Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Frequest BSODs and Crashing Programs

23 Dec 2010   #1
Doku

Windows 7 Home Premium x64
 
 
Frequest BSODs and Crashing Programs

Hi!

I'm experiencing frequent crashes on my desktop and I'd be grateful if someone can help me out.

These crashes have always been there. I've tried reinstalling Windows twice, updates Windows and all my drivers, and even ran a registry cleanup.

I'm also experiencing some instability in some programs especially web browsers (firefox, chrome, IE) they seem to crash very often so that may or may not be related to the BSODs.

Specs:
Processor: Intel Quad Core 2
Motherboard: Asus P5P43TD
RAM: G Skill 4GB
Graphics Card: ATI HD5830
OS: Windows 7 - 64 bit Home

I'm using an assembled desktop so the windows installation was carried out by myself.

So, um... help?


My System SpecsSystem Spec
.
23 Dec 2010   #2
cybercore

Windows 7 x64
 
 

Happy New Year,

could you give us some info we need:

http://www.sevenforums.com/crashes-d...tructions.html
My System SpecsSystem Spec
23 Dec 2010   #3
Doku

Windows 7 Home Premium x64
 
 

Yeah sorry for that.

Attached it in this post.
My System SpecsSystem Spec
.

23 Dec 2010   #4
cybercore

Windows 7 x64
 
 

DISABLE the Driver Verifier.

Update the causer of your crashes, Realtek 8180/8185 Wireless:

RTL85n64.sys Fri Oct 16 03:25:11 2009


Update your network and keyboard drivers too:

L1E62x64.sys Sun Aug 23 01:08:09 2009
Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller(NDIS6.20)

Lycosa.sys Fri Jan 18 03:51:42 2008
Razer Tarantula Keyboard



If BSOD's reoccur after the updates, remove Avast and install MSE:

avast! Uninstall Utility

https://www.microsoft.com/security_essentials/



Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\122310-27939-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a53000 PsLoadedModuleList = 0xfffff800`02c90e50
Debug session time: Wed Dec 22 15:09:21.042 2010 (UTC - 5:00)
System Uptime: 0 days 7:51:12.509
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\RTL85n64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTL85n64.sys
*** ERROR: Module load completed but symbols could not be loaded for RTL85n64.sys
Probably caused by : nwifi.sys ( nwifi!EtwEx_tidActivityInfoTransfer+1ac )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+6436323963333630
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  RtWLan.exe

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000ba2a08 -- (.exr 0xfffff80000ba2a08)
ExceptionAddress: fffff8800158945c (ndis!ndisMSendCompleteNetBufferListsInternal+0x00000000000000fc)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: ffffffffffffffff
   Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000

TRAP_FRAME:  fffff80000ba2ab0 -- (.trap 0xfffff80000ba2ab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800158945c rsp=fffff80000ba2c40 rbp=fffef9800f3c88d0
 r8=0000000000000000  r9=fffef9800f3c88d0 r10=0000000000000000
r11=0000000001a290b5 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ndis!ndisMSendCompleteNetBufferListsInternal+0xfc:
fffff880`0158945c 488b8d90050000  mov     rcx,qword ptr [rbp+590h] ss:0018:fffef980`0f3c8e60=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002abb46e to fffff80002ac3710

STACK_TEXT:  
fffff800`00ba1af8 fffff800`02abb46e : fffffa80`0397a9f0 fffff800`02f57f6d fffff800`00ba2270 fffff800`02af0668 : nt!KeBugCheck
fffff800`00ba1b00 fffff800`02ae940d : fffff800`02cd1b7c fffff800`02c0be84 fffff800`02a53000 fffff800`00ba2a08 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00ba1b30 fffff800`02af0a90 : fffff800`02c12a40 fffff800`00ba1ba8 fffff800`00ba2a08 fffff800`02a53000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00ba1b60 fffff800`02afd9ef : fffff800`00ba2a08 fffff800`00ba2270 fffff800`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
fffff800`00ba2240 fffff800`02ac2d82 : fffff800`00ba2a08 00000000`00000000 fffff800`00ba2ab0 fffffa80`058af1a0 : nt!KiDispatchException+0x16f
fffff800`00ba28d0 fffff800`02ac1552 : fffff6fc`c0328690 fffff800`02f56dfe fffff800`00ba2ac0 fffff800`00b9d000 : nt!KiExceptionDispatch+0xc2
fffff800`00ba2ab0 fffff880`0158945c : fffff980`650d2e90 fffff800`02f678ef fffff880`03b50ea0 00000000`00000300 : nt!KiStackFault+0x112
fffff800`00ba2c40 fffff880`038fbeb0 : fffffa80`00000000 fffff980`20904d30 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0xfc
fffff800`00ba2ce0 fffff880`038f7f58 : 00000000`00000000 fffffa80`050244f0 00000000`00000000 fffff880`03b4fe8c : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
fffff800`00ba2d30 fffff880`038fb860 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`03b84dac : nwifi!Dot11SendCompletion+0x44
fffff800`00ba2d60 fffff880`015895ad : fffffa80`058af1a0 00000000`00000000 fffff980`51a04fe0 fffff980`1f93ef50 : nwifi!Pt6SendComplete+0x28
fffff800`00ba2d90 fffff880`03b4c1af : fffff980`0bbf0ca0 00000000`00000000 fffffa80`058af1a0 fffffa80`058af1a0 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff800`00ba2dd0 fffff980`0bbf0ca0 : 00000000`00000000 fffffa80`058af1a0 fffffa80`058af1a0 fffffa80`05cc54c0 : RTL85n64+0xcf1af
fffff800`00ba2dd8 00000000`00000000 : fffffa80`058af1a0 fffffa80`058af1a0 fffffa80`05cc54c0 fffff880`0155a759 : 0xfffff980`0bbf0ca0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nwifi!EtwEx_tidActivityInfoTransfer+1ac
fffff880`038fbeb0 f0838348130000ff lock add dword ptr [rbx+1348h],0FFFFFFFFh

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  nwifi!EtwEx_tidActivityInfoTransfer+1ac

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nwifi

IMAGE_NAME:  nwifi.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc3b

FAILURE_BUCKET_ID:  X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac

BUCKET_ID:  X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\122110-41589-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a0e000 PsLoadedModuleList = 0xfffff800`02c4be50
Debug session time: Tue Dec 21 10:59:16.733 2010 (UTC - 5:00)
System Uptime: 0 days 2:38:46.201
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\RTL85n64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTL85n64.sys
*** ERROR: Module load completed but symbols could not be loaded for RTL85n64.sys
Probably caused by : nwifi.sys ( nwifi!EtwEx_tidActivityInfoTransfer+1ac )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+6366393030376137
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002f1b798 -- (.exr 0xfffff88002f1b798)
ExceptionAddress: fffff8800157345c (ndis!ndisMSendCompleteNetBufferListsInternal+0x00000000000000fc)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: ffffffffffffffff
   Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000

TRAP_FRAME:  fffff88002f1b840 -- (.trap 0xfffff88002f1b840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800157345c rsp=fffff88002f1b9d0 rbp=fffef9800eaaa8d0
 r8=0000000000000000  r9=fffef9800eaaa8d0 r10=0000000000000000
r11=00000000002500e2 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ndis!ndisMSendCompleteNetBufferListsInternal+0xfc:
fffff880`0157345c 488b8d90050000  mov     rcx,qword ptr [rbp+590h] ss:0018:fffef980`0eaaae60=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a7646e to fffff80002a7e710

STACK_TEXT:  
fffff880`02f1a888 fffff800`02a7646e : fffffa80`039784f0 fffff800`02f12f6d fffff880`02f1b000 fffff800`02aab668 : nt!KeBugCheck
fffff880`02f1a890 fffff800`02aa440d : fffff800`02c8cb7c fffff800`02bc6e84 fffff800`02a0e000 fffff880`02f1b798 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f1a8c0 fffff800`02aaba90 : fffff800`02bcdb14 fffff880`02f1a938 fffff880`02f1b798 fffff800`02a0e000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f1a8f0 fffff800`02ab89ef : fffff880`02f1b798 fffff880`02f1b000 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
fffff880`02f1afd0 fffff800`02a7dd82 : fffff880`02f1b798 00000000`00000000 fffff880`02f1b840 fffffa80`0584c1a0 : nt!KiDispatchException+0x16f
fffff880`02f1b660 fffff800`02a7c552 : fffff6fc`c00c5c80 fffff800`02f11dfe fffff880`02f1b850 fffff880`02f16000 : nt!KiExceptionDispatch+0xc2
fffff880`02f1b840 fffff880`0157345c : fffff980`18b90e90 fffff800`02f228ef fffff880`0413fea0 00000000`00000000 : nt!KiStackFault+0x112
fffff880`02f1b9d0 fffff880`03ab5eb0 : fffffa80`00000000 fffff980`10df2d30 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0xfc
fffff880`02f1ba70 fffff880`03ab1f58 : 00000000`00000000 fffffa80`06184050 00000000`00000000 fffff880`0413ee8c : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
fffff880`02f1bac0 fffff880`03ab5860 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`04173dac : nwifi!Dot11SendCompletion+0x44
fffff880`02f1baf0 fffff880`015735ad : fffffa80`0584c1a0 00000000`00000000 fffff980`1bbf4fe0 fffff980`0c840f50 : nwifi!Pt6SendComplete+0x28
fffff880`02f1bb20 fffff880`0413b1af : fffff980`0b9f0ca0 00000000`00000000 fffffa80`0584c1a0 fffffa80`0584c1a0 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff880`02f1bb60 fffff980`0b9f0ca0 : 00000000`00000000 fffffa80`0584c1a0 fffffa80`0584c1a0 fffffa80`05bdd580 : RTL85n64+0xcf1af
fffff880`02f1bb68 00000000`00000000 : fffffa80`0584c1a0 fffffa80`0584c1a0 fffffa80`05bdd580 00000000`00000000 : 0xfffff980`0b9f0ca0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nwifi!EtwEx_tidActivityInfoTransfer+1ac
fffff880`03ab5eb0 f0838348130000ff lock add dword ptr [rbx+1348h],0FFFFFFFFh

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  nwifi!EtwEx_tidActivityInfoTransfer+1ac

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nwifi

IMAGE_NAME:  nwifi.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc3b

FAILURE_BUCKET_ID:  X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac

BUCKET_ID:  X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\122210-31605-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
Debug session time: Wed Dec 22 07:17:25.562 2010 (UTC - 5:00)
System Uptime: 0 days 0:16:19.404
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80002d25c06, 0, 0, fffff80002aae7a2}

Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+122 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80002d25c06, memory referenced
Arg2: 0000000000000000, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002aae7a2, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb90e0
 fffff80002d25c06 

CURRENT_IRQL:  0

FAULTING_IP: 
nt!RtlDispatchException+122
fffff800`02aae7a2 410fb60c24      movzx   ecx,byte ptr [r12]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  wuauclt.exe

TRAP_FRAME:  fffff880033627c0 -- (.trap 0xfffff880033627c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80002ca11ec rbx=0000000000000000 rcx=fffff80002d25c44
rdx=fffff80002d25bac rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aae7a2 rsp=fffff88003362950 rbp=fffff880033637f8
 r8=0000000000002029  r9=0000000000002029 r10=fffff88003363d00
r11=fffff88003362998 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlDispatchException+0x122:
fffff800`02aae7a2 410fb60c24      movzx   ecx,byte ptr [r12] ds:00000000`00000000=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a80ca9 to fffff80002a81740

STACK_TEXT:  
fffff880`03362678 fffff800`02a80ca9 : 00000000`0000000a fffff800`02d25c06 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`03362680 fffff800`02a7f920 : 00000000`00000000 00000000`0000005a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`033627c0 fffff800`02aae7a2 : fffff800`02d25c06 fffff880`03362998 fffff880`033637f8 fffff800`02a11000 : nt!KiPageFault+0x260
fffff880`03362950 fffff800`02abb9ef : fffff880`033637f8 fffff880`03363060 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`03363030 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16f


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!RtlDispatchException+122
fffff800`02aae7a2 410fb60c24      movzx   ecx,byte ptr [r12]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!RtlDispatchException+122

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_VRF_nt!RtlDispatchException+122

BUCKET_ID:  X64_0xA_VRF_nt!RtlDispatchException+122

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\122310-28470-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a05000 PsLoadedModuleList = 0xfffff800`02c42e50
Debug session time: Wed Dec 22 15:13:44.092 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:41.559
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff80002ba88c7, fffff880031a1878, fffff880031a10e0}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+14d3 )

Followup: Pool_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ba88c7, The address that the exception occurred at
Arg3: fffff880031a1878, Exception Record Address
Arg4: fffff880031a10e0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!ExDeferredFreePool+14d3
fffff800`02ba88c7 4c3910          cmp     qword ptr [rax],r10

EXCEPTION_RECORD:  fffff880031a1878 -- (.exr 0xfffff880031a1878)
ExceptionAddress: fffff80002ba88c7 (nt!ExDeferredFreePool+0x00000000000014d3)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880031a10e0 -- (.cxr 0xfffff880031a10e0)
rax=fffef8a00284ec40 rbx=fffff8a0028bc150 rcx=0000000000000541
rdx=fffff8a0028bc190 rsi=fffffa80039fcb60 rdi=fffffa800397d148
rip=fffff80002ba88c7 rsp=fffff880031a1ab0 rbp=0000000000000000
 r8=0000000000000001  r9=fffff8a0028bc1a0 r10=fffff8a0028bc1a0
r11=000000000000010d r12=0000000000000001 r13=fffff8a0028bc160
r14=0000000000000000 r15=fffffa800397d140
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ExDeferredFreePool+0x14d3:
fffff800`02ba88c7 4c3910          cmp     qword ptr [rax],r10 ds:002b:fffef8a0`0284ec40=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cad0e0
 ffffffffffffffff 

FOLLOWUP_IP: 
nt!ExDeferredFreePool+14d3
fffff800`02ba88c7 4c3910          cmp     qword ptr [rax],r10

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff80002d69bfe to fffff80002ba88c7

STACK_TEXT:  
fffff880`031a1ab0 fffff800`02d69bfe : 00000000`936c134e 00000000`00000200 fffff8a0`624e4d43 00000000`00000000 : nt!ExDeferredFreePool+0x14d3
fffff880`031a1b60 fffff800`02d69ac8 : fffff8a0`00c856f8 00000000`00000001 fffff8a0`00022010 ffffffff`ffffffff : nt!CmpDereferenceNameControlBlockWithLock+0xd6
fffff880`031a1b90 fffff800`02d68400 : 00000000`00000000 fffff800`02d6855d 00000000`624e4d43 00000000`00010216 : nt!CmpCleanUpKcbCacheWithLock+0x34
fffff880`031a1bc0 fffff800`02d6860b : 00000000`00000000 00000000`00000001 fffff8a0`00022010 00000000`00000001 : nt!CmpDereferenceKeyControlBlockWithLock+0x150
fffff880`031a1bf0 fffff800`02d689c4 : 00000000`00000000 00000000`00000001 fffff8a0`00022010 fffffa80`039fcb60 : nt!CmpDereferenceKeyControlBlock+0x11f
fffff880`031a1c40 fffff800`02a82961 : fffff800`02d688dc fffff800`02c1a5f8 fffffa80`039fcb60 00000000`00000000 : nt!CmpDelayDerefKCBWorker+0xe8
fffff880`031a1c70 fffff800`02d19c06 : 00000000`00000bec fffffa80`039fcb60 00000000`00000080 fffffa80`039e3040 : nt!ExpWorkerThread+0x111
fffff880`031a1d00 fffff800`02a53c26 : fffff880`02f64180 fffffa80`039fcb60 fffff880`02f6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031a1d40 00000000`00000000 : fffff880`031a2000 fffff880`0319c000 fffff880`031a15a0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExDeferredFreePool+14d3

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff880031a10e0 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_VRF_nt!ExDeferredFreePool+14d3

BUCKET_ID:  X64_0x7E_VRF_nt!ExDeferredFreePool+14d3

Followup: Pool_corruption
---------


Drivers:

Code:
start             end                 module name
fffff880`00ef4000 fffff880`00f4b000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`0183b000 fffff880`018c5000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04010000 fffff880`04026000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00e33000 fffff880`00e3e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`041d8000 fffff880`041e0000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`02c67000 fffff880`02c6d000   AsIO     AsIO.sys     Mon Apr 06 03:21:08 2009 (49D9AD64)
fffff880`02c61000 fffff880`02c67000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`05c00000 fffff880`05c09000   aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:09 2010 (4C86506D)
fffff880`05dc3000 fffff880`05dfd000   aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084)
fffff880`019e5000 fffff880`019ef000   aswRdr   aswRdr.SYS   Tue Sep 07 10:47:47 2010 (4C865093)
fffff880`02c3e000 fffff880`02c61000   aswSP    aswSP.SYS    Tue Sep 07 10:52:07 2010 (4C865197)
fffff880`0182b000 fffff880`0183b000   aswTdi   aswTdi.SYS   Tue Sep 07 10:52:27 2010 (4C8651AB)
fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e09000 fffff880`00e33000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`03fd8000 fffff880`03ff8000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`048a0000 fffff880`050b1000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
fffff880`03e6a000 fffff880`03eb6000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
fffff880`01964000 fffff880`0196b000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02c2d000 fffff880`02c3e000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03ac8000 fffff880`03ae6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00680000 fffff960`006a7000   cdd      cdd.dll      unavailable (00000000)
fffff880`01931000 fffff880`0195b000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018cb000 fffff880`018fb000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d45000 fffff880`00da3000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010c6000 fffff880`01139000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04000000 fffff880`04010000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05cdf000 fffff880`05ced000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c0f000 fffff880`02c2d000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c00000 fffff880`02c0f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01200000 fffff880`01216000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05c4f000 fffff880`05c71000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05cf9000 fffff880`05d02000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05ced000 fffff880`05cf9000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05d02000 fffff880`05d15000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05cd3000 fffff880`05cdf000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`050b1000 fffff880`051a5000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`051a5000 fffff880`051eb000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01054000 fffff880`01068000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01008000 fffff880`01054000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013f3000 fffff880`013fd000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`011bf000 fffff880`011f9000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`041ec000 fffff880`041f9000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02fe1000 fffff800`0302a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04800000 fffff880`04824000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05c77000 fffff880`05cd3000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05d62000 fffff880`05d7b000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05d7b000 fffff880`05d83080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05d54000 fffff880`05d62000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`03a00000 fffff880`03ac8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015e7000 fffff880`015f0000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`02c93000 fffff880`02ca9000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04032000 fffff880`04041000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05d84000 fffff880`05d92000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bd1000 fffff800`00bdb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`03f6e000 fffff880`03fb1000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013c8000 fffff880`013e2000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05c71000 fffff880`05c76200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`051eb000 fffff880`051fd000   L1E62x64 L1E62x64.sys Sun Aug 23 01:08:09 2009 (4A90CEB9)
fffff880`02ca9000 fffff880`02cbe000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05da0000 fffff880`05dc3000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`05d4f000 fffff880`05d53980   Lycosa   Lycosa.sys   Fri Jan 18 03:51:42 2008 (4790689E)
fffff880`00ced000 fffff880`00d31000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`05d92000 fffff880`05da0000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03f5f000 fffff880`03f6e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03b77000 fffff880`03b84000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fdf000 fffff880`00ff9000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03b84000 fffff880`03b9c000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03b9c000 fffff880`03bc9000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`06213000 fffff880`06261000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`06261000 fffff880`06284000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019c9000 fffff880`019d4000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f54000 fffff880`00f5e000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01068000 fffff880`010c6000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02ded000 fffff880`02df8000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0147d000 fffff880`0148f000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01495000 fffff880`01587000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04026000 fffff880`04032000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03b4c000 fffff880`03b5f000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`03eda000 fffff880`03f09000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03fc3000 fffff880`03fd8000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d35000 fffff880`02d44000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cc1000 fffff880`02d06000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01587000 fffff880`015e7000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`019d4000 fffff880`019e5000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02de1000 fffff880`02ded000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a05000 fffff800`02fe1000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01225000 fffff880`013c8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0195b000 fffff880`01964000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03af9000 fffff880`03b4c000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d0f000 fffff880`02d35000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`041bb000 fffff880`041d8000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f9e000 fffff880`00fb3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f5e000 fffff880`00f91000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fc8000 fffff880`00fcf000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fcf000 fffff880`00fdf000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013e2000 fffff880`013f3000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06284000 fffff880`0632a000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05c12000 fffff880`05c4f000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d31000 fffff880`00d45000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03eb6000 fffff880`03eda000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03f09000 fffff880`03f24000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03f24000 fffff880`03f45000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03f45000 fffff880`03f5f000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d90000 fffff880`02de1000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`019ae000 fffff880`019b7000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019b7000 fffff880`019c0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019c0000 fffff880`019c9000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01185000 fffff880`011bf000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03b5f000 fffff880`03b77000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04043000 fffff880`041bb000   RTL85n64 RTL85n64.sys Fri Oct 16 03:25:11 2009 (4AD81FD7)
fffff880`0632a000 fffff880`06335000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`041e0000 fffff880`041ec000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02d44000 fffff880`02d61000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01475000 fffff880`0147d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06eab000 fffff880`06f41000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06374000 fffff880`063db000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06335000 fffff880`06362000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`04041000 fffff880`04042480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06362000 fffff880`06374000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0181e000 fffff880`0182b000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01800000 fffff880`0181e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d7c000 fffff880`02d90000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`02c6d000 fffff880`02c93000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03fb1000 fffff880`03fc3000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05d32000 fffff880`05d4f000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05d30000 fffff880`05d31f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04887000 fffff880`04898000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e00000 fffff880`03e5a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04831000 fffff880`04887000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05d15000 fffff880`05d30000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`04824000 fffff880`04831000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f91000 fffff880`00f9e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0196b000 fffff880`01979000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01979000 fffff880`0199e000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fb3000 fffff880`00fc8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00da3000 fffff880`00dff000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01139000 fffff880`01185000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d61000 fffff880`02d7c000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0199e000 fffff880`019ae000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e41000 fffff880`00ee5000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ee5000 fffff880`00ef4000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d06000 fffff880`02d0f000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`0036f000   win32k   win32k.sys   unavailable (00000000)
fffff880`00f4b000 fffff880`00f54000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`018fb000 fffff880`0191c000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`018fb000 fffff880`01909000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01909000 fffff880`01915000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01915000 fffff880`0191e000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`0191e000 fffff880`01931000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
23 Dec 2010   #5
Doku

Windows 7 Home Premium x64
 
 

Thanks for the quick reply Cybercore.

To do list:
  1. DISABLE the Driver Verifier. Check
  2. Update Realtek 8180/8185 Wireless driver. Check
  3. Update your LAN drivers. (Couldn't find, skipped)
  4. Update keyboard drivers. Check
  5. Remove Avast and install MSE. Pending
I'll post tomorrow on how my machine is running.
My System SpecsSystem Spec
25 Dec 2010   #6
Doku

Windows 7 Home Premium x64
 
 

Two days so far without BSODs which is new for me.

Thanks for the help Cybercore.
My System SpecsSystem Spec
30 Dec 2010   #7
Doku

Windows 7 Home Premium x64
 
 

My computer's been working fine until today. Suddenly I've getting non-stop BSODs. Help.
My System SpecsSystem Spec
Reply

 Frequest BSODs and Crashing Programs




Thread Tools Search this Thread
Search this Thread:

Advanced Search




Similar help and support threads
Thread Forum
Frequest BSOD/Crashing many without any error/dump files
Hi Guys, I am have a problem with my not so old custom build PC. The file is attached with all the information. I have 3 HDD 1 -500GB Seagate running Windows 7 Ultimate 32bit (installed years back) 2 -500GB WD running Windows 7 Ultimate 64bit (fresh install) 3- 1TB with all the data when I...
BSOD Help and Support
Random BSODS and programs crashing.
Hi, For the past few months now my computer has been running very slowly, with programs constantly crashing and at least 3 times a day I get a BSOD, sometimes more. The blue screens always either read Memory_Management or Page_Fault_In_Non_Paged_Area, and bluescreenview says that ntoskrnl.exe...
BSOD Help and Support
I'm new.. please help me with crashing programs.. most crash
hi,... im very upset because my windows 7 home premium is giving me problems.. whenever i start any program, it crashes and i get the error message "so and so program has stopped working. it then searches for solution online and never finds anything.. even my dritek lauch manager crashes with the...
BSOD Help and Support
Several BSODs and crashing, need some help
Hi, thanks for taking a look at this, since I'm getting frustrated. I'm new to the forum, and not techsavvy at all, so if you need additional info let me know. I bought a computer several months ago running Windows 7 Professional 64 bit, from a reputable website where you can choose the various...
BSOD Help and Support
Frequest BSOD Dump Attached
Hi Everyone, Attached you can find my latest 3 dump files. I've been dealing with the problem for awhile now and I'm hoping someone on here will be kind enough to help me out. I get a random BSOD every so often (about one a day). It doesn't matter what I am doing. I can be either...
BSOD Help and Support
Crashing -> BSODs daily
Hello, I have Windows 7 Ultimate, and i am sick of getting BSODs. I ran prime95, memtest but it never crashed during the tests. I attached my last 3 generated minidumps. I tried to read them but i am getting the same error: -- Probably caused by : ntkrnlpa.exe ( nt+44022 ) Followup:...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 10:38.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App