Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD, help please

15 Aug 2010   #61
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Sorry to hear that. It was a good try. I think that a new card will go a long way toward solving the problem. Keep us posted.


My System SpecsSystem Spec
.
08 Sep 2010   #62
kuleee

Windows 7 Ultimate x64
 
 

fresh re-format. again
i do NOT have new card, everything is still the same, one bsod. please take a look at files
My System SpecsSystem Spec
08 Sep 2010   #63
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Quote   Quote: Originally Posted by kuleee View Post
fresh re-format. again
i do NOT have new card, everything is still the same, one bsod. please take a look at files
Since you reformatted and did a clean install, this more than ever points to hardware. You have tested your RAM and your hard drive. I looked at all four dumps. All pointed to memory or memory corruption. Add to this your uptimes were not very long before your system crashed.

Error code 1A, MEMORY_MANAGEMENT - usually caused by a device driver, memory, kernel.

Error code 7E, SYSTEM_THREAD_EXCEPTION_NOT_HANDLED - Insufficient disk space, Device driver, Video card, BIOS, Breakpoint with no debugger attached, Hardware incompatibility, Faulty system service, Memory, 3rd party remote control.

Error code 3B, SYSTEM_SERVICE_EXCEPTION - System service, Device driver, graphics driver, ?memory.

Code:
Kernel base = 0xfffff800`02a0e000 PsLoadedModuleList = 0xfffff800`02c4be50
Debug session time: Mon Sep  6 12:46:58.341 2010 (GMT-4)
System Uptime: 0 days 3:27:39.713
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5003, fffff70001080000, b43b, bf6100016872}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+29fd7 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000000b43b
Arg4: 0000bf6100016872

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002aefa08 to fffff80002a7ff00

STACK_TEXT:  
fffff880`094d99c8 fffff800`02aefa08 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0000b43b : nt!KeBugCheckEx
fffff880`094d99d0 fffff800`02a9a1a6 : 00000000`00000001 00000000`0d28a000 fffff880`094d9c20 fffff680`00069450 : nt! ?? ::FNODOBFM::`string'+0x29fd7
fffff880`094d9ac0 fffff800`02a7dfee : 00000000`00000001 00000000`0d289ffc 00000000`0f340d01 00000000`0014b568 : nt!MmAccessFault+0x5c6
fffff880`094d9c20 00000000`705f872e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0014b420 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x705f872e


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+29fd7
fffff800`02aefa08 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+29fd7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29fd7

BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29fd7

Followup: MachineOwner
---------

System Uptime: 0 days 0:19:49.556
Unable to load image Unknown_Module_c66878db`85fff86d, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_c66878db`85fff86d
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_c66878db`85fff86d
Debugger can not determine kernel base address
Loading Kernel Symbols
.
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7E, {ffffffffc0000005, fffff80002a84b5c, fffff8800338dfd8, fffff8800338d830}

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a84b5c, The address that the exception occurred at
Arg3: fffff8800338dfd8, Exception Record Address
Arg4: fffff8800338d830, Context Record Address

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+5dfa952f01ecdf90
fffff800`02a84b5c 0fb742c0        movzx   eax,word ptr [rdx-40h]

EXCEPTION_RECORD:  fffff8800338dfd8 -- (.exr 0xfffff8800338dfd8)
Cannot read Exception record @ fffff8800338dfd8

CONTEXT:  fffff8800338d830 -- (.cxr 0xfffff8800338d830)
Unable to read context, Win32 error 0n30

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x7E

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002ae5a3a to fffff880045859c2

STACK_TEXT:  
fffff800`041e6c98 fffff800`02ae5a3a : 00000000`0023c380 fffffa80`043558a8 fffff800`02c5ec40 00000000`00000001 : 0xfffff880`045859c2
fffff800`041e6ca0 00000000`0023c380 : fffffa80`043558a8 fffff800`02c5ec40 00000000`00000001 fffff800`02c50e80 : 0xfffff800`02ae5a3a
fffff800`041e6ca8 fffffa80`043558a8 : fffff800`02c5ec40 00000000`00000001 fffff800`02c50e80 fffff800`02ae3697 : 0x23c380
fffff800`041e6cb0 fffff800`02c5ec40 : 00000000`00000001 fffff800`02c50e80 fffff800`02ae3697 00000000`a6381606 : 0xfffffa80`043558a8
fffff800`041e6cb8 00000000`00000001 : fffff800`02c50e80 fffff800`02ae3697 00000000`a6381606 00000000`a63815fa : 0xfffff800`02c5ec40
fffff800`041e6cc0 fffff800`02c50e80 : fffff800`02ae3697 00000000`a6381606 00000000`a63815fa 00000000`a6381606 : 0x1
fffff800`041e6cc8 fffff800`02ae3697 : 00000000`a6381606 00000000`a63815fa 00000000`a6381606 00000000`000000dd : 0xfffff800`02c50e80
fffff800`041e6cd0 00000000`a6381606 : 00000000`a63815fa 00000000`a6381606 00000000`000000dd fffffa80`04355810 : 0xfffff800`02ae3697
fffff800`041e6cd8 00000000`a63815fa : 00000000`a6381606 00000000`000000dd fffffa80`04355810 400000c2`400000c1 : 0xa6381606
fffff800`041e6ce0 00000000`a6381606 : 00000000`000000dd fffffa80`04355810 400000c2`400000c1 00000009`400000c3 : 0xa63815fa
fffff800`041e6ce8 00000000`000000dd : fffffa80`04355810 400000c2`400000c1 00000009`400000c3 00000000`a0d3b1bf : 0xa6381606
fffff800`041e6cf0 fffffa80`04355810 : 400000c2`400000c1 00000009`400000c3 00000000`a0d3b1bf fffff800`041e0080 : 0xdd
fffff800`041e6cf8 400000c2`400000c1 : 00000009`400000c3 00000000`a0d3b1bf fffff800`041e0080 fffffa80`024b89e0 : 0xfffffa80`04355810
fffff800`041e6d00 00000009`400000c3 : 00000000`a0d3b1bf fffff800`041e0080 fffffa80`024b89e0 00000000`00000000 : 0x400000c2`400000c1
fffff800`041e6d08 00000000`a0d3b1bf : fffff800`041e0080 fffffa80`024b89e0 00000000`00000000 00000298`89153075 : 0x9`400000c3
fffff800`041e6d10 fffff800`041e0080 : fffffa80`024b89e0 00000000`00000000 00000298`89153075 00000298`891538af : 0xa0d3b1bf
fffff800`041e6d18 fffffa80`024b89e0 : 00000000`00000000 00000298`89153075 00000298`891538af fffff800`02c5ec40 : 0xfffff800`041e0080
fffff800`041e6d20 00000000`00000000 : 00000298`89153075 00000298`891538af fffff800`02c5ec40 fffff800`041e0080 : 0xfffffa80`024b89e0


STACK_COMMAND:  kb

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  CORRUPT_MODULELIST

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\Downloads\A-Rar\090710-21996-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a5c000 PsLoadedModuleList = 0xfffff800`02c99e50
Debug session time: Tue Sep  7 00:06:35.906 2010 (GMT-4)
System Uptime: 0 days 0:06:59.841
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002dc6ac1, fffff8800622bab0, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObpWaitForMultipleObjects+186 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002dc6ac1, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800622bab0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObpWaitForMultipleObjects+186
fffff800`02dc6ac1 488b4a20        mov     rcx,qword ptr [rdx+20h]

CONTEXT:  fffff8800622bab0 -- (.cxr 0xfffff8800622bab0)
rax=0000000000000000 rbx=fffff8a000fefb00 rcx=fffff80002a5c000
rdx=0000000000000000 rsi=000000000000003a rdi=fffffa800597f010
rip=fffff80002dc6ac1 rsp=fffff8800622c490 rbp=fffff8800622cca0
 r8=0000000000000008  r9=fffff8a001010000 r10=fffffa800565c6d0
r11=fffffffffffffd80 r12=fffff8800622cb68 r13=fffff8a000e43400
r14=0000000000000039 r15=0000000000000040
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!ObpWaitForMultipleObjects+0x186:
fffff800`02dc6ac1 488b4a20        mov     rcx,qword ptr [rdx+20h] ds:002b:00000000`00000020=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002dc6ac1

STACK_TEXT:  
fffff880`0622c490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpWaitForMultipleObjects+0x186


FOLLOWUP_IP: 
nt!ObpWaitForMultipleObjects+186
fffff800`02dc6ac1 488b4a20        mov     rcx,qword ptr [rdx+20h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpWaitForMultipleObjects+186

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

STACK_COMMAND:  .cxr 0xfffff8800622bab0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObpWaitForMultipleObjects+186

BUCKET_ID:  X64_0x3B_nt!ObpWaitForMultipleObjects+186

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\Downloads\A-Rar\090710-22323-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c97e50
Debug session time: Mon Sep  6 23:09:26.537 2010 (GMT-4)
System Uptime: 0 days 0:18:00.472
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff80002b132d4, fffff880009a99d8, fffff880009a9230}

Probably caused by : memory_corruption ( nt!MmZeroPageThread+823 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002b132d4, The address that the exception occurred at
Arg3: fffff880009a99d8, Exception Record Address
Arg4: fffff880009a9230, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MmZeroPageThread+823
fffff800`02b132d4 4d8b3f          mov     r15,qword ptr [r15]

EXCEPTION_RECORD:  fffff880009a99d8 -- (.exr 0xfffff880009a99d8)
ExceptionAddress: fffff80002b132d4 (nt!MmZeroPageThread+0x0000000000000823)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880009a9230 -- (.cxr 0xfffff880009a9230)
rax=0000000000000000 rbx=fa80044b716004c0 rcx=fffff880009a9ba8
rdx=0000000000000001 rsi=000000000009340d rdi=0000000000000002
rip=fffff80002b132d4 rsp=fffff880009a9c10 rbp=0000000000000000
 r8=fffffa8000e06670  r9=0000000000000000 r10=fffff80002d04400
r11=fffff880009a9be0 r12=0000000000000000 r13=0000000000000000
r14=0000058000000000 r15=fa80044b716004c0
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
nt!MmZeroPageThread+0x823:
fffff800`02b132d4 4d8b3f          mov     r15,qword ptr [r15] ds:002b:fa80044b`716004c0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d020e0
 ffffffffffffffff 

FOLLOWUP_IP: 
nt!MmZeroPageThread+823
fffff800`02b132d4 4d8b3f          mov     r15,qword ptr [r15]

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff80002d6f166 to fffff80002b132d4

STACK_TEXT:  
fffff880`009a9c10 fffff800`02d6f166 : fffffa80`024b93b0 00000000`00000080 fffffa80`024b9890 fffff800`02aaa479 : nt!MmZeroPageThread+0x823
fffff880`009a9d40 fffff800`02aaa486 : fffff800`02c44e80 fffffa80`024b93b0 fffff800`02c52c40 00060b01`30025003 : nt!PspSystemThreadStartup+0x5a
fffff880`009a9d80 00000000`00000000 : fffff880`009aa000 fffff880`009a4000 fffff880`009a99b0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MmZeroPageThread+823

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

STACK_COMMAND:  .cxr 0xfffff880009a9230 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x7E_nt!MmZeroPageThread+823

BUCKET_ID:  X64_0x7E_nt!MmZeroPageThread+823

Followup: MachineOwner
---------
Start with uninstalling in CD/DVD program such as Deamon Tools or Alcohol.. I found the driver sptd.sys on your system. This driver is an almost guaranteed cause of crashes. When you have finished uninstalling the software, download and run this tool: DuplexSecure - Downloads

Do not choose the reinstall option, choose delete to remove all traces of sptd.

One of the dumps indicated this driver was involved in the crash and it is way out of date.

nvm62x64.sys Fri Oct 17 17:01:06 2008 - nVidia Ethernet Networking Driver (nForce chipset driver) Drivers - Download NVIDIA Drivers. See if you can update this driver. I really suggest you upgrade your network adapter card.

I also find you still have other obsolete drivers. Win 7 does not like out of date drivers. They can and do cause conflicts, memory corruption and crashes. All of your dumps pointed to memory corruption.

Quote:
nvstor.sys Wed May 20 02:45:37 2009 - this is a chipset driver and there may not be an update. nVidia Storage Drivers Drivers - Download NVIDIA Drivers

SI3132.sys Wed Oct 03 14:39:29 2007 - Silicon Image driver Silicon Image - Support. This software is obsolete. If you cannot update the drivers, uninstall it.

SiWinAcc.sys Thu Jun 14 20:02:02 2007 - Silicon Image driver - comes with package for the SIxxxx drivers Silicon Image - Support. The process Windows Accelerator Driver belongs to the software SATALink Accelerator Driver or SiWinAcc or SATALink Windows Accelerator by Silicon Image, Inc. See above.


Follow the suggestions above and get your system cleaned up and reboot. Post back when you have done this and lets see how your system runs.
My System SpecsSystem Spec
.

09 Sep 2010   #64
kuleee

Windows 7 Ultimate x64
 
 

thanks for response

1. i didn't install any cd virtualization programs. i didn't even install it last time i was reformatting windows one month ago, so i don't know how did this driver came in! even so, i followed your advice and installed that duplexsecure, but when i run it, it says "no SPTD version was detected. select action to be performed" and i have "install" only, "uninstall" button is gray...
2. i don't get it, which device is that nvidia ethernet that you mentioned? cause i have realtek (integrated) network card, fully upgraded to june 2010. which device is that nvm62x64.sys? google says it is 64bit driver (my OS is win7 32bit)! but i don't know which device is that.

sry for bad english!
My System SpecsSystem Spec
09 Sep 2010   #65
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Kuleee, I am so sorry; I discovered that I clicked on another dump from someone else by accident. I apologize. Your English is fine; my eyesight must be bad.

OK, here is your dump.

Error code 4E, PFN_LIST_CORRUPT - usual causes are Device driver, ?memory.

Code:
Kernel base = 0x82840000 PsLoadedModuleList = 0x8297f570
Debug session time: Wed Sep  8 05:55:19.139 2010 (GMT-4)
System Uptime: 0 days 0:27:16.139
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
0: kd> !Analyze
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {7, 165b0, 1, 0}

*** WARNING: Unable to verify timestamp for eamon.sys
*** ERROR: Module load completed but symbols could not be loaded for eamon.sys
Probably caused by : memory_corruption ( nt!MiPfnReferenceCountIsZero+1e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000007, A driver has unlocked a page more times than it locked it
Arg2: 000165b0, page frame number
Arg3: 00000001, current share count
Arg4: 00000000, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  WinSAT.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 828e6a52 to 82911574

STACK_TEXT:  
9f3908b4 828e6a52 0000004e 00000007 000165b0 nt!KeBugCheckEx+0x1e
9f3908d4 828bff98 000165b0 86a205b0 83e18888 nt!MiPfnReferenceCountIsZero+0x1e
9f3908f0 828db1fe 00000000 00040000 8597560a nt!MiRemoveLockedPageChargeAndDecRef+0x153
9f390944 828ea425 00000000 00000000 02390960 nt!MiWaitForInPageComplete+0x731
9f390964 828ee457 860778e4 00000000 00000000 nt!MiPfCompletePrefetchIos+0x6b
9f390980 828e19b0 8551dee0 00100000 85a3e600 nt!MmWaitForCacheManagerPrefetch+0x1b
9f3909ac 82aa2763 85a3e600 00000001 9f390a24 nt!CcFetchDataForRead+0xa4
9f3909ec 82a98872 85a3e600 00500000 00000000 nt!CcMapAndCopyFromCache+0x71
9f390a2c 8c836c8b 85a3e600 9f390a70 00100000 nt!CcCopyRead+0x107
9f390a58 8c834541 8592f628 85a3e600 85905bb8 Ntfs!NtfsCachedRead+0x13e
9f390b34 8c837bae 8592f628 85905bb8 13bcd04c Ntfs!NtfsCommonRead+0x11a1
9f390ba4 8286ef44 85fe0020 85905bb8 85905bb8 Ntfs!NtfsFsdRead+0x279
9f390bbc 8c77320c 85fd4578 85905bb8 00000000 nt!IofCallDriver+0x63
9f390be0 8c7733cb 9f390c00 85fd4578 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
9f390c18 8286ef44 85fd4578 85905bb8 85905dd8 fltmgr!FltpDispatch+0xc5
9f390c30 ab443253 85a3e600 8567ab50 00000000 nt!IofCallDriver+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
9f390c44 8286ef44 8567ab50 85905bb8 85905bb8 eamon+0x5253
9f390c5c 82a44307 85905bb8 85905db4 85a3e600 nt!IofCallDriver+0x63
9f390c7c 82a451ee 8567ab50 85a3e600 00000001 nt!IopSynchronousServiceTail+0x1f8
9f390d08 8287579a 8567ab50 85905bb8 00000000 nt!NtReadFile+0x644
9f390d08 772b64f4 8567ab50 85905bb8 00000000 nt!KiFastCallEntry+0x12a
036af138 00000000 00000000 00000000 00000000 0x772b64f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiPfnReferenceCountIsZero+1e
828e6a52 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiPfnReferenceCountIsZero+1e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3f9b

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  0x4E_7_nt!MiPfnReferenceCountIsZero+1e

BUCKET_ID:  0x4E_7_nt!MiPfnReferenceCountIsZero+1e

Followup: MachineOwner
---------

0: kd> lmtsmn
start    end        module name
8c613000 8c65b000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8cf86000 8cfe0000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
93a9d000 93aaf000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8c764000 8c76d000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
8c738000 8c741000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
8c741000 8c764000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
93430000 93884000   atikmdag atikmdag.sys Fri Apr 24 06:50:20 2009 (49F1996C)
8cef2000 8cef9000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
92ca9000 92cb7000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8c49f000 8c4a7000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9cc98000 9ccb1000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
97fd0000 97fee000   cdd      cdd.dll      Mon Jul 13 21:04:18 2009 (4A5BD992)
8cecc000 8ceeb000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
8c4e9000 8c594000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8ce75000 8ce9a000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8c4a7000 8c4e9000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8c98c000 8c9e9000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
93a90000 93a9d000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
92c0b000 92c18000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
92c2d000 92c91000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
92c91000 92ca9000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8cbd4000 8cbe0000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8ce64000 8ce75000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
93bdd000 93bf6000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
92c23000 92c2c000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
92c18000 92c23000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8ce9a000 8ceab000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
8ceab000 8ceb5000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
93884000 9393b000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
9393b000 93974000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
ab43e000 ab50a000   eamon    eamon.sys    Fri Sep 11 01:12:15 2009 (4AA9DC2F)
9cf1c000 9cf39000   ehdrv    ehdrv.sys    Fri Sep 11 01:12:49 2009 (4AA9DC51)
9cf39000 9cf53000   epfwwfpr epfwwfpr.sys Fri Sep 11 01:07:03 2009 (4AA9DAF7)
8c7a1000 8c7b2000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8c76d000 8c7a1000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
8c9f7000 8ca00000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
8ce32000 8ce64000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
8cd6c000 8cd9d000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82809000 82840000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
93974000 93993000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
92cea000 92d3a000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
92fe6000 92ff9000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
93bf6000 93bfc480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
92fdb000 92fe6000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
9cc13000 9cc98000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
8ce2a000 8ce32000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
93a54000 93a6c000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
92cd8000 92cea000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
93a6c000 93a79000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80bb9000 80bc1000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
93b46000 93b7a000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
8c979000 8c98c000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8caf5000 8cb1a000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
8c800000 8c810000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
8cbe0000 8cbfb000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
8c416000 8c48e000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
8ceb5000 8cec0000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
93a79000 93a86000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
92c00000 92c0b000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8c722000 8c738000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
9ccb1000 9ccc3000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
9ccc3000 9cce6000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
9cce6000 9cd21000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
9cd21000 9cd3c000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8cf4b000 8cf56000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8c664000 8c66c000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8c94e000 8c979000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8cbca000 8cbd4000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8ce1a000 8ce2a000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8ca00000 8cab7000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
93ac7000 93ad2000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
93ad2000 93af4000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
93bcc000 93bdd000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
8cfe7000 8cff5000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
8cb1a000 8cb4c000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
8cab7000 8caf5000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
8cf56000 8cf64000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
8cff5000 8cfff000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82840000 82c40000   nt       ntkrnlmp.exe Fri Jun 18 23:55:07 2010 (4C1C3F9B)
8c81f000 8c94e000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
8ceeb000 8cef2000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
8cc00000 8cc1f000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
93a3c000 93a54000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
8c6a1000 8c6b2000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
9cd3c000 9cd43000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
8c66c000 8c696000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
8c70d000 8c714000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
8c714000 8c722000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
8c9e9000 8c9f7000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9cd43000 9cdda000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
93400000 9342f000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
8c48e000 8c49f000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
93aaf000 93ac7000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
93af4000 93b0c000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
93b0c000 93b23000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
93b23000 93b3a000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
8cb89000 8cbca000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
93b3a000 93b44000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
8cf33000 8cf3b000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8cf3b000 8cf43000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8cf43000 8cf4b000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8cded000 8ce1a000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
8c7b2000 8c7c5000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
93993000 939d8000   Rt86win7 Rt86win7.sys Wed Jun 23 05:10:23 2010 (4C21CF7F)
92d3a000 92fda400   RTKVHDA  RTKVHDA.sys  Mon Aug 31 06:18:44 2009 (4A9BA384)
9cdda000 9cde4000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
93a86000 93a90000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
8cb4c000 8cb66000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
8cde5000 8cded000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
ab50a000 ab574000   spsys    spsys.sys    Mon May 11 12:37:10 2009 (4A085436)
9cecb000 9cf1c000   srv      srv.sys      Mon Jun 21 22:47:32 2010 (4C202444)
9ce7c000 9cecb000   srv2     srv2.sys     Mon Jun 21 22:47:19 2010 (4C202437)
9ce4e000 9ce6f000   srvnet   srvnet.sys   Mon Jun 21 22:47:09 2010 (4C20242D)
93b44000 93b45380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8cc23000 8cd6c000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
9ce6f000 9ce7c000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8cf7b000 8cf86000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8cf64000 8cf7b000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8cb79000 8cb89000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
97fa0000 97fa9000   TSDDD    TSDDD.dll    unavailable (00000000)
92cb7000 92cd8000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
93b7a000 93b88000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
93bfd000 93bfe700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
93a2d000 93a3c000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
93b88000 93bcc000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
939d8000 939e2000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
939e2000 93a2d000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
8c696000 8c6a1000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8cef9000 8cf05000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
8cf05000 8cf26000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
8cd9d000 8cda5380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
8c6b2000 8c6c2000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8c6c2000 8c70d000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8cda6000 8cde5000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
8cb66000 8cb79000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
8cf26000 8cf33000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8c594000 8c605000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8c605000 8c613000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8cfe0000 8cfe7000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
97d40000 97f8a000   win32k   win32k.sys   Sat Jun 19 00:06:50 2010 (4C1C425A)
8c65b000 8c664000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)

Unloaded modules:
9cde4000 9ce4e000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8ce9a000 8cea7000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8cea7000 8ceb2000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8ceb2000 8cebb000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8cebb000 8cecc000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
This a hardware/hardware related problem. eamon.sys is shown in the dump stack and mentioned in the text. eamon.sys is a driver for Eset NOD 32. This indicates that Eset was involved in the crash; it does not say that Eset caused the crash. Based on the dump and that Eset is known to cause problems on some Win 7 systems, I suggest that you uninstall it using this tool: Info > Tool. Install Microsoft Security Essentials and make sure Windows Firewall is enabled.

Troubleshooting is often a process of elimination. We want to eliminate all potential causes of crashes. Once your system is running smoothly, you can try Eset again if you wish. If you start getting BSOD's after reinstalling, you will know it is a cause of crashes.

I also find an outdated driver:

atikmdag.sys Fri Apr 24 06:50:20 2009 -
ATI Video driver (remove the Catalyst Control Center and only install the Display Driver)Global Provider of Innovative Graphics, Processors and Media Solutions | AMD. Update this driver.
After you uninstall Eset and update this driver, reboot, post back and let's see what your systems does.

Again, I apologize for my mistake.

My System SpecsSystem Spec
10 Sep 2010   #66
kuleee

Windows 7 Ultimate x64
 
 

i have uninstalled eset and followed your advice. i do have "driver only" for my graphic card, but its definitely not that old! i downloaded august drivers from ATI site. maybe its integrated graphic card that have so old drivers? i tried and downloaded latest drivers for my integrated ATI x1250, they are from february 2010. btw these are not for win7, only for vista. when i try to install them, installation process says that my drivers are up to date, even if i want to update that integrated card. i hope you understand what i was trying to say... anyway, important part is, that i uninstalled NOD 17 hours ago, and still didn't have BSOD. i will let computer work as long as needs to crash (i hope he wont anymore)
My System SpecsSystem Spec
10 Sep 2010   #67
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Good job and thanks for reporting what you have done. If the drivers are dated July 13, 2009 or later, they are more than likely fine. And I suspect it was the onboard graphics drivers that were out of date.

I sure glad to hear you have not had a BSOD! That is great news. Post back in a couple of days and update us. If you have not had a BSOD, we will ask the moderators to mark this thread as solved. If you have another crash, upload the dump and we will take a look at it. I have my fingers crossed.
My System SpecsSystem Spec
11 Sep 2010   #68
kuleee

Windows 7 Ultimate x64
 
 

ok, unfortunately i had 2 bsod's this morning, so take a look in files. these bsod's happen after 28 hours of continuous work
My System SpecsSystem Spec
11 Sep 2010   #69
CarlTR6

Windows 7 Ultimate 32 bit
 
 

That is not what we wanted to hear. Both dumps are stop error code A.

Error code A, IRQL_NOT_LESS_OR_EQUAL - usually cased by Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility.

The first dump blames ataport.sys and the second blames hardware. Both mention memory. ataport.sys is very likely not the cause; it was affected by something else. I looked through your drivers and found this very obsolete driver:

pcouffin.sys Tue Dec 05 09:39:53 2006 - Patin-Couffin low level access layer for CD devices or low level access layer for CD/DVD/BD devices or VSO Software pcouffin belongs to the software Low level access layer for CD devices or Patin couffin engine or VSO Software pcouffin by VSO Software (www.vso-software.fr). This is an XP driver. The software is obsolete and not compatible with Win 7. Uninstall this software. If there is an updated version of the software compatible with Win 7 available, you may install that.

I can't guarantee this driver is involved in the crash; but I can definitely say it is not helping your system any. After you uninstall the VSO software, reboot and lets see what your system does.

Code:
Kernel base = 0x82c08000 PsLoadedModuleList = 0x82d47570
Debug session time: Fri Sep 10 22:24:08.297 2010 (GMT-4)
System Uptime: 1 days 5:01:24.297
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {1, 2, 1, 8300b839}

Probably caused by : ataport.SYS ( ataport!DeviceUpdateRequestTimeoutCounter+1e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000001, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8300b839, address which referenced memory

Debugging Details:
------------------


WORKER_ROUTINE: 
+5650952f01a7dd54
00000001 ??              ???

WORK_ITEM:  8300b839

CURRENT_IRQL:  2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  82d26a84 -- (.trap 0xffffffff82d26a84)
ErrCode = 00000002
eax=82d26b04 ebx=8cb6fa01 ecx=85eef4c4 edx=00000001 esi=85eef3f0 edi=85eef3f0
eip=8300b839 esp=82d26af8 ebp=82d26b10 iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29:
8300b839 8902            mov     dword ptr [edx],eax  ds:0023:00000001=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 8300b839 to 82c40b7b

STACK_TEXT:  
82d26a84 8300b839 badb0d00 00000001 855ec138 nt!KiTrap0E+0x2cf
82d26af4 8cb71d8a 855ec0e0 8cb6fa60 00000000 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29
82d26b10 8cb6facd 85eef3f0 82d26ba0 00000000 ataport!DeviceUpdateRequestTimeoutCounter+0x1e
82d26b38 82c5f497 855ed2b0 015ec028 69ba46d3 ataport!IdePortTickHandler+0x6d
82d26b7c 82c5f43b 82d29d20 82d26ca8 00000004 nt!KiProcessTimerDpcTable+0x50
82d26c68 82c5f2f8 82d29d20 82d26ca8 00000000 nt!KiProcessExpiredTimerList+0x101
82d26cdc 82c5d68e 00660913 85722270 82d33240 nt!KiTimerExpiration+0x25c
82d26d20 82c5d4b8 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
82d26d24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!DeviceUpdateRequestTimeoutCounter+1e
8cb71d8a 8d86d8000000    lea     eax,[esi+0D8h]

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  ataport!DeviceUpdateRequestTimeoutCounter+1e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf16

FAILURE_BUCKET_ID:  0xA_ataport!DeviceUpdateRequestTimeoutCounter+1e

BUCKET_ID:  0xA_ataport!DeviceUpdateRequestTimeoutCounter+1e

Followup: MachineOwner
---------

0: kd> lmtsmn
start    end        module name
8ca38000 8ca80000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8d372000 8d3cc000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
93155000 93167000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8cb89000 8cb92000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
8cb5d000 8cb66000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
8cb66000 8cb89000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
9381a000 93e3a000   atikmdag atikmdag.sys Tue Aug 03 21:35:57 2010 (4C58C3FD)
930e0000 93119000   atikmpag atikmpag.sys Tue Aug 03 21:15:28 2010 (4C58BF30)
8d2de000 8d2e5000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
9309f000 930ad000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8c8c4000 8c8cc000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
98fa9000 98fc2000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
9a3c0000 9a3de000   cdd      cdd.dll      unavailable (00000000)
98ec2000 98ed8000   cdfs     cdfs.sys     Mon Jul 13 19:11:14 2009 (4A5BBF12)
8d2b8000 8d2d7000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
8c90e000 8c9b9000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8d261000 8d286000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8c8cc000 8c90e000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8cda2000 8cdff000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
93148000 93155000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
98ed8000 98ee5000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
93023000 93087000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
93087000 9309f000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8cfef000 8cffb000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8d250000 8d261000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
93312000 9332b000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
98ef0000 98ef9000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
98ee5000 98ef0000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
98ef9000 98f0a000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
98f0a000 98f14000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
93e3a000 93ef1000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
93ef1000 93f2a000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
9eae9000 9eb13000   fastfat  fastfat.SYS  Mon Jul 13 19:14:01 2009 (4A5BBFB9)
8cbc6000 8cbd7000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8cb92000 8cbc6000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
8ce0d000 8ce16000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
8d21e000 8d250000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
8d158000 8d189000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
83008000 8303f000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
93f2a000 93f49000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
93293000 932e3000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
98f1f000 98f32000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
98f32000 98f38480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
98f14000 98f1f000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
9332b000 933b0000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
8d216000 8d21e000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
93119000 93131000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
9ea3f000 9ea47700   ImmunetProtect ImmunetProtect.sys Fri Aug 13 14:23:53 2010 (4C658DB9)
9ea48000 9ea4df80   ImmunetSelfProtect ImmunetSelfProtect.sys Fri Aug 13 14:23:47 2010 (4C658DB3)
930ce000 930e0000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
93ff2000 93fff000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80bb9000 80bc1000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
931fc000 93230000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
8cd8f000 8cda2000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8cf0b000 8cf30000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
98f86000 98f96000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
98f51000 98f6c000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
8c83b000 8c8b3000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
98f46000 98f51000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
93131000 9313e000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
98f3b000 98f46000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8cb47000 8cb5d000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
9ea13000 9ea36000   MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E)
9ea36000 9ea3ee00   MpNWMon  MpNWMon.sys  Sat Mar 20 00:03:24 2010 (4BA4490C)
98fc2000 98fd4000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
98fd4000 98ff7000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
933b0000 933eb000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
98c00000 98c1b000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8d337000 8d342000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8ca89000 8ca91000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8cd64000 8cd8f000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8cfe5000 8cfef000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8d206000 8d216000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8ce16000 8cecd000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
9317f000 9318a000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
9318a000 931ac000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
93282000 93293000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
8cf4f000 8cf5d000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
8d3cc000 8d3fe000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
8cecd000 8cf0b000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
8d342000 8d350000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
8cfdb000 8cfe5000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82c08000 83008000   nt       ntkrnlmp.exe Fri Jun 18 23:55:07 2010 (4C1C3F9B)
8cc35000 8cd64000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
8d2d7000 8d2de000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
8cf30000 8cf4f000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
93800000 93818000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
8cac6000 8cad7000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
98ff7000 98ffe000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
8ca91000 8cabb000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
8cb32000 8cb39000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
8cb39000 8cb47000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
9eac6000 9ead1900   pcouffin pcouffin.sys Tue Dec 05 09:39:53 2006 (457584B9)
8cdff000 8ce0d000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9e83a000 9e8d1000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
932e3000 93312000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
8c8b3000 8c8c4000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
93167000 9317f000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
931ac000 931c4000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
931c4000 931db000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
931db000 931f2000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
8cf9a000 8cfdb000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
931f2000 931fc000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
8d31f000 8d327000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8d327000 8d32f000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8d32f000 8d337000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8d1d9000 8d206000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
98f96000 98fa9000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
93f49000 93f8e000   Rt86win7 Rt86win7.sys Wed Jun 23 05:10:23 2010 (4C21CF7F)
98c21000 98ec1400   RTKVHDA  RTKVHDA.sys  Mon Aug 31 06:18:44 2009 (4A9BA384)
9ea4e000 9ea57000   safedrv  safedrv.sys  Fri Aug 06 10:02:03 2010 (4C5C15DB)
9e8d1000 9e8db000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
9313e000 93148000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
8cf5d000 8cf77000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
8d1d1000 8d1d9000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
9e9c2000 9ea13000   srv      srv.sys      Mon Jun 21 22:47:32 2010 (4C202444)
9e973000 9e9c2000   srv2     srv2.sys     Mon Jun 21 22:47:19 2010 (4C202437)
9e8db000 9e8fc000   srvnet   srvnet.sys   Mon Jun 21 22:47:09 2010 (4C20242D)
93818000 93819380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8d00f000 8d158000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
9e8fc000 9e909000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8d367000 8d372000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8d350000 8d367000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8cf8a000 8cf9a000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
9a390000 9a399000   TSDDD    TSDDD.dll    unavailable (00000000)
930ad000 930ce000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
93230000 9323e000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
98f39000 98f3a700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
93fe3000 93ff2000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
9323e000 93282000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
93f8e000 93f98000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
93f98000 93fe3000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
8cabb000 8cac6000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8d2e5000 8d2f1000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
8d2f1000 8d312000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
8d189000 8d191380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
8cad7000 8cae7000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8cae7000 8cb32000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8d192000 8d1d1000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
8cf77000 8cf8a000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
8d312000 8d31f000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8c9b9000 8ca2a000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8ca2a000 8ca38000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8d000000 8d007000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
9a130000 9a37a000   win32k   win32k.sys   unavailable (00000000)
8ca80000 8ca89000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
98f6c000 98f86000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)

Unloaded modules:
9eb13000 9eb34000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
9ead2000 9eae9000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
9ea57000 9eac1000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
9eac1000 9eac6000   atidcmxx.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
9e909000 9e973000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8d286000 8d293000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8d293000 8d29e000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8d29e000 8d2a7000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8d2a7000 8d2b8000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000

Kernel base = 0x82c1c000 PsLoadedModuleList = 0x82d5b570
Debug session time: Sat Sep 11 02:49:45.006 2010 (GMT-4)
System Uptime: 0 days 4:24:37.006
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {1, 2, 1, 82c71aa0}

Probably caused by : hardware

Followup: MachineOwner
---------
 *** Possible invalid call from 82cbe961 ( nt!MiInsertPageInFreeOrZeroedList+0x1c4 )
 *** Expected target 82c71a70 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000001, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82c71aa0, address which referenced memory

Debugging Details:
------------------


WORKER_ROUTINE: 
+5650952f01b8dc8c
00000001 ??              ???

WORK_ITEM:  82c71aa0

CURRENT_IRQL:  2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  sidebar.exe

TRAP_FRAME:  a00078b0 -- (.trap 0xffffffffa00078b0)
ErrCode = 00000002
eax=00000001 ebx=00000ab4 ecx=a0007944 edx=85501745 esi=84df14d8 edi=85501734
eip=82c71aa0 esp=a0007924 ebp=a0007954 iopl=0         nv up ei ng nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
nt!KeAcquireQueuedSpinLockAtDpcLevel+0x20:
82c71aa0 8908            mov     dword ptr [eax],ecx  ds:0023:00000001=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82cbe966 to 82c71aa0

POSSIBLE_INVALID_CONTROL_TRANSFER:  from 82cbe961 to 82c71a70

STACK_TEXT:  
a0007920 82cbe966 8496c648 84df14d8 84df14e0 nt!KeAcquireQueuedSpinLockAtDpcLevel+0x20
a0007954 82c88c5f 8496c648 84df14d8 84df14e0 nt!MiInsertPageInFreeOrZeroedList+0x1c9
a0007984 82ca431e c0008144 a0007a6c 02040000 nt!MiPfnShareCountIsZero+0x15f
a0007a48 82ca3e76 c0008110 c0008140 85a0a750 nt!MiDeletePteRun+0x303
a0007b2c 82c992fc 85a0a750 02050fff 903acb98 nt!MiDeleteVirtualAddresses+0x33b
a0007bc4 82c5179a ffffffff a0007ce8 a0007cf4 nt!NtFreeVirtualMemory+0x60b
a0007bc4 82c4f74d ffffffff a0007ce8 a0007cf4 nt!KiFastCallEntry+0x12a
a0007c4c 990ed3d8 ffffffff a0007ce8 a0007cf4 nt!ZwFreeVirtualMemory+0x11
a0007cec 990ee790 00000000 00000000 00000000 win32k!SURFACE::bDeleteSurface+0x291
a0007d00 990ce2a3 00000000 00000000 ff9f1a08 win32k!SURFREF::bDeleteSurface+0x14
a0007d14 990cfa88 3f050c5b 01d0ba4c 3f050c5b win32k!bDeleteSurface+0x20
a0007d28 82c5179a 3f050c5b 01d0ba60 77a664f4 win32k!NtGdiDeleteObjectApp+0x7f
a0007d28 77a664f4 3f050c5b 01d0ba60 77a664f4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
01d0ba60 00000000 00000000 00000000 00000000 0x77a664f4


STACK_COMMAND:  .trap 0xffffffffa00078b0 ; kb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  CPU_CALL_ERROR

Followup: MachineOwner
---------
 *** Possible invalid call from 82cbe961 ( nt!MiInsertPageInFreeOrZeroedList+0x1c4 )
 *** Expected target 82c71a70 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )
My System SpecsSystem Spec
12 Sep 2010   #70
kuleee

Windows 7 Ultimate x64
 
 

i uninstalled and had new bsod 2 hours ago. here is minidump file only...
My System SpecsSystem Spec
Reply

 BSOD, help please




Thread Tools



Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 18:06.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App