Misc BSOD, replaced every part in my computer - Need some assistance!


  1. Posts : 6
    Windows 7 Ultimate x64
       #1

    Misc BSOD, replaced every part in my computer - Need some assistance!


    This is my first time posting here although I am a frequent "lurker". This forum has tons and tons of valuable information and it really helps me a lot without actually having to post or ask questions.

    Now to the real reason I am posting. I have receiving frequent BSOD's. It will go 2-3 days without them and then BSOD 4-5 times in the middle of the night or even while I simply browsing the website. I have been battling with this issue for months and over the passed couple of months I have replaced nearly EVERY part in my computer.

    The BSOD that I am recieving are a variety of errors. 0x000000A, 0x00000109.

    I am also receiving an error in my logs:
    The IOCBIOS service failed to start due to the following error:
    The system cannot find the path specified.

    I researched this and found some people think its a virus. This is a fresh brand new install of windows with close to nothing installed. After I formated and did a clean install it didnt BSOD for days and then one night it BSOD 4-5 times in the middle of the night.

    Parts replaced:
    Motherboard
    Ram (was 4GB now 8GB switch from PNY to Corsair)
    PSU
    HDD
    Video card

    I have not replaced the actual CPU itself..

    I have gone out to Intel's support site and downloaded the latest drivers for the Chipset and LAN thinking this may have been the issue but yet I am still receiving BSOD.

    Computer Spec's as follows:

    Intel DP45SG Extreme Motherboard
    Q9300 Quad Core
    8GB memory (CMX8GX3M4B1333C9)
    160GB WD 10,000RPM drive
    600W Corsair PSU
    Nvidia GeForce 460 GTS 1GB memory
    Windows 7 Ultimate x64

    Unfortunately it was set to a single .dmp file not mini dumps so the file of my .dmp is about 1GB.
    I have uploaded the dumps that I found.. A few are today. A new one includes 0x03b

    Can anyone shed some light on this? I can zip this huge .dmp file for you and send it your way if that will help AND I have already changed it to do multiple minidump files so I can send whatever I get over the next few days because there is no doubt I will get more BSOD's soon.

    Thanks in advance for your help. I really do appreciate it. Sorry if I left out any information.
    Last edited by dwayne1413; 28 Mar 2011 at 17:18. Reason: uploaded dump files
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    The IOCBIOS service failed to start due to the following error:
    The system cannot find the path specified.
    That's Intel(R) Extreme Tuning Utility Performance Tuning service that can't start. Path not found, strange. In combination with Stop 0x109.

    You have upgraded hardware and you're getting crashes after system reinstall.


    Set all hardware clocks as recommended by the manufacturer. Attach:

    - CPU-Z MEMORY and CPU tabs snips
    - RAMMON HTML report
    - Drivers List by Nirsot DriverView
    - Uninstall Intel(R) Extreme Tuning Utility Performance Tuning
      My Computer


  3. Posts : 6
    Windows 7 Ultimate x64
    Thread Starter
       #3

    Intel Extreme Tuning Utility would not install on my board due to my version of BIOS. Once they replaced the board the software would no longer install but I did try and it errored out. There is nothing in my Add/Remove programs, nothing under services. I may have to do a fresh install to remove that but I dont think that is what is causing my BSOD.

    I am attaching the reports you requested. Everything is defaulted, I have never overclocked and it is all brand new hardware.

    Let me know if you need anything else. If it blue screens any time at all tonight I will post the mini dmp file for you.

    Thanks for your help. It is greatly appreciated.
    Last edited by dwayne1413; 28 Mar 2011 at 13:59. Reason: corrections
      My Computer


  4. Posts : 6
    Windows 7 Ultimate x64
    Thread Starter
       #4

    Can a spare hard drive cause a BSOD? It prevented me from installing windows and checking or downloading windows updates.

    After I got Windows installed and installed the updates I plugged it back in and it was fine for days then I come home last night around 12PM and go to log in and it immediately blue screens. After I get logged back in I check my logs and it had blue screened quite a few times over the weekend while I was out of town.
      My Computer


  5. Posts : 6
    Windows 7 Ultimate x64
    Thread Starter
       #5

    CPU


    Hi I am getting random BSOD's and I've replaced every part in my computer except for my CPU. I am getting completely random BSOD with nearly a different code every time.

    I contacted Intel and they seeing as how I have replaced every part in my computer except for the CPU they could only offer me a replacement CPU.

    The representative said he had never seem it as bad as mine but has seen CPU the cause a BSOD. I also asked him if there are any know incompatible drivers for Windows 7 on my board and he said nothing that would cause those types of problems.

    Does this sound like it could be a bad CPU processor?
    As far as performance I can have 8 Remote Desktop Sessions open (multiple computers at work) and play Starcraft 2 at the same time and it wont crash. But I'll wake up after sleeping 8 hours and it will have rebooted and recovered from a BSOD from in the middle of the night.

    Thanks for your help.
      My Computer


  6. Posts : 6
    Windows 7 Ultimate x64
    Thread Starter
       #6

    Quick update:

    I came home, first thing after unlocking my machine it blue screened out. Gave me yet again another, different blue screen error this time. 0x03b

    Since I have been on it a good 6 hours now It has not blue screened since.

    I am still getting the IOCBIOS servvice failed error.. I am not quite sure how to fix this as the software is not installed and I deleted all traces of it on the HDD.
      My Computer


  7. Posts : 670
    Windows 7 x64
       #7

    Hi,

    the CPU is not overclocked and the memory sticks are identical and are set correctly: CMX8GX3M4B1333C9 1333MHz, 9-9-9-24, 1.65V. You might need to set the voltage 1.65 manually.


    WinDbg output:


    032811-12604-01.dmp
    BugCheck 3B, {c0000005, fffff80002c7622f, fffff880063810b0, 0}
    Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+34f )

    032811-12729-01.dmp
    BugCheck 1E, {ffffffffc0000005, fffff80002cb1acf, 0, 10}
    Probably caused by : memory_corruption ( nt!MiSwapWslEntries+13f )

    032311-14086-01.dmp
    BugCheck 19, {3, fffff80002c18cb0, fffff80002c38cb0, fffff80002c18cb0}
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )

    032811-16863-01.dmp
    BugCheck A, {2000a, 2, 0, fffff80002cdeef1}
    Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+47e )


    Uninstall LogMeIn / RemotelyAnywhere
    lmimirr.sys Tue Apr 10 18:32:45 2007
    LMIRfsDriver.sys Mon Jul 14 12:26:56 2008
    RaInfo.sys Fri Jan 04 13:57:14 2008


    I am still getting the IOCBIOS servvice failed error.
    You need to clear tracks of Intel Extreme Overclocking utility, you could use CCleaner. Or you can turn off its service in Control Panel > Administrative > Services.



    Can a spare hard drive cause a BSOD? It prevented me from installing windows and checking or downloading windows updates.
    DISCONNECT IT FOR NOW.


    I came home, first thing after unlocking my machine it blue screened out. Gave me yet again another, different blue screen error this time. 0x03b

    Since I have been on it a good 6 hours now It has not blue screened since.


    Hi I am getting random BSOD's and I've replaced every part in my computer except for my CPU. I am getting completely random BSOD with nearly a different code every time.
    This is certainly some hardware issue. Uninstall LogMeIn, disconnect the hard drive you mentioned, and if BSOD's persist you may want to run hardware diagnostics:

    RAM - Test with Memtest86+

    Video Card - Stress Test with Furmark

    https://www.sevenforums.com/tutorials...t-prime95.html

    HD Diagnostic








    CRASH DUMPS

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032811-16863-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02c4d000 PsLoadedModuleList = 0xfffff800`02e8ae50
    Debug session time: Mon Mar 28 00:44:28.184 2011 (UTC - 4:00)
    System Uptime: 1 days 20:21:53.679
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {2000a, 2, 0, fffff80002cdeef1}
    
    Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+47e )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 000000000002000a, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002cdeef1, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef50e0
     000000000002000a 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MmUnlockPages+11
    fffff800`02cdeef1 440fb7410a      movzx   r8d,word ptr [rcx+0Ah]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  csrss.exe
    
    TRAP_FRAME:  fffff88002f93670 -- (.trap 0xfffff88002f93670)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000060970 rbx=0000000000000000 rcx=0000000000020000
    rdx=fffff88002f93906 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002cdeef1 rsp=fffff88002f93800 rbp=00000000a000000c
     r8=000000000000000b  r9=fffff88003f622d0 r10=0000000000000020
    r11=fffff88002f93968 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!MmUnlockPages+0x11:
    fffff800`02cdeef1 440fb7410a      movzx   r8d,word ptr [rcx+0Ah] ds:1970:00000000`0002000a=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cbcca9 to fffff80002cbd740
    
    STACK_TEXT:  
    fffff880`02f93528 fffff800`02cbcca9 : 00000000`0000000a 00000000`0002000a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02f93530 fffff800`02cbb920 : fffffa80`07b2b300 00000000`00020000 fffffa80`07d451a0 fffff880`10b67f79 : nt!KiBugCheckDispatch+0x69
    fffff880`02f93670 fffff800`02cdeef1 : fffff880`02f64180 fffffa80`08fe5301 fffffa80`07b2b538 fffffa80`082a41a0 : nt!KiPageFault+0x260
    fffff880`02f93800 fffff800`02cbfae8 : fffffa80`089c3150 fffff880`10b8f0d8 fffffa80`07b2b300 fffff880`03f612c3 : nt!MmUnlockPages+0x11
    fffff880`02f93890 fffff880`03f5fcd6 : 00000000`00000004 fffffa80`08aa0a06 fffffa80`08aa0ad0 00000000`00000000 : nt!IopfCompleteRequest+0x168
    fffff880`02f93970 fffff880`05185c79 : 00000000`00000002 00000000`ffffffff fffffa80`07bd1010 fffffa80`08aa0190 : mouclass!MouseClassServiceCallback+0x47e
    fffff880`02f939f0 fffff800`02cbfd26 : fffffa80`07e8fd93 fffff880`00000000 fffffa80`00000001 00000000`00000000 : mouhid!MouHid_ReadComplete+0x69d
    fffff880`02f93a70 fffff880`05165acc : fffffa80`08a90c50 fffffa80`08a90c06 fffffa80`08a8f700 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
    fffff880`02f93b50 fffff880`05165d35 : fffffa80`08a90602 fffffa80`08a90660 fffffa80`08a8f7e0 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x130
    fffff880`02f93be0 fffff800`02cbfd26 : fffffa80`07bc6ee3 00000000`00000000 fffffa80`08a8f601 fffffa80`07bc6c60 : HIDCLASS!HidpInterruptReadComplete+0x235
    fffff880`02f93c70 fffff880`10b755d9 : fffffa80`07d45050 fffffa80`06ccf500 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
    fffff880`02f93d50 fffff880`10b75ab7 : fffffa80`08ee1502 fffffa80`07bc6c60 00000000`ffffffff fffffa80`07d45ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
    fffff880`02f93e30 fffff880`10b7364f : fffffa80`07d45ea8 fffffa80`07d451a0 fffffa80`07d46040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
    fffff880`02f93e90 fffff880`10b64f89 : fffffa80`07d45050 00000000`00000000 fffffa80`07d45e02 fffffa80`07d45ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
    fffff880`02f93ed0 fffff800`02cc8bfc : fffff880`02f64180 fffffa80`07d45ea8 fffffa80`07d45ec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
    fffff880`02f93f00 fffff800`02cc3865 : fffff880`02f8cc98 fffffa80`08ae2580 00000000`00000000 fffff880`10b64db0 : nt!KiRetireDpcList+0x1bc
    fffff880`02f93fb0 fffff800`02cc367c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
    fffff880`046fabe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    mouclass!MouseClassServiceCallback+47e
    fffff880`03f5fcd6 488d4e20        lea     rcx,[rsi+20h]
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  mouclass!MouseClassServiceCallback+47e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: mouclass
    
    IMAGE_NAME:  mouclass.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc116
    
    FAILURE_BUCKET_ID:  X64_0xA_mouclass!MouseClassServiceCallback+47e
    
    BUCKET_ID:  X64_0xA_mouclass!MouseClassServiceCallback+47e
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032311-14086-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
    Debug session time: Wed Mar 23 14:49:08.402 2011 (UTC - 4:00)
    System Uptime: 0 days 6:15:44.947
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {3, fffff80002c18cb0, fffff80002c38cb0, fffff80002c18cb0}
    
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )
    
    Followup: Pool_corruption
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000003, the pool freelist is corrupt.
    Arg2: fffff80002c18cb0, the pool entry being checked.
    Arg3: fffff80002c38cb0, the read back flink freelist value (should be the same as 2).
    Arg4: fffff80002c18cb0, the read back blink freelist value (should be the same as 2).
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  Downloader_Dia
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002bbcd6f to fffff80002a89740
    
    STACK_TEXT:  
    fffff880`03b03b88 fffff800`02bbcd6f : 00000000`00000019 00000000`00000003 fffff800`02c18cb0 fffff800`02c38cb0 : nt!KeBugCheckEx
    fffff880`03b03b90 fffff800`02a691ea : fffff880`00000000 00000000`00000000 00000000`6c624e54 fffffa80`00000000 : nt!ExDeferredFreePool+0xa56
    fffff880`03b03c80 fffff880`01490271 : fffff8a0`09b53010 fffffa80`00000038 fffff880`01254a00 00060000`000000a0 : nt!ExAllocatePoolWithTagPriority+0x4a
    fffff880`03b03d10 fffff880`015828a1 : fffffa80`00000001 00000000`00000009 fffff880`03b03e98 00000000`00000014 : ndis!NdisAllocateNetBufferList+0x342
    fffff880`03b03d60 fffff880`0167a329 : 00000000`00000009 fffffa80`079fe5f0 00000000`00000000 00000000`00000000 : NETIO!NetioAllocateAndReferenceNetBufferListNetBufferMdlAndData+0x21
    fffff880`03b03d90 fffff880`01678bc9 : fffffa80`08f04190 00000000`00000001 00000000`0000b48f 00000000`00000009 : tcpip!TcpBeginTcbSend+0x299
    fffff880`03b04010 fffff880`0167703a : fffff880`03b04300 fffff8a0`09b53450 00000000`00000000 fffff880`03b04300 : tcpip!TcpTcbSend+0x1d9
    fffff880`03b04290 fffff880`01676e28 : fffffa80`079fe5f0 fffffa80`079fe5f0 00000000`00000000 00000000`00000001 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0x19a
    fffff880`03b042c0 fffff880`01676e7b : 00000000`00003f01 fffff800`02abc0be fffffa80`06f70b60 fffff880`010dd0a2 : tcpip!TcpEnqueueTcbSend+0x438
    fffff880`03b04360 fffff800`02a98e5a : fffff880`03b04430 fffff880`010dc32e fffffa80`09246440 fffff880`03b044c0 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
    fffff880`03b04390 fffff880`0167cdaa : fffff880`01676e60 fffff880`03b044a0 fffffa80`0731c600 fffff880`02cf36ac : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`03b04470 fffff880`02d0b67b : fffffa80`078e7260 fffff880`03b04ca0 00000000`00000009 fffffa80`06d3e280 : tcpip!TcpTlConnectionSend+0x7a
    fffff880`03b044e0 fffff880`02cf2423 : 00000000`00000000 fffffa80`00000000 00000000`00000000 fffff880`03b048f0 : afd!AfdFastConnectionSend+0x38b
    fffff880`03b046a0 fffff800`02da22b3 : 00000000`00000009 fffffa80`09244490 00000000`03a4f5d4 fffff800`02bbe201 : afd!AfdFastIoDeviceControl+0x413
    fffff880`03b04a10 fffff800`02da2da6 : fffffa80`08dc0060 00000000`000006b4 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
    fffff880`03b04b40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+a56
    fffff800`02bbcd6f cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+a56
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a56
    
    BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a56
    
    Followup: Pool_corruption
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032811-12729-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
    Debug session time: Mon Mar 28 17:49:48.328 2011 (UTC - 4:00)
    System Uptime: 0 days 9:27:40.873
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ..............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff80002cb1acf, 0, 10}
    
    Probably caused by : memory_corruption ( nt!MiSwapWslEntries+13f )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002cb1acf, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000010, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!MiSwapWslEntries+13f
    fffff800`02cb1acf 488b5110        mov     rdx,qword ptr [rcx+10h]
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000010
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
     0000000000000010 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  SearchIndexer.
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff8800779c8e8 -- (.exr 0xfffff8800779c8e8)
    ExceptionAddress: fffff80002cb1acf (nt!MiSwapWslEntries+0x000000000000013f)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 0000000000000010
    Attempt to read from address 0000000000000010
    
    TRAP_FRAME:  fffff8800779c990 -- (.trap 0xfffff8800779c990)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002cb1acf rsp=fffff8800779cb20 rbp=fffff8800779cca0
     r8=fffff80002c11000  r9=fffffa8000000000 r10=0000000000000000
    r11=fffff8800779ca60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po cy
    nt!MiSwapWslEntries+0x13f:
    fffff800`02cb1acf 488b5110        mov     rdx,qword ptr [rcx+10h] ds:00000000`00000010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cbba39 to fffff80002c81740
    
    STACK_TEXT:  
    fffff880`0779c118 fffff800`02cbba39 : 00000000`0000001e ffffffff`c0000005 fffff800`02cb1acf 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0779c120 fffff800`02c80d82 : fffff880`0779c8e8 fffffa80`08f22820 fffff880`0779c990 fffff680`00000000 : nt!KiDispatchException+0x1b9
    fffff880`0779c7b0 fffff800`02c7f8fa : 00000000`00000000 fffffa80`08f22820 fffff880`0779cb00 00000000`06c0fa00 : nt!KiExceptionDispatch+0xc2
    fffff880`0779c990 fffff800`02cb1acf : 00000000`00000001 fffff880`0779cba8 fffff880`0779cbc8 00000000`000e8401 : nt!KiPageFault+0x23a
    fffff880`0779cb20 00000000`0000ff00 : fffffa80`08f22891 fffffa80`08f22868 fffffa80`08f22864 fffff880`0779cbe0 : nt!MiSwapWslEntries+0x13f
    fffff880`0779cb80 fffffa80`08f22891 : fffffa80`08f22868 fffffa80`08f22864 fffff880`0779cbe0 fffffa80`07a11060 : 0xff00
    fffff880`0779cb88 fffffa80`08f22868 : fffffa80`08f22864 fffff880`0779cbe0 fffffa80`07a11060 00000000`00000000 : 0xfffffa80`08f22891
    fffff880`0779cb90 fffffa80`08f22864 : fffff880`0779cbe0 fffffa80`07a11060 00000000`00000000 00000000`00000000 : 0xfffffa80`08f22868
    fffff880`0779cb98 fffff880`0779cbe0 : fffffa80`07a11060 00000000`00000000 00000000`00000000 fffffa80`00000000 : 0xfffffa80`08f22864
    fffff880`0779cba0 fffffa80`07a11060 : 00000000`00000000 00000000`00000000 fffffa80`00000000 00000000`00000000 : 0xfffff880`0779cbe0
    fffff880`0779cba8 00000000`00000000 : 00000000`00000000 fffffa80`00000000 00000000`00000000 fffffa80`082cd760 : 0xfffffa80`07a11060
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiSwapWslEntries+13f
    fffff800`02cb1acf 488b5110        mov     rdx,qword ptr [rcx+10h]
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!MiSwapWslEntries+13f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!MiSwapWslEntries+13f
    
    BUCKET_ID:  X64_0x1E_c0000005_nt!MiSwapWslEntries+13f
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032811-12604-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02c01000 PsLoadedModuleList = 0xfffff800`02e3ee50
    Debug session time: Mon Mar 28 17:59:38.343 2011 (UTC - 4:00)
    System Uptime: 0 days 0:08:42.263
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff80002c7622f, fffff880063810b0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+34f )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002c7622f, Address of the instruction which caused the bugcheck
    Arg3: fffff880063810b0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!KiDeferredReadyThread+34f
    fffff800`02c7622f f0490fba6c243000 lock bts qword ptr [r12+30h],0
    
    CONTEXT:  fffff880063810b0 -- (.cxr 0xfffff880063810b0)
    rax=0000000000000000 rbx=0000f824b48b4cab rcx=0000000000000000
    rdx=0000000000000000 rsi=fffff88002fd5180 rdi=fffffa80091ba5f0
    rip=fffff80002c7622f rsp=fffff88006381a80 rbp=0000000000020003
     r8=0000000000000001  r9=fffffa80091ba6f8 r10=fffff80002c01000
    r11=00000000000f00ff r12=0000f824b48b4cab r13=fffff88002fd5180
    r14=fffffa80091ba6f8 r15=0000000000000000
    iopl=0         nv up ei ng nz ac pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010292
    nt!KiDeferredReadyThread+0x34f:
    fffff800`02c7622f f0490fba6c243000 lock bts qword ptr [r12+30h],0 ds:002b:0000f824`b48b4cdb=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002c8286b to fffff80002c7622f
    
    STACK_TEXT:  
    fffff880`06381a80 fffff800`02c8286b : fffff880`02fd5180 fffff880`02fd5180 00000000`00000000 fffffa80`07b4fb90 : nt!KiDeferredReadyThread+0x34f
    fffff880`06381b00 fffff800`02f6bcf4 : 00000000`00000000 00000000`00000000 00000000`015e0a00 fffff880`00000000 : nt!KiInsertQueue+0x15b
    fffff880`06381b70 fffff800`02c817ae : 00000000`00000000 00000000`00000001 fffffa80`091b2060 fffffa80`091b2060 : nt!IoSetIoCompletionEx+0x58
    fffff880`06381ba0 fffff800`02c70993 : fffffa80`091b7060 fffffa80`091b2060 fffff880`06381ca0 00000000`015e0a00 : nt!NtReleaseWorkerFactoryWorker+0x196
    fffff880`06381c20 00000000`76dd0a6a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`062bf5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76dd0a6a
    
    
    FOLLOWUP_IP: 
    nt!KiDeferredReadyThread+34f
    fffff800`02c7622f f0490fba6c243000 lock bts qword ptr [r12+30h],0
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiDeferredReadyThread+34f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    STACK_COMMAND:  .cxr 0xfffff880063810b0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!KiDeferredReadyThread+34f
    
    BUCKET_ID:  X64_0x3B_nt!KiDeferredReadyThread+34f
    
    Followup: MachineOwner
    ---------




    DRIVERS

    Code:
    start             end                 module name
    fffff880`01847000 fffff880`01885000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00f13000 fffff880`00f6a000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c57000 fffff880`02ce1000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02dd6000 fffff880`02dec000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00dcc000 fffff880`00dd7000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`066a2000 fffff880`066ad000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00fe7000 fffff880`00ff0000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00d92000 fffff880`00dbc000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff960`00840000 fffff960`008a1000   ATMFD    ATMFD.DLL    Fri Jan 07 00:49:20 2011 (4D26A960)
    fffff880`01992000 fffff880`01999000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03ed0000 fffff880`03ee1000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`05954000 fffff880`05972000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00700000 fffff960`00727000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
    fffff880`0192e000 fffff880`01958000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018c6000 fffff880`018f6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d1a000 fffff880`00d78000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01149000 fffff880`011bc000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`03e16000 fffff880`03e26000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05881000 fffff880`0588a000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
    fffff880`0512f000 fffff880`0513d000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03e2f000 fffff880`03eb2000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03eb2000 fffff880`03ed0000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02dc7000 fffff880`02dd6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0123e000 fffff880`01254000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`050ed000 fffff880`0510f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05154000 fffff880`05167000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05149000 fffff880`05154000   dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0513d000 fffff880`05149000   dump_pciidex dump_pciidex.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05115000 fffff880`05121000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03f07000 fffff880`03ffb000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`10b7a000 fffff880`10bc0000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`0fe00000 fffff880`0fe4a000   e1y62x64 e1y62x64.sys Wed Apr 07 18:58:49 2010 (4BBD0E29)
    fffff880`010d7000 fffff880`010eb000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0108b000 fffff880`010d7000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`011bc000 fffff880`011f6000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`0feca000 fffff880`0fed7000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`031de000 fffff800`03227000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`10bc0000 fffff880`10be4000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04215000 fffff880`04271000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`051af000 fffff880`051c8000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`051c8000 fffff880`051d0080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`051a1000 fffff880`051af000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0588c000 fffff880`05954000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01235000 fffff880`0123e000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03e00000 fffff880`03e16000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`10be4000 fffff880`10bf3880   intelsmb intelsmb.sys Wed May 13 03:31:00 2009 (4A0A7734)
    fffff880`04325000 fffff880`04334000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`051d1000 fffff880`051df000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bbf000 fffff800`00bc9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04345000 fffff880`04388000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`0510f000 fffff880`05114200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`05044000 fffff880`05059000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`10bf4000 fffff880`10bfb000   lmimirr  lmimirr.sys  Tue Apr 10 18:32:45 2007 (461C108D)
    fffff880`059be000 fffff880`059d1000   LMIRfsDriver LMIRfsDriver.sys Mon Jul 14 12:26:56 2008 (487B7E50)
    fffff880`05000000 fffff880`05023000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00cc2000 fffff880`00d06000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`05121000 fffff880`0512f000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04334000 fffff880`04343000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`051df000 fffff880`051ec000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00d78000 fffff880`00d92000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`01958000 fffff880`01989000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`05871000 fffff880`05881000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`05972000 fffff880`0598a000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0598a000 fffff880`059b7000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`05800000 fffff880`0584e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0584e000 fffff880`05871000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`00ff0000 fffff880`00ffb000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01800000 fffff880`0180b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f73000 fffff880`00f7d000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010eb000 fffff880`01149000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02dbc000 fffff880`02dc7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015e7000 fffff880`015f9000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01495000 fffff880`01587000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0fed7000 fffff880`0fee3000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`04295000 fffff880`042c4000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04200000 fffff880`04215000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d55000 fffff880`02d64000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02ce1000 fffff880`02d26000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01587000 fffff880`015e7000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`059d1000 fffff880`059e6000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`0180b000 fffff880`0181c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02db0000 fffff880`02dbc000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c01000 fffff800`031de000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
    fffff880`0125a000 fffff880`013fd000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01989000 fffff880`01992000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`10b78000 fffff880`10b79180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
    fffff880`0fee6000 fffff880`10b77e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
    fffff880`02d2f000 fffff880`02d55000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fbd000 fffff880`00fd2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f7d000 fffff880`00fb0000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00dbc000 fffff880`00dcc000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`05c11000 fffff880`05cb7000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`050b0000 fffff880`050ed000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d06000 fffff880`00d1a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`059b7000 fffff880`059be000   RaInfo   RaInfo.sys   Fri Jan 04 13:57:14 2008 (477E818A)
    fffff880`01885000 fffff880`018a9000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`042c4000 fffff880`042df000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`042df000 fffff880`04300000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04300000 fffff880`0431a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`0431a000 fffff880`04325000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`019dc000 fffff880`019e5000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019e5000 fffff880`019ee000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019ee000 fffff880`019f7000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05059000 fffff880`05071000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05cb7000 fffff880`05cc2000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`0febe000 fffff880`0feca000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02d64000 fffff880`02d81000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05d68000 fffff880`05dfe000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`05d01000 fffff880`05d68000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`05cc2000 fffff880`05cef000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`04343000 fffff880`04344480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`05cef000 fffff880`05d01000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0183a000 fffff880`01847000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0181c000 fffff880`0183a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02d9c000 fffff880`02db0000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00450000 fffff960`0045a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03ee1000 fffff880`03f07000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04388000 fffff880`0439a000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05186000 fffff880`051a0c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05167000 fffff880`05184000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05184000 fffff880`05185f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`0fead000 fffff880`0febe000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`0439a000 fffff880`043f4000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`0fe57000 fffff880`0fead000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`0fe4a000 fffff880`0fe57000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00fb0000 fffff880`00fbd000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01999000 fffff880`019a7000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`019a7000 fffff880`019cc000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00fd2000 fffff880`00fe7000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02d81000 fffff880`02d9c000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019cc000 fffff880`019dc000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e60000 fffff880`00f04000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f04000 fffff880`00f13000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d26000 fffff880`02d2f000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00020000 fffff960`00330000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
    fffff880`00f6a000 fffff880`00f73000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`05023000 fffff880`05044000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`06631000 fffff880`066a2000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`018f6000 fffff880`01904000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01904000 fffff880`01910000   dump_pciidex
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01910000 fffff880`0191b000   dump_msahci.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    fffff880`0191b000 fffff880`0192e000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 19:22.
Find Us