ntoskrnl.exe causing BSOD Windows 7

Page 1 of 4 123 ... LastLast

  1. Posts : 19
    Windows 7 Pro
       #1

    ntoskrnl.exe causing BSOD Windows 7


    Hi, i was given a laptop by a friend about a week ago, its a DELL Vostro 1500.
    i was told that it "crashed" randomly, when i had it it had vista.

    the sticker on the laptop says "core 2 duo" but the actual processor was a celeron!

    so, my first port of call was throwing a core 2 duo in, this worked well for about a day until it bsoded again. (The processor i put in was a core 2 duo that came with the original vostro.)

    I then put a new HDD in and installed windows 7 pro but the bsods are still here.

    I have attached the minidumps that have ocurred during the past day or so.

    They all point to ntoskrnl.exe but i am not sure where to go from here.

    Thanks, Elis


    Attachment 87418
    Last edited by Elis; 25 Jul 2010 at 13:58.
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    Hi Ellis and welcome to the forum. There are no mini dumps attached. How to upload your dump files - https://www.sevenforums.com/tutorials...en-forums.html
      My Computer


  3. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #3

    The dumps point to hardware or hardware related issues. Usually when there are varying error codes, there is a hardware issue. You can see that each code points to hardware.

    STOP 0x0000000A: IRQL_NOT_LESS_OR_EQUAL

    Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility

    STOP 0x00000019: BAD_POOL_HEADER

    Usual causes: Device driver


    STOP 0x0000001A: MEMORY_MANAGEMENT

    Usual causes: Device driver, memory, kernel


    STOP 0x000000C2: BAD_POOL_CALLER

    Usual causes:
    Device driver, ?Memory
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidumps.zip\072410-22666-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a59000 PsLoadedModuleList = 0xfffff800`02c96e50
    Debug session time: Sat Jul 24 11:56:30.461 2010 (GMT-4)
    System Uptime: 0 days 0:04:48.802
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {3, fffffa8000c11550, 0, 0}
    
    Probably caused by : Pool_Corruption ( nt!ExFreePool+536 )
    
    Followup: Pool_corruption
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000003, the pool freelist is corrupt.
    Arg2: fffffa8000c11550, the pool entry being checked.
    Arg3: 0000000000000000, the read back flink freelist value (should be the same as 2).
    Arg4: 0000000000000000, the read back blink freelist value (should be the same as 2).
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  avp.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002bfcd6f to fffff80002ac9600
    
    STACK_TEXT:  
    fffff880`06806758 fffff800`02bfcd6f : 00000000`00000019 00000000`00000003 fffffa80`00c11550 00000000`00000000 : nt!KeBugCheckEx
    fffff880`06806760 fffff800`02aef63a : fffffa80`00000003 00010000`00010d0d fffffa80`01792010 fffffa80`00000000 : nt!ExFreePool+0x536
    fffff880`06806850 fffff880`013057c9 : 00010000`00010d0d fffffa80`01792010 fffffa80`017807a0 fffff8a0`02cf7010 : nt!RtlInsertElementGenericTableFullAvl+0x4a
    fffff880`06806890 fffff880`012d1cf6 : fffffa80`017807a0 fffffa80`01b07180 fffffa80`017807a0 00010000`00010d0d : Ntfs!NtfsCreateFcb+0x211
    fffff880`06806970 fffff880`012f5b04 : fffff880`06161490 fffffa80`01792010 fffffa80`017807a0 00000000`00000000 : Ntfs!NtfsOpenFile+0x1ca
    fffff880`06806b50 fffff880`0125ec0d : fffffa80`017807a0 fffffa80`01792010 fffff880`06161490 fffffa80`00dfcb00 : Ntfs!NtfsCommonCreate+0xc54
    fffff880`06806d30 fffff800`02ac1487 : fffff880`06161400 00000000`00000000 00000000`7ee75000 00000000`034aff88 : Ntfs!NtfsCommonCreateCallout+0x1d
    fffff880`06806d60 fffff800`02ac1441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
    fffff880`061612d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExFreePool+536
    fffff800`02bfcd6f cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!ExFreePool+536
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExFreePool+536
    
    BUCKET_ID:  X64_0x19_3_nt!ExFreePool+536
    
    Followup: Pool_corruption
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidumps.zip\072410-23665-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02817000 PsLoadedModuleList = 0xfffff800`02a54e50
    Debug session time: Fri Jul 23 19:17:50.193 2010 (GMT-4)
    System Uptime: 0 days 0:07:12.128
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...............................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffffa80126d3010, 2, 1, fffff800029459f7}
    
    Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+87 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa80126d3010, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800029459f7, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abf0e0
     fffffa80126d3010 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`029459f7 480fb328        btr     qword ptr [rax],rbp
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  regsvr32.exe
    
    TRAP_FRAME:  fffff88006c607c0 -- (.trap 0xfffff88006c607c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa80026d3010 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800029459f7 rsp=fffff88006c60950 rbp=0000000080000000
     r8=fffff88006c60980  r9=fffffa80016c3ec8 r10=0000000fffffffff
    r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!MiReleaseConfirmedPageFileSpace+0x87:
    fffff800`029459f7 480fb328        btr     qword ptr [rax],rbp ds:3000:fffffa80`026d3010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002886b69 to fffff80002887600
    
    STACK_TEXT:  
    fffff880`06c60678 fffff800`02886b69 : 00000000`0000000a fffffa80`126d3010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`06c60680 fffff800`028857e0 : 00000000`7746a000 fffffa80`0198fb60 00000000`778d9000 00000000`73f9a000 : nt!KiBugCheckDispatch+0x69
    fffff880`06c607c0 fffff800`029459f7 : 00000000`778b3000 fffffa80`0198fb60 fffffa80`01edf010 00000000`75fc5000 : nt!KiPageFault+0x260
    fffff880`06c60950 fffff800`02837ad6 : 80000000`00000000 00000000`00000015 80000000`00000000 00000000`00000002 : nt!MiReleaseConfirmedPageFileSpace+0x87
    fffff880`06c609d0 fffff800`0285b324 : fffffa80`016c3ec8 00000000`00000001 00000000`00000000 fffffa80`0000001c : nt! ?? ::FNODOBFM::`string'+0x20a72
    fffff880`06c60a50 fffff800`0285a5ae : 00000000`00000001 fffffa80`016c3b30 fffffa80`016c3b30 00000000`00000001 : nt!MiDeleteAllHashMappings+0xe4
    fffff880`06c60a90 fffff800`02b6dc4f : fffff8a0`02a101b0 00000000`00000001 00000000`00000000 fffffa80`0198fb60 : nt!MmCleanProcessAddressSpace+0xa2
    fffff880`06c60ae0 fffff800`02b456eb : 00000000`00000003 00000000`00000001 00000000`7efdb000 00000000`00000000 : nt!PspExitThread+0x92f
    fffff880`06c60ba0 fffff800`02886853 : fffffa80`016c3b30 fffff880`00000003 00000000`7efdb000 fffffa80`0198fb60 : nt!NtTerminateProcess+0x25b
    fffff880`06c60c20 00000000`7771001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0014dc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7771001a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`029459f7 480fb328        btr     qword ptr [rax],rbp
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiReleaseConfirmedPageFileSpace+87
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidumps.zip\072410-24024-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a56000 PsLoadedModuleList = 0xfffff800`02c93e50
    Debug session time: Sat Jul 24 17:10:00.726 2010 (GMT-4)
    System Uptime: 0 days 0:07:18.067
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {5001, fffff70001080000, 0, fffff6fb7dbed009}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+29961 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000005001, The subtype of the bugcheck.
    Arg2: fffff70001080000
    Arg3: 0000000000000000
    Arg4: fffff6fb7dbed009
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_5001
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  GoogleUpdate.e
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880064b7a50 -- (.trap 0xfffff880064b7a50)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000007ffffff0000 rbx=0000000000000000 rcx=0000000000413ce8
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002d87377 rsp=fffff880064b7be0 rbp=fffff880064b8ca0
     r8=0000000000013ce8  r9=000000000000000a r10=0000000000400000
    r11=0000000000413ce8 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po cy
    nt!MiInitializeWowPeb+0x8f:
    fffff800`02d87377 418a03          mov     al,byte ptr [r11] ds:d790:00000000`00413ce8=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002b357b2 to fffff80002ac6600
    
    STACK_TEXT:  
    fffff880`064b7788 fffff800`02b357b2 : 00000000`0000001a 00000000`00005001 fffff700`01080000 00000000`00000000 : nt!KeBugCheckEx
    fffff880`064b7790 fffff800`02ab84a9 : fffffa80`0343f6e0 00000000`00000000 fffffa80`016adb28 00000000`00413ce8 : nt! ?? ::FNODOBFM::`string'+0x29961
    fffff880`064b7820 fffff800`02ae179b : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffffa80`00000000 : nt!MiIssueHardFault+0x309
    fffff880`064b78f0 fffff800`02ac46ee : 00000000`00000000 00000000`7efdf000 fffffa80`00e48200 fffff800`00000004 : nt!MmAccessFault+0x14bb
    fffff880`064b7a50 fffff800`02d87377 : 00000000`7efdf000 fffff880`064b8ca0 00000000`004000e8 fffffa80`00e48230 : nt!KiPageFault+0x16e
    fffff880`064b7be0 fffff800`02d77780 : 00000000`7efdf000 fffffa80`016ad790 fffff880`00000001 00000000`004000e8 : nt!MiInitializeWowPeb+0x8f
    fffff880`064b7c80 fffff800`02d755e9 : fffffa80`00000000 fffffa80`016c1060 fffffa80`016adac8 00000000`00000020 : nt!MmCreatePeb+0x447
    fffff880`064b7db0 fffff800`02d72e48 : 00000000`00000000 00000000`0042f890 fffff880`064b86f0 fffffa80`0176891a : nt!PspAllocateProcess+0x79d
    fffff880`064b8080 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateUserProcess+0x4a3
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+29961
    fffff800`02b357b2 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+29961
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb
    
    FAILURE_BUCKET_ID:  X64_0x1a_5001_nt!_??_::FNODOBFM::_string_+29961
    
    BUCKET_ID:  X64_0x1a_5001_nt!_??_::FNODOBFM::_string_+29961
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidumps.zip\072510-30919-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a4d000 PsLoadedModuleList = 0xfffff800`02c8ae50
    Debug session time: Sun Jul 25 08:28:10.898 2010 (GMT-4)
    System Uptime: 0 days 0:01:20.958
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 1097, 0, fffff8a000a08010}
    
    GetPointerFromAddress: unable to read from fffff80002cf50e0
    GetUlongFromAddress: unable to read from fffff80002c631b0
    GetUlongFromAddress: unable to read from fffff80002c631b0
    Probably caused by : fltmgr.sys ( fltmgr!FltpPerformPreCallbacks+8f0 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 0000000000001097, (reserved)
    Arg3: 0000000000000000, Memory contents of the pool block
    Arg4: fffff8a000a08010, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    GetUlongFromAddress: unable to read from fffff80002c631b0
    GetUlongFromAddress: unable to read from fffff80002c631b0
    
    POOL_ADDRESS:  fffff8a000a08010 
    
    BUGCHECK_STR:  0xc2_7
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002bf060e to fffff80002abd600
    
    STACK_TEXT:  
    fffff880`02fff838 fffff800`02bf060e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02fff840 fffff880`01180620 : fffffa80`0220e050 fffffa80`0220e050 fffffa80`02363684 00000000`00000000 : nt!ExFreePool+0xccb
    fffff880`02fff8f0 fffff880`01180be9 : fffff880`02ff8000 fffff800`00000002 fffff800`02c41000 fffff800`02ac0c00 : fltmgr!FltpPerformPreCallbacks+0x8f0
    fffff880`02fff9f0 fffff880`0117f6c7 : fffffa80`03842380 fffffa80`01b7f8e0 fffffa80`016b2400 00000000`00000000 : fltmgr!FltpPassThrough+0x2d9
    fffff880`02fffa70 fffff800`02dd472e : fffffa80`0220e050 fffffa80`01b79190 fffff8a0`00a082c0 fffffa80`01b7f8e0 : fltmgr!FltpDispatch+0xb7
    fffff880`02fffad0 fffff800`02ac27b4 : 00000000`00000000 00000000`00000000 fffffa80`00ca0080 00000000`00000000 : nt!IopDeleteFile+0x11e
    fffff880`02fffb60 fffff800`02daf229 : 00000000`00000000 00000000`00080081 fffffa80`0220e9f0 fffffa80`00080081 : nt!ObfDereferenceObject+0xd4
    fffff880`02fffbc0 fffff800`02be4fcb : fffffa80`0220e9f8 00000000`00000001 00000000`00000000 00000000`00000631 : nt!MiSegmentDelete+0xa1
    fffff880`02fffc00 fffff800`02be563d : 00000000`00000000 00000000`00000080 fffffa80`00c82040 00000000`00000012 : nt!MiProcessDereferenceList+0x23b
    fffff880`02fffcc0 fffff800`02d62a86 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDereferenceSegmentThread+0x10d
    fffff880`02fffd40 fffff800`02a9bb06 : fffff800`02c37e80 fffffa80`00ca1510 fffff800`02c45c40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`02fffd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    fltmgr!FltpPerformPreCallbacks+8f0
    fffff880`01180620 4885db          test    rbx,rbx
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  fltmgr!FltpPerformPreCallbacks+8f0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: fltmgr
    
    IMAGE_NAME:  fltmgr.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc11f
    
    FAILURE_BUCKET_ID:  X64_0xc2_7_fltmgr!FltpPerformPreCallbacks+8f0
    
    BUCKET_ID:  X64_0xc2_7_fltmgr!FltpPerformPreCallbacks+8f0
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmtsmn
    start             end                 module name
    fffff880`00f04000 fffff880`00f5b000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`0413d000 fffff880`041c7000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`05187000 fffff880`0519d000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`01173000 fffff880`0117e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`01135000 fffff880`0113e000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0113e000 fffff880`01168000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`050fb000 fffff880`05116000   b44amd64 b44amd64.sys Tue Nov 21 07:23:06 2006 (4562EFAA)
    fffff880`00fcc000 fffff880`00fd8000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`04e46000 fffff880`050ee000   bcmwl664 bcmwl664.sys Tue Jul 07 20:45:04 2009 (4A53EC10)
    fffff880`02ca1000 fffff880`02cb2000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`02944000 fffff880`02962000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00770000 fffff960`00797000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0191c000 fffff880`01946000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cf2000 fffff880`00db2000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018b4000 fffff880`018e4000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c94000 fffff880`00cf2000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05169000 fffff880`0516d500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`01405000 fffff880`01478000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00fc3000 fffff880`00fcc000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`05177000 fffff880`05187000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05951000 fffff880`0595f000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02c00000 fffff880`02c83000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`02c83000 fffff880`02ca1000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02d91000 fffff880`02da0000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0189e000 fffff880`018b4000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0523d000 fffff880`0525f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`0595f000 fffff880`0596b000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05976000 fffff880`05989000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`0596b000 fffff880`05976000   dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`05996000 fffff880`059a2000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03ae5000 fffff880`03bd9000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03a00000 fffff880`03a46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`011ca000 fffff880`011de000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0117e000 fffff880`011ca000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01489000 fffff880`01493000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`00c00000 fffff880`00c3a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`00e00000 fffff880`00e4a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`0515c000 fffff880`05169000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02a04000 fffff800`02a4d000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03aba000 fffff880`03ade000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`053a2000 fffff880`053fe000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`0592d000 fffff880`05946000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05946000 fffff880`0594e080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`0591f000 fffff880`0592d000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0287c000 fffff880`02944000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`0122b000 fffff880`01234000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`05116000 fffff880`05134000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0480e000 fffff880`04df2fe0   igdkmd64 igdkmd64.sys Wed Sep 23 15:22:57 2009 (4ABA7591)
    fffff880`01103000 fffff880`0110b000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02dc6000 fffff880`02ddc000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`0514d000 fffff880`0515c000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00bd2000 fffff800`00bdc000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`03c14000 fffff880`0413d000   kl1      kl1.sys      Mon Jun 15 06:00:30 2009 (4A361BBE)
    fffff880`011de000 fffff880`011ea000   klbg     klbg.sys     Mon Dec 15 11:41:13 2008 (494688A9)
    fffff880`01946000 fffff880`0199c000   klif     klif.sys     Fri Jul 03 05:07:48 2009 (4A4DCA64)
    fffff880`02ce1000 fffff880`02ceb000   klim6    klim6.sys    Fri May 15 10:50:08 2009 (4A0D8120)
    fffff880`05134000 fffff880`0513e000   klmouflt klmouflt.sys Sat May 16 12:58:34 2009 (4A0EF0BA)
    fffff880`052de000 fffff880`05321000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`013d7000 fffff880`013f1000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01200000 fffff880`0122b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`0525f000 fffff880`05264200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`05800000 fffff880`05815000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`059b0000 fffff880`059d3000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c3c000 fffff880`00c80000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`05910000 fffff880`0591f000   modem    modem.sys    Mon Jul 13 20:10:48 2009 (4A5BCD08)
    fffff880`059a2000 fffff880`059b0000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0513e000 fffff880`0514d000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05989000 fffff880`05996000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`0111b000 fffff880`01135000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02962000 fffff880`0297a000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0297a000 fffff880`029a7000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`029a7000 fffff880`029f5000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`02800000 fffff880`02823000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01168000 fffff880`01173000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01809000 fffff880`01814000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f64000 fffff880`00f6e000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02d86000 fffff880`02d91000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`011ea000 fffff880`011fc000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01493000 fffff880`01585000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`051c1000 fffff880`051cd000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`05815000 fffff880`05828000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`051cd000 fffff880`051fc000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0538d000 fffff880`053a2000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02ceb000 fffff880`02cfa000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`01850000 fffff880`01895000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01585000 fffff880`015e5000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01814000 fffff880`01825000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02d7a000 fffff880`02d86000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a4d000 fffff800`03029000   nt       ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
    fffff880`01234000 fffff880`013d7000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0199c000 fffff880`019a5000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`05600000 fffff880`05653000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`041d0000 fffff880`041f6000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fae000 fffff880`00fc3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f6e000 fffff880`00fa1000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0110b000 fffff880`0111b000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01478000 fffff880`01489000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`03875000 fffff880`0391b000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05200000 fffff880`0523d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c80000 fffff880`00c94000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`0519d000 fffff880`051c1000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04e00000 fffff880`04e1b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04e1b000 fffff880`04e3c000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03bd9000 fffff880`03bf3000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02d29000 fffff880`02d7a000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`03bf3000 fffff880`03bfe000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`019e8000 fffff880`019f1000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019f1000 fffff880`019fa000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01800000 fffff880`01809000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0105e000 fffff880`01098000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05828000 fffff880`05840000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0399d000 fffff880`039a8000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`015f5000 fffff880`015fd000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05ede000 fffff880`05f76000   srv      srv.sys      Tue Dec 08 03:32:55 2009 (4B1E0F37)
    fffff880`03800000 fffff880`03869000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
    fffff880`039a8000 fffff880`039d5000   srvnet   srvnet.sys   Tue Dec 08 03:32:26 2009 (4B1E0F1A)
    fffff880`04e3c000 fffff880`04e3d480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`039d5000 fffff880`039e7000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01843000 fffff880`01850000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01825000 fffff880`01843000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02d15000 fffff880`02d29000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004d0000 fffff960`004da000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`02da0000 fffff880`02dc6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`05321000 fffff880`05333000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`0594f000 fffff880`05950f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03aa9000 fffff880`03aba000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`05333000 fffff880`0538d000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03a53000 fffff880`03aa9000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`03a46000 fffff880`03a53000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00fa1000 fffff880`00fae000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019a5000 fffff880`019b3000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`019b3000 fffff880`019d8000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`015e5000 fffff880`015f5000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00fd8000 fffff880`00fed000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010a7000 fffff880`01103000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`00db2000 fffff880`00dfe000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`05265000 fffff880`052b7000   VSTAZL6  VSTAZL6.SYS  Wed Oct 15 20:53:42 2008 (48F69096)
    fffff880`05845000 fffff880`05910000   VSTCNXT6 VSTCNXT6.SYS Wed Oct 15 20:52:22 2008 (48F69046)
    fffff880`05675000 fffff880`057e9000   VSTDPV6  VSTDPV6.SYS  Wed Oct 15 20:57:45 2008 (48F69189)
    fffff880`050ee000 fffff880`050fb000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02ccb000 fffff880`02ce1000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`02cfa000 fffff880`02d15000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019d8000 fffff880`019e8000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e51000 fffff880`00ef5000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ef5000 fffff880`00f04000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`041c7000 fffff880`041d0000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00060000 fffff960`0036f000   win32k   win32k.sys   unavailable (00000000)
    fffff880`0516e000 fffff880`05177000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f5b000 fffff880`00f64000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`059d3000 fffff880`059f4000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`03946000 fffff880`0399d000   rixdpx64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0392f000 fffff880`03946000   rimspx64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0391b000 fffff880`0392f000   rimmpx64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`018e4000 fffff880`018f2000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`018f2000 fffff880`018fe000   dump_pciidex
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`018fe000 fffff880`01909000   dump_msahci.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01909000 fffff880`0191c000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    Since drivers are mentioned as a possible cause, I will start with them. You have some very old drivers on your system and Win 7 does not like obsolete drivers. They can and will cause BSOD's.
    b44amd64.sys Tue Nov 21 07:23:06 2006
    bcmwl664.sys Tue Jul 07 20:45:04 2009
    GEARAspiWDM.sys Mon May 18 08:17:04 2009
    kl1.sys Mon Jun 15 06:00:30 2009
    klbg.sys Mon Dec 15 11:41:13 2008
    klif.sys Fri Jul 03 05:07:48 2009
    klim6.sys Fri May 15 10:50:08 2009
    klmouflt.sys Sat May 16 12:58:34 2009
    VSTAZL6.SYS Wed Oct 15 20:53:42 2008
    VSTCNXT6.SYS Wed Oct 15 20:52:22 2008
    VSTDPV6.SYS Wed Oct 15 20:57:45 2008
    While I cannot say these drivers are causing your problems, they are definitely not helping the stability of your system. These drivers, especially the ones in red font, need to be updated. It is best to get the drivers from the manufacturers' websites.

    How to find drivers:

    - search Google for the name of the driver
    - compare the Google results with what's installed on your system to figure out which device/program it belongs to
    - visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).

    - if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.

    - - The most common drivers are listed on this page: Driver Reference
    - - Driver manufacturer links are on this page: Drivers and Downloads

    After you have updated your drivers and rebooted, we will go from there.
    Last edited by CarlTR6; 25 Jul 2010 at 14:58.
      My Computer


  4. Posts : 19
    Windows 7 Pro
    Thread Starter
       #4

    hi, thanks for your explanation of the stop codes, as they all point to hardware there would be no benefit to reinstalling windows.

    Does the minidump point to any specific hardware item or hardware in general.

    Thanks.
      My Computer


  5. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #5

    You are very welcome. Refresh your page for my suggestions. Unfortunately, the mini dumps do not point to a specific cause; so will will trouble shoot by process of elimination.

    I see you are running Kaspersky. Kaspersky is a known cause of BSOD's on some Win 7 systems. Before you update your drivers, completely uninstall Kaspersky using this tool > Info > Tool (Note: Removal of all versions of Kaspersky AV) Do not try to update it; uninstall it. Once you have uninstalled Kaspersky, download and install Microsoft Security Essentials while we are trouble shooting. Once your system is running smoothly, you can reinstall Kaspersky and try it; but I do not recommend it.

    Here is some help with your drivers.

    b44amd64.sys - this is your network adapter card driver. Broadcom NDIS driver
    Broadcom.com - Downloads & Support

    bcmwl664.sys - Broadcom 802.11 Network Adapter wireless driver

    GEARAspiWDM.sys - CDRom Class Filter Driver or Filter Driver for 2k and XP or CD/DVD Class Filter Driver or CD DVD Filter or GEAR ASPI Filter Driver
    belongs to the software GEAR.wrks or GEAR CDRom Filter or GEARAspi or GEARAspiWDM or Norton Ghost or MixMeister Studio Demo or MixMeister Pro or GEAR 32bit Driver Installer or MixMeister CD-R Drivers or Drive Image or Norton Save and Restore or CD DVD Filter or GearDrvs or iTunes or GEAR ASPI Filter Driver or GEAR driver installer for x by GEAR Software Inc (www.gearsoftware.com).

    kl1.sys - Kaspersky
    klim6.sys - Kaspersky
    klmouflt.sys - Kaspersky

    VSTAZL6.SYS - This is your modem driver. HSF_HWAZL WDM driver; SoftK56 Modem Driver, Conexant Systems, Inc.

    VSTCNXT6.SYS - Your modem driver. HSF_HWAZL WDM driver; SoftK56 Modem Driver, Conexant Systems, Inc.

    VSTDPV6.SYS - Another modem driver. HSF_HWAZL WDM driver; SoftK56 Modem Driver, Conexant Systems, Inc.

    VSTCNXT6.SYS - Another modem driver. HSF_HWAZL WDM driver; SoftK56 Modem Driver, Conexant Systems, Inc.

    After you update these drivers, run your system and post back.
    Last edited by CarlTR6; 25 Jul 2010 at 15:37.
      My Computer


  6. Posts : 19
    Windows 7 Pro
    Thread Starter
       #6

    Hi, i have had some bother finding a newer driver for b44amd64.sys, The driver provided by broadcom is no newer than the driver windows itself has.

    however,
    VSTAZL6.SYS, VSTCNXT6.SYS and VSTDPV6.SYS are all drivers that point to a 56k modem that the laptop has, since i never use it can i just uninstall the drivers and remove the hardware?


      My Computer


  7. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #7

    Yes, you can. That is a good solution. You can actually rename those drivers from .sys to .bak and leave them. They won't load if they are renamed. The modem is obsolete for Win 7 and removing it is a good solution.

    If you have not done so, please refresh your page and read what I have said about Kaspersky. Uninstall it using the Kaspersky uninstall tool.

    Edited to add: I just looked at your system specs and see that you are overclocking. Please return your settings to stock while you are trouble shooting. Overclocking can cause BSOD's.
    Last edited by CarlTR6; 25 Jul 2010 at 15:51. Reason: Additional information
      My Computer


  8. Posts : 19
    Windows 7 Pro
    Thread Starter
       #8

    hi, the overclocking is on my pc (that is stable), I am talking about my laptop. It doesnt have the option to overclock and the bios is up to date.


    update: i am now running microsoft security essentials.

    Do i need to physically remove the 56k modem or can i just disable it in device manager and rename or delete the driver .sys files?

    Thanks for all of your help, Elis
      My Computer


  9. Posts : 1,360
    win7 ultimate / virtual box
       #9

    Elis said:
    hi, the overclocking is on my pc (that is stable), I am talking about my laptop. It doesnt have the option to overclock and the bios is up to date.


    update: i am now running microsoft security essentials.

    Do i need to physically remove the 56k modem or can i just disable it in device manager and rename or delete the driver .sys files?

    Thanks for all of your help, Elis
    I would unninstall it reboot then enter your bios options and disable the modem there :)
      My Computer


  10. Posts : 19
    Windows 7 Pro
    Thread Starter
       #10

    OK, physically removed 56k modem.

    will the drivers .sys files automatically be uninstalled or not?
    Last edited by Elis; 25 Jul 2010 at 18:14.
      My Computer


 
Page 1 of 4 123 ... LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 16:38.
Find Us