BSOD's/Restarts have me stumped

Page 4 of 6 FirstFirst ... 23456 LastLast

  1. Posts : 845
    Windows 7 - Vista
       #31

    Hi -

    Update your Intel 82562V-2 10/100 Network Connection Ethernet driver -
    Code:
    e1e6032e.sys    Tue Mar 24 14:17:23 2009 (49C923B3)
    Intel Driver downloads - http://downloadcenter.intel.com/Default.aspx?lang=eng


    Remove Daemon Tools.


    "mouse" is mentioned in one of the 3 dumps.


    Windbg Logs
    --> http://sysnative.com/bsod2011/jcgrif..._jcgriff2_.txt
    --> http://sysnative.com/bsod2011/jcgrif...riff2_.txt.zip

    Regards. . .

    jcgriff2

    `


    BSOD BUGCHECK SUMMARY
    Code:
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Debug session time: Mon Jan 31 02:48:45.039 2011 (GMT-5)
    System Uptime: 0 days 0:29:31.161
    Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+47e )
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  System
    FAILURE_BUCKET_ID:  X64_0xA_mouclass!MouseClassServiceCallback+47e
    Bugcheck code 0000000A
    Arguments 00000000`00000048 00000000`00000002 00000000`00000000 fffff800`028c10a2
    ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Debug session time: Mon Jan 31 01:06:08.353 2011 (GMT-5)
    System Uptime: 0 days 0:03:21.085
    Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+433 )
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  Steam.exe
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433
    Bugcheck code 0000000A
    Arguments 00000000`00000018 00000000`00000002 00000000`00000001 fffff800`02883313
    ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Debug session time: Mon Jan 31 01:01:15.133 2011 (GMT-5)
    System Uptime: 0 days 0:22:51.255
    Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+433 )
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  wmpnetwk.exe
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433
    Bugcheck code 0000000A
    Arguments 00000000`00010002 00000000`00000002 00000000`00000001 fffff800`028bf313
    ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
     
    by jcgriff2     
     
          J. C. Griffith, Microsoft MVP   
     
            https://mvp.support.microsoft.com/profile/Griffith   
     
            www.sysnative.com
     
            www.jcgriff2.com 
     
    ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии
      My Computer


  2. Posts : 46
    Win 7 Ultimate 64 Bit
    Thread Starter
       #32

    Ive been trying to update the Intel driver but I cant stay on the computer long enough before it reboots itself to get and install the driver.
      My Computer


  3. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #33

    Can you install it in the safe mode?
      My Computer


  4. Posts : 46
    Win 7 Ultimate 64 Bit
    Thread Starter
       #34

    Ok I managed to install the drivers but the computer was still restarting. So I also installed the software for my mouse and keyboard. Still had restarting/BSOD's. Next I opened up the computer and reseated the RAM and my video card and it fixed nothing. So now I took out my video card and hooked up to my motherboard's integrated video and am still having the same problems. I even tried disconnecting my mouse and using a different one which also didnt fix anything. Ive been trying to post this message on the computer with the problem but I keep BSOD or restarting. So once it gives me enough time I will upload the most recent BSOD's to see if there is anything new.


    Added dumps
    Last edited by rtc0523; 31 Jan 2011 at 15:13. Reason: Added dumps
      My Computer


  5. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #35

    I looked at your 7 dumps. Out of the 7 dumps, there are 5 different bugcheck codes. This indicates a hardware or hardware related (driver) problem.

    I suggest you test your RAM with Mentest86 following the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off for an hour or so. Let it run for at least 7 passes. This will take 6 - 8 hours. Post back with your results.

    If Memtest shows no errors, enable Driver Verifier carefully following the instructions in this tutorial: Driver Verifier - Enable and Disable. Upload all dumps triggered by Driver Verifier.


    Code:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`0284c000 PsLoadedModuleList = 0xfffff800`02a89e50
    Debug session time: Mon Jan 31 14:09:25.610 2011 (GMT-5)
    System Uptime: 0 days 0:06:12.343
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {190, 2, 0, fffff800028c48db}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiSearchForNewThread+26b )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000190, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800028c48db, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002af40e0
     0000000000000190 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiSearchForNewThread+26b
    fffff800`028c48db 66453b9080010000 cmp     r10w,word ptr [r8+180h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002f1bb50 -- (.trap 0xfffff88002f1bb50)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000100 rbx=0000000000000000 rcx=fffff88002fd8700
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800028c48db rsp=fffff88002f1bce0 rbp=0000000000000001
     r8=0000000000000010  r9=0000000000000008 r10=0000000000000000
    r11=fffff880031a1b80 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!KiSearchForNewThread+0x26b:
    fffff800`028c48db 66453b9080010000 cmp     r10w,word ptr [r8+180h] ds:bc98:00000000`00000190=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800028bbca9 to fffff800028bc740
    
    STACK_TEXT:  
    fffff880`02f1ba08 fffff800`028bbca9 : 00000000`0000000a 00000000`00000190 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02f1ba10 fffff800`028ba920 : 00000000`2f45b17c 00000000`00000000 fffffa80`05766101 fffffa80`047bf1b0 : nt!KiBugCheckDispatch+0x69
    fffff880`02f1bb50 fffff800`028c48db : 00000000`33f0a83b 00000000`0000003b fffffa80`043db600 400000c2`400000c1 : nt!KiPageFault+0x260
    fffff880`02f1bce0 fffff800`0287409a : 00000000`00000000 00000000`00000000 fffff880`00000000 00000000`00000001 : nt!KiSearchForNewThread+0x26b
    fffff880`02f1bd50 fffff800`028c4fc6 : fffff880`009e6180 fffff880`009f0fc0 00000000`00000000 fffff880`00c14f44 : nt!KiIdleSchedule+0x7a
    fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x136
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiSearchForNewThread+26b
    fffff800`028c48db 66453b9080010000 cmp     r10w,word ptr [r8+180h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KiSearchForNewThread+26b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiSearchForNewThread+26b
    
    BUCKET_ID:  X64_0xA_nt!KiSearchForNewThread+26b
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Mon Jan 31 14:32:19.893 2011 (GMT-5)
    System Uptime: 0 days 0:05:40.000
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8800318dc47, 1, fffff80002883590, 0}
    
    
    Could not read faulting driver name
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8800318dc47, memory referenced.
    Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
    Arg3: fffff80002883590, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abd0e0
     fffff8800318dc47 
    
    FAULTING_IP: 
    nt!KiGeneralProtectionFault+10
    fffff800`02883590 c645ab01        mov     byte ptr [rbp-55h],1
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880031851c0 -- (.trap 0xfffff880031851c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88002f63180 rbx=0000000000000000 rcx=ffff00000573ead0
    rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002883590 rsp=fffff88003185350 rbp=fffff8800318dc9c
     r8=fffffa8003b24348  r9=fffffa8003b24240 r10=fffffa8005f6c010
    r11=fffffa8003b24390 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up di ng nz na po nc
    nt!KiGeneralProtectionFault+0x10:
    fffff800`02883590 c645ab01        mov     byte ptr [rbp-55h],1 ss:0018:fffff880`0318dc47=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002905f14 to fffff80002885740
    
    STACK_TEXT:  
    fffff880`03185058 fffff800`02905f14 : 00000000`00000050 fffff880`0318dc47 00000000`00000001 fffff880`031851c0 : nt!KeBugCheckEx
    fffff880`03185060 fffff800`0288382e : 00000000`00000001 fffffa80`047c8100 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42837
    fffff880`031851c0 fffff800`02883590 : 00000000`00000000 fffffa80`00fa5200 00000580`00000001 fffffa80`039f8f48 : nt!KiPageFault+0x16e
    fffff880`03185350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
    30 errors : !nt (fffff8000288358c-fffff8000288367d)
    fffff80002883580  55  48  81  ec  58  01  00  00  48  8d  ac  24 *4c *89  00  00 UH..X...H..$L...
    fffff80002883590  c6  45  ab  01  48  89  45  b0  48  89  4d  b8 *65 *4c  55  c0 .E..H.E.H.M.eLU.
    fffff800028835a0  4c  89  45  c8  4c  89  4d  d0  4c  89  55  d8 *80 *fa  5d  e0 L.E.L.M.L.U...].
    fffff800028835b0  f6  85  f0  00  00  00  01  74  64  0f  01  f8 *00 *00  8b  14 .......td.......
    fffff800028835c0  25  88  01  00  00  41  f6  42  03  80  74  3c *79 *82  01  00 %....A.B..t<y...
    fffff800028835d0  c0  0f  32  48  c1  e2  20  48  0b  c2  49  39 *8a *c4  00  00 ..2H.. H..I9....
    fffff800028835e0  00  74  25  49  39  82  b0  01  00  00  74  1c *83 *02  92  b8 .t%I9.....t.....
    fffff800028835f0  01  00  00  41  0f  ba  6a  4c  0b  66  41  ff *00 *fc  01  00 ...A..jL.fA.....
    fffff80002883600  00  48  89  82  80  00  00  00  41  f6  42  03 *af *55  c7  85 .H......A.B..U..
    fffff80002883610  80  00  00  00  00  00  74  05  e8  d3  25  00 *29 *65  0f  ae ......t...%.)e..
    fffff80002883620  5d  ac  65  0f  ae  14  25  80  01  00  00  0f *01 *00  f0  0f ].e...%.........
    fffff80002883630  29  4d  00  0f  29  55  10  0f  29  5d  20  0f *00 *00  30  0f )M..)U..)] ...0.
    ...
    fffff80002883650  85  e0  00  00  00  48  f7  85  f8  00  00  00 *33 *d2  00  00 .....H......3...
    fffff80002883660  74  01  fb  b9  01  00  00  10  ba  02  00  00 *7f *e1  8b  8d t...............
    fffff80002883670  e0  00  00  00  41  81  e1  ff  ff  00  00  4d *48 *83  4c  8b ....A......MH.L.
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  STRIDE
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE
    
    Followup: memory_corruption
    ---------
    
    Debug session time: Mon Jan 31 14:36:48.806 2011 (GMT-5)
    System Uptime: 0 days 0:03:59.912
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff8000284b95b, fffff88006f10e60, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!ExQueryPoolUsage+e0 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff8000284b95b, Address of the exception record for the exception that caused the bugcheck
    Arg3: fffff88006f10e60, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ExQueryPoolUsage+e0
    fffff800`0284b95b 8379e400        cmp     dword ptr [rcx-1Ch],0
    
    CONTEXT:  fffff88006f10e60 -- (.cxr 0xfffff88006f10e60)
    rax=000000000288a6dc rbx=0000000000000000 rcx=000003880000049f
    rdx=fffff88006f1197c rsi=0000000000033cc3 rdi=00000000001bf290
    rip=fffff8000284b95b rsp=fffff88006f11830 rbp=fffff88006f11ca0
     r8=fffff88006f11978  r9=fffff80002a31720 r10=0000000000000005
    r11=fffff88006f1195c r12=0000000000000004 r13=0000000000009a62
    r14=fffff80002ac4900 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe cy
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010203
    nt!ExQueryPoolUsage+0xe0:
    fffff800`0284b95b 8379e400        cmp     dword ptr [rcx-1Ch],0 ds:002b:00000388`00000483=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  WMIADAP.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002b897ab to fffff8000284b95b
    
    STACK_TEXT:  
    fffff880`06f11830 fffff800`02b897ab : 00000000`00000000 00000000`00033cc3 00000000`00033cc3 00000000`00000026 : nt!ExQueryPoolUsage+0xe0
    fffff880`06f11840 fffff800`02b8b1e5 : 00000000`001bf290 fffff800`02b8710e 00000000`00000003 00000000`00000000 : nt!ExpQuerySystemInformation+0x5a9
    fffff880`06f11be0 fffff800`0288b993 : 00000000`00000164 fffff880`06f11ca0 ffffffff`fffe7960 00000000`00000000 : nt!NtQuerySystemInformation+0x4d
    fffff880`06f11c20 00000000`773500ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`001bf1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773500ba
    
    
    FOLLOWUP_IP: 
    nt!ExQueryPoolUsage+e0
    fffff800`0284b95b 8379e400        cmp     dword ptr [rcx-1Ch],0
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExQueryPoolUsage+e0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    STACK_COMMAND:  .cxr 0xfffff88006f10e60 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!ExQueryPoolUsage+e0
    
    BUCKET_ID:  X64_0x3B_nt!ExQueryPoolUsage+e0
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Mon Jan 31 15:01:04.954 2011 (GMT-5)
    System Uptime: 0 days 0:00:40.060
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1, {744a2dd9, 0, ffff, fffff88002baeca0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    APC_INDEX_MISMATCH (1)
    This is a kernel internal error. The most common reason to see this
    bugcheck is when a filesystem or a driver has a mismatched number of
    calls to disable and re-enable APCs. The key data item is the
    Thread->KernelApcDisable field. A negative value indicates that a driver
    has disabled APC calls without re-enabling them.  A positive value indicates
    that the reverse is true. This check is made on exit from a system call.
    Arguments:
    Arg1: 00000000744a2dd9, address of system function (system call)
    Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
    Arg3: 000000000000ffff, Thread->KernelApcDisable
    Arg4: fffff88002baeca0, Previous KernelApcDisable
    
    Debugging Details:
    ------------------
    
    
    FAULTING_IP: 
    +5ac0952f01a5def0
    00000000`744a2dd9 c3              ret
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x1
    
    PROCESS_NAME:  AvastSvc.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff8000287dca9 to fffff8000287e740
    
    STACK_TEXT:  
    fffff880`02baea68 fffff800`0287dca9 : 00000000`00000001 00000000`744a2dd9 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
    fffff880`02baea70 fffff800`0287dbe0 : 00000000`04fafd20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02baebb0 00000000`744a2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
    00000000`04faf0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x744a2dd9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiSystemServiceExit+245
    fffff800`0287dbe0 4883ec50        sub     rsp,50h
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiSystemServiceExit+245
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1_nt!KiSystemServiceExit+245
    
    BUCKET_ID:  X64_0x1_nt!KiSystemServiceExit+245
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Mon Jan 31 13:14:37.323 2011 (GMT-5)
    System Uptime: 0 days 0:04:52.055
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {0, 0, 0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: 0000000000000000, The exception code that was not handled
    Arg2: 0000000000000000, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
    
    FAULTING_IP: 
    +5ac0952f01b7ddf0
    00000000`00000000 ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x1E
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff80000b9c248 -- (.exr 0xfffff80000b9c248)
    ExceptionAddress: fffff800028c90a2 (nt!KiDeferredReadyThread+0x00000000000001c2)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff80000b9c2f0 -- (.trap 0xfffff80000b9c2f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffff000002a4cb80 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800028c90a2 rsp=fffff80000b9c480 rbp=0000000000000002
     r8=0000000000000001  r9=fffff80002bb78dc r10=fffff80002854000
    r11=fffff80002a3ee80 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    nt!KiDeferredReadyThread+0x1c2:
    fffff800`028c90a2 663b5048        cmp     dx,word ptr [rax+48h] ds:ffff0000`02a4cbc8=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800028bc46e to fffff800028c4710
    
    STACK_TEXT:  
    fffff800`00b9b338 fffff800`028bc46e : 00000000`00000000 00000000`00000000 fffff800`00b9bab0 fffff800`028f1668 : nt!KeBugCheck
    fffff800`00b9b340 fffff800`028ea40d : fffff800`02ad2b7c fffff800`02a0ce84 fffff800`02854000 fffff800`00b9c248 : nt!KiKernelCalloutExceptionHandler+0xe
    fffff800`00b9b370 fffff800`028f1a90 : fffff800`02a13b14 fffff800`00b9b3e8 fffff800`00b9c248 fffff800`02854000 : nt!RtlpExecuteHandlerForException+0xd
    fffff800`00b9b3a0 fffff800`028fe9ef : fffff800`00b9c248 fffff800`00b9bab0 fffff800`00000000 fffffa80`039fc040 : nt!RtlDispatchException+0x410
    fffff800`00b9ba80 fffff800`028c3d82 : fffff800`00b9c248 fffff880`02f63180 fffff800`00b9c2f0 fffff800`02a3ee80 : nt!KiDispatchException+0x16f
    fffff800`00b9c110 fffff800`028c268a : 00000000`00000000 fffffa80`05e0c050 fffff880`04341250 fffffa80`03fef1a8 : nt!KiExceptionDispatch+0xc2
    fffff800`00b9c2f0 fffff800`028c90a2 : fffffa80`00000000 00000000`00000002 fffff800`00b9c540 00000000`215e7003 : nt!KiGeneralProtectionFault+0x10a
    fffff800`00b9c480 fffff800`028cc1aa : 00000000`00000000 fffff800`02a695f8 fffffa80`039fc040 fffffa80`039fc148 : nt!KiDeferredReadyThread+0x1c2
    fffff800`00b9c500 fffff800`028d029e : fffffa80`06d59cd0 fffff800`00b9c618 00000000`00000002 00000000`00000003 : nt!ExQueueWorkItem+0x21a
    fffff800`00b9c570 fffff800`028cfdd6 : fffffa80`05e5c1f0 fffffa80`05e5c1f0 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
    fffff800`00b9c5e0 fffff800`028d04be : 00000000`ae1423a2 fffff800`00b9cc58 00000000`00004921 fffff800`02a416a8 : nt!KiProcessExpiredTimerList+0xc6
    fffff800`00b9cc30 fffff800`028cfcb7 : 00000000`28c116c3 00000000`00004921 00000000`28c11663 00000000`00000021 : nt!KiTimerExpiration+0x1be
    fffff800`00b9ccd0 fffff800`028cceea : fffff800`02a3ee80 fffff800`02a4cc40 00000000`00000000 fffff880`03f60db0 : nt!KiRetireDpcList+0x277
    fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiKernelCalloutExceptionHandler+e
    fffff800`028bc46e 90              nop
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
    
    BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
    
    Followup: MachineOwner
    ---------
      My Computer


  6. Posts : 46
    Win 7 Ultimate 64 Bit
    Thread Starter
       #36

    Ok since I had already ran memtest I started to stress test my pc with prime95 with one stick of ram in. It ran fine no restarts no BSOD's. Added another stick ran fine. Added a 3rd stick ran fine. Added a 4th stick and I got a BSOD pretty much right as I started the stress test. So I removed the stick in slot 4 and put it into slot 3 and it ran fine. This was all done with my DVD drive disconnected and video card removed. So i put the DVD drive back in and it ran fine through the stress test also. Now that I put my video card back in and started the stress test a few minutes in my computer restarted with no BSOD this time. Ill attach the dump from the BSOD I had with the 4 stick of ram in. Does this mean its my PSU? It seems when I add too much to draw from the PSU is when this happens.



    Also I used driver verifier for a little while before I formatted and didnt get any BSOD's either. And its a fresh install so I don't really see it being software related anymore.
      My Computer


  7. Posts : 6,668
    Windows 7 x64
       #37

    Code:
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002891313, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac40e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiDeferredReadyThread+433
    fffff800`02891313 4c8900          mov     qword ptr [rax],r8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  prime95.exe
    
    TRAP_FRAME:  fffff88002f22600 -- (.trap 0xfffff88002f22600)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80039f81a0
    rdx=fffff88002f67710 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002891313 rsp=fffff88002f22790 rbp=0000000000000002
     r8=fffffa8005c37100  r9=0000000000000009 r10=fffff8000281c000
    r11=fffff88002f227e0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!KiDeferredReadyThread+0x433:
    fffff800`02891313 4c8900          mov     qword ptr [rax],r8 ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000288bca9 to fffff8000288c740
    
    STACK_TEXT:  
    fffff880`02f224b8 fffff800`0288bca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`02f224c0 fffff800`0288a920 : fffffa80`05c6d128 fffff880`02f63180 fffffa80`04854c50 fffff880`01686fa4 : nt!KiBugCheckDispatch+0x69
    fffff880`02f22600 fffff800`02891313 : fffffa80`05c39248 fffffa80`05c39248 00000000`00000000 fffffa80`05c39240 : nt!KiPageFault+0x260
    fffff880`02f22790 fffff800`02897e67 : fffffa80`067bac20 fffffa80`060b4420 fffffa80`060b4420 fffffa80`05695c00 : nt!KiDeferredReadyThread+0x433
    fffff880`02f22810 fffff800`028984be : 00000000`3709af64 fffff880`02f22e88 00000000`0000171f fffff880`009e8968 : nt!KiProcessExpiredTimerList+0x157
    fffff880`02f22e60 fffff800`02897cb7 : fffff880`009e61c5 fffffa80`0000171f fffffa80`0396a050 00000000`0000001f : nt!KiTimerExpiration+0x1be
    fffff880`02f22f00 fffff800`02892865 : 00000000`00000000 fffffa80`0501db60 00000000`00000000 fffff800`029acda0 : nt!KiRetireDpcList+0x277
    fffff880`02f22fb0 fffff800`0289267c : fffff880`009e6180 fffff800`02899618 fffff880`068feca0 00000000`00000056 : nt!KxRetireDpcList+0x5
    fffff880`068febe0 fffff800`028d6113 : fffff800`028993ac fffff800`02899418 00000000`01fb1600 fffff880`068feca0 : nt!KiDispatchInterruptContinue
    fffff880`068fec10 fffff800`02899418 : 00000000`01fb1600 fffff880`068feca0 00000000`6863c140 00000000`6864f35c : nt!KiDpcInterruptBypass+0x13
    fffff880`068fec20 00000001`40089735 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSecondaryClockInterrupt+0x1a8
    00000000`0410f2f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1`40089735
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDeferredReadyThread+433
    fffff800`02891313 4c8900          mov     qword ptr [rax],r8
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KiDeferredReadyThread+433
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433
    
    BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433
    
    Followup: MachineOwner
    ---------
    
    1: kd> lm t n
    start             end                 module name
    fffff800`00ba9000 fffff800`00bb3000   kdcom    kdcom.dll    Mon Jul 13 20:31:07 2009 (4A5BDFDB)
    fffff800`0281c000 fffff800`02df8000   nt       ntkrnlmp.exe Fri Jun 18 23:16:41 2010 (4C1C44A9)
    fffff800`02df8000 fffff800`02e41000   hal      hal.dll      Mon Jul 13 20:27:36 2009 (4A5BDF08)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 18:20:33 2009 (4A5BC141)
    fffff880`00c5c000 fffff880`00c6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 18:19:48 2009 (4A5BC114)
    fffff880`00c6c000 fffff880`00c86000   mountmgr mountmgr.sys Mon Jul 13 18:19:54 2009 (4A5BC11A)
    fffff880`00c86000 fffff880`00c8f000   atapi    atapi.sys    Mon Jul 13 18:19:47 2009 (4A5BC113)
    fffff880`00cab000 fffff880`00cef000   mcupdate mcupdate.dll Mon Jul 13 20:29:10 2009 (4A5BDF66)
    fffff880`00cef000 fffff880`00d03000   PSHED    PSHED.dll    Mon Jul 13 20:32:23 2009 (4A5BE027)
    fffff880`00d03000 fffff880`00d61000   CLFS     CLFS.SYS     Mon Jul 13 18:19:57 2009 (4A5BC11D)
    fffff880`00d61000 fffff880`00d94000   pci      pci.sys      Mon Jul 13 18:19:51 2009 (4A5BC117)
    fffff880`00d94000 fffff880`00da9000   partmgr  partmgr.sys  Mon Jul 13 18:19:58 2009 (4A5BC11E)
    fffff880`00da9000 fffff880`00db5000   BATTC    BATTC.SYS    Mon Jul 13 18:31:01 2009 (4A5BC3B5)
    fffff880`00db5000 fffff880`00dca000   volmgr   volmgr.sys   Mon Jul 13 18:19:57 2009 (4A5BC11D)
    fffff880`00dca000 fffff880`00df4000   ataport  ataport.SYS  Mon Jul 13 18:19:52 2009 (4A5BC118)
    fffff880`00df4000 fffff880`00dff000   amdxata  amdxata.sys  Tue May 19 12:56:59 2009 (4A12F2EB)
    fffff880`00e00000 fffff880`00e0f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 18:19:54 2009 (4A5BC11A)
    fffff880`00e0f000 fffff880`00e66000   ACPI     ACPI.sys     Mon Jul 13 18:19:34 2009 (4A5BC106)
    fffff880`00e66000 fffff880`00e6f000   WMILIB   WMILIB.SYS   Mon Jul 13 18:19:51 2009 (4A5BC117)
    fffff880`00e6f000 fffff880`00e79000   msisadrv msisadrv.sys Mon Jul 13 18:19:26 2009 (4A5BC0FE)
    fffff880`00e79000 fffff880`00e86000   vdrvroot vdrvroot.sys Mon Jul 13 19:01:31 2009 (4A5BCADB)
    fffff880`00e86000 fffff880`00e8f000   compbatt compbatt.sys Mon Jul 13 18:31:02 2009 (4A5BC3B6)
    fffff880`00e8f000 fffff880`00e96000   pciide   pciide.sys   Mon Jul 13 18:19:49 2009 (4A5BC115)
    fffff880`00e99000 fffff880`00f59000   CI       CI.dll       Mon Jul 13 20:32:13 2009 (4A5BE01D)
    fffff880`00f59000 fffff880`00ffd000   Wdf01000 Wdf01000.sys Mon Jul 13 18:22:07 2009 (4A5BC19F)
    fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 18:49:40 2009 (4A5BC814)
    fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Mon Jul 13 18:20:08 2009 (4A5BC128)
    fffff880`010f5000 fffff880`01141000   fltmgr   fltmgr.sys   Mon Jul 13 18:19:59 2009 (4A5BC11F)
    fffff880`01141000 fffff880`01155000   fileinfo fileinfo.sys Mon Jul 13 18:34:25 2009 (4A5BC481)
    fffff880`01155000 fffff880`011b3000   msrpc    msrpc.sys    Mon Jul 13 18:21:32 2009 (4A5BC17C)
    fffff880`011b3000 fffff880`011ed000   rdyboost rdyboost.sys Mon Jul 13 18:34:34 2009 (4A5BC48A)
    fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 18:19:45 2009 (4A5BC111)
    fffff880`01230000 fffff880`013d3000   Ntfs     Ntfs.sys     Mon Jul 13 18:20:47 2009 (4A5BC14F)
    fffff880`013d3000 fffff880`013ed000   ksecdd   ksecdd.sys   Mon Jul 13 18:20:54 2009 (4A5BC156)
    fffff880`013ed000 fffff880`013fe000   pcw      pcw.sys      Mon Jul 13 18:19:27 2009 (4A5BC0FF)
    fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 18:21:08 2009 (4A5BC164)
    fffff880`0144a000 fffff880`0145a000   vmstorfl vmstorfl.sys Mon Jul 13 18:42:54 2009 (4A5BC67E)
    fffff880`0145b000 fffff880`0154d000   ndis     ndis.sys     Mon Jul 13 18:21:40 2009 (4A5BC184)
    fffff880`0154d000 fffff880`015ad000   NETIO    NETIO.SYS    Thu Apr 08 21:43:59 2010 (4BBE946F)
    fffff880`015ad000 fffff880`015d8000   ksecpkg  ksecpkg.sys  Fri Dec 11 00:03:32 2009 (4B21E0B4)
    fffff880`015d8000 fffff880`015e0000   spldr    spldr.sys    Mon May 11 11:56:27 2009 (4A0858BB)
    fffff880`015e0000 fffff880`015f2000   mup      mup.sys      Mon Jul 13 18:23:45 2009 (4A5BC201)
    fffff880`015f2000 fffff880`015fb000   hwpolicy hwpolicy.sys Mon Jul 13 18:19:22 2009 (4A5BC0FA)
    fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 22:39:04 2010 (4C15A458)
    fffff880`01800000 fffff880`0180e000   monitor  monitor.sys  Mon Jul 13 18:38:52 2009 (4A5BC58C)
    fffff880`01826000 fffff880`01860000   fvevol   fvevol.sys   Fri Sep 25 21:34:26 2009 (4ABD7DB2)
    fffff880`01860000 fffff880`01876000   disk     disk.sys     Mon Jul 13 18:19:57 2009 (4A5BC11D)
    fffff880`01876000 fffff880`018a6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 18:19:58 2009 (4A5BC11E)
    fffff880`018a6000 fffff880`018c9000   luafv    luafv.sys    Mon Jul 13 18:26:13 2009 (4A5BC295)
    fffff880`018c9000 fffff880`018de000   lltdio   lltdio.sys   Mon Jul 13 19:08:50 2009 (4A5BCC92)
    fffff880`018de000 fffff880`018f6000   rspndr   rspndr.sys   Mon Jul 13 19:08:50 2009 (4A5BCC92)
    fffff880`01906000 fffff880`0190f000   Null     Null.SYS     Mon Jul 13 18:19:37 2009 (4A5BC109)
    fffff880`0190f000 fffff880`01916000   Beep     Beep.SYS     Mon Jul 13 19:00:13 2009 (4A5BCA8D)
    fffff880`01916000 fffff880`01924000   vga      vga.sys      Mon Jul 13 18:38:47 2009 (4A5BC587)
    fffff880`01924000 fffff880`01949000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 18:38:51 2009 (4A5BC58B)
    fffff880`01949000 fffff880`01959000   watchdog watchdog.sys Mon Jul 13 18:37:35 2009 (4A5BC53F)
    fffff880`01959000 fffff880`01962000   RDPCDD   RDPCDD.sys   Mon Jul 13 19:16:34 2009 (4A5BCE62)
    fffff880`01962000 fffff880`0196b000   rdpencdd rdpencdd.sys Mon Jul 13 19:16:34 2009 (4A5BCE62)
    fffff880`0196b000 fffff880`01974000   rdprefmp rdprefmp.sys Mon Jul 13 19:16:35 2009 (4A5BCE63)
    fffff880`01974000 fffff880`0197f000   Msfs     Msfs.SYS     Mon Jul 13 18:19:47 2009 (4A5BC113)
    fffff880`0197f000 fffff880`01990000   Npfs     Npfs.SYS     Mon Jul 13 18:19:48 2009 (4A5BC114)
    fffff880`01990000 fffff880`019ae000   tdx      tdx.sys      Mon Jul 13 18:21:15 2009 (4A5BC16B)
    fffff880`019ae000 fffff880`019bb000   TDI      TDI.SYS      Mon Jul 13 18:21:18 2009 (4A5BC16E)
    fffff880`019bb000 fffff880`019fe000   ks       ks.sys       Wed Mar 03 22:32:25 2010 (4B8F37D9)
    fffff880`02649000 fffff880`02711000   HTTP     HTTP.sys     Mon Jul 13 18:22:16 2009 (4A5BC1A8)
    fffff880`02711000 fffff880`0272f000   bowser   bowser.sys   Mon Jul 13 18:23:50 2009 (4A5BC206)
    fffff880`0272f000 fffff880`02747000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:08:25 2009 (4A5BCC79)
    fffff880`02747000 fffff880`02774000   mrxsmb   mrxsmb.sys   Sat Feb 27 01:52:19 2010 (4B88CF33)
    fffff880`02774000 fffff880`027c2000   mrxsmb10 mrxsmb10.sys Sat Feb 27 01:52:28 2010 (4B88CF3C)
    fffff880`027c2000 fffff880`027e5000   mrxsmb20 mrxsmb20.sys Sat Feb 27 01:52:26 2010 (4B88CF3A)
    fffff880`02c00000 fffff880`02c0f000   discache discache.sys Mon Jul 13 18:37:18 2009 (4A5BC52E)
    fffff880`02c0f000 fffff880`02c1e000   mouclass mouclass.sys Mon Jul 13 18:19:50 2009 (4A5BC116)
    fffff880`02c1e000 fffff880`02c30000   umbus    umbus.sys    Mon Jul 13 19:06:56 2009 (4A5BCC20)
    fffff880`02c30000 fffff880`02c44000   LMouFilt LMouFilt.Sys Tue Aug 24 12:21:43 2010 (4C73FFA7)
    fffff880`02c44000 fffff880`02cce000   afd      afd.sys      Mon Jul 13 18:21:40 2009 (4A5BC184)
    fffff880`02cce000 fffff880`02d13000   netbt    netbt.sys    Mon Jul 13 18:21:28 2009 (4A5BC178)
    fffff880`02d13000 fffff880`02d1c000   wfplwf   wfplwf.sys   Mon Jul 13 19:09:26 2009 (4A5BCCB6)
    fffff880`02d1c000 fffff880`02d42000   pacer    pacer.sys    Mon Jul 13 19:09:41 2009 (4A5BCCC5)
    fffff880`02d42000 fffff880`02d51000   netbios  netbios.sys  Mon Jul 13 19:09:26 2009 (4A5BCCB6)
    fffff880`02d51000 fffff880`02d6c000   wanarp   wanarp.sys   Mon Jul 13 19:10:21 2009 (4A5BCCED)
    fffff880`02d6c000 fffff880`02d80000   termdd   termdd.sys   Mon Jul 13 19:16:36 2009 (4A5BCE64)
    fffff880`02d80000 fffff880`02d8a000   SASKUTIL64 SASKUTIL64.SYS Tue Feb 09 16:27:34 2010 (4B71E156)
    fffff880`02d8a000 fffff880`02d94000   SASDIFSV64 SASDIFSV64.SYS Mon Feb 08 18:11:52 2010 (4B70A848)
    fffff880`02d94000 fffff880`02de5000   rdbss    rdbss.sys    Mon Jul 13 18:24:09 2009 (4A5BC219)
    fffff880`02de5000 fffff880`02df1000   nsiproxy nsiproxy.sys Mon Jul 13 18:21:02 2009 (4A5BC15E)
    fffff880`02df1000 fffff880`02dfc000   mssmbios mssmbios.sys Mon Jul 13 18:31:10 2009 (4A5BC3BE)
    fffff880`03a00000 fffff880`03a1b000   raspppoe raspppoe.sys Mon Jul 13 19:10:17 2009 (4A5BCCE9)
    fffff880`03a1b000 fffff880`03a3c000   raspptp  raspptp.sys  Mon Jul 13 19:10:18 2009 (4A5BCCEA)
    fffff880`03a3c000 fffff880`03a56000   rassstp  rassstp.sys  Mon Jul 13 19:10:25 2009 (4A5BCCF1)
    fffff880`03a56000 fffff880`03a65000   kbdclass kbdclass.sys Mon Jul 13 18:19:50 2009 (4A5BC116)
    fffff880`03a69000 fffff880`03aec000   csc      csc.sys      Mon Jul 13 18:24:26 2009 (4A5BC22A)
    fffff880`03aec000 fffff880`03b0a000   dfsc     dfsc.sys     Mon Jul 13 18:23:44 2009 (4A5BC200)
    fffff880`03b0a000 fffff880`03b1b000   blbdrive blbdrive.sys Mon Jul 13 18:35:59 2009 (4A5BC4DF)
    fffff880`03b1b000 fffff880`03b41000   tunnel   tunnel.sys   Mon Jul 13 19:09:37 2009 (4A5BCCC1)
    fffff880`03b41000 fffff880`03b57000   intelppm intelppm.sys Mon Jul 13 18:19:25 2009 (4A5BC0FD)
    fffff880`03b57000 fffff880`03bad000   USBPORT  USBPORT.SYS  Mon Jul 13 19:06:31 2009 (4A5BCC07)
    fffff880`03bad000 fffff880`03bd1000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:10:11 2009 (4A5BCCE3)
    fffff880`03bd1000 fffff880`03c00000   ndiswan  ndiswan.sys  Mon Jul 13 19:10:11 2009 (4A5BCCE3)
    fffff880`04000000 fffff880`04046000   dxgmms1  dxgmms1.sys  Mon Nov 01 21:50:56 2010 (4CCF7C90)
    fffff880`04046000 fffff880`0408f000   e1e6232e e1e6232e.sys Fri Mar 26 03:14:14 2010 (4BAC6CD6)
    fffff880`0408f000 fffff880`0409c000   usbuhci  usbuhci.sys  Mon Jul 13 19:06:27 2009 (4A5BCC03)
    fffff880`0409c000 fffff880`040ad000   usbehci  usbehci.sys  Mon Jul 13 19:06:30 2009 (4A5BCC06)
    fffff880`040ad000 fffff880`040d1000   HDAudBus HDAudBus.sys Mon Jul 13 19:06:13 2009 (4A5BCBF5)
    fffff880`040d1000 fffff880`040e1000   CompositeBus CompositeBus.sys Mon Jul 13 19:00:33 2009 (4A5BCAA1)
    fffff880`040e1000 fffff880`040ec000   rdpbus   rdpbus.sys   Mon Jul 13 19:17:46 2009 (4A5BCEAA)
    fffff880`040ec000 fffff880`041e0000   dxgkrnl  dxgkrnl.sys  Mon Nov 01 21:51:31 2010 (4CCF7CB3)
    fffff880`041e0000 fffff880`041f6000   AgileVpn AgileVpn.sys Mon Jul 13 19:10:24 2009 (4A5BCCF0)
    fffff880`041f6000 fffff880`041f7480   swenum   swenum.sys   Mon Jul 13 19:00:18 2009 (4A5BCA92)
    fffff880`04400000 fffff880`0440e000   kbdhid   kbdhid.sys   Mon Jul 13 19:00:20 2009 (4A5BCA94)
    fffff880`0440e000 fffff880`0441b000   mouhid   mouhid.sys   Mon Jul 13 19:00:20 2009 (4A5BCA94)
    fffff880`04422000 fffff880`0447c000   usbhub   usbhub.sys   Mon Jul 13 19:07:09 2009 (4A5BCC2D)
    fffff880`0447c000 fffff880`04491000   NDProxy  NDProxy.SYS  Mon Jul 13 19:10:05 2009 (4A5BCCDD)
    fffff880`04491000 fffff880`044ed000   HdAudio  HdAudio.sys  Mon Jul 13 19:06:59 2009 (4A5BCC23)
    fffff880`044ed000 fffff880`0452a000   portcls  portcls.sys  Mon Jul 13 19:06:27 2009 (4A5BCC03)
    fffff880`0452a000 fffff880`0454c000   drmk     drmk.sys     Mon Jul 13 20:01:25 2009 (4A5BD8E5)
    fffff880`0454c000 fffff880`04551200   ksthunk  ksthunk.sys  Mon Jul 13 19:00:19 2009 (4A5BCA93)
    fffff880`04552000 fffff880`04560000   crashdmp crashdmp.sys Mon Jul 13 19:01:01 2009 (4A5BCABD)
    fffff880`04560000 fffff880`0456c000   dump_ataport dump_ataport.sys Mon Jul 13 18:19:47 2009 (4A5BC113)
    fffff880`0456c000 fffff880`04575000   dump_atapi dump_atapi.sys Mon Jul 13 18:19:47 2009 (4A5BC113)
    fffff880`04575000 fffff880`04588000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 18:21:51 2009 (4A5BC18F)
    fffff880`04588000 fffff880`04594000   Dxapi    Dxapi.sys    Mon Jul 13 18:38:28 2009 (4A5BC574)
    fffff880`04594000 fffff880`045b1000   usbccgp  usbccgp.sys  Mon Jul 13 19:06:45 2009 (4A5BCC15)
    fffff880`045b1000 fffff880`045b2f00   USBD     USBD.SYS     Mon Jul 13 19:06:23 2009 (4A5BCBFF)
    fffff880`045b3000 fffff880`045c1000   hidusb   hidusb.sys   Mon Jul 13 19:06:22 2009 (4A5BCBFE)
    fffff880`045c1000 fffff880`045da000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:06:21 2009 (4A5BCBFD)
    fffff880`045da000 fffff880`045e2080   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:06:17 2009 (4A5BCBF9)
    fffff880`045e3000 fffff880`045f8000   LHidFilt LHidFilt.Sys Tue Aug 24 12:21:36 2010 (4C73FFA0)
    fffff880`0480b000 fffff880`04deffe0   igdkmd64 igdkmd64.sys Wed Sep 23 14:22:57 2009 (4ABA7591)
    fffff880`04df0000 fffff880`04dfc000   ndistapi ndistapi.sys Mon Jul 13 19:10:00 2009 (4A5BCCD8)
    fffff880`05a00000 fffff880`05a67000   srv2     srv2.sys     Thu Aug 26 22:37:46 2010 (4C77330A)
    fffff880`05acf000 fffff880`05b75000   peauth   peauth.sys   Mon Jul 13 20:01:19 2009 (4A5BD8DF)
    fffff880`05b75000 fffff880`05b80000   secdrv   secdrv.SYS   Wed Sep 13 08:18:38 2006 (4508052E)
    fffff880`05b80000 fffff880`05bad000   srvnet   srvnet.sys   Thu Aug 26 22:37:24 2010 (4C7732F4)
    fffff880`05bad000 fffff880`05bbf000   tcpipreg tcpipreg.sys Mon Jul 13 19:09:49 2009 (4A5BCCCD)
    fffff880`05cf9000 fffff880`05d8f000   srv      srv.sys      Thu Aug 26 22:38:00 2010 (4C773318)
    fffff880`05d8f000 fffff880`05d97000   ALSysIO64 ALSysIO64.sys Sun Apr 19 14:41:04 2009 (49EB7E50)
    fffff880`05d97000 fffff880`05dcd000   fastfat  fastfat.SYS  Mon Jul 13 18:23:28 2009 (4A5BC1F0)
    fffff960`000a0000 fffff960`003b0000   win32k   win32k.sys   Tue Oct 19 22:08:46 2010 (4CBE5D3E)
    fffff960`005b0000 fffff960`005ba000   TSDDD    TSDDD.dll    Mon Jul 13 19:16:34 2009 (4A5BCE62)
    fffff960`00600000 fffff960`00627000   cdd      cdd.dll      Mon Nov 01 23:59:22 2010 (4CCF9AAA)
    
    Unloaded modules:
    fffff880`018a6000 fffff880`018b4000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`018b4000 fffff880`018c0000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018c0000 fffff880`018c9000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`018c9000 fffff880`018dc000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`018dc000 fffff880`01906000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0002A000
    I have to say that is just... nuts. It's like looking into a microscope and seeing a thousand dancing bananas.
      My Computer


  8. Posts : 46
    Win 7 Ultimate 64 Bit
    Thread Starter
       #38

    Now I took out my video card and am back on integrated video. And while watching a video it had a BSOD. So I unplugged my mouse and DVD burner and it crashed this time while I was scrolling through my Google reader feeds.
      My Computer


  9. Posts : 46
    Win 7 Ultimate 64 Bit
    Thread Starter
       #39

    Weird weird error now. Never saw this one before.

    Added another dump.

    More dumps.

    I really dont know anymore or have any ideas short of throwing this thing out the window.
    Last edited by rtc0523; 31 Jan 2011 at 21:10. Reason: Added dump.
      My Computer


  10. Posts : 46
    Win 7 Ultimate 64 Bit
    Thread Starter
       #40

    Ive established that if i try watching a 720p video on youtube full screened pretty quickly my computer will restart. If that helps to diagnose anything at all.

    But I guess that can be caused by the fact Im using integrated video right now.
    Last edited by rtc0523; 01 Feb 2011 at 01:10.
      My Computer


 
Page 4 of 6 FirstFirst ... 23456 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

й Designer Media Ltd
All times are GMT -5. The time now is 16:19.
Find Us