Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Stop error 3B or 1E crashdump help needed


21 Mar 2011   #1

Windows 7 Home Premium x64, including SP1
 
 
Stop error 3B or 1E crashdump help needed

Hi All,

I am experiencing numerous error's with my system, wich mostly results in a Stop 3B error and sometimes a 1E error.

System:
Asus P5QL pro
Intel Core 2 quad 8200
4 x 1 Gb RAM, A-data
400 W PSU
ATI HD 4650 graphics
1x 250 GB SATA, 2 x 2 TB SATA, all WD
1x TerraTec Cinergy C HD
1x TechniSat Cablestar 2 HD
1x Realtek NIC 1gbps
running Windows 7 Home Premium OEM x64 (installed again yesterday)

Hardware replaced so far/tested, but still getting the error's:
-Asus replaced with MSI P31 Neo V2
-400 W PSU is replacing a standard 300 W one
-Ech memory unit installed seperately and tested with Memtest86 (at least 6 passes per unit), no errors
-CPU tested with Prime95, no errors

The CrashDump file is about 300 MB, i analysed it, but i am unsure what the result's mean. If anybody can help me out?

This is the most recent crashdump (stop 1e)

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [G:\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c62e90
Debug session time: Sun Mar 20 18:38:10.978 2011 (UTC + 1:00)
System Uptime: 0 days 0:02:14.804
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols

Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - De bewerking is voltooid.

FAULTING_IP: 
+6137343861376362
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002f8b288 -- (.exr 0xfffff88002f8b288)
ExceptionAddress: fffff80002aac9c9 (nt!KiTryUnwaitThread+0x0000000000000159)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002f8b330 -- (.trap 0xfffff88002f8b330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa800859dcc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aac9c9 rsp=fffff88002f8b4c0 rbp=fffff88002f63180
 r8=0000000000000002  r9=0000000000000000 r10=00000000000000c1
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiTryUnwaitThread+0x159:
fffff800`02aac9c9 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0 ds:0950:4490=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a94ffe to fffff80002a9d610

STACK_TEXT:  
fffff880`02f8a368 fffff800`02a94ffe : 00000000`00000000 ffff0000`037abefa fffff880`02f8aae0 fffff800`02ac92a0 : nt!KeBugCheck
fffff880`02f8a370 fffff800`02ac8f6d : fffff800`02ca4a10 fffff800`02be0c78 fffff800`02a1d000 fffff880`02f8b288 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8a3a0 fffff800`02ac7d45 : fffff800`02be40fc fffff880`02f8a418 fffff880`02f8b288 fffff800`02a1d000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8a3d0 fffff800`02ad8dc1 : fffff880`02f8b288 fffff880`02f8aae0 fffff880`00000000 effff880`009ea180 : nt!RtlDispatchException+0x415
fffff880`02f8aab0 fffff800`02a9ccc2 : fffff880`02f8b288 fffffa80`0859db60 fffff880`02f8b330 fffffa80`0859dcc8 : nt!KiDispatchException+0x135
fffff880`02f8b150 fffff800`02a9b5ca : fffffa80`078e2a60 fffff880`04805f99 fffffa80`06d30480 fffff800`02b47164 : nt!KiExceptionDispatch+0xc2
fffff880`02f8b330 fffff800`02aac9c9 : 00000000`00000000 00000000`000007ff fffffa80`078e2c08 fffffa80`07a1eca0 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f8b4c0 fffff800`02aa61d1 : fffffa80`078885a8 fffffa80`078885a8 00000000`00000000 fffffa80`078885a0 : nt!KiTryUnwaitThread+0x159
fffff880`02f8b520 fffff800`02aa8ead : fffffa80`078885a0 fffffa80`076c69a8 fffffa80`076c69a8 00000000`00000102 : nt!KiTimerWaitTest+0x2d1
fffff880`02f8b5a0 fffff800`02aa8dee : 00000000`50598641 fffff880`02f8bc18 00000000`000021c1 fffff880`02f66da8 : nt!KiProcessExpiredTimerList+0x6d
fffff880`02f8bbf0 fffff800`02aa8bd7 : 00000000`1255d6c2 00000000`000021c1 00000000`1255d634 00000000`000000c0 : nt!KiTimerExpiration+0x1be
fffff880`02f8bc90 fffff800`02a9536a : fffff880`02f63180 fffff880`02f6dfc0 00000000`00000001 fffff800`00000000 : nt!KiRetireDpcList+0x277
fffff880`02f8bd40 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd00 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02a94ffe 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------
And the 3b crashdump:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\MEMORY 3b.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a14000 PsLoadedModuleList = 0xfffff800`02c59e90
Debug session time: Mon Mar 21 19:32:33.035 2011 (UTC + 1:00)
System Uptime: 0 days 0:00:39.861
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdf018).  Type ".hh dbgerr001" for details
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002a8a73e, fffff8800277c0d0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiInsertQueue+fe )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002a8a73e, Address of the instruction which caused the bugcheck
Arg3: fffff8800277c0d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.

FAULTING_IP: 
nt!KiInsertQueue+fe
fffff800`02a8a73e f0480fbaae9044000000 lock bts qword ptr [rsi+4490h],0

CONTEXT:  fffff8800277c0d0 -- (.cxr 0xfffff8800277c0d0)
rax=fffffa8007a7bab0 rbx=fffffa8007a7bab0 rcx=0000000000000001
rdx=fffffa80080fd950 rsi=effff88002fd3180 rdi=fffffa800810db60
rip=fffff80002a8a73e rsp=fffff8800277cab0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffffa8003a39f30
r11=00000000000f00ff r12=fffff88002f63180 r13=fffffa8007a7bab8
r14=fffffa800810dc68 r15=fffffa800810d768
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!KiInsertQueue+0xfe:
fffff800`02a8a73e f0480fbaae9044000000 lock bts qword ptr [rsi+4490h],0 ds:002b:effff880`02fd7610=????????????????
Resetting default scope

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002d7ce64 to fffff80002a8a73e

STACK_TEXT:  
fffff880`0277cab0 fffff800`02d7ce64 : 00000000`00000000 fffffa80`080fd950 00000000`01bf1b00 fffff880`00000000 : nt!KiInsertQueue+0xfe
fffff880`0277cb30 fffff800`02a80c42 : 00000000`00000000 00000000`00000001 fffffa80`07af0bd0 fffffa80`07af0bd0 : nt!IoSetIoCompletionEx+0x58
fffff880`0277cb60 fffff800`02a938d3 : fffffa80`0811b660 fffffa80`07af0bd0 fffff880`0277cc60 00000000`01bf1b00 : nt!NtReleaseWorkerFactoryWorker+0x196
fffff880`0277cbe0 00000000`77cc26ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0187f248 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cc26ca


FOLLOWUP_IP: 
nt!KiInsertQueue+fe
fffff800`02a8a73e f0480fbaae9044000000 lock bts qword ptr [rsi+4490h],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiInsertQueue+fe

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff8800277c0d0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiInsertQueue+fe

BUCKET_ID:  X64_0x3B_nt!KiInsertQueue+fe

Followup: MachineOwner
---------

Thanx for any help in advance!

WBMK

My System SpecsSystem Spec
.

21 Mar 2011   #2

Win 7 Pro x64 SP1 OS X Snow Leopard 10.6.7
 
 

My System SpecsSystem Spec
21 Mar 2011   #3

Windows 7 Home Premium x64, including SP1
 
 

DeanP,

Sorry for not posting the attachment's right away, but my system is verry unstable... With some effort, i attached the files to my initial post.

Regards,

wbmk
My System SpecsSystem Spec
.


21 Mar 2011   #4

Microsoft Community Contributor Award Recipient

Windows 7 Home Premium 64bit
 
 

Belongs to your USB SmartCard reader. Either find a newer update or get rid of it.
GKUPRO2D.sys Fri Feb 18 04:57:02 2005


ASACPI.sys Sun Mar 27 22:30:36 2005
Quote:
The 2005 version of this driver is a known BSOD cause.
Please visit this link: ASUSTeK Computer Inc.-Support- download_item_mkt
Scroll down to the Utilities category, then scroll down to the "ATK0110 driver for WindowsXP/Vista/Windows 7 32&64-bit " (it's about the 8th item down).
Download and install it.
Go to C:\Windows\System32\drivers to check and make sure that the ASACPI.sys file is date stamped from 2009 or 2010 (NOT 2005).

atikmdag.sys Mon Aug 17 23:05:47 2009

Update your video card drivers. They are 2 years out of date
My System SpecsSystem Spec
22 Mar 2011   #5

Windows 7 Home Premium x64, including SP1
 
 

mgorman87,

Thank you for your reply!

I did not have a chance to update all the drivers yet.. i did a fresh reinstall of windows last sunday.

I really hope that if i update the drivers conforming your recomendation it solves the BSOD's...

Did you have a chance to look at the 3B error in my first post? I thought maybe it is a memory related error after all... (i did run memtest86 for at least 6 passes)

Thanx for your help so far!

Regards,

wbmk
My System SpecsSystem Spec
22 Mar 2011   #6

Windows 7 Home Premium x64, including SP1
 
 

DeanP, mgroman87,

I updated the drivers as suggested. Almost immediately afterwards the system crashed again with stop error 1E


Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c62e90
Debug session time: Tue Mar 22 18:21:17.500 2011 (UTC + 1:00)
System Uptime: 0 days 0:04:08.326
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols

Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - De bewerking is voltooid.

FAULTING_IP: 
+6137343861376362
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002f8b2e8 -- (.exr 0xfffff88002f8b2e8)
ExceptionAddress: fffff80002aa60e2 (nt!KiTimerWaitTest+0x00000000000001e2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002f8b390 -- (.trap 0xfffff88002f8b390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8008ac83b0 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aa60e2 rsp=fffff88002f8b520 rbp=fffffa8008af1c28
 r8=fffff88002f65301  r9=0000000000000004 r10=000000000000002e
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiTimerWaitTest+0x1e2:
fffff800`02aa60e2 f0490fbaaf9044000000 lock bts qword ptr [r15+4490h],0 ds:00000000`00004490=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a94ffe to fffff80002a9d610

STACK_TEXT:  
fffff880`02f8a3c8 fffff800`02a94ffe : fffffa80`0821b190 fffffa80`0821b010 fffff880`02f8ab40 fffff800`02ac92a0 : nt!KeBugCheck
fffff880`02f8a3d0 fffff800`02ac8f6d : fffff800`02ca4a10 fffff800`02be0c78 fffff800`02a1d000 fffff880`02f8b2e8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8a400 fffff800`02ac7d45 : fffff800`02be40fc fffff880`02f8a478 fffff880`02f8b2e8 fffff800`02a1d000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8a430 fffff800`02ad8dc1 : fffff880`02f8b2e8 fffff880`02f8ab40 fffff880`00000000 fffffa80`08af1c20 : nt!RtlDispatchException+0x415
fffff880`02f8ab10 fffff800`02a9ccc2 : fffff880`02f8b2e8 fffffa80`08af1c28 fffff880`02f8b390 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`02f8b1b0 fffff800`02a9b5ca : fffffa80`03c37a02 fffffa80`03c37a50 fffffa80`06c32a00 fffffa80`07ec0150 : nt!KiExceptionDispatch+0xc2
fffff880`02f8b390 fffff800`02aa60e2 : fffffa80`078d4060 fffff880`052513e4 fffffa80`079de7d0 fffff880`04004af4 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f8b520 fffff800`02aa8ead : fffffa80`08af1c20 fffff880`05251d8f 00000000`00000000 00000000`00000102 : nt!KiTimerWaitTest+0x1e2
fffff880`02f8b5a0 fffff800`02aa8dee : 00000000`94039c2c fffff880`02f8bc18 00000000`00003e2e fffff880`02f65b48 : nt!KiProcessExpiredTimerList+0x6d
fffff880`02f8bbf0 fffff800`02aa8bd7 : 00000000`21bd95c3 00000000`00003e2e 00000000`21bd95b8 00000000`0000002e : nt!KiTimerExpiration+0x1be
fffff880`02f8bc90 fffff800`02a9536a : fffff880`02f63180 fffff880`02f6dfc0 00000000`00000001 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff880`02f8bd40 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd00 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02a94ffe 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------
I analysed the system again, and attached it.

Could you offer other suggestions to solve my problem?

Regards,

wbmk
My System SpecsSystem Spec
24 Mar 2011   #7

Windows 7 Home Premium x64, including SP1
 
 

Hi,

Does anybody have an idea what could cause these error's?

I ran Memtest86 again last night. Just to be sure... i exited it this morning after 11 passes with no error's.

Than i tried to boot Windows, but as soon as i logged in i had another BSOD (3B). I did not have the time to generate a new report yet.

Regards,

WBMK
My System SpecsSystem Spec
30 Mar 2011   #8

Microsoft Community Contributor Award Recipient

Windows 7 Home Premium 64bit
 
 

Sorry for such the long delay between posts.

Run memtest for 7-8 passes - RAM - Test with Memtest86+
Run all three Prime95 tests - http://www.sevenforums.com/tutorials...t-prime95.html


Please enable driver verifier
Driver Verifier - Enable and Disable

Code:
GKUPRO2D.sys Fri Feb 18 04:57:02 2005 (4215BBEE)
Update your NMB Dell USB Smart Card Reader Keyboard
- here

Code:
L1E62x64.sys Sun Aug 23 01:08:09 2009 (4A90CEB9)
Update your Atheros drivers from - here

Code:
Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
Please update your Realtek drivers - here

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Mike\AppData\Local\Temp\Rar$DI00.337\032211-43617-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c62e90
Debug session time: Tue Mar 22 13:21:17.500 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:08.326
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+3236346234643763
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002f8b2e8 -- (.exr 0xfffff88002f8b2e8)
ExceptionAddress: fffff80002aa60e2 (nt!KiTimerWaitTest+0x00000000000001e2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002f8b390 -- (.trap 0xfffff88002f8b390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8008ac83b0 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aa60e2 rsp=fffff88002f8b520 rbp=fffffa8008af1c28
 r8=fffff88002f65301  r9=0000000000000004 r10=000000000000002e
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiTimerWaitTest+0x1e2:
fffff800`02aa60e2 f0490fbaaf9044000000 lock bts qword ptr [r15+4490h],0 ds:00000000`00004490=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a94ffe to fffff80002a9d610

STACK_TEXT:  
fffff880`02f8a3c8 fffff800`02a94ffe : fffffa80`0821b190 fffffa80`0821b010 fffff880`02f8ab40 fffff800`02ac92a0 : nt!KeBugCheck
fffff880`02f8a3d0 fffff800`02ac8f6d : fffff800`02ca4a10 fffff800`02be0c78 fffff800`02a1d000 fffff880`02f8b2e8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8a400 fffff800`02ac7d45 : fffff800`02be40fc fffff880`02f8a478 fffff880`02f8b2e8 fffff800`02a1d000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8a430 fffff800`02ad8dc1 : fffff880`02f8b2e8 fffff880`02f8ab40 fffff880`00000000 fffffa80`08af1c20 : nt!RtlDispatchException+0x415
fffff880`02f8ab10 fffff800`02a9ccc2 : fffff880`02f8b2e8 fffffa80`08af1c28 fffff880`02f8b390 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`02f8b1b0 fffff800`02a9b5ca : fffffa80`03c37a02 fffffa80`03c37a50 fffffa80`06c32a00 fffffa80`07ec0150 : nt!KiExceptionDispatch+0xc2
fffff880`02f8b390 fffff800`02aa60e2 : fffffa80`078d4060 fffff880`052513e4 fffffa80`079de7d0 fffff880`04004af4 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f8b520 fffff800`02aa8ead : fffffa80`08af1c20 fffff880`05251d8f 00000000`00000000 00000000`00000102 : nt!KiTimerWaitTest+0x1e2
fffff880`02f8b5a0 fffff800`02aa8dee : 00000000`94039c2c fffff880`02f8bc18 00000000`00003e2e fffff880`02f65b48 : nt!KiProcessExpiredTimerList+0x6d
fffff880`02f8bbf0 fffff800`02aa8bd7 : 00000000`21bd95c3 00000000`00003e2e 00000000`21bd95b8 00000000`0000002e : nt!KiTimerExpiration+0x1be
fffff880`02f8bc90 fffff800`02a9536a : fffff880`02f63180 fffff880`02f6dfc0 00000000`00000001 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff880`02f8bd40 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd00 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02a94ffe 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------

2: kd> lmntsm
start             end                 module name
fffff880`00f5a000 fffff880`00fb1000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`03a29000 fffff880`03ab2000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`04534000 fffff880`0454a000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c4f000 fffff880`00c5a000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`04510000 fffff880`04518000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`06a71000 fffff880`06a7c000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00e9a000 fffff880`00ea3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c1a000 fffff880`00c44000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`052b9000 fffff880`052d9000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`04891000 fffff880`051c6000   atikmdag atikmdag.sys Sat Feb 26 22:42:19 2011 (4D69C81B)
fffff880`0407f000 fffff880`040ce000   atikmpag atikmpag.sys Sat Feb 26 22:59:42 2011 (4D69CC2E)
fffff880`044c7000 fffff880`044cae80   BdaSup   BdaSup.SYS   Mon Jul 13 20:06:40 2009 (4A5BCC10)
fffff880`019e7000 fffff880`019ee000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03a0f000 fffff880`03a20000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`063c1000 fffff880`063df000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00630000 fffff960`00657000   cdd      cdd.dll      unavailable (00000000)
fffff880`01668000 fffff880`01692000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00d27000 fffff880`00de7000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01600000 fffff880`01630000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00cc9000 fffff880`00d27000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01072000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`04524000 fffff880`04534000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`053a2000 fffff880`053b0000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`010a1000 fffff880`010bf000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`03a00000 fffff880`03a0f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`019d1000 fffff880`019e7000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05316000 fffff880`05338000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`053b0000 fffff880`053bc000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`053c7000 fffff880`053da000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`053bc000 fffff880`053c7000   dump_msahci dump_msahci.sys Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`053da000 fffff880`053e6000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`040ce000 fffff880`041c2000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`04800000 fffff880`04846000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`0284d000 fffff880`02935000   eamonm   eamonm.sys   Wed Apr 07 14:58:42 2010 (4BBCD5E2)
fffff880`0148b000 fffff880`014b0000   ehdrv    ehdrv.sys    Wed Apr 07 14:59:27 2010 (4BBCD60F)
fffff880`0629e000 fffff880`062bf000   epfwwfpr epfwwfpr.sys Wed Apr 07 14:54:29 2010 (4BBCD4E5)
fffff880`02800000 fffff880`02836000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01142000 fffff880`01156000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010f6000 fffff880`01142000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`013f0000 fffff880`013fa000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01997000 fffff880`019d1000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`018a4000 fffff880`018ee000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`02768000 fffff880`02785780   GKUPRO2D GKUPRO2D.sys Fri Feb 18 04:57:02 2005 (4215BBEE)
fffff800`03007000 fffff800`03050000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`04846000 fffff880`0486a000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`05338000 fffff880`05394000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`05282000 fffff880`0529b000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`0529b000 fffff880`052a3080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`053e6000 fffff880`053f4000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`062f8000 fffff880`063c1000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`0198e000 fffff880`01997000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`011b4000 fffff880`011ca000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04400000 fffff880`0440f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05394000 fffff880`053a2000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bcc000 fffff800`00bd6000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04484000 fffff880`044c7000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`013c4000 fffff880`013df000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`044cb000 fffff880`044d0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`051c6000 fffff880`051d8000   L1E62x64 L1E62x64.sys Sun Aug 23 01:08:09 2009 (4A90CEB9)
fffff880`02956000 fffff880`0296b000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`027ae000 fffff880`027d1000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c66000 fffff880`00cb5000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`027a0000 fffff880`027ae000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0440f000 fffff880`0441e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05200000 fffff880`0520d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00c00000 fffff880`00c1a000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`063df000 fffff880`063f7000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06200000 fffff880`0622d000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`0622d000 fffff880`0627a000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`0627a000 fffff880`0629e000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`00c44000 fffff880`00c4f000   msahci   msahci.sys   Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`01200000 fffff880`0120b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fba000 fffff880`00fc4000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01156000 fffff880`011b4000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`03bf4000 fffff880`03bff000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0442d000 fffff880`04484000   MtsBda   MtsBda.sys   Thu Jul 02 06:35:48 2009 (4A4C8D84)
fffff880`05278000 fffff880`05282000   MtsHID   MtsHID.sys   Fri Jan 25 01:02:45 2008 (47997B85)
fffff880`0197c000 fffff880`0198e000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014b8000 fffff880`015ab000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`0456e000 fffff880`0457a000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`029be000 fffff880`029d1000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`0457a000 fffff880`045a9000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`052a4000 fffff880`052b9000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`03b3c000 fffff880`03b4b000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03ab2000 fffff880`03af7000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`0266d000 fffff880`02723000   netr7364 netr7364.sys Thu Mar 12 23:13:08 2009 (49B9CF44)
fffff880`0120b000 fffff880`0121c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03be8000 fffff880`03bf4000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a1d000 fffff800`03007000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01221000 fffff880`013c4000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`01692000 fffff880`0169b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0296b000 fffff880`029be000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03b00000 fffff880`03b26000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00e0d000 fffff880`00e22000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00fc4000 fffff880`00ff7000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00e93000 fffff880`00e9a000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00de7000 fffff880`00df7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013df000 fffff880`013f0000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`068ef000 fffff880`06995000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`052d9000 fffff880`05316000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cb5000 fffff880`00cc9000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0454a000 fffff880`0456e000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`045a9000 fffff880`045c4000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`045c4000 fffff880`045e5000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`045e5000 fffff880`045ff000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03b97000 fffff880`03be8000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`015e0000 fffff880`015e9000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015e9000 fffff880`015f2000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015f2000 fffff880`015fb000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01942000 fffff880`0197c000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`029d1000 fffff880`029e9000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`044d1000 fffff880`04510000   Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
fffff880`02792000 fffff880`027a0000   scfilter scfilter.sys Sat Nov 20 05:09:59 2010 (4CE79E77)
fffff880`06995000 fffff880`069a0000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04518000 fffff880`04524000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03b4b000 fffff880`03b68000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`02786000 fffff880`02792000   SMCLIB   SMCLIB.SYS   Mon Jul 13 20:00:35 2009 (4A5BCAA3)
fffff880`0193a000 fffff880`01942000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06a00000 fffff880`06a71000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`06ad2000 fffff880`06b6b000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`06800000 fffff880`0686b000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`069a0000 fffff880`069d1000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`0441e000 fffff880`0441f480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`016a0000 fffff880`018a4000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`069d1000 fffff880`069e3000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`01094000 fffff880`010a1000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`01072000 fffff880`01094000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`03b83000 fffff880`03b97000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00510000 fffff960`0051a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`010bf000 fffff880`010e5000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`051d8000 fffff880`051ea000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`0274b000 fffff880`02768000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`053f4000 fffff880`053f5f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04877000 fffff880`04888000   usbehci  usbehci.sys  Sat Nov 20 05:43:54 2010 (4CE7A66A)
fffff880`0521e000 fffff880`05278000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Sat Nov 20 05:44:00 2010 (4CE7A670)
fffff880`02730000 fffff880`0274b000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
fffff880`0486a000 fffff880`04877000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00e00000 fffff880`00e0d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019ee000 fffff880`019fc000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`015ab000 fffff880`015d0000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e22000 fffff880`00e37000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e37000 fffff880`00e93000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`018ee000 fffff880`0193a000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`02723000 fffff880`02730000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`03b26000 fffff880`03b3c000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03b68000 fffff880`03b83000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`015d0000 fffff880`015e0000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ea7000 fffff880`00f4b000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f4b000 fffff880`00f5a000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03af7000 fffff880`03b00000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00050000 fffff960`00361000   win32k   win32k.sys   unavailable (00000000)
fffff880`00fb1000 fffff880`00fba000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02935000 fffff880`02956000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
fffff880`06b6b000 fffff880`06b9c000   WUDFRd   WUDFRd.sys   Sat Nov 20 05:43:32 2010 (4CE7A654)

Unloaded modules:
fffff880`01630000 fffff880`0163e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0163e000 fffff880`0164a000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0164a000 fffff880`01655000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`01655000 fffff880`01668000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
31 Mar 2011   #9

Windows 7 Home Premium x64, including SP1
 
 

mgorman87,

Thanx for taking the time to reply.

I did run memtest for 11 (!) passes with no error's. I ran the Intel burntest, and it stated that there where some minor issues with the CPU. I started to wonder if the CPU was causing the problem. I returned the CPU to the vendor and, if i am luky, i will recieve a new one today (waranty)

Once installed i hope my problems are solved.

Thank for pointing out the Dell UISB keyboard driver. I had some trouble finding the correct one!

Regards,

WBMK
My System SpecsSystem Spec
07 Apr 2011   #10

Windows 7 Home Premium x64, including SP1
 
 

Well,

I got the new CPU in, and at first everything seemed to be OK. But after an hour or 2 the system got unstable again and crashed a few times with different stop error's.

Finally i decided to buy new memory (kingston this time) and put those in last saturday.

I am happy to report that the system is still up and running without error's (for 5 day's uninterrupted so far)

Although i ran memtest86 for 11 passes (for over 12 hours) on the old modules without error's it seems to me that the memory was faulty. When i add 2 old modules to the 2 new ones the system is unstable again...

Just wanted to let u know..

Regards, WBMK
My System SpecsSystem Spec
Reply

 Stop error 3B or 1E crashdump help needed




Thread Tools




Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 11:23 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33