W. 7 Ultimate x64 Crashes


  1. Posts : 16
    Window 7 professional x64
       #1

    W. 7 Ultimate x64 Crashes


    Please help
    I keep getting BSOD over again and again.

    Is Windows 7 . . .
    - x86 (32-bit) or x64 ? x64
    - the original installed OS on the system? self built computer and i installed window xp first
    - an OEM or full retail version? full retail i believe
    - OEM = came pre-installed on system
    - Full Retail = you purchased it from retailer

    - What is the age of system (hardware)? i bought all the components 9 months ago
    - What is the age of OS installation (have you re-installed the OS?) just reinstalled again because of bsod.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    Update drivers:

    mv61xx.sys Thu Mar 19 23:48:21 2009
    Marvell Thor

    Rt64win7.sys Fri May 22 10:52:30 2009
    Realtek 8136/8168/8169 PCI/PCIe Adapter

    viahduaa.sys Tue Jun 02 04:55:21 2009
    VIA Audio



    If crashes persist after the driver updates, check RAM settings in BIOS and run memtest overnight:

    RAM - Test with Memtest86+




    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121710-36691-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02e5b000 PsLoadedModuleList = 0xfffff800`03098e50
    Debug session time: Sat Dec 18 01:40:45.617 2010 (UTC - 5:00)
    System Uptime: 0 days 5:30:46.365
    Loading Kernel Symbols
    ...............................................................
    ...............Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
    Unable to add module at 00000000`00000000
    
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80002ed318e}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80002ed318e
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  MOM.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002ecc469 to fffff80002eccf00
    
    STACK_TEXT:  
    fffff880`02fdace8 fffff800`02ecc469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02fdacf0 fffff800`02eca932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02fdae30 fffff800`02ed318e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`06a8ffd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext_PatchXSave+0x8b
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02eca932 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121710-25989-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02e19000 PsLoadedModuleList = 0xfffff800`03056e50
    Debug session time: Sat Dec 18 02:00:35.094 2010 (UTC - 5:00)
    System Uptime: 0 days 0:10:14.826
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {20, fffffa80061f4090, fffffa80061f40d0, 4040009}
    
    Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_DereferenceDeviceHandle+ff )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000020, a pool block header size is corrupt.
    Arg2: fffffa80061f4090, The pool entry we were looking for within the page.
    Arg3: fffffa80061f40d0, The next pool entry.
    Arg4: 0000000004040009, (reserved)
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_20
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c10e0
     fffffa80061f4090 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002fbc6d3 to fffff80002e8af00
    
    STACK_TEXT:  
    fffff880`02ffda08 fffff800`02fbc6d3 : 00000000`00000019 00000000`00000020 fffffa80`061f4090 fffffa80`061f40d0 : nt!KeBugCheckEx
    fffff880`02ffda10 fffff880`03f8b557 : 00000000`54627255 00000000`000000e0 fffffa80`70627375 fffffa80`051701a0 : nt!ExFreePool+0xda4
    fffff880`02ffdac0 fffff880`03f765bc : fffffa80`05170050 fffffa80`04ae2302 00000000`00000000 fffffa80`051701a0 : USBPORT!USBPORT_DereferenceDeviceHandle+0xff
    fffff880`02ffdb20 fffff880`03f76ab7 : fffffa80`03b95c02 fffffa80`04fd3500 00000000`ffffffff fffffa80`05170ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x9f8
    fffff880`02ffdc00 fffff880`03f7464f : fffffa80`05170ea8 fffffa80`051701a0 fffffa80`05171040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
    fffff880`02ffdc60 fffff880`03f65f89 : fffffa80`05170050 00000000`00000000 fffffa80`05170e02 fffffa80`05170ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
    fffff880`02ffdca0 fffff800`02e965dc : fffff880`02fd5180 fffffa80`05170ea8 fffffa80`05170ec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
    fffff880`02ffdcd0 fffff800`02e936fa : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`03f65db0 : nt!KiRetireDpcList+0x1bc
    fffff880`02ffdd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    USBPORT!USBPORT_DereferenceDeviceHandle+ff
    fffff880`03f8b557 8a5c2468        mov     bl,byte ptr [rsp+68h]
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  USBPORT!USBPORT_DereferenceDeviceHandle+ff
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: USBPORT
    
    IMAGE_NAME:  USBPORT.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc07
    
    FAILURE_BUCKET_ID:  X64_0x19_20_USBPORT!USBPORT_DereferenceDeviceHandle+ff
    
    BUCKET_ID:  X64_0x19_20_USBPORT!USBPORT_DereferenceDeviceHandle+ff
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121810-20763-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02e09000 PsLoadedModuleList = 0xfffff800`03046e50
    Debug session time: Sat Dec 18 12:36:03.102 2010 (UTC - 5:00)
    System Uptime: 0 days 0:12:45.850
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8004beb3e76, 1, fffff80002eb3cb6, 5}
    
    
    Could not read faulting driver name
    Probably caused by : hardware ( nt!RtlInitializeExtendedContext+3a )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8004beb3e76, memory referenced.
    Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
    Arg3: fffff80002eb3cb6, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b10e0
     fffff8004beb3e76 
    
    FAULTING_IP: 
    nt!RtlInitializeExtendedContext+3a
    fffff800`02eb3cb6 8325b90100498d  and     dword ptr [fffff800`4beb3e76],0FFFFFF8Dh
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  Launch.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880062dd1e0 -- (.trap 0xfffff880062dd1e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000000000000000f rbx=0000000000000000 rcx=0000000000100000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002eb3cb6 rsp=fffff880062dd370 rbp=fffff880062dd8d0
     r8=fffff880062dd3b8  r9=0000000000010040 r10=000000000011001f
    r11=fffff880062dd3d0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!RtlInitializeExtendedContext+0x3a:
    fffff800`02eb3cb6 8325b90100498d  and     dword ptr [fffff800`4beb3e76],0FFFFFF8Dh ds:0001:fffff800`4beb3e76=????????
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff880062ddb78 -- (.exr 0xfffff880062ddb78)
    ExceptionAddress: 0000000005f068ac
       ExceptionCode: 10000004
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 0000000000000151
    
    MISALIGNED_IP: 
    nt!RtlInitializeExtendedContext+3a
    fffff800`02eb3cb6 8325b90100498d  and     dword ptr [fffff800`4beb3e76],0FFFFFF8Dh
    
    LAST_CONTROL_TRANSFER:  from fffff80002ef8b91 to fffff80002e7af00
    
    STACK_TEXT:  
    fffff880`062dd078 fffff800`02ef8b91 : 00000000`00000050 fffff800`4beb3e76 00000000`00000001 fffff880`062dd1e0 : nt!KeBugCheckEx
    fffff880`062dd080 fffff800`02e78fee : 00000000`00000001 fffff880`062ddb78 00000000`00000000 ffffdc66`a9171c5e : nt! ?? ::FNODOBFM::`string'+0x40f5b
    fffff880`062dd1e0 fffff800`02eb3cb6 : fffff880`062dd500 00000000`00000200 fffff880`062dda40 00000000`00000000 : nt!KiPageFault+0x16e
    fffff880`062dd370 fffff800`02eb5130 : fffff880`062ddb78 fffff880`062ddc20 fffff900`c2c31000 00000000`00000001 : nt!RtlInitializeExtendedContext+0x3a
    fffff880`062dd3a0 fffff800`02e7a542 : fffff880`062ddb78 00000000`00000035 fffff880`062ddc20 00000000`17880530 : nt!KiDispatchException+0xb0
    fffff880`062dda40 fffff800`02e790ba : 00000000`00000000 00000000`00000035 00000000`11569401 00000000`7efdb000 : nt!KiExceptionDispatch+0xc2
    fffff880`062ddc20 00000000`05f068ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
    00000000`0018efd4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x5f068ac
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!RtlInitializeExtendedContext+3a
    fffff800`02eb3cb6 8325b90100498d  and     dword ptr [fffff800`4beb3e76],0FFFFFF8Dh
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!RtlInitializeExtendedContext+3a
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: hardware
    
    FAILURE_BUCKET_ID:  X64_IP_MISALIGNED
    
    BUCKET_ID:  X64_IP_MISALIGNED
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121810-17503-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02e4d000 PsLoadedModuleList = 0xfffff800`0308ae50
    Debug session time: Sat Dec 18 12:54:54.088 2010 (UTC - 5:00)
    System Uptime: 0 days 0:17:17.821
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {3, fffff8a00c454650, fffff8a00c444650, fffff8a00c454650}
    
    Probably caused by : Pool_Corruption ( nt!ExFreePool+75b )
    
    Followup: Pool_corruption
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000003, the pool freelist is corrupt.
    Arg2: fffff8a00c454650, the pool entry being checked.
    Arg3: fffff8a00c444650, the read back flink freelist value (should be the same as 2).
    Arg4: fffff8a00c454650, the read back blink freelist value (should be the same as 2).
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  Launch.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002ff010b to fffff80002ebef00
    
    STACK_TEXT:  
    fffff880`06cd04b8 fffff800`02ff010b : 00000000`00000019 00000000`00000003 fffff8a0`0c454650 fffff8a0`0c444650 : nt!KeBugCheckEx
    fffff880`06cd04c0 fffff800`02ff24c1 : 00000000`00000001 fffff8a0`0d07a260 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x75b
    fffff880`06cd0550 fffff880`0401ac83 : fffff8a0`07dbc4e0 00000000`00000000 00000000`6d4d6956 00000000`00000174 : nt!ExFreePoolWithTag+0x411
    fffff880`06cd0600 fffff880`0400198f : fffffa80`0419db40 fffff8a0`03f91470 fffffa80`05ae8000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::DestroyOneAllocation+0x2ab
    fffff880`06cd06e0 fffff880`04119fb3 : 00000000`00000000 00000000`00000000 fffff8a0`07999000 00000000`00000174 : dxgmms1!VidMmDestroyAllocation+0x4f
    fffff880`06cd0710 fffff880`0411954b : fffff8a0`07999000 00000000`00000000 fffff8a0`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x5eb
    fffff880`06cd0800 fffff880`04119825 : fffff8a0`07999000 fffff8a0`07999000 00000000`00000001 00000000`00000000 : dxgkrnl!DXGDEVICE::ProcessTerminationList+0xa3
    fffff880`06cd0850 fffff880`0411d6e0 : fffff8a0`09de4300 fffff880`06cd0ca0 fffffa80`05ac8000 fffff880`040e43af : dxgkrnl!DXGDEVICE::TerminateAllocations+0xb9
    fffff880`06cd08a0 fffff880`0411fd9b : fffff8a0`07999000 fffff880`06cd09b0 00000000`7efdb001 fffff880`040e5001 : dxgkrnl!DXGDEVICE::DestroyAllocation+0x448
    fffff880`06cd0930 fffff960`0027b242 : 00000000`0008e1b0 fffffa80`04255b60 00000000`00000020 00000000`737e5f08 : dxgkrnl!DxgkDestroyAllocation+0x9bf
    fffff880`06cd0bf0 fffff800`02ebe153 : 00000000`08412e70 fffff880`06cd0ca0 00000000`00000000 00000000`08430ca0 : win32k!NtGdiDdDDIDestroyAllocation+0x12
    fffff880`06cd0c20 00000000`7380120a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0008e2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7380120a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExFreePool+75b
    fffff800`02ff010b cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!ExFreePool+75b
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExFreePool+75b
    
    BUCKET_ID:  X64_0x19_3_nt!ExFreePool+75b
    
    Followup: Pool_corruption
    ---------


    Drivers:

    Code:
    start             end                 module name
    fffff880`040a3000 fffff880`040e1000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00f5b000 fffff880`00fb2000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c93000 fffff880`02d1d000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03fb3000 fffff880`03fc9000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`03f53000 fffff880`03f68000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`010f6000 fffff880`01101000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`041f2000 fffff880`041fa000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
    fffff880`07c8b000 fffff880`07c96000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00e9a000 fffff880`00ea3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00d9e000 fffff880`00dc8000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`04594000 fffff880`045b4000   AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
    fffff880`04801000 fffff880`04ff6000   atikmdag atikmdag.sys Tue Oct 26 22:29:53 2010 (4CC78EA1)
    fffff880`03f68000 fffff880`03fb3000   atikmpag atikmpag.sys Tue Oct 26 22:14:23 2010 (4CC78AFF)
    fffff880`01964000 fffff880`0196c000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
    fffff960`00830000 fffff960`00891000   ATMFD    ATMFD.DLL    Mon Jul 13 19:38:13 2009 (4A5BC565)
    fffff880`019d5000 fffff880`019dc000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03f1c000 fffff880`03f2d000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`03bdc000 fffff880`03bfa000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`006e0000 fffff960`00707000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
    fffff880`019a2000 fffff880`019cc000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cb4000 fffff880`00d74000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01934000 fffff880`01964000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c56000 fffff880`00cb4000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`03e62000 fffff880`03e72000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`045f1000 fffff880`045ff000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03e7b000 fffff880`03efe000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03efe000 fffff880`03f1c000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02c68000 fffff880`02c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0191e000 fffff880`01934000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04400000 fffff880`04422000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`03e72000 fffff880`03e7b000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0196c000 fffff880`01978000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01978000 fffff880`0198b000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05fe6000 fffff880`05ff2000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`040e2000 fffff880`041d6000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
    fffff880`04000000 fffff880`04046000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`0114d000 fffff880`01161000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01101000 fffff880`0114d000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`018e4000 fffff880`0191e000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`015b2000 fffff880`015fc000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02e04000 fffff800`02e4d000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04046000 fffff880`0406a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`05e2d000 fffff880`05e46000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05e46000 fffff880`05e4e080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05e1f000 fffff880`05e2d000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`03b14000 fffff880`03bdc000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`018db000 fffff880`018e4000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`011ee000 fffff880`011fd000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05ff2000 fffff880`06000000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00b9f000 fffff800`00ba9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`044d0000 fffff880`04513000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
    fffff880`04422000 fffff880`04427200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0198b000 fffff880`019a0000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04453000 fffff880`04476000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c35000 fffff880`00c42000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`04445000 fffff880`04453000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`00c1a000 fffff880`00c29000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`04428000 fffff880`04435000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00d84000 fffff880`00d9e000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03a00000 fffff880`03a18000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03a18000 fffff880`03a44000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
    fffff880`03a44000 fffff880`03a91000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
    fffff880`03a91000 fffff880`03ab4000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
    fffff880`014a4000 fffff880`014af000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fbb000 fffff880`00fc5000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01161000 fffff880`011bf000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`018c9000 fffff880`018db000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01081000 fffff880`010c7000   mv61xx   mv61xx.sys   Thu Mar 19 23:48:21 2009 (49C31205)
    fffff880`014c0000 fffff880`015b2000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03fed000 fffff880`03ff9000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`011bf000 fffff880`011ee000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0457f000 fffff880`04594000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d91000 fffff880`02da0000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d1d000 fffff880`02d62000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`014af000 fffff880`014c0000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02e4d000 fffff800`0342a000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
    fffff880`0125a000 fffff880`013fd000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`019cc000 fffff880`019d5000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02d6b000 fffff880`02d91000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00e0d000 fffff880`00e22000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00fc5000 fffff880`00ff8000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e93000 fffff880`00e9a000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00d74000 fffff880`00d84000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`054a4000 fffff880`0554a000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`04435000 fffff880`04445000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
    fffff880`045b4000 fffff880`045f1000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c42000 fffff880`00c56000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03fc9000 fffff880`03fed000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`02c77000 fffff880`02c92000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`00dc8000 fffff880`00de9000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`00c00000 fffff880`00c1a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`02dec000 fffff880`02df7000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`019ea000 fffff880`019f3000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019f3000 fffff880`019fc000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0149b000 fffff880`014a4000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0188f000 fffff880`018c9000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`03afc000 fffff880`03b14000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0406a000 fffff880`040a3000   Rt64win7 Rt64win7.sys Fri May 22 10:52:30 2009 (4A16BC2E)
    fffff880`010c7000 fffff880`010f6000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`0554a000 fffff880`05555000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`03e56000 fffff880`03e62000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02da0000 fffff880`02dbd000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01887000 fffff880`0188f000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05400000 fffff880`05498000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
    fffff880`05594000 fffff880`055fd000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
    fffff880`05555000 fffff880`05582000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
    fffff880`041fa000 fffff880`041fb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`05582000 fffff880`05594000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01073000 fffff880`01080000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01235000 fffff880`01253000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02dd8000 fffff880`02dec000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00580000 fffff960`0058a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03f2d000 fffff880`03f53000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04476000 fffff880`044ca000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
    fffff880`04513000 fffff880`04525000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05e00000 fffff880`05e1d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05e1d000 fffff880`05e1ef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`041e1000 fffff880`041f2000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04525000 fffff880`0457f000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`041d6000 fffff880`041e1000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03e00000 fffff880`03e56000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00e00000 fffff880`00e0d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019dc000 fffff880`019ea000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`05e55000 fffff880`05fe6000   viahduaa viahduaa.sys Tue Jun 02 04:55:21 2009 (4A24E8F9)
    fffff880`01800000 fffff880`01825000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`0148b000 fffff880`0149b000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00e22000 fffff880`00e37000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e37000 fffff880`00e93000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`0183b000 fffff880`01887000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02dbd000 fffff880`02dd8000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01825000 fffff880`01835000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ea8000 fffff880`00f4c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f4c000 fffff880`00f5b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d62000 fffff880`02d6b000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000f0000 fffff960`003ff000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
    fffff880`04ff6000 fffff880`04fff000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00fb2000 fffff880`00fbb000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    
    Unloaded modules:
    fffff880`07c1a000 fffff880`07c8b000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`0196c000 fffff880`0197a000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0197a000 fffff880`01986000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01986000 fffff880`0198f000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`0198f000 fffff880`019a2000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 07:27.
Find Us