Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Repeat BSODs 1-2 mins after loading desktop


26 Dec 2011   #1

Win 7 Professional 64 bit
 
 
Repeat BSODs 1-2 mins after loading desktop

This problem has been plaguing me for a while and does not seem to follow a predictable pattern. Usually I avoid restarting my computer because it is such a hassle to get it running again, but if I do, I need to reset it 8-15x before it will launch into windows and not BSOD after 1-2 minutes. Minidump zip of several examples is attached.

Notable this NEVER happens in safemode. Memtest ran 6 passes with both sticks of RAM with 0 errors. Thanks in advance.

My System SpecsSystem Spec
.

26 Dec 2011   #2

Windows 7 Home Premium 64 Bit
 
 

Code:
  1. Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-19281-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03206000 PsLoadedModuleList = 0xfffff800`0344b670 Debug session time: Thu Nov 10 19:07:52.373 2011 (UTC - 7:00) System Uptime: 0 days 0:01:38.248 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000330bb55, fffff88008a5cb40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000330bb55, Address of the instruction which caused the bugcheck Arg3: fffff88008a5cb40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0330bb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88008a5cb40 -- (.cxr 0xfffff88008a5cb40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff555837472 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000330bb55 rsp=fffff88008a5d528 rbp=0000000000000000 r8=fffffe0008a5d560 r9=000fffbffffffffd r10=fffff88008a5d5d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0330bb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000330bb55 STACK_TEXT: fffff880`08a5d528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0330bb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88008a5cb40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  2. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-19843-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03253000 PsLoadedModuleList = 0xfffff800`03498670 Debug session time: Fri Nov 11 00:57:56.089 2011 (UTC - 7:00) System Uptime: 0 days 0:11:19.337 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C9, {7, fffff88008e33a10, fffff98013c2eee0, 0} Unable to load image \??\C:\Program Files\PeerBlock\pbfilter.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for pbfilter.sys *** ERROR: Module load completed but symbols could not be loaded for pbfilter.sys Probably caused by : pbfilter.sys ( pbfilter+2a10 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9) The IO manager has caught a misbehaving driver. Arguments: Arg1: 0000000000000007, IRP passed to IoCompleteRequest still has cancel routine set Arg2: fffff88008e33a10, the cancel routine pointer Arg3: fffff98013c2eee0, the IRP Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0xc9_7 DRIVER_VERIFIER_IO_VIOLATION_TYPE: 7 IRP_CANCEL_ROUTINE: pbfilter+2a10 fffff880`08e33a10 48895c2408 mov qword ptr [rsp+8],rbx FAULTING_IP: pbfilter+2a10 fffff880`08e33a10 48895c2408 mov qword ptr [rsp+8],rbx FOLLOWUP_IP: pbfilter+2a10 fffff880`08e33a10 48895c2408 mov qword ptr [rsp+8],rbx IRP_ADDRESS: fffff98013c2eee0 DEVICE_OBJECT: fffffa8007aeb7c0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP PROCESS_NAME: uTorrent.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff8000376f072 to fffff800032cfc40 STACK_TEXT: fffff880`0883e1b8 fffff800`0376f072 : 00000000`000000c9 00000000`00000007 fffff880`08e33a10 fffff980`13c2eee0 : nt!KeBugCheckEx fffff880`0883e1c0 fffff880`08e339ea : 00000000`0000ecc2 00000000`00000000 fffffa80`07aeb910 fffff980`13c2eee0 : nt!IovCompleteRequest+0x72 fffff880`0883e290 00000000`0000ecc2 : 00000000`00000000 fffffa80`07aeb910 fffff980`13c2eee0 00000000`00000006 : pbfilter+0x29ea fffff880`0883e298 00000000`00000000 : fffffa80`07aeb910 fffff980`13c2eee0 00000000`00000006 00000000`05baabe0 : 0xecc2 STACK_COMMAND: .bugcheck ; kb SYMBOL_NAME: pbfilter+2a10 FOLLOWUP_NAME: MachineOwner MODULE_NAME: pbfilter IMAGE_NAME: pbfilter.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4cd60dba FAILURE_BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 Followup: MachineOwner ---------
  3. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-21434-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03214000 PsLoadedModuleList = 0xfffff800`03459670 Debug session time: Thu Nov 10 19:10:33.959 2011 (UTC - 7:00) System Uptime: 0 days 0:01:34.208 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003319b55, fffff8800701fb40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003319b55, Address of the instruction which caused the bugcheck Arg3: fffff8800701fb40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03319b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff8800701fb40 -- (.cxr 0xfffff8800701fb40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5557ab572 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003319b55 rsp=fffff88007020528 rbp=0000000000000000 r8=fffffe0007020560 r9=000fffbffffffffd r10=fffff880070205d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03319b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003319b55 STACK_TEXT: fffff880`07020528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03319b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff8800701fb40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  4. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-29640-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Unable to load image Unknown_Module_34b29076`9d5e3040, Win32 error 0n2 *** WARNING: Unable to verify timestamp for Unknown_Module_34b29076`9d5e3040 *** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_34b29076`9d5e3040 Debugger can not determine kernel base address Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03258000 PsLoadedModuleList = 0xfffff800`0349d670 Debug session time: Thu Nov 10 19:55:26.351 2011 (UTC - 7:00) System Uptime: 0 days 0:01:36.226 Unable to load image Unknown_Module_34b29076`9d5e3040, Win32 error 0n2 *** WARNING: Unable to verify timestamp for Unknown_Module_34b29076`9d5e3040 *** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_34b29076`9d5e3040 Debugger can not determine kernel base address Loading Kernel Symbols . Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000335db55, fffff880094c6b40, 0} ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000335db55, Address of the instruction which caused the bugcheck Arg3: fffff880094c6b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: +0 fffff800`0335db55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff880094c6b40 -- (.cxr 0xfffff880094c6b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff55586ed1d rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000335db55 rsp=fffff880094c7528 rbp=0000000000000000 r8=fffffe00094c7560 r9=000fffbffffffffd r10=fffff880094c75d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 fffff800`0335db55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000335db55 STACK_TEXT: fffff880`094c6278 fffff800`032d41e9 : 00000000`0000003b 00000000`c0000005 fffff800`0335db55 fffff880`094c6b40 : 0xfffff800`032d4c40 fffff880`094c6280 00000000`0000003b : 00000000`c0000005 fffff800`0335db55 fffff880`094c6b40 00000000`00000000 : 0xfffff800`032d41e9 fffff880`094c6288 00000000`c0000005 : fffff800`0335db55 fffff880`094c6b40 00000000`00000000 00000000`00703c0e : 0x3b fffff880`094c6290 fffff800`0335db55 : fffff880`094c6b40 00000000`00000000 00000000`00703c0e 00000000`00000000 : 0xc0000005 fffff880`094c6298 fffff880`094c6b40 : 00000000`00000000 00000000`00703c0e 00000000`00000000 00000000`00000000 : 0xfffff800`0335db55 fffff880`094c62a0 00000000`00000000 : 00000000`00703c0e 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`094c6b40 STACK_COMMAND: kb SYMBOL_NAME: ANALYSIS_INCONCLUSIVE FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: CORRUPT_MODULELIST Followup: MachineOwner ---------
  5. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111111-19624-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0320a000 PsLoadedModuleList = 0xfffff800`0344f670 Debug session time: Fri Nov 11 01:07:09.385 2011 (UTC - 7:00) System Uptime: 0 days 0:05:31.244 Loading Kernel Symbols ............................................................... ................................................................ ............................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C9, {7, fffff8800887ea10, fffff98010c7cee0, 0} Unable to load image \??\C:\Program Files\PeerBlock\pbfilter.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for pbfilter.sys *** ERROR: Module load completed but symbols could not be loaded for pbfilter.sys Probably caused by : pbfilter.sys ( pbfilter+2a10 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9) The IO manager has caught a misbehaving driver. Arguments: Arg1: 0000000000000007, IRP passed to IoCompleteRequest still has cancel routine set Arg2: fffff8800887ea10, the cancel routine pointer Arg3: fffff98010c7cee0, the IRP Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0xc9_7 DRIVER_VERIFIER_IO_VIOLATION_TYPE: 7 IRP_CANCEL_ROUTINE: pbfilter+2a10 fffff880`0887ea10 48895c2408 mov qword ptr [rsp+8],rbx FAULTING_IP: pbfilter+2a10 fffff880`0887ea10 48895c2408 mov qword ptr [rsp+8],rbx FOLLOWUP_IP: pbfilter+2a10 fffff880`0887ea10 48895c2408 mov qword ptr [rsp+8],rbx IRP_ADDRESS: fffff98010c7cee0 DEVICE_OBJECT: fffffa8007780380 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80003726072 to fffff80003286c40 STACK_TEXT: fffff880`03519068 fffff800`03726072 : 00000000`000000c9 00000000`00000007 fffff880`0887ea10 fffff980`10c7cee0 : nt!KeBugCheckEx fffff880`03519070 fffff880`0887e9ea : 00000000`00002177 00000000`00000000 fffffa80`077804d0 fffff980`10c7cee0 : nt!IovCompleteRequest+0x72 fffff880`03519140 00000000`00002177 : 00000000`00000000 fffffa80`077804d0 fffff980`10c7cee0 fffffa80`0ca50550 : pbfilter+0x29ea fffff880`03519148 00000000`00000000 : fffffa80`077804d0 fffff980`10c7cee0 fffffa80`0ca50550 00000000`3666795b : 0x2177 STACK_COMMAND: .bugcheck ; kb SYMBOL_NAME: pbfilter+2a10 FOLLOWUP_NAME: MachineOwner MODULE_NAME: pbfilter IMAGE_NAME: pbfilter.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4cd60dba FAILURE_BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 Followup: MachineOwner ---------
  6. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111111-19999-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03210000 PsLoadedModuleList = 0xfffff800`03455670 Debug session time: Fri Nov 11 01:09:59.037 2011 (UTC - 7:00) System Uptime: 0 days 0:01:21.286 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C9, {7, fffff88007973a10, fffff9800a630ee0, 0} Unable to load image \??\C:\Program Files\PeerBlock\pbfilter.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for pbfilter.sys *** ERROR: Module load completed but symbols could not be loaded for pbfilter.sys Probably caused by : pbfilter.sys ( pbfilter+2a10 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9) The IO manager has caught a misbehaving driver. Arguments: Arg1: 0000000000000007, IRP passed to IoCompleteRequest still has cancel routine set Arg2: fffff88007973a10, the cancel routine pointer Arg3: fffff9800a630ee0, the IRP Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0xc9_7 DRIVER_VERIFIER_IO_VIOLATION_TYPE: 7 IRP_CANCEL_ROUTINE: pbfilter+2a10 fffff880`07973a10 48895c2408 mov qword ptr [rsp+8],rbx FAULTING_IP: pbfilter+2a10 fffff880`07973a10 48895c2408 mov qword ptr [rsp+8],rbx FOLLOWUP_IP: pbfilter+2a10 fffff880`07973a10 48895c2408 mov qword ptr [rsp+8],rbx IRP_ADDRESS: fffff9800a630ee0 DEVICE_OBJECT: fffffa800d915cc0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff8000372c072 to fffff8000328cc40 STACK_TEXT: fffff800`00b9a8f8 fffff800`0372c072 : 00000000`000000c9 00000000`00000007 fffff880`07973a10 fffff980`0a630ee0 : nt!KeBugCheckEx fffff800`00b9a900 fffff880`079739ea : 00000000`0000e6c5 00000000`00000000 fffffa80`0d915e10 fffff980`0a630ee0 : nt!IovCompleteRequest+0x72 fffff800`00b9a9d0 00000000`0000e6c5 : 00000000`00000000 fffffa80`0d915e10 fffff980`0a630ee0 fffffa80`0bf84a80 : pbfilter+0x29ea fffff800`00b9a9d8 00000000`00000000 : fffffa80`0d915e10 fffff980`0a630ee0 fffffa80`0bf84a80 00000000`60825f46 : 0xe6c5 STACK_COMMAND: .bugcheck ; kb SYMBOL_NAME: pbfilter+2a10 FOLLOWUP_NAME: MachineOwner MODULE_NAME: pbfilter IMAGE_NAME: pbfilter.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4cd60dba FAILURE_BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 Followup: MachineOwner ---------
  7. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111111-20389-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03252000 PsLoadedModuleList = 0xfffff800`03497670 Debug session time: Fri Nov 11 01:00:31.010 2011 (UTC - 7:00) System Uptime: 0 days 0:01:18.259 Loading Kernel Symbols ............................................................... ................................................................ ............................. Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003357b55, fffff880072e1b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003357b55, Address of the instruction which caused the bugcheck Arg3: fffff880072e1b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03357b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff880072e1b40 -- (.cxr 0xfffff880072e1b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5557ba0c8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003357b55 rsp=fffff880072e2528 rbp=0000000000000000 r8=fffffe00072e2560 r9=000fffbffffffffd r10=fffff880072e25d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03357b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003357b55 STACK_TEXT: fffff880`072e2528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03357b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff880072e1b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_VRF_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_VRF_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  8. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111211-20467-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0324f000 PsLoadedModuleList = 0xfffff800`03494670 Debug session time: Sat Nov 12 19:22:13.947 2011 (UTC - 7:00) System Uptime: 0 days 0:01:27.196 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003354b55, fffff8800941ab40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003354b55, Address of the instruction which caused the bugcheck Arg3: fffff8800941ab40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03354b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff8800941ab40 -- (.cxr 0xfffff8800941ab40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff55586b3c8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003354b55 rsp=fffff8800941b528 rbp=0000000000000000 r8=fffffe000941b560 r9=000fffbffffffffd r10=fffff8800941b5d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03354b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003354b55 STACK_TEXT: fffff880`0941b528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03354b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff8800941ab40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  9. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111211-35178-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03262000 PsLoadedModuleList = 0xfffff800`034a7670 Debug session time: Sat Nov 12 19:56:45.926 2011 (UTC - 7:00) System Uptime: 0 days 0:01:30.175 Loading Kernel Symbols ............................................................... ................................................................ .................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003367b55, fffff88006d40b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003367b55, Address of the instruction which caused the bugcheck Arg3: fffff88006d40b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03367b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88006d40b40 -- (.cxr 0xfffff88006d40b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff55579c072 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003367b55 rsp=fffff88006d41528 rbp=0000000000000000 r8=fffffe0006d41560 r9=000fffbffffffffd r10=fffff88006d415d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03367b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003367b55 STACK_TEXT: fffff880`06d41528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03367b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88006d40b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  10. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\112211-23103-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0324d000 PsLoadedModuleList = 0xfffff800`03492670 Debug session time: Tue Nov 22 18:19:43.930 2011 (UTC - 7:00) System Uptime: 0 days 0:01:08.179 Loading Kernel Symbols ............................................................... ................................................................ ....................... Loading User Symbols Loading unloaded module list ............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003352b55, fffff88004028b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003352b55, Address of the instruction which caused the bugcheck Arg3: fffff88004028b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03352b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88004028b40 -- (.cxr 0xfffff88004028b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5556ab872 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003352b55 rsp=fffff88004029528 rbp=0000000000000000 r8=fffffe0004029560 r9=000fffbffffffffd r10=fffff880040295d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03352b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003352b55 STACK_TEXT: fffff880`04029528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03352b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88004028b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  11. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\112711-16426-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0321c000 PsLoadedModuleList = 0xfffff800`03461670 Debug session time: Sun Nov 27 17:57:18.897 2011 (UTC - 7:00) System Uptime: 0 days 0:01:05.145 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003321b55, fffff880072f0b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003321b55, Address of the instruction which caused the bugcheck Arg3: fffff880072f0b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03321b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff880072f0b40 -- (.cxr 0xfffff880072f0b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5557ba5c8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003321b55 rsp=fffff880072f1528 rbp=0000000000000000 r8=fffffe00072f1560 r9=000fffbffffffffd r10=fffff880072f15d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03321b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003321b55 STACK_TEXT: fffff880`072f1528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03321b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff880072f0b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  12. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\112711-17565-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03216000 PsLoadedModuleList = 0xfffff800`0345b670 Debug session time: Sun Nov 27 17:59:40.175 2011 (UTC - 7:00) System Uptime: 0 days 0:01:22.424 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000331bb55, fffff88007242b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000331bb55, Address of the instruction which caused the bugcheck Arg3: fffff88007242b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0331bb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88007242b40 -- (.cxr 0xfffff88007242b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5557b6bc8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000331bb55 rsp=fffff88007243528 rbp=0000000000000000 r8=fffffe0007243560 r9=000fffbffffffffd r10=fffff880072435d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0331bb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000331bb55 STACK_TEXT: fffff880`07243528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0331bb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88007242b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  13. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\120911-18142-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03213000 PsLoadedModuleList = 0xfffff800`03458670 Debug session time: Fri Dec 9 14:37:12.262 2011 (UTC - 7:00) System Uptime: 0 days 0:01:07.136 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003318b55, fffff88009561b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003318b55, Address of the instruction which caused the bugcheck Arg3: fffff88009561b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03318b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88009561b40 -- (.cxr 0xfffff88009561b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5558720c8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003318b55 rsp=fffff88009562528 rbp=0000000000000000 r8=fffffe0009562560 r9=000fffbffffffffd r10=fffff880095625d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03318b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003318b55 STACK_TEXT: fffff880`09562528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03318b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88009561b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  14. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\121311-28626-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03256000 PsLoadedModuleList = 0xfffff800`0349b670 Debug session time: Tue Dec 13 19:38:59.978 2011 (UTC - 7:00) System Uptime: 0 days 0:01:21.227 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000335bb55, fffff8800931fb40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000335bb55, Address of the instruction which caused the bugcheck Arg3: fffff8800931fb40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0335bb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff8800931fb40 -- (.cxr 0xfffff8800931fb40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff55586601d rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000335bb55 rsp=fffff88009320528 rbp=0000000000000000 r8=fffffe0009320560 r9=000fffbffffffffd r10=fffff880093205d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0335bb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000335bb55 STACK_TEXT: fffff880`09320528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0335bb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff8800931fb40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  15. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\121811-12573-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0321a000 PsLoadedModuleList = 0xfffff800`0345f670 Debug session time: Sun Dec 18 12:25:58.091 2011 (UTC - 7:00) System Uptime: 0 days 22:34:58.005 Loading Kernel Symbols ............................................................... ................................................................ .............................. Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa800541db80, ffff, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+360e8 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa800541db80 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: SearchProtocol CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80003306218 to fffff80003296c40 STACK_TEXT: fffff880`099b8058 fffff800`03306218 : 00000000`0000001a 00000000`00041790 fffffa80`0541db80 00000000`0000ffff : nt!KeBugCheckEx fffff880`099b8060 fffff800`03268596 : fffffa80`09b34060 fffffa80`00000024 fffff8a0`000000b0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x360e8 fffff880`099b8910 fffff800`0356cb1a : fffff8a0`10adb530 00000000`00000001 00000000`00000000 fffffa80`0dbf9610 : nt!MmCleanProcessAddressSpace+0x96 fffff880`099b8960 fffff800`0354e48c : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x56a fffff880`099b8a60 fffff800`03295ed3 : fffffa80`09b34060 00000000`00000000 fffffa80`0dbf9610 00000000`00000000 : nt!NtTerminateProcess+0x138 fffff880`099b8ae0 00000000`775515da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0014f878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775515da STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+360e8 fffff800`03306218 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+360e8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+360e8 BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+360e8 Followup: MachineOwner ---------
  16. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-10966-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0321b000 PsLoadedModuleList = 0xfffff800`03460670 Debug session time: Tue Dec 20 04:04:26.785 2011 (UTC - 7:00) System Uptime: 1 days 15:37:31.034 Loading Kernel Symbols ............................................................... ................................................................ ................................ Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {5003, fffff70001080000, 3ee2, f2a3009} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+398d6 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000005003, The subtype of the bugcheck. Arg2: fffff70001080000 Arg3: 0000000000003ee2 Arg4: 000000000f2a3009 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_5003 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff8000330a5b6 to fffff80003297c40 STACK_TEXT: fffff880`057e7868 fffff800`0330a5b6 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`00003ee2 : nt!KeBugCheckEx fffff880`057e7870 fffff800`032a4f19 : 00000000`00000000 fffffa80`0b83f4d0 00000000`00a67000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x398d6 fffff880`057e7980 fffff800`03295d6e : 00000000`00000001 00000000`18f60000 00000000`ec001201 00000000`0734c340 : nt!MmAccessFault+0x359 fffff880`057e7ae0 000007fe`f4358e71 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e 00000000`0207d950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f4358e71 STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+398d6 fffff800`0330a5b6 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+398d6 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+398d6 BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+398d6 Followup: MachineOwner ---------
  17. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-11060-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0321e000 PsLoadedModuleList = 0xfffff800`03463670 Debug session time: Tue Dec 20 18:54:07.134 2011 (UTC - 7:00) System Uptime: 0 days 10:24:08.008 Loading Kernel Symbols ............................................................... ................................................................ ............................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa8005e3db80, ffff, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+36024 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa8005e3db80 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: SearchProtocol CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff8000330a150 to fffff8000329ac40 STACK_TEXT: fffff880`0d10d748 fffff800`0330a150 : 00000000`0000001a 00000000`00041790 fffffa80`05e3db80 00000000`0000ffff : nt!KeBugCheckEx fffff880`0d10d750 fffff800`0326cb79 : ffffffff`00000000 00000000`003affff fffffa80`00000000 fffffa80`0c285060 : nt! ?? ::FNODOBFM::`string'+0x36024 fffff880`0d10d910 fffff800`03570b1a : fffff8a0`0aa4fa70 00000000`00000001 00000000`00000000 fffffa80`0c285060 : nt!MmCleanProcessAddressSpace+0x679 fffff880`0d10d960 fffff800`0355248c : 00000000`00000000 00000000`00000001 000007ff`fffdd000 00000000`00000000 : nt!PspExitThread+0x56a fffff880`0d10da60 fffff800`03299ed3 : fffffa80`0c86c9e0 00000000`00000000 fffffa80`0c285060 00000000`00000000 : nt!NtTerminateProcess+0x138 fffff880`0d10dae0 00000000`76d715da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`001ef958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d715da STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+36024 fffff800`0330a150 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+36024 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+36024 BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+36024 Followup: MachineOwner ---------
  18. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-11559-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03267000 PsLoadedModuleList = 0xfffff800`034ac670 Debug session time: Tue Dec 20 18:56:37.256 2011 (UTC - 7:00) System Uptime: 0 days 0:01:07.131 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000336cb55, fffff8800a913b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000336cb55, Address of the instruction which caused the bugcheck Arg3: fffff8800a913b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0336cb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff8800a913b40 -- (.cxr 0xfffff8800a913b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5558db172 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000336cb55 rsp=fffff8800a914528 rbp=0000000000000000 r8=fffffe000a914560 r9=000fffbffffffffd r10=fffff8800a9145d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0336cb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000336cb55 STACK_TEXT: fffff880`0a914528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0336cb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff8800a913b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  19. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-12417-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03249000 PsLoadedModuleList = 0xfffff800`0348e670 Debug session time: Tue Dec 20 19:40:02.958 2011 (UTC - 7:00) System Uptime: 0 days 0:01:08.207 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000334eb55, fffff88008f26b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000334eb55, Address of the instruction which caused the bugcheck Arg3: fffff88008f26b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0334eb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88008f26b40 -- (.cxr 0xfffff88008f26b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff555850d1d rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000334eb55 rsp=fffff88008f27528 rbp=0000000000000000 r8=fffffe0008f27560 r9=000fffbffffffffd r10=fffff88008f275d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0334eb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000334eb55 STACK_TEXT: fffff880`08f27528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0334eb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88008f26b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  20. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-13369-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03214000 PsLoadedModuleList = 0xfffff800`03459670 Debug session time: Tue Dec 20 19:41:41.231 2011 (UTC - 7:00) System Uptime: 0 days 0:00:41.105 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {1236, fffffa800c6dc1a0, fffffa800c6dc1f0, 195f3d} Probably caused by : rdyboost.sys ( rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000001236, The subtype of the bugcheck. Arg2: fffffa800c6dc1a0 Arg3: fffffa800c6dc1f0 Arg4: 0000000000195f3d Debugging Details: ------------------ BUGCHECK_STR: 0x1a_1236 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80003383dab to fffff80003290c40 STACK_TEXT: fffff880`0434f998 fffff800`03383dab : 00000000`0000001a 00000000`00001236 fffffa80`0c6dc1a0 fffffa80`0c6dc1f0 : nt!KeBugCheckEx fffff880`0434f9a0 fffff880`01f07eb2 : fffffa80`099a1118 fffffa80`0c6dc1a0 fffffa80`099a1118 00000000`00000710 : nt!MmFreePagesFromMdl+0x31b fffff880`0434fa00 fffff880`01f14952 : fffffa80`099a1118 00000000`00000003 fffff880`02ba1000 fffff880`02ba1000 : rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+0x4e fffff880`0434fa60 fffff880`01f12d98 : fffffa80`00000004 00000000`00000712 00000000`00000710 fffffa80`099a5000 : rdyboost!ST_STORE<SMD_TRAITS>::StCompactionPerformInMem+0x28e fffff880`0434faf0 fffff880`01f124b4 : fffffa80`099a1438 00000000`00000080 fffffa80`099a1438 fffff880`03569f40 : rdyboost!ST_STORE<SMD_TRAITS>::StCompactionWorker+0x68 fffff880`0434fb40 fffff880`01f1141a : fffffa80`099a1438 fffff880`0434fbe0 00000000`00000080 fffffa80`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0xc0 fffff880`0434fba0 fffff800`0352bfee : 00000000`00000000 fffff880`00000000 fffffa80`09897b60 fffffa80`06706040 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x152 fffff880`0434fc00 fffff800`032825e6 : fffff880`03565180 fffffa80`09897b60 fffffa80`06725b60 ffffffff`ffffffff : nt!PspSystemThreadStartup+0x5a fffff880`0434fc40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e fffff880`01f07eb2 33d2 xor edx,edx SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e FOLLOWUP_NAME: MachineOwner MODULE_NAME: rdyboost IMAGE_NAME: rdyboost.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7982e FAILURE_BUCKET_ID: X64_0x1a_1236_rdyboost!ST_STORE_SMD_TRAITS_::StReleaseRegion+4e BUCKET_ID: X64_0x1a_1236_rdyboost!ST_STORE_SMD_TRAITS_::StReleaseRegion+4e Followup: MachineOwner ---------
  21. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-14258-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03265000 PsLoadedModuleList = 0xfffff800`034aa670 Debug session time: Tue Dec 20 19:43:51.325 2011 (UTC - 7:00) System Uptime: 0 days 0:01:10.200 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000336ab55, fffff880098dfb40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000336ab55, Address of the instruction which caused the bugcheck Arg3: fffff880098dfb40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0336ab55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff880098dfb40 -- (.cxr 0xfffff880098dfb40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff555884ac8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000336ab55 rsp=fffff880098e0528 rbp=0000000000000000 r8=fffffe00098e0560 r9=000fffbffffffffd r10=fffff880098e05d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0336ab55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000336ab55 STACK_TEXT: fffff880`098e0528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0336ab55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff880098dfb40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
Please remove any CD/DVD virtualization software, such as Daemon Tools/Alcohol 120%, as they use a driver called sptd.sys that is known to cause BSODs. Use the sptd.sys uninstaller

I prefer TotalMounter as my CD/DVD virtualization software as it allows me to burn images to a virtual CD/DVD if I just want an ISO file instead of a disc, and it is free.

Many use MagicISO - Convert BIN to ISO, Create, Edit, Burn, Extract ISO file, ISO/BIN converter/extractor/editor as well, which is also free.


Also, what antivirus are you using? If you are using anything other than Microsoft Security Essentials, recommend uninstalling it using the appropriate removal tool provided by the antivirus company and installing Microsoft Security Essentials (MSE) and using MSE with Windows firewall.

Also, have you uninstalled any antivirus software in the past without using the antivirus company's tools to do so?
My System SpecsSystem Spec
31 Dec 2011   #3

Win 7 Professional 64 bit
 
 

Quote   Quote: Originally Posted by writhziden View Post
Code:
  1. Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-19281-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03206000 PsLoadedModuleList = 0xfffff800`0344b670 Debug session time: Thu Nov 10 19:07:52.373 2011 (UTC - 7:00) System Uptime: 0 days 0:01:38.248 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000330bb55, fffff88008a5cb40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000330bb55, Address of the instruction which caused the bugcheck Arg3: fffff88008a5cb40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0330bb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88008a5cb40 -- (.cxr 0xfffff88008a5cb40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff555837472 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000330bb55 rsp=fffff88008a5d528 rbp=0000000000000000 r8=fffffe0008a5d560 r9=000fffbffffffffd r10=fffff88008a5d5d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0330bb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000330bb55 STACK_TEXT: fffff880`08a5d528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0330bb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88008a5cb40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  2. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-19843-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03253000 PsLoadedModuleList = 0xfffff800`03498670 Debug session time: Fri Nov 11 00:57:56.089 2011 (UTC - 7:00) System Uptime: 0 days 0:11:19.337 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C9, {7, fffff88008e33a10, fffff98013c2eee0, 0} Unable to load image \??\C:\Program Files\PeerBlock\pbfilter.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for pbfilter.sys *** ERROR: Module load completed but symbols could not be loaded for pbfilter.sys Probably caused by : pbfilter.sys ( pbfilter+2a10 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9) The IO manager has caught a misbehaving driver. Arguments: Arg1: 0000000000000007, IRP passed to IoCompleteRequest still has cancel routine set Arg2: fffff88008e33a10, the cancel routine pointer Arg3: fffff98013c2eee0, the IRP Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0xc9_7 DRIVER_VERIFIER_IO_VIOLATION_TYPE: 7 IRP_CANCEL_ROUTINE: pbfilter+2a10 fffff880`08e33a10 48895c2408 mov qword ptr [rsp+8],rbx FAULTING_IP: pbfilter+2a10 fffff880`08e33a10 48895c2408 mov qword ptr [rsp+8],rbx FOLLOWUP_IP: pbfilter+2a10 fffff880`08e33a10 48895c2408 mov qword ptr [rsp+8],rbx IRP_ADDRESS: fffff98013c2eee0 DEVICE_OBJECT: fffffa8007aeb7c0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP PROCESS_NAME: uTorrent.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff8000376f072 to fffff800032cfc40 STACK_TEXT: fffff880`0883e1b8 fffff800`0376f072 : 00000000`000000c9 00000000`00000007 fffff880`08e33a10 fffff980`13c2eee0 : nt!KeBugCheckEx fffff880`0883e1c0 fffff880`08e339ea : 00000000`0000ecc2 00000000`00000000 fffffa80`07aeb910 fffff980`13c2eee0 : nt!IovCompleteRequest+0x72 fffff880`0883e290 00000000`0000ecc2 : 00000000`00000000 fffffa80`07aeb910 fffff980`13c2eee0 00000000`00000006 : pbfilter+0x29ea fffff880`0883e298 00000000`00000000 : fffffa80`07aeb910 fffff980`13c2eee0 00000000`00000006 00000000`05baabe0 : 0xecc2 STACK_COMMAND: .bugcheck ; kb SYMBOL_NAME: pbfilter+2a10 FOLLOWUP_NAME: MachineOwner MODULE_NAME: pbfilter IMAGE_NAME: pbfilter.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4cd60dba FAILURE_BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 Followup: MachineOwner ---------
  3. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-21434-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03214000 PsLoadedModuleList = 0xfffff800`03459670 Debug session time: Thu Nov 10 19:10:33.959 2011 (UTC - 7:00) System Uptime: 0 days 0:01:34.208 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003319b55, fffff8800701fb40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003319b55, Address of the instruction which caused the bugcheck Arg3: fffff8800701fb40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03319b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff8800701fb40 -- (.cxr 0xfffff8800701fb40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5557ab572 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003319b55 rsp=fffff88007020528 rbp=0000000000000000 r8=fffffe0007020560 r9=000fffbffffffffd r10=fffff880070205d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03319b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003319b55 STACK_TEXT: fffff880`07020528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03319b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff8800701fb40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  4. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-29640-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Unable to load image Unknown_Module_34b29076`9d5e3040, Win32 error 0n2 *** WARNING: Unable to verify timestamp for Unknown_Module_34b29076`9d5e3040 *** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_34b29076`9d5e3040 Debugger can not determine kernel base address Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03258000 PsLoadedModuleList = 0xfffff800`0349d670 Debug session time: Thu Nov 10 19:55:26.351 2011 (UTC - 7:00) System Uptime: 0 days 0:01:36.226 Unable to load image Unknown_Module_34b29076`9d5e3040, Win32 error 0n2 *** WARNING: Unable to verify timestamp for Unknown_Module_34b29076`9d5e3040 *** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_34b29076`9d5e3040 Debugger can not determine kernel base address Loading Kernel Symbols . Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000335db55, fffff880094c6b40, 0} ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000335db55, Address of the instruction which caused the bugcheck Arg3: fffff880094c6b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: +0 fffff800`0335db55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff880094c6b40 -- (.cxr 0xfffff880094c6b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff55586ed1d rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000335db55 rsp=fffff880094c7528 rbp=0000000000000000 r8=fffffe00094c7560 r9=000fffbffffffffd r10=fffff880094c75d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 fffff800`0335db55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000335db55 STACK_TEXT: fffff880`094c6278 fffff800`032d41e9 : 00000000`0000003b 00000000`c0000005 fffff800`0335db55 fffff880`094c6b40 : 0xfffff800`032d4c40 fffff880`094c6280 00000000`0000003b : 00000000`c0000005 fffff800`0335db55 fffff880`094c6b40 00000000`00000000 : 0xfffff800`032d41e9 fffff880`094c6288 00000000`c0000005 : fffff800`0335db55 fffff880`094c6b40 00000000`00000000 00000000`00703c0e : 0x3b fffff880`094c6290 fffff800`0335db55 : fffff880`094c6b40 00000000`00000000 00000000`00703c0e 00000000`00000000 : 0xc0000005 fffff880`094c6298 fffff880`094c6b40 : 00000000`00000000 00000000`00703c0e 00000000`00000000 00000000`00000000 : 0xfffff800`0335db55 fffff880`094c62a0 00000000`00000000 : 00000000`00703c0e 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`094c6b40 STACK_COMMAND: kb SYMBOL_NAME: ANALYSIS_INCONCLUSIVE FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: CORRUPT_MODULELIST Followup: MachineOwner ---------
  5. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111111-19624-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0320a000 PsLoadedModuleList = 0xfffff800`0344f670 Debug session time: Fri Nov 11 01:07:09.385 2011 (UTC - 7:00) System Uptime: 0 days 0:05:31.244 Loading Kernel Symbols ............................................................... ................................................................ ............................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C9, {7, fffff8800887ea10, fffff98010c7cee0, 0} Unable to load image \??\C:\Program Files\PeerBlock\pbfilter.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for pbfilter.sys *** ERROR: Module load completed but symbols could not be loaded for pbfilter.sys Probably caused by : pbfilter.sys ( pbfilter+2a10 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9) The IO manager has caught a misbehaving driver. Arguments: Arg1: 0000000000000007, IRP passed to IoCompleteRequest still has cancel routine set Arg2: fffff8800887ea10, the cancel routine pointer Arg3: fffff98010c7cee0, the IRP Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0xc9_7 DRIVER_VERIFIER_IO_VIOLATION_TYPE: 7 IRP_CANCEL_ROUTINE: pbfilter+2a10 fffff880`0887ea10 48895c2408 mov qword ptr [rsp+8],rbx FAULTING_IP: pbfilter+2a10 fffff880`0887ea10 48895c2408 mov qword ptr [rsp+8],rbx FOLLOWUP_IP: pbfilter+2a10 fffff880`0887ea10 48895c2408 mov qword ptr [rsp+8],rbx IRP_ADDRESS: fffff98010c7cee0 DEVICE_OBJECT: fffffa8007780380 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80003726072 to fffff80003286c40 STACK_TEXT: fffff880`03519068 fffff800`03726072 : 00000000`000000c9 00000000`00000007 fffff880`0887ea10 fffff980`10c7cee0 : nt!KeBugCheckEx fffff880`03519070 fffff880`0887e9ea : 00000000`00002177 00000000`00000000 fffffa80`077804d0 fffff980`10c7cee0 : nt!IovCompleteRequest+0x72 fffff880`03519140 00000000`00002177 : 00000000`00000000 fffffa80`077804d0 fffff980`10c7cee0 fffffa80`0ca50550 : pbfilter+0x29ea fffff880`03519148 00000000`00000000 : fffffa80`077804d0 fffff980`10c7cee0 fffffa80`0ca50550 00000000`3666795b : 0x2177 STACK_COMMAND: .bugcheck ; kb SYMBOL_NAME: pbfilter+2a10 FOLLOWUP_NAME: MachineOwner MODULE_NAME: pbfilter IMAGE_NAME: pbfilter.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4cd60dba FAILURE_BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 Followup: MachineOwner ---------
  6. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111111-19999-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03210000 PsLoadedModuleList = 0xfffff800`03455670 Debug session time: Fri Nov 11 01:09:59.037 2011 (UTC - 7:00) System Uptime: 0 days 0:01:21.286 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C9, {7, fffff88007973a10, fffff9800a630ee0, 0} Unable to load image \??\C:\Program Files\PeerBlock\pbfilter.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for pbfilter.sys *** ERROR: Module load completed but symbols could not be loaded for pbfilter.sys Probably caused by : pbfilter.sys ( pbfilter+2a10 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9) The IO manager has caught a misbehaving driver. Arguments: Arg1: 0000000000000007, IRP passed to IoCompleteRequest still has cancel routine set Arg2: fffff88007973a10, the cancel routine pointer Arg3: fffff9800a630ee0, the IRP Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0xc9_7 DRIVER_VERIFIER_IO_VIOLATION_TYPE: 7 IRP_CANCEL_ROUTINE: pbfilter+2a10 fffff880`07973a10 48895c2408 mov qword ptr [rsp+8],rbx FAULTING_IP: pbfilter+2a10 fffff880`07973a10 48895c2408 mov qword ptr [rsp+8],rbx FOLLOWUP_IP: pbfilter+2a10 fffff880`07973a10 48895c2408 mov qword ptr [rsp+8],rbx IRP_ADDRESS: fffff9800a630ee0 DEVICE_OBJECT: fffffa800d915cc0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff8000372c072 to fffff8000328cc40 STACK_TEXT: fffff800`00b9a8f8 fffff800`0372c072 : 00000000`000000c9 00000000`00000007 fffff880`07973a10 fffff980`0a630ee0 : nt!KeBugCheckEx fffff800`00b9a900 fffff880`079739ea : 00000000`0000e6c5 00000000`00000000 fffffa80`0d915e10 fffff980`0a630ee0 : nt!IovCompleteRequest+0x72 fffff800`00b9a9d0 00000000`0000e6c5 : 00000000`00000000 fffffa80`0d915e10 fffff980`0a630ee0 fffffa80`0bf84a80 : pbfilter+0x29ea fffff800`00b9a9d8 00000000`00000000 : fffffa80`0d915e10 fffff980`0a630ee0 fffffa80`0bf84a80 00000000`60825f46 : 0xe6c5 STACK_COMMAND: .bugcheck ; kb SYMBOL_NAME: pbfilter+2a10 FOLLOWUP_NAME: MachineOwner MODULE_NAME: pbfilter IMAGE_NAME: pbfilter.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4cd60dba FAILURE_BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10 Followup: MachineOwner ---------
  7. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111111-20389-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03252000 PsLoadedModuleList = 0xfffff800`03497670 Debug session time: Fri Nov 11 01:00:31.010 2011 (UTC - 7:00) System Uptime: 0 days 0:01:18.259 Loading Kernel Symbols ............................................................... ................................................................ ............................. Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003357b55, fffff880072e1b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003357b55, Address of the instruction which caused the bugcheck Arg3: fffff880072e1b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03357b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff880072e1b40 -- (.cxr 0xfffff880072e1b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5557ba0c8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003357b55 rsp=fffff880072e2528 rbp=0000000000000000 r8=fffffe00072e2560 r9=000fffbffffffffd r10=fffff880072e25d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03357b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003357b55 STACK_TEXT: fffff880`072e2528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03357b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff880072e1b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_VRF_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_VRF_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  8. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111211-20467-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0324f000 PsLoadedModuleList = 0xfffff800`03494670 Debug session time: Sat Nov 12 19:22:13.947 2011 (UTC - 7:00) System Uptime: 0 days 0:01:27.196 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003354b55, fffff8800941ab40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003354b55, Address of the instruction which caused the bugcheck Arg3: fffff8800941ab40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03354b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff8800941ab40 -- (.cxr 0xfffff8800941ab40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff55586b3c8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003354b55 rsp=fffff8800941b528 rbp=0000000000000000 r8=fffffe000941b560 r9=000fffbffffffffd r10=fffff8800941b5d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03354b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003354b55 STACK_TEXT: fffff880`0941b528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03354b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff8800941ab40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  9. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111211-35178-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03262000 PsLoadedModuleList = 0xfffff800`034a7670 Debug session time: Sat Nov 12 19:56:45.926 2011 (UTC - 7:00) System Uptime: 0 days 0:01:30.175 Loading Kernel Symbols ............................................................... ................................................................ .................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003367b55, fffff88006d40b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003367b55, Address of the instruction which caused the bugcheck Arg3: fffff88006d40b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03367b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88006d40b40 -- (.cxr 0xfffff88006d40b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff55579c072 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003367b55 rsp=fffff88006d41528 rbp=0000000000000000 r8=fffffe0006d41560 r9=000fffbffffffffd r10=fffff88006d415d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03367b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003367b55 STACK_TEXT: fffff880`06d41528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03367b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88006d40b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  10. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\112211-23103-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0324d000 PsLoadedModuleList = 0xfffff800`03492670 Debug session time: Tue Nov 22 18:19:43.930 2011 (UTC - 7:00) System Uptime: 0 days 0:01:08.179 Loading Kernel Symbols ............................................................... ................................................................ ....................... Loading User Symbols Loading unloaded module list ............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003352b55, fffff88004028b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003352b55, Address of the instruction which caused the bugcheck Arg3: fffff88004028b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03352b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88004028b40 -- (.cxr 0xfffff88004028b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5556ab872 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003352b55 rsp=fffff88004029528 rbp=0000000000000000 r8=fffffe0004029560 r9=000fffbffffffffd r10=fffff880040295d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03352b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003352b55 STACK_TEXT: fffff880`04029528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03352b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88004028b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  11. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\112711-16426-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0321c000 PsLoadedModuleList = 0xfffff800`03461670 Debug session time: Sun Nov 27 17:57:18.897 2011 (UTC - 7:00) System Uptime: 0 days 0:01:05.145 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003321b55, fffff880072f0b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003321b55, Address of the instruction which caused the bugcheck Arg3: fffff880072f0b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03321b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff880072f0b40 -- (.cxr 0xfffff880072f0b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5557ba5c8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003321b55 rsp=fffff880072f1528 rbp=0000000000000000 r8=fffffe00072f1560 r9=000fffbffffffffd r10=fffff880072f15d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03321b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003321b55 STACK_TEXT: fffff880`072f1528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03321b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff880072f0b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  12. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\112711-17565-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03216000 PsLoadedModuleList = 0xfffff800`0345b670 Debug session time: Sun Nov 27 17:59:40.175 2011 (UTC - 7:00) System Uptime: 0 days 0:01:22.424 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000331bb55, fffff88007242b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000331bb55, Address of the instruction which caused the bugcheck Arg3: fffff88007242b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0331bb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88007242b40 -- (.cxr 0xfffff88007242b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5557b6bc8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000331bb55 rsp=fffff88007243528 rbp=0000000000000000 r8=fffffe0007243560 r9=000fffbffffffffd r10=fffff880072435d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0331bb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000331bb55 STACK_TEXT: fffff880`07243528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0331bb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88007242b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  13. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\120911-18142-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03213000 PsLoadedModuleList = 0xfffff800`03458670 Debug session time: Fri Dec 9 14:37:12.262 2011 (UTC - 7:00) System Uptime: 0 days 0:01:07.136 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003318b55, fffff88009561b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003318b55, Address of the instruction which caused the bugcheck Arg3: fffff88009561b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`03318b55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88009561b40 -- (.cxr 0xfffff88009561b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5558720c8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff80003318b55 rsp=fffff88009562528 rbp=0000000000000000 r8=fffffe0009562560 r9=000fffbffffffffd r10=fffff880095625d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`03318b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003318b55 STACK_TEXT: fffff880`09562528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`03318b55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88009561b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  14. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\121311-28626-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03256000 PsLoadedModuleList = 0xfffff800`0349b670 Debug session time: Tue Dec 13 19:38:59.978 2011 (UTC - 7:00) System Uptime: 0 days 0:01:21.227 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000335bb55, fffff8800931fb40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000335bb55, Address of the instruction which caused the bugcheck Arg3: fffff8800931fb40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0335bb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff8800931fb40 -- (.cxr 0xfffff8800931fb40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff55586601d rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000335bb55 rsp=fffff88009320528 rbp=0000000000000000 r8=fffffe0009320560 r9=000fffbffffffffd r10=fffff880093205d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0335bb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000335bb55 STACK_TEXT: fffff880`09320528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0335bb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff8800931fb40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  15. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\121811-12573-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0321a000 PsLoadedModuleList = 0xfffff800`0345f670 Debug session time: Sun Dec 18 12:25:58.091 2011 (UTC - 7:00) System Uptime: 0 days 22:34:58.005 Loading Kernel Symbols ............................................................... ................................................................ .............................. Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa800541db80, ffff, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+360e8 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa800541db80 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: SearchProtocol CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80003306218 to fffff80003296c40 STACK_TEXT: fffff880`099b8058 fffff800`03306218 : 00000000`0000001a 00000000`00041790 fffffa80`0541db80 00000000`0000ffff : nt!KeBugCheckEx fffff880`099b8060 fffff800`03268596 : fffffa80`09b34060 fffffa80`00000024 fffff8a0`000000b0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x360e8 fffff880`099b8910 fffff800`0356cb1a : fffff8a0`10adb530 00000000`00000001 00000000`00000000 fffffa80`0dbf9610 : nt!MmCleanProcessAddressSpace+0x96 fffff880`099b8960 fffff800`0354e48c : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x56a fffff880`099b8a60 fffff800`03295ed3 : fffffa80`09b34060 00000000`00000000 fffffa80`0dbf9610 00000000`00000000 : nt!NtTerminateProcess+0x138 fffff880`099b8ae0 00000000`775515da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0014f878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775515da STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+360e8 fffff800`03306218 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+360e8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+360e8 BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+360e8 Followup: MachineOwner ---------
  16. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-10966-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0321b000 PsLoadedModuleList = 0xfffff800`03460670 Debug session time: Tue Dec 20 04:04:26.785 2011 (UTC - 7:00) System Uptime: 1 days 15:37:31.034 Loading Kernel Symbols ............................................................... ................................................................ ................................ Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {5003, fffff70001080000, 3ee2, f2a3009} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+398d6 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000005003, The subtype of the bugcheck. Arg2: fffff70001080000 Arg3: 0000000000003ee2 Arg4: 000000000f2a3009 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_5003 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff8000330a5b6 to fffff80003297c40 STACK_TEXT: fffff880`057e7868 fffff800`0330a5b6 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`00003ee2 : nt!KeBugCheckEx fffff880`057e7870 fffff800`032a4f19 : 00000000`00000000 fffffa80`0b83f4d0 00000000`00a67000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x398d6 fffff880`057e7980 fffff800`03295d6e : 00000000`00000001 00000000`18f60000 00000000`ec001201 00000000`0734c340 : nt!MmAccessFault+0x359 fffff880`057e7ae0 000007fe`f4358e71 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e 00000000`0207d950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f4358e71 STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+398d6 fffff800`0330a5b6 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+398d6 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+398d6 BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+398d6 Followup: MachineOwner ---------
  17. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-11060-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0321e000 PsLoadedModuleList = 0xfffff800`03463670 Debug session time: Tue Dec 20 18:54:07.134 2011 (UTC - 7:00) System Uptime: 0 days 10:24:08.008 Loading Kernel Symbols ............................................................... ................................................................ ............................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa8005e3db80, ffff, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+36024 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa8005e3db80 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: SearchProtocol CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff8000330a150 to fffff8000329ac40 STACK_TEXT: fffff880`0d10d748 fffff800`0330a150 : 00000000`0000001a 00000000`00041790 fffffa80`05e3db80 00000000`0000ffff : nt!KeBugCheckEx fffff880`0d10d750 fffff800`0326cb79 : ffffffff`00000000 00000000`003affff fffffa80`00000000 fffffa80`0c285060 : nt! ?? ::FNODOBFM::`string'+0x36024 fffff880`0d10d910 fffff800`03570b1a : fffff8a0`0aa4fa70 00000000`00000001 00000000`00000000 fffffa80`0c285060 : nt!MmCleanProcessAddressSpace+0x679 fffff880`0d10d960 fffff800`0355248c : 00000000`00000000 00000000`00000001 000007ff`fffdd000 00000000`00000000 : nt!PspExitThread+0x56a fffff880`0d10da60 fffff800`03299ed3 : fffffa80`0c86c9e0 00000000`00000000 fffffa80`0c285060 00000000`00000000 : nt!NtTerminateProcess+0x138 fffff880`0d10dae0 00000000`76d715da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`001ef958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d715da STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+36024 fffff800`0330a150 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+36024 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+36024 BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+36024 Followup: MachineOwner ---------
  18. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-11559-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03267000 PsLoadedModuleList = 0xfffff800`034ac670 Debug session time: Tue Dec 20 18:56:37.256 2011 (UTC - 7:00) System Uptime: 0 days 0:01:07.131 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000336cb55, fffff8800a913b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000336cb55, Address of the instruction which caused the bugcheck Arg3: fffff8800a913b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0336cb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff8800a913b40 -- (.cxr 0xfffff8800a913b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff5558db172 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000336cb55 rsp=fffff8800a914528 rbp=0000000000000000 r8=fffffe000a914560 r9=000fffbffffffffd r10=fffff8800a9145d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0336cb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000336cb55 STACK_TEXT: fffff880`0a914528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0336cb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff8800a913b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  19. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-12417-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03249000 PsLoadedModuleList = 0xfffff800`0348e670 Debug session time: Tue Dec 20 19:40:02.958 2011 (UTC - 7:00) System Uptime: 0 days 0:01:08.207 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000334eb55, fffff88008f26b40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000334eb55, Address of the instruction which caused the bugcheck Arg3: fffff88008f26b40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0334eb55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff88008f26b40 -- (.cxr 0xfffff88008f26b40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff555850d1d rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000334eb55 rsp=fffff88008f27528 rbp=0000000000000000 r8=fffffe0008f27560 r9=000fffbffffffffd r10=fffff88008f275d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0334eb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000334eb55 STACK_TEXT: fffff880`08f27528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0334eb55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff88008f26b40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
  20. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-13369-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03214000 PsLoadedModuleList = 0xfffff800`03459670 Debug session time: Tue Dec 20 19:41:41.231 2011 (UTC - 7:00) System Uptime: 0 days 0:00:41.105 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {1236, fffffa800c6dc1a0, fffffa800c6dc1f0, 195f3d} Probably caused by : rdyboost.sys ( rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000001236, The subtype of the bugcheck. Arg2: fffffa800c6dc1a0 Arg3: fffffa800c6dc1f0 Arg4: 0000000000195f3d Debugging Details: ------------------ BUGCHECK_STR: 0x1a_1236 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80003383dab to fffff80003290c40 STACK_TEXT: fffff880`0434f998 fffff800`03383dab : 00000000`0000001a 00000000`00001236 fffffa80`0c6dc1a0 fffffa80`0c6dc1f0 : nt!KeBugCheckEx fffff880`0434f9a0 fffff880`01f07eb2 : fffffa80`099a1118 fffffa80`0c6dc1a0 fffffa80`099a1118 00000000`00000710 : nt!MmFreePagesFromMdl+0x31b fffff880`0434fa00 fffff880`01f14952 : fffffa80`099a1118 00000000`00000003 fffff880`02ba1000 fffff880`02ba1000 : rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+0x4e fffff880`0434fa60 fffff880`01f12d98 : fffffa80`00000004 00000000`00000712 00000000`00000710 fffffa80`099a5000 : rdyboost!ST_STORE<SMD_TRAITS>::StCompactionPerformInMem+0x28e fffff880`0434faf0 fffff880`01f124b4 : fffffa80`099a1438 00000000`00000080 fffffa80`099a1438 fffff880`03569f40 : rdyboost!ST_STORE<SMD_TRAITS>::StCompactionWorker+0x68 fffff880`0434fb40 fffff880`01f1141a : fffffa80`099a1438 fffff880`0434fbe0 00000000`00000080 fffffa80`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0xc0 fffff880`0434fba0 fffff800`0352bfee : 00000000`00000000 fffff880`00000000 fffffa80`09897b60 fffffa80`06706040 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x152 fffff880`0434fc00 fffff800`032825e6 : fffff880`03565180 fffffa80`09897b60 fffffa80`06725b60 ffffffff`ffffffff : nt!PspSystemThreadStartup+0x5a fffff880`0434fc40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e fffff880`01f07eb2 33d2 xor edx,edx SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e FOLLOWUP_NAME: MachineOwner MODULE_NAME: rdyboost IMAGE_NAME: rdyboost.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7982e FAILURE_BUCKET_ID: X64_0x1a_1236_rdyboost!ST_STORE_SMD_TRAITS_::StReleaseRegion+4e BUCKET_ID: X64_0x1a_1236_rdyboost!ST_STORE_SMD_TRAITS_::StReleaseRegion+4e Followup: MachineOwner ---------
  21. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-14258-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03265000 PsLoadedModuleList = 0xfffff800`034aa670 Debug session time: Tue Dec 20 19:43:51.325 2011 (UTC - 7:00) System Uptime: 0 days 0:01:10.200 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000336ab55, fffff880098dfb40, 0} Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000336ab55, Address of the instruction which caused the bugcheck Arg3: fffff880098dfb40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiGetTopLevelPfn+65 fffff800`0336ab55 4c8b4928 mov r9,qword ptr [rcx+28h] CONTEXT: fffff880098dfb40 -- (.cxr 0xfffff880098dfb40) rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70 rdx=fffffff555884ac8 rsi=fffffa80065ec000 rdi=0000058000000000 rip=fffff8000336ab55 rsp=fffff880098e0528 rbp=0000000000000000 r8=fffffe00098e0560 r9=000fffbffffffffd r10=fffff880098e05d8 r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000 r14=fffff6fb40000000 r15=0000000fffffffff iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiGetTopLevelPfn+0x65: fffff800`0336ab55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000336ab55 STACK_TEXT: fffff880`098e0528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65 FOLLOWUP_IP: nt!MiGetTopLevelPfn+65 fffff800`0336ab55 4c8b4928 mov r9,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiGetTopLevelPfn+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 STACK_COMMAND: .cxr 0xfffff880098dfb40 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65 Followup: MachineOwner ---------
Please remove any CD/DVD virtualization software, such as Daemon Tools/Alcohol 120%, as they use a driver called sptd.sys that is known to cause BSODs. Use the sptd.sys uninstaller

I prefer TotalMounter as my CD/DVD virtualization software as it allows me to burn images to a virtual CD/DVD if I just want an ISO file instead of a disc, and it is free.

Many use MagicISO - Convert BIN to ISO, Create, Edit, Burn, Extract ISO file, ISO/BIN converter/extractor/editor as well, which is also free.


Also, what antivirus are you using? If you are using anything other than Microsoft Security Essentials, recommend uninstalling it using the appropriate removal tool provided by the antivirus company and installing Microsoft Security Essentials (MSE) and using MSE with Windows firewall.

Also, have you uninstalled any antivirus software in the past without using the antivirus company's tools to do so?
I cant believe that did it.... TOTALLY SOLVED NOW! Thank you SO MUCH! Repped and /cookies to you. Have a great new year.
My System SpecsSystem Spec
.


31 Dec 2011   #4

Windows 7 Home Premium 64 Bit
 
 

Quote   Quote: Originally Posted by MD2be View Post

I cant believe that did it.... TOTALLY SOLVED NOW! Thank you SO MUCH! Repped and /cookies to you. Have a great new year.
Glad it worked! Enjoy your New Year, as well. Good luck!
My System SpecsSystem Spec
Reply

 Repeat BSODs 1-2 mins after loading desktop




Thread Tools



Similar help and support threads for2: Repeat BSODs 1-2 mins after loading desktop
Thread Forum
Repeat BSODs, seemingly random (currently using fresh Win7 64 install) General Discussion
Loading Desktop problems Hardware & Devices
2 BSODs while gaming/internet/loading BSOD Help and Support
BSOD, loading applications slow 5-15 mins, frequent memory dumps BSOD Help and Support
Repeat BSODs shortly after loading desktop BSOD Help and Support
W7 is freezing before loading to a desktop Hardware & Devices
Keyboard repeat delay, repeat rate?? Hardware & Devices

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 01:19 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33