Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Misc BSOD, replaced every part in my computer - Need some assistance!


28 Mar 2011   #1

Windows 7 Ultimate x64
 
 
Misc BSOD, replaced every part in my computer - Need some assistance!

This is my first time posting here although I am a frequent "lurker". This forum has tons and tons of valuable information and it really helps me a lot without actually having to post or ask questions.

Now to the real reason I am posting. I have receiving frequent BSOD's. It will go 2-3 days without them and then BSOD 4-5 times in the middle of the night or even while I simply browsing the website. I have been battling with this issue for months and over the passed couple of months I have replaced nearly EVERY part in my computer.

The BSOD that I am recieving are a variety of errors. 0x000000A, 0x00000109.

I am also receiving an error in my logs:
The IOCBIOS service failed to start due to the following error:
The system cannot find the path specified.

I researched this and found some people think its a virus. This is a fresh brand new install of windows with close to nothing installed. After I formated and did a clean install it didnt BSOD for days and then one night it BSOD 4-5 times in the middle of the night.

Parts replaced:
Motherboard
Ram (was 4GB now 8GB switch from PNY to Corsair)
PSU
HDD
Video card

I have not replaced the actual CPU itself..

I have gone out to Intel's support site and downloaded the latest drivers for the Chipset and LAN thinking this may have been the issue but yet I am still receiving BSOD.

Computer Spec's as follows:

Intel DP45SG Extreme Motherboard
Q9300 Quad Core
8GB memory (CMX8GX3M4B1333C9)
160GB WD 10,000RPM drive
600W Corsair PSU
Nvidia GeForce 460 GTS 1GB memory
Windows 7 Ultimate x64

Unfortunately it was set to a single .dmp file not mini dumps so the file of my .dmp is about 1GB.
I have uploaded the dumps that I found.. A few are today. A new one includes 0x03b

Can anyone shed some light on this? I can zip this huge .dmp file for you and send it your way if that will help AND I have already changed it to do multiple minidump files so I can send whatever I get over the next few days because there is no doubt I will get more BSOD's soon.

Thanks in advance for your help. I really do appreciate it. Sorry if I left out any information.

My System SpecsSystem Spec
.

28 Mar 2011   #2

Windows 7 x64
 
 

Quote:
The IOCBIOS service failed to start due to the following error:
The system cannot find the path specified.
That's Intel(R) Extreme Tuning Utility Performance Tuning service that can't start. Path not found, strange. In combination with Stop 0x109.

You have upgraded hardware and you're getting crashes after system reinstall.


Set all hardware clocks as recommended by the manufacturer. Attach:

- CPU-Z MEMORY and CPU tabs snips
- RAMMON HTML report
- Drivers List by Nirsot DriverView
- Uninstall Intel(R) Extreme Tuning Utility Performance Tuning
My System SpecsSystem Spec
28 Mar 2011   #3

Windows 7 Ultimate x64
 
 

Intel Extreme Tuning Utility would not install on my board due to my version of BIOS. Once they replaced the board the software would no longer install but I did try and it errored out. There is nothing in my Add/Remove programs, nothing under services. I may have to do a fresh install to remove that but I dont think that is what is causing my BSOD.

I am attaching the reports you requested. Everything is defaulted, I have never overclocked and it is all brand new hardware.

Let me know if you need anything else. If it blue screens any time at all tonight I will post the mini dmp file for you.

Thanks for your help. It is greatly appreciated.
My System SpecsSystem Spec
.


28 Mar 2011   #4

Windows 7 Ultimate x64
 
 

Can a spare hard drive cause a BSOD? It prevented me from installing windows and checking or downloading windows updates.

After I got Windows installed and installed the updates I plugged it back in and it was fine for days then I come home last night around 12PM and go to log in and it immediately blue screens. After I get logged back in I check my logs and it had blue screened quite a few times over the weekend while I was out of town.
My System SpecsSystem Spec
28 Mar 2011   #5

Windows 7 Ultimate x64
 
 
CPU

Hi I am getting random BSOD's and I've replaced every part in my computer except for my CPU. I am getting completely random BSOD with nearly a different code every time.

I contacted Intel and they seeing as how I have replaced every part in my computer except for the CPU they could only offer me a replacement CPU.

The representative said he had never seem it as bad as mine but has seen CPU the cause a BSOD. I also asked him if there are any know incompatible drivers for Windows 7 on my board and he said nothing that would cause those types of problems.

Does this sound like it could be a bad CPU processor?
As far as performance I can have 8 Remote Desktop Sessions open (multiple computers at work) and play Starcraft 2 at the same time and it wont crash. But I'll wake up after sleeping 8 hours and it will have rebooted and recovered from a BSOD from in the middle of the night.

Thanks for your help.
My System SpecsSystem Spec
28 Mar 2011   #6

Windows 7 Ultimate x64
 
 

Quick update:

I came home, first thing after unlocking my machine it blue screened out. Gave me yet again another, different blue screen error this time. 0x03b

Since I have been on it a good 6 hours now It has not blue screened since.

I am still getting the IOCBIOS servvice failed error.. I am not quite sure how to fix this as the software is not installed and I deleted all traces of it on the HDD.
My System SpecsSystem Spec
29 Mar 2011   #7

Windows 7 x64
 
 

Hi,

the CPU is not overclocked and the memory sticks are identical and are set correctly: CMX8GX3M4B1333C9 1333MHz, 9-9-9-24, 1.65V. You might need to set the voltage 1.65 manually.


WinDbg output:

Quote:

032811-12604-01.dmp
BugCheck 3B, {c0000005, fffff80002c7622f, fffff880063810b0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+34f )

032811-12729-01.dmp
BugCheck 1E, {ffffffffc0000005, fffff80002cb1acf, 0, 10}
Probably caused by : memory_corruption ( nt!MiSwapWslEntries+13f )

032311-14086-01.dmp
BugCheck 19, {3, fffff80002c18cb0, fffff80002c38cb0, fffff80002c18cb0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )

032811-16863-01.dmp
BugCheck A, {2000a, 2, 0, fffff80002cdeef1}
Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+47e )


Uninstall LogMeIn / RemotelyAnywhere
lmimirr.sys Tue Apr 10 18:32:45 2007
LMIRfsDriver.sys Mon Jul 14 12:26:56 2008
RaInfo.sys Fri Jan 04 13:57:14 2008


Quote:
I am still getting the IOCBIOS servvice failed error.
You need to clear tracks of Intel Extreme Overclocking utility, you could use CCleaner. Or you can turn off its service in Control Panel > Administrative > Services.



Quote:
Can a spare hard drive cause a BSOD? It prevented me from installing windows and checking or downloading windows updates.
DISCONNECT IT FOR NOW.


Quote:
I came home, first thing after unlocking my machine it blue screened out. Gave me yet again another, different blue screen error this time. 0x03b

Since I have been on it a good 6 hours now It has not blue screened since.


Hi I am getting random BSOD's and I've replaced every part in my computer except for my CPU. I am getting completely random BSOD with nearly a different code every time.
This is certainly some hardware issue. Uninstall LogMeIn, disconnect the hard drive you mentioned, and if BSOD's persist you may want to run hardware diagnostics:

RAM - Test with Memtest86+

Video Card - Stress Test with Furmark

http://www.sevenforums.com/tutorials...t-prime95.html

HD Diagnostic








CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032811-16863-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c4d000 PsLoadedModuleList = 0xfffff800`02e8ae50
Debug session time: Mon Mar 28 00:44:28.184 2011 (UTC - 4:00)
System Uptime: 1 days 20:21:53.679
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {2000a, 2, 0, fffff80002cdeef1}

Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+47e )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000002000a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cdeef1, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef50e0
 000000000002000a 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MmUnlockPages+11
fffff800`02cdeef1 440fb7410a      movzx   r8d,word ptr [rcx+0Ah]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  fffff88002f93670 -- (.trap 0xfffff88002f93670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060970 rbx=0000000000000000 rcx=0000000000020000
rdx=fffff88002f93906 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cdeef1 rsp=fffff88002f93800 rbp=00000000a000000c
 r8=000000000000000b  r9=fffff88003f622d0 r10=0000000000000020
r11=fffff88002f93968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MmUnlockPages+0x11:
fffff800`02cdeef1 440fb7410a      movzx   r8d,word ptr [rcx+0Ah] ds:1970:00000000`0002000a=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cbcca9 to fffff80002cbd740

STACK_TEXT:  
fffff880`02f93528 fffff800`02cbcca9 : 00000000`0000000a 00000000`0002000a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f93530 fffff800`02cbb920 : fffffa80`07b2b300 00000000`00020000 fffffa80`07d451a0 fffff880`10b67f79 : nt!KiBugCheckDispatch+0x69
fffff880`02f93670 fffff800`02cdeef1 : fffff880`02f64180 fffffa80`08fe5301 fffffa80`07b2b538 fffffa80`082a41a0 : nt!KiPageFault+0x260
fffff880`02f93800 fffff800`02cbfae8 : fffffa80`089c3150 fffff880`10b8f0d8 fffffa80`07b2b300 fffff880`03f612c3 : nt!MmUnlockPages+0x11
fffff880`02f93890 fffff880`03f5fcd6 : 00000000`00000004 fffffa80`08aa0a06 fffffa80`08aa0ad0 00000000`00000000 : nt!IopfCompleteRequest+0x168
fffff880`02f93970 fffff880`05185c79 : 00000000`00000002 00000000`ffffffff fffffa80`07bd1010 fffffa80`08aa0190 : mouclass!MouseClassServiceCallback+0x47e
fffff880`02f939f0 fffff800`02cbfd26 : fffffa80`07e8fd93 fffff880`00000000 fffffa80`00000001 00000000`00000000 : mouhid!MouHid_ReadComplete+0x69d
fffff880`02f93a70 fffff880`05165acc : fffffa80`08a90c50 fffffa80`08a90c06 fffffa80`08a8f700 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f93b50 fffff880`05165d35 : fffffa80`08a90602 fffffa80`08a90660 fffffa80`08a8f7e0 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x130
fffff880`02f93be0 fffff800`02cbfd26 : fffffa80`07bc6ee3 00000000`00000000 fffffa80`08a8f601 fffffa80`07bc6c60 : HIDCLASS!HidpInterruptReadComplete+0x235
fffff880`02f93c70 fffff880`10b755d9 : fffffa80`07d45050 fffffa80`06ccf500 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f93d50 fffff880`10b75ab7 : fffffa80`08ee1502 fffffa80`07bc6c60 00000000`ffffffff fffffa80`07d45ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f93e30 fffff880`10b7364f : fffffa80`07d45ea8 fffffa80`07d451a0 fffffa80`07d46040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f93e90 fffff880`10b64f89 : fffffa80`07d45050 00000000`00000000 fffffa80`07d45e02 fffffa80`07d45ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f93ed0 fffff800`02cc8bfc : fffff880`02f64180 fffffa80`07d45ea8 fffffa80`07d45ec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f93f00 fffff800`02cc3865 : fffff880`02f8cc98 fffffa80`08ae2580 00000000`00000000 fffff880`10b64db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f93fb0 fffff800`02cc367c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`046fabe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
mouclass!MouseClassServiceCallback+47e
fffff880`03f5fcd6 488d4e20        lea     rcx,[rsi+20h]

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  mouclass!MouseClassServiceCallback+47e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: mouclass

IMAGE_NAME:  mouclass.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc116

FAILURE_BUCKET_ID:  X64_0xA_mouclass!MouseClassServiceCallback+47e

BUCKET_ID:  X64_0xA_mouclass!MouseClassServiceCallback+47e

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032311-14086-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Wed Mar 23 14:49:08.402 2011 (UTC - 4:00)
System Uptime: 0 days 6:15:44.947
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {3, fffff80002c18cb0, fffff80002c38cb0, fffff80002c18cb0}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )

Followup: Pool_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffff80002c18cb0, the pool entry being checked.
Arg3: fffff80002c38cb0, the read back flink freelist value (should be the same as 2).
Arg4: fffff80002c18cb0, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR:  0x19_3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Downloader_Dia

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002bbcd6f to fffff80002a89740

STACK_TEXT:  
fffff880`03b03b88 fffff800`02bbcd6f : 00000000`00000019 00000000`00000003 fffff800`02c18cb0 fffff800`02c38cb0 : nt!KeBugCheckEx
fffff880`03b03b90 fffff800`02a691ea : fffff880`00000000 00000000`00000000 00000000`6c624e54 fffffa80`00000000 : nt!ExDeferredFreePool+0xa56
fffff880`03b03c80 fffff880`01490271 : fffff8a0`09b53010 fffffa80`00000038 fffff880`01254a00 00060000`000000a0 : nt!ExAllocatePoolWithTagPriority+0x4a
fffff880`03b03d10 fffff880`015828a1 : fffffa80`00000001 00000000`00000009 fffff880`03b03e98 00000000`00000014 : ndis!NdisAllocateNetBufferList+0x342
fffff880`03b03d60 fffff880`0167a329 : 00000000`00000009 fffffa80`079fe5f0 00000000`00000000 00000000`00000000 : NETIO!NetioAllocateAndReferenceNetBufferListNetBufferMdlAndData+0x21
fffff880`03b03d90 fffff880`01678bc9 : fffffa80`08f04190 00000000`00000001 00000000`0000b48f 00000000`00000009 : tcpip!TcpBeginTcbSend+0x299
fffff880`03b04010 fffff880`0167703a : fffff880`03b04300 fffff8a0`09b53450 00000000`00000000 fffff880`03b04300 : tcpip!TcpTcbSend+0x1d9
fffff880`03b04290 fffff880`01676e28 : fffffa80`079fe5f0 fffffa80`079fe5f0 00000000`00000000 00000000`00000001 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0x19a
fffff880`03b042c0 fffff880`01676e7b : 00000000`00003f01 fffff800`02abc0be fffffa80`06f70b60 fffff880`010dd0a2 : tcpip!TcpEnqueueTcbSend+0x438
fffff880`03b04360 fffff800`02a98e5a : fffff880`03b04430 fffff880`010dc32e fffffa80`09246440 fffff880`03b044c0 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
fffff880`03b04390 fffff880`0167cdaa : fffff880`01676e60 fffff880`03b044a0 fffffa80`0731c600 fffff880`02cf36ac : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`03b04470 fffff880`02d0b67b : fffffa80`078e7260 fffff880`03b04ca0 00000000`00000009 fffffa80`06d3e280 : tcpip!TcpTlConnectionSend+0x7a
fffff880`03b044e0 fffff880`02cf2423 : 00000000`00000000 fffffa80`00000000 00000000`00000000 fffff880`03b048f0 : afd!AfdFastConnectionSend+0x38b
fffff880`03b046a0 fffff800`02da22b3 : 00000000`00000009 fffffa80`09244490 00000000`03a4f5d4 fffff800`02bbe201 : afd!AfdFastIoDeviceControl+0x413
fffff880`03b04a10 fffff800`02da2da6 : fffffa80`08dc0060 00000000`000006b4 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
fffff880`03b04b40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+a56
fffff800`02bbcd6f cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExDeferredFreePool+a56

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a56

BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a56

Followup: Pool_corruption
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032811-12729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
Debug session time: Mon Mar 28 17:49:48.328 2011 (UTC - 4:00)
System Uptime: 0 days 9:27:40.873
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002cb1acf, 0, 10}

Probably caused by : memory_corruption ( nt!MiSwapWslEntries+13f )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cb1acf, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000010, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MiSwapWslEntries+13f
fffff800`02cb1acf 488b5110        mov     rdx,qword ptr [rcx+10h]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000010

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
 0000000000000010 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  SearchIndexer.

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff8800779c8e8 -- (.exr 0xfffff8800779c8e8)
ExceptionAddress: fffff80002cb1acf (nt!MiSwapWslEntries+0x000000000000013f)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010

TRAP_FRAME:  fffff8800779c990 -- (.trap 0xfffff8800779c990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cb1acf rsp=fffff8800779cb20 rbp=fffff8800779cca0
 r8=fffff80002c11000  r9=fffffa8000000000 r10=0000000000000000
r11=fffff8800779ca60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiSwapWslEntries+0x13f:
fffff800`02cb1acf 488b5110        mov     rdx,qword ptr [rcx+10h] ds:00000000`00000010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cbba39 to fffff80002c81740

STACK_TEXT:  
fffff880`0779c118 fffff800`02cbba39 : 00000000`0000001e ffffffff`c0000005 fffff800`02cb1acf 00000000`00000000 : nt!KeBugCheckEx
fffff880`0779c120 fffff800`02c80d82 : fffff880`0779c8e8 fffffa80`08f22820 fffff880`0779c990 fffff680`00000000 : nt!KiDispatchException+0x1b9
fffff880`0779c7b0 fffff800`02c7f8fa : 00000000`00000000 fffffa80`08f22820 fffff880`0779cb00 00000000`06c0fa00 : nt!KiExceptionDispatch+0xc2
fffff880`0779c990 fffff800`02cb1acf : 00000000`00000001 fffff880`0779cba8 fffff880`0779cbc8 00000000`000e8401 : nt!KiPageFault+0x23a
fffff880`0779cb20 00000000`0000ff00 : fffffa80`08f22891 fffffa80`08f22868 fffffa80`08f22864 fffff880`0779cbe0 : nt!MiSwapWslEntries+0x13f
fffff880`0779cb80 fffffa80`08f22891 : fffffa80`08f22868 fffffa80`08f22864 fffff880`0779cbe0 fffffa80`07a11060 : 0xff00
fffff880`0779cb88 fffffa80`08f22868 : fffffa80`08f22864 fffff880`0779cbe0 fffffa80`07a11060 00000000`00000000 : 0xfffffa80`08f22891
fffff880`0779cb90 fffffa80`08f22864 : fffff880`0779cbe0 fffffa80`07a11060 00000000`00000000 00000000`00000000 : 0xfffffa80`08f22868
fffff880`0779cb98 fffff880`0779cbe0 : fffffa80`07a11060 00000000`00000000 00000000`00000000 fffffa80`00000000 : 0xfffffa80`08f22864
fffff880`0779cba0 fffffa80`07a11060 : 00000000`00000000 00000000`00000000 fffffa80`00000000 00000000`00000000 : 0xfffff880`0779cbe0
fffff880`0779cba8 00000000`00000000 : 00000000`00000000 fffffa80`00000000 00000000`00000000 fffffa80`082cd760 : 0xfffffa80`07a11060


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiSwapWslEntries+13f
fffff800`02cb1acf 488b5110        mov     rdx,qword ptr [rcx+10h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!MiSwapWslEntries+13f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!MiSwapWslEntries+13f

BUCKET_ID:  X64_0x1E_c0000005_nt!MiSwapWslEntries+13f

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032811-12604-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c01000 PsLoadedModuleList = 0xfffff800`02e3ee50
Debug session time: Mon Mar 28 17:59:38.343 2011 (UTC - 4:00)
System Uptime: 0 days 0:08:42.263
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002c7622f, fffff880063810b0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+34f )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c7622f, Address of the instruction which caused the bugcheck
Arg3: fffff880063810b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!KiDeferredReadyThread+34f
fffff800`02c7622f f0490fba6c243000 lock bts qword ptr [r12+30h],0

CONTEXT:  fffff880063810b0 -- (.cxr 0xfffff880063810b0)
rax=0000000000000000 rbx=0000f824b48b4cab rcx=0000000000000000
rdx=0000000000000000 rsi=fffff88002fd5180 rdi=fffffa80091ba5f0
rip=fffff80002c7622f rsp=fffff88006381a80 rbp=0000000000020003
 r8=0000000000000001  r9=fffffa80091ba6f8 r10=fffff80002c01000
r11=00000000000f00ff r12=0000f824b48b4cab r13=fffff88002fd5180
r14=fffffa80091ba6f8 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010292
nt!KiDeferredReadyThread+0x34f:
fffff800`02c7622f f0490fba6c243000 lock bts qword ptr [r12+30h],0 ds:002b:0000f824`b48b4cdb=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002c8286b to fffff80002c7622f

STACK_TEXT:  
fffff880`06381a80 fffff800`02c8286b : fffff880`02fd5180 fffff880`02fd5180 00000000`00000000 fffffa80`07b4fb90 : nt!KiDeferredReadyThread+0x34f
fffff880`06381b00 fffff800`02f6bcf4 : 00000000`00000000 00000000`00000000 00000000`015e0a00 fffff880`00000000 : nt!KiInsertQueue+0x15b
fffff880`06381b70 fffff800`02c817ae : 00000000`00000000 00000000`00000001 fffffa80`091b2060 fffffa80`091b2060 : nt!IoSetIoCompletionEx+0x58
fffff880`06381ba0 fffff800`02c70993 : fffffa80`091b7060 fffffa80`091b2060 fffff880`06381ca0 00000000`015e0a00 : nt!NtReleaseWorkerFactoryWorker+0x196
fffff880`06381c20 00000000`76dd0a6a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`062bf5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76dd0a6a


FOLLOWUP_IP: 
nt!KiDeferredReadyThread+34f
fffff800`02c7622f f0490fba6c243000 lock bts qword ptr [r12+30h],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiDeferredReadyThread+34f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

STACK_COMMAND:  .cxr 0xfffff880063810b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiDeferredReadyThread+34f

BUCKET_ID:  X64_0x3B_nt!KiDeferredReadyThread+34f

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`01847000 fffff880`01885000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f13000 fffff880`00f6a000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c57000 fffff880`02ce1000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02dd6000 fffff880`02dec000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00dcc000 fffff880`00dd7000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`066a2000 fffff880`066ad000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00fe7000 fffff880`00ff0000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d92000 fffff880`00dbc000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00840000 fffff960`008a1000   ATMFD    ATMFD.DLL    Fri Jan 07 00:49:20 2011 (4D26A960)
fffff880`01992000 fffff880`01999000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ed0000 fffff880`03ee1000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05954000 fffff880`05972000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00700000 fffff960`00727000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`0192e000 fffff880`01958000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018c6000 fffff880`018f6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d1a000 fffff880`00d78000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01149000 fffff880`011bc000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03e16000 fffff880`03e26000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05881000 fffff880`0588a000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
fffff880`0512f000 fffff880`0513d000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e2f000 fffff880`03eb2000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03eb2000 fffff880`03ed0000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02dc7000 fffff880`02dd6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0123e000 fffff880`01254000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`050ed000 fffff880`0510f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05154000 fffff880`05167000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05149000 fffff880`05154000   dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0513d000 fffff880`05149000   dump_pciidex dump_pciidex.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05115000 fffff880`05121000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03f07000 fffff880`03ffb000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`10b7a000 fffff880`10bc0000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0fe00000 fffff880`0fe4a000   e1y62x64 e1y62x64.sys Wed Apr 07 18:58:49 2010 (4BBD0E29)
fffff880`010d7000 fffff880`010eb000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0108b000 fffff880`010d7000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`011bc000 fffff880`011f6000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`0feca000 fffff880`0fed7000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`031de000 fffff800`03227000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`10bc0000 fffff880`10be4000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04215000 fffff880`04271000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`051af000 fffff880`051c8000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`051c8000 fffff880`051d0080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`051a1000 fffff880`051af000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0588c000 fffff880`05954000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01235000 fffff880`0123e000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03e00000 fffff880`03e16000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`10be4000 fffff880`10bf3880   intelsmb intelsmb.sys Wed May 13 03:31:00 2009 (4A0A7734)
fffff880`04325000 fffff880`04334000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`051d1000 fffff880`051df000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bbf000 fffff800`00bc9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04345000 fffff880`04388000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0510f000 fffff880`05114200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05044000 fffff880`05059000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`10bf4000 fffff880`10bfb000   lmimirr  lmimirr.sys  Tue Apr 10 18:32:45 2007 (461C108D)
fffff880`059be000 fffff880`059d1000   LMIRfsDriver LMIRfsDriver.sys Mon Jul 14 12:26:56 2008 (487B7E50)
fffff880`05000000 fffff880`05023000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cc2000 fffff880`00d06000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`05121000 fffff880`0512f000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04334000 fffff880`04343000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`051df000 fffff880`051ec000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d78000 fffff880`00d92000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`01958000 fffff880`01989000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`05871000 fffff880`05881000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`05972000 fffff880`0598a000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0598a000 fffff880`059b7000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05800000 fffff880`0584e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0584e000 fffff880`05871000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`00ff0000 fffff880`00ffb000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`01800000 fffff880`0180b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f73000 fffff880`00f7d000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010eb000 fffff880`01149000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02dbc000 fffff880`02dc7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e7000 fffff880`015f9000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01495000 fffff880`01587000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fed7000 fffff880`0fee3000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04295000 fffff880`042c4000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04200000 fffff880`04215000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d55000 fffff880`02d64000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02ce1000 fffff880`02d26000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01587000 fffff880`015e7000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`059d1000 fffff880`059e6000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`0180b000 fffff880`0181c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02db0000 fffff880`02dbc000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c01000 fffff800`031de000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`0125a000 fffff880`013fd000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01989000 fffff880`01992000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b78000 fffff880`10b79180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fee6000 fffff880`10b77e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`02d2f000 fffff880`02d55000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fbd000 fffff880`00fd2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f7d000 fffff880`00fb0000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00dbc000 fffff880`00dcc000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05c11000 fffff880`05cb7000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`050b0000 fffff880`050ed000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d06000 fffff880`00d1a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`059b7000 fffff880`059be000   RaInfo   RaInfo.sys   Fri Jan 04 13:57:14 2008 (477E818A)
fffff880`01885000 fffff880`018a9000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`042c4000 fffff880`042df000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`042df000 fffff880`04300000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04300000 fffff880`0431a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0431a000 fffff880`04325000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`019dc000 fffff880`019e5000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019e5000 fffff880`019ee000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019ee000 fffff880`019f7000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05059000 fffff880`05071000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05cb7000 fffff880`05cc2000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0febe000 fffff880`0feca000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02d64000 fffff880`02d81000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05d68000 fffff880`05dfe000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`05d01000 fffff880`05d68000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`05cc2000 fffff880`05cef000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`04343000 fffff880`04344480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05cef000 fffff880`05d01000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0183a000 fffff880`01847000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0181c000 fffff880`0183a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d9c000 fffff880`02db0000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00450000 fffff960`0045a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03ee1000 fffff880`03f07000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04388000 fffff880`0439a000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05186000 fffff880`051a0c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05167000 fffff880`05184000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05184000 fffff880`05185f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0fead000 fffff880`0febe000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0439a000 fffff880`043f4000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0fe57000 fffff880`0fead000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0fe4a000 fffff880`0fe57000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fb0000 fffff880`00fbd000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01999000 fffff880`019a7000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`019a7000 fffff880`019cc000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fd2000 fffff880`00fe7000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d81000 fffff880`02d9c000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019cc000 fffff880`019dc000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e60000 fffff880`00f04000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f04000 fffff880`00f13000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d26000 fffff880`02d2f000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00020000 fffff960`00330000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`00f6a000 fffff880`00f73000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05023000 fffff880`05044000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`06631000 fffff880`066a2000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`018f6000 fffff880`01904000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01904000 fffff880`01910000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01910000 fffff880`0191b000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`0191b000 fffff880`0192e000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
Reply

 Misc BSOD, replaced every part in my computer - Need some assistance!




Thread Tools



Similar help and support threads for2: Misc BSOD, replaced every part in my computer - Need some assistance!
Thread Forum
Sager np9150 BSOD ntoskrnl and misc BSOD Help and Support
Solved computer wouldn't wake (CPU was replaced error) Hardware & Devices
BSOD - USB Driver Bugcode + Misc. Boot Issues BSOD Help and Support
Computer won't load windows even though I replaced HDD, RAM,CPU, MB Hardware & Devices
Misc tasks, screen freezes, video driver unloads, BSOD atikmpag.sys Hardware & Devices
Moved: Misc tasks, screen freezes, video driver unloads, BSOD atikmpag BSOD Help and Support
Homebuilt computer BSOD - Part 2 BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 09:17 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33