4C694A7C)
8ed9b000 8eda9000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
8f658000 8f662000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
82e39000 83249000   nt       ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
85e28000 85f57000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
8ed30000 8ed37000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
90dac000 90dad040   nvBridge nvBridge.kmd Sat Oct 16 20:04:23 2010 (4CB9DB17)
9040f000 90dab5a0   nvlddmkm nvlddmkm.sys Sat Oct 16 20:07:56 2010 (4CB9DBEC)
9b035000 9b07b000   nwifi    nwifi.sys    Tue Jul 14 02:51:59 2009 (4A5BC89F)
8ede1000 8ee00000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
85b19000 85b2a000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
85ae4000 85b0e000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
85b9f000 85bad000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
85ff2000 86000000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
9f02f000 9f0c6000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
924cd000 924fc000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
85898000 858a9000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
8ff93000 8ffab000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
8ffd8000 8fff0000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
90dae000 90dc5000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
90dc5000 90ddc000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
8f617000 8f658000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
8fff0000 8fffa000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
8ed78000 8ed80000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
8ed80000 8ed88000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8ed88000 8ed90000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
8653f000 8656c000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
916e8000 916f9000   rimmptsk rimmptsk.sys Thu Jun 25 10:58:09 2009 (4A432E11)
916f9000 9170d000   rimsptsk rimsptsk.sys Thu Jun 25 10:10:46 2009 (4A4322F6)
9170d000 9175f000   rixdptsk rixdptsk.sys Thu Jun 25 10:25:57 2009 (4A432685)
9b08b000 9b09e000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
92232000 924cca40   RTKVHDA  RTKVHDA.sys  Thu Jul 23 12:55:58 2009 (4A6833AE)
863d2000 863dfa60   SCDEmu   SCDEmu.SYS   Mon Nov 09 05:21:19 2009 (4AF78AAF)
916cf000 916e8000   sdbus    sdbus.sys    Sat Oct 10 05:31:24 2009 (4ACFF1FC)
9f0c6000 9f0d0000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
917f8000 917fdf00   seehcri  seehcri.sys  Wed Jan 09 10:41:37 2008 (478488C1)
8651a000 8653ec20   snapman  snapman.sys  Tue Sep 08 10:57:17 2009 (4AA60E5D)
86512000 8651a000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
9f81e000 9f86f000   srv      srv.sys      Fri Aug 27 06:31:26 2010 (4C77318E)
9f168000 9f1b7000   srv2     srv2.sys     Fri Aug 27 06:30:45 2010 (4C773165)
9f0d0000 9f0f1000   srvnet   srvnet.sys   Fri Aug 27 06:30:39 2010 (4C77315F)
917fe000 917ff380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
917a3000 917cee00   SynTP    SynTP.sys    Wed May 09 22:16:25 2007 (46421E09)
86200000 86349000   tcpip    tcpip.sys    Mon Jun 14 06:36:59 2010 (4C15A3DB)
9f0f1000 9f0fe000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
8edc0000 8edcb000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
86437000 86511b00   tdrpm251 tdrpm251.sys Fri Jul 31 17:00:11 2009 (4A72F8EB)
8eda9000 8edc0000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
863c2000 863d2000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
86148000 861d1880   timntr   timntr.sys   Mon Aug 17 10:16:54 2009 (4A8903E6)
95d60000 95d69000   TSDDD    TSDDD.dll    unavailable (00000000)
8f729000 8f74a000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
90dea000 90df8000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
9255d000 92574000   usbccgp  usbccgp.sys  Tue Jul 14 02:51:31 2009 (4A5BC883)
917cf000 917d0700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
8ff53000 8ff62000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
8f790000 8f7d4000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
8ff08000 8ff53000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
8fefd000 8ff08000   usbuhci  usbuhci.sys  Tue Jul 14 02:51:10 2009 (4A5BC86E)
92574000 92597b80   usbvideo usbvideo.sys Thu Mar 04 06:04:40 2010 (4B8F3158)
85b0e000 85b19000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
8ed3e000 8ed4a000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
8ed4a000 8ed6b000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
8637a000 86382380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
85b3d000 85b4d000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
85b4d000 85b98000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
86383000 863c2000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
92515000 92552000   VSTAZL3  VSTAZL3.SYS  Thu Oct 16 03:30:03 2008 (48F68B0B)
92111000 921c6000   VSTCNXT3 VSTCNXT3.SYS Thu Oct 16 03:29:13 2008 (48F68AD9)
9200f000 92111000   VSTDPV3  VSTDPV3.SYS  Thu Oct 16 03:32:04 2008 (48F68B84)
8ec0e000 8ec21000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
8ed6b000 8ed78000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
85a0c000 85a7d000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
85a7d000 85a8b000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8edda000 8ede1000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
95b00000 95d4b000   win32k   win32k.sys   Wed Sep 01 05:34:29 2010 (4C7DBBB5)
9175f000 91774000   winbondcir winbondcir.sys Wed Mar 28 08:51:32 2007 (460A0264)
917e2000 917eb000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:19:16 2009 (4A5BC0F4)
85ad3000 85adc000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
92200000 9221a000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)

Unloaded modules:
9f0fe000 9f168000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
9b1c7000 9b1df000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00018000
865ec000 865f9000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
8ec26000 8ed00000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  000DA000
8ed00000 8ed11000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
My System SpecsSystem Spec
26 Oct 2010   #5

Windows 7 Ultimate
 
 
Checklist

I haven't uninstalled Avast as of yet. Is this really a must? It has been an incredibly reliable product for me and hasnt caused any issues in the past :S


Quote   Quote: Originally Posted by cybercore View Post
C:\Program Files\Rappelz\GameGuard\
Gameguard - Disable or remove
I have uninstalled this since the Gameguard (As much as a bloody nightmare as it is, is essential to play this game) Maybe a reinstall combined with the following alterations will resolve the Bluescreen upon launch.

Quote   Quote: Originally Posted by cybercore View Post
netw5v32.sys
Intel® Wireless WiFi Link Adapter
Recently updated only a couple of days ago.

Quote   Quote: Originally Posted by cybercore View Post
b57nd60x.sys Sun Apr 26 14:15:34 2009
Broadcom NetXtreme Gigabit Ethernet Driver
I have uninstalled the modem through the device manager but cannot find any other.

Quote   Quote: Originally Posted by cybercore View Post
DKbFltr.sys Thu Mar 26 05:10:12 2009
Dritek 64-bit PS/2 Keyboard
Keyboard was auto insalled via windows update. I have no idea why this was 64-bit or included such. However, uninstalled all and Windows update downloaded defaults.

Quote   Quote: Originally Posted by cybercore View Post
iaStor.sys Fri Jun 05 04:42:33 2009
Intel Matrix Storage
Two instances. Since the latest driver was from 2009 I just uninstalled both.

Quote   Quote: Originally Posted by cybercore View Post
mdvrmng.sys Mon May 28 17:37:13 2007
SmartRoaming Client - update or remove
I need help with this. I cannot find any means of locating or uninstalling this. Could you please point me in the right direction?

Quote   Quote: Originally Posted by cybercore View Post
rimsptsk.sys Thu Jun 25 10:10:46 2009
Ricoh Memorystick Controller
Updated driver software.

Quote   Quote: Originally Posted by cybercore View Post
RTKVHDA.sys Thu Jul 23 12:55:58 2009
Realtek Audio
Updated driver software via download from Realtek since Windows update didn't find any better driver. Manual install of driver dated this month.

Quote   Quote: Originally Posted by cybercore View Post
SCDEmu.SYS Mon Nov 09 05:21:19 2009
PowerISO
Uninstalled.

Quote   Quote: Originally Posted by cybercore View Post
SynTP.sys Wed May 09 22:16:25 2007
Synaptics Touchpad
Uninstalled.

Quote   Quote: Originally Posted by cybercore View Post
tdrpm251.sys Fri Jul 31 17:00:11 2009
Acronis Try&Decide
Uninstalled.

Quote   Quote: Originally Posted by cybercore View Post
timntr.sys Mon Aug 17 10:16:54 2009
Acronis True Image
Uninstalled.

Quote   Quote: Originally Posted by cybercore View Post
VSTCNXT3.SYS Thu Oct 16 03:29:13 2008
Conexant SoftK56 Modem
I cannot find this either. Could you please point me as to where I might find it?

Quote   Quote: Originally Posted by cybercore View Post
winbondcir.sys Wed Mar 28 08:51:32 2007
Winbond CIR Transceiver Winbond Electronics Corporation
Likewise I cannot find this. Could you please point me as to where I might find it?


I have quoted your advice and listed all my actions taken in every instance you mentioned.

My computer maker is Acer and they are terrible for keeping on their drivers. I have even had to use a manually made (by whom I dont know) PowerMizer switch for my NVidia driver.

This is to disable the powermizer since when its active it is making my laptop screen flicker and fuzz every few seconds. (NVidia 8600M GT (512mb)

I will reinstall Rappelz, try and run it and let you know of any change.

In the meantime, I thank you so very, very much for all your time and help.

You guys are great
My System SpecsSystem Spec
26 Oct 2010   #6

Windows 7 x64
 
 

BSOD are caused by a) drivers b) hardware.

Avast was involved in one of your crashes. MSE is really BSOD proof and works with anything, not resulting in crashes. But if you're still getting crashes it's a must do to uninstall Avast. Also make sure you use only 1 AV system, as mixing them occasionally results in BSODs.

You want:

1. Only 1 AV system year 2010, preferably MSE as it doesn't bsod

2. Up to date drivers, no later than 2009 preferably 2010





Winbond Electronics Corporation
Winbond - Technical Support
I don't know, not familiar with this one. Locate it in Programs and Components and uninstall - your version is outdated.


SmartRoaming Client - if this is a Trend Micro product then uninstall it. It caused one of your crashes.


Intel Matrix Storage - the latest version is 2010.


Dritek 64-bit PS/2 Keyboard - not sure about this one, leave it as it is for now.


Broadcom NetXtreme Gigabit Ethernet Driver - just leave it as it is if no updates for it. Check here Broadcom.com - Downloads & Support.


Gameguard - it just happenned to cause a couple of your crashes. Later if it's all stable you can try it again.
My System SpecsSystem Spec
Reply

 BSOD Suspect: Isolated




Thread Tools



Similar help and support threads for2: BSOD Suspect: Isolated
Thread Forum
BSOD, suspect it's RAM - 0x00001a MEMORY_MANAGEMENT BSOD Help and Support
BSOD I suspect product 768_1 BSOD Help and Support
BSOD, i suspect hal.dll may be the cause BSOD Help and Support
BSOD 0x000000F4 - I suspect SSD BSOD Help and Support
BSOD with KMPlayer (I suspect) BSOD Help and Support
BSOD, Suspect Video Card BSOD Help and Support
New BSOD after format. ntoskrnl suspect BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 12:36 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33