George, I am sorry to learn you are still having problems. Anytime you get a crash on startup, you can pretty well figure it is a hardware or driver related.
Error code 3B, SYSTEM_SERVICE_EXCEPTION- usually caused by System service, Device driver, graphics driver, ?memory.
The dump blamed a Windows system driver (very unlikely) and indicated memory corruption. I also looked at the two previous dumps. Both are error code 3B. One directly point s to memory corruption and the other points to a Windows system driver and indicates memory corruption.
Code:
Kernel base = 0xfffff800`02e4b000 PsLoadedModuleList = 0xfffff800`03088e50
Debug session time: Fri Sep 10 19:54:37.299 2010 (GMT-4)
System Uptime: 0 days 0:01:14.437
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002edb436, fffff8800b12ed00, 0}
Probably caused by : ntkrnlmp.exe ( nt!WmipIoControl+d6 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002edb436, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800b12ed00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`02edb436 488b09 mov rcx,qword ptr [rcx]
CONTEXT: fffff8800b12ed00 -- (.cxr 0xfffff8800b12ed00)
rax=fffffa800b173978 rbx=fffffa800b285010 rcx=fefffa800b173978
rdx=fefffa800b173978 rsi=0000000000000000 rdi=fffffa800b301520
rip=fffff80002edb436 rsp=fffff8800b12f6d0 rbp=00000000a000000c
r8=0000000fffffffff r9=fffffa8000000008 r10=0000000000000002
r11=0000007ffffffff8 r12=fffffa800b173970 r13=0000000000000000
r14=fffffa800b32a930 r15=fffff880009e9180
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!IopCompleteRequest+0xc73:
fffff800`02edb436 488b09 mov rcx,qword ptr [rcx] ds:002b:fefffa80`0b173978=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 2
IRP_ADDRESS: ffffffffffffff88
LAST_CONTROL_TRANSFER: from fffff80002ebe0dd to fffff80002edb436
STACK_TEXT:
fffff880`0b12f6d0 fffff800`02ebe0dd : 00000000`00000000 fffff800`20206f49 00000000`00010001 fffffa80`00000000 : nt!IopCompleteRequest+0xc73
fffff880`0b12f7a0 fffff800`0314d2f6 : 00000000`0000000c fffff800`02fefb00 fffffa80`0b301520 00000000`00000000 : nt!IopfCompleteRequest+0x75d
fffff880`0b12f880 fffff800`031d6707 : fffffa80`0b301520 fffff880`0b12fc60 fffff880`0b12fc60 fffffa80`0b285010 : nt!WmipIoControl+0xd6
fffff880`0b12f9d0 fffff800`031d6f66 : fffff880`0b12fbb8 00000000`00000454 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`0b12fb00 fffff800`02eba993 : 00000000`00000d41 00000000`0062e638 00000000`00000000 0000007f`ffffffff : nt!NtDeviceIoControlFile+0x56
fffff880`0b12fb70 00000000`73f02dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0062ef38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73f02dd9
FOLLOWUP_IP:
nt!WmipIoControl+d6
fffff800`0314d2f6 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!WmipIoControl+d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff8800b12ed00 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!WmipIoControl+d6
BUCKET_ID: X64_0x3B_nt!WmipIoControl+d6
Followup: MachineOwner
---------
Kernel base = 0xfffff800`02e61000 PsLoadedModuleList = 0xfffff800`0309ee50
Debug session time: Wed Sep 1 14:17:12.782 2010 (GMT-4)
System Uptime: 0 days 0:31:59.592
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031787eb, fffff8800ab35e10, 0}
Probably caused by : memory_corruption ( nt!MiUnsecureVirtualMemory+6b )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031787eb, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800ab35e10, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiUnsecureVirtualMemory+6b
fffff800`031787eb 8b4540 mov eax,dword ptr [rbp+40h]
CONTEXT: fffff8800ab35e10 -- (.cxr 0xfffff8800ab35e10)
rax=000000000000000a rbx=fffffa800af13060 rcx=fefffa800b5da951
rdx=0000000000000000 rsi=fffffa8006970b30 rdi=fefffa800b5da950
rip=fffff800031787eb rsp=fffff8800ab367e0 rbp=fefffa800b5da910
r8=0000000000000001 r9=0000000000000002 r10=fffffa8006970b30
r11=fffff800030d1b60 r12=fffffa8006970d48 r13=fffffa800a8eb520
r14=fffffa8006970b30 r15=fffff8800ab36930
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!MiUnsecureVirtualMemory+0x6b:
fffff800`031787eb 8b4540 mov eax,dword ptr [rbp+40h] ss:0018:fefffa80`0b5da950=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003179b1b to fffff800031787eb
STACK_TEXT:
fffff880`0ab367e0 fffff800`03179b1b : fffff800`03049e30 00000000`00000000 fffff8a0`0c2c3490 fffff8a0`0c2c34b0 : nt!MiUnsecureVirtualMemory+0x6b
fffff880`0ab36810 fffff800`0316a596 : 00000000`00000000 fffff800`03049e30 fffff8a0`0c2c34b0 fffff8a0`0c282d00 : nt!AlpcpViewDestroyProcedure+0x1fb
fffff880`0ab368b0 fffff800`0316b167 : 00000000`00000000 00000000`01b2e3c0 00000000`40000000 fffff880`0ab36a40 : nt!AlpcpCaptureViewAttributeInternal+0x196
fffff880`0ab36910 fffff800`031a0413 : fffff8a0`0bdd27e8 00000000`00000000 fffffa80`0af13060 fffff800`031eb56f : nt!AlpcpCaptureViewAttribute+0x47
fffff880`0ab36960 fffff800`031d11f9 : fffffa80`0a8eb520 00000000`00000000 fffff8a0`0c282d00 fffff8a0`0c282d00 : nt!AlpcpCaptureAttributes+0x320
fffff880`0ab369c0 fffff800`031d2ed9 : fffffa80`00000000 fffff8a0`00000001 00000000`014ff420 00000000`00000701 : nt!AlpcpSendMessage+0x3c7
fffff880`0ab36ac0 fffff800`02ed0993 : fffffa80`0af13060 fffff880`0ab36c60 00000000`014ff3a8 0000007f`ffffffff : nt!NtAlpcSendWaitReceivePort+0xb9
fffff880`0ab36b70 00000000`773a05aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`014ff388 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773a05aa
FOLLOWUP_IP:
nt!MiUnsecureVirtualMemory+6b
fffff800`031787eb 8b4540 mov eax,dword ptr [rbp+40h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiUnsecureVirtualMemory+6b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff8800ab35e10 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiUnsecureVirtualMemory+6b
BUCKET_ID: X64_0x3B_nt!MiUnsecureVirtualMemory+6b
Followup: MachineOwner
---------
Kernel base = 0xfffff800`02e67000 PsLoadedModuleList = 0xfffff800`030a4e50
Debug session time: Mon Aug 30 17:19:33.405 2010 (GMT-4)
System Uptime: 0 days 1:15:03.434
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031b374d, fffff8800b599730, 0}
Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1dd )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031b374d, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800b599730, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!CmpKcbCacheLookup+1dd
fffff800`031b374d 418b45f4 mov eax,dword ptr [r13-0Ch]
CONTEXT: fffff8800b599730 -- (.cxr 0xfffff8800b599730)
rax=fffff8a005065000 rbx=0000000000000000 rcx=0000000000000bd9
rdx=00000000073d1409 rsi=fffff8a0007eea18 rdi=fffff8800b59a340
rip=fffff800031b374d rsp=fffff8800b59a100 rbp=fffff8a0007ee420
r8=000000000000000b r9=0000000000000000 r10=0000000000000016
r11=fffff8800b59a298 r12=0000000000000007 r13=fefff8a0000e8268
r14=0000000000000007 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!CmpKcbCacheLookup+0x1dd:
fffff800`031b374d 418b45f4 mov eax,dword ptr [r13-0Ch] ds:002b:fefff8a0`000e825c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800031b2d08 to fffff800031b374d
STACK_TEXT:
fffff880`0b59a100 fffff800`031b2d08 : fffff880`0b59a298 fffff880`00000008 fffff880`0b59a688 fffff880`0b59a6a0 : nt!CmpKcbCacheLookup+0x1dd
fffff880`0b59a1f0 fffff800`031b0f61 : fffff8a0`02efe960 fffff880`0b59a6a0 fffff880`0b59a6d8 fffff880`0b59a6c0 : nt!CmpBuildHashStackAndLookupCache+0x328
fffff880`0b59a5d0 fffff800`031d0e84 : fffff800`031b0cc0 00000000`00000000 fffffa80`045b6010 fffff880`011dd901 : nt!CmpParseKey+0x2a1
fffff880`0b59a8a0 fffff800`031d5e4d : fffffa80`045b6010 fffff880`0b59aa00 00000000`00000040 fffffa80`03cf7080 : nt!ObpLookupObjectName+0x585
fffff880`0b59a9a0 fffff800`031b4dcc : 00000000`03c67000 00000000`00000000 fffff8a0`02efe901 fffff880`0b59aa68 : nt!ObOpenObjectByName+0x1cd
fffff880`0b59aa50 fffff800`031b6f0f : 00000000`1ff8d340 00000000`00020019 00000000`1ff8d3c8 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`0b59aba0 fffff800`02ed6993 : fffffa80`04192b60 fffff880`0b59ac60 00000000`00000000 fffffa80`0aa2bd60 : nt!NtOpenKeyEx+0xf
fffff880`0b59abe0 00000000`76d40caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`1ff8d2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d40caa
FOLLOWUP_IP:
nt!CmpKcbCacheLookup+1dd
fffff800`031b374d 418b45f4 mov eax,dword ptr [r13-0Ch]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!CmpKcbCacheLookup+1dd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff8800b599730 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!CmpKcbCacheLookup+1dd
BUCKET_ID: X64_0x3B_nt!CmpKcbCacheLookup+1dd
Followup: MachineOwner
---------
Let's test your RAM. Follow the instructions in this excellent tutorial by Johnathan King.
RAM - Test with Memtest86+
This will take some time. Please post the results.
You still have out of date drivers; though I can see that you have updated some of them. You have a few really old drivers that definitely are not helping your system's stability.
BCM42RLY.sys Tue Jul 07 20:34:55 2009 - Broadcom iLine10(tm) PCI Network Adapter
Broadcom.com - Downloads & Support. I know that you have tried to update this driver. It is slightly out of date; but it may work.
nvsmu.sys Mon Jun 29 03:36:37 2009 - nVidia nForce System Management Controller (nVidia nForce chipset driver)
Drivers - Download NVIDIA Drivers. This is a chipset driver and slightly out of date. See if you can update this one.
OA001Ufd.sys Tue Jun 03 05:30:37 2008 - Upper Filter Drivers are driver files from Creative Technology Ltd. These must be for your web cam. If you cannot update these drivers, the hardware is obsolete and not compatible with Win 7. Check here:
Windows 7 Compatibility: Software Programs & Hardware Devices: Find Updates, Drivers, & Downloads If there is no update, I recommend that you uninstall this hardware and upgrade to a camera compatible with Win 7.
OA001Vid.sys Mon Aug 25 09:07:17 2008 - see above
rimmpx64.sys Thu Jun 25 04:04:18 2009 - Ricoh Card Reader driver.
rimspx64.sys Thu Jun 25 03:13:43 2009 - Ricoh Card Reader driver.
rixdpx64.sys Thu Jun 25 03:38:50 2009 - Ricoh Card Reader driver.
Let's try something. This is going break your webcam; but let's see if those drivers are the problem. Navigate to C:\Windows\System32\Drivers and rename the two camera drivers from .sys to .bak. Reboot and lets see what your system does. You can rename to .sys later if this proves not to be the problem.
Post back and let us know. And don't forget to run Memtest.