Joblai, welcome to the forum. Wow, 24 dumps! I looked at the five most recent for now. I see four different error codes which usually indicates a hardware/hardware related issue.
Error code 7F, UNEXPECTED_KERNEL_MODE_TRAP (2 X) - usual causes are Memory corruption, Hardware (memory in particular), Installing a faulty or mismatched hardware (especially memory) or a failure after installing it, 3rd party firewall, Device drivers, SCSI/network/BIOS updates needed, Improperly seated cards, Incompatible storage devices, Overclocking, Virus scanner, Backup tool, Bad motherboard, Missing Service Pack
Error code 9C, MACHINE_CHECK_EXCEPTION - Hardware error (similar to STOP 0x124)
Error code C5, DRIVER_CORRUPTED_EXPOOL - Device driver, memory are the usual causes.
Error code 1E, KMODE_EXCEPTION_NOT_HANDLED - usual caused by Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS
Because these errors point to hardware and you have the 9C error code, I am looking at this as though it were a 124 error code. Please read the information in the link below.
[2-Int] Stop 0x124 - what it means and what to try
Code:
Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e48e50
Debug session time: Tue Sep 14 01:52:51.103 2010 (GMT-4)
System Uptime: 0 days 11:52:37.459
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+59d2952f01a8dca4
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88002f1ba68 -- (.exr 0xfffff88002f1ba68)
ExceptionAddress: fffff80002c88d1b (nt!PoIdle+0x000000000000000b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000006f9db232
Attempt to read from address 000000006f9db232
TRAP_FRAME: fffff88002f1bb10 -- (.trap 0xfffff88002f1bb10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002f1bd78 rbx=0000000000000000 rcx=fffff880009eb180
rdx=00002d4100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c88d1b rsp=fffff88002f1bca0 rbp=0000000000000000
r8=0000000000000000 r9=00000000003545b2 r10=000000000000000e
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po nc
nt!PoIdle+0xb:
fffff800`02c88d1b f605a842190002 test byte ptr [nt!PpmIdlePolicy+0x2 (fffff800`02e1cfca)],2 ds:d26b:fffff800`02e1cfca=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c7346e to fffff80002c7b710
STACK_TEXT:
fffff880`02f1ab58 fffff800`02c7346e : 00000000`00000000 fffff880`01669b9d fffff880`02f1b2d0 fffff800`02ca8668 : nt!KeBugCheck
fffff880`02f1ab60 fffff800`02ca140d : fffff800`02e89ea0 fffff800`02dc2dac fffff800`02c0b000 fffff880`02f1ba68 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f1ab90 fffff800`02ca8a90 : fffff800`02dcab14 fffff880`02f1ac08 fffff880`02f1ba68 fffff800`02c0b000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f1abc0 fffff800`02cb59ef : fffff880`02f1ba68 fffff880`02f1b2d0 fffff880`00000000 fffffa80`0ce68b60 : nt!RtlDispatchException+0x410
fffff880`02f1b2a0 fffff800`02c7ad82 : fffff880`02f1ba68 fffff880`009eb180 fffff880`02f1bb10 fffff880`009f61c0 : nt!KiDispatchException+0x16f
fffff880`02f1b930 fffff800`02c798fa : 00000000`00000000 fffff880`009eb180 fffffa80`0c626900 00001f80`00810010 : nt!KiExceptionDispatch+0xc2
fffff880`02f1bb10 fffff800`02c88d1b : 00000000`003545b2 00000000`00000000 fffff880`009f61c0 00000000`00000001 : nt!KiPageFault+0x23a
fffff880`02f1bca0 fffff800`02c83ebc : fffff880`009eb180 fffff880`00000000 00000000`00000000 fffff880`04402db0 : nt!PoIdle+0xb
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`02c7346e 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner
---------
Kernel base = 0xfffff800`02c19000 PsLoadedModuleList = 0xfffff800`02e56e50
Debug session time: Sun Sep 26 16:16:06.128 2010 (GMT-4)
System Uptime: 0 days 17:30:13.096
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {fffff80000102d6d, 2, 0, fffff80002dbe29f}
Probably caused by : hidusb.sys ( hidusb!HumReadReport+13f )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: fffff80000102d6d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80002dbe29f, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExFreePoolWithTag+1ef
fffff800`02dbe29f 66833d612d100001 cmp word ptr [nt!KeNumberNodes (fffff800`02ec1008)],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: fsx.exe
TRAP_FRAME: fffff88002f22780 -- (.trap 0xfffff88002f22780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000200 rbx=0000000000000000 rcx=000000000000168a
rdx=fffff880009eb180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dbe29f rsp=fffff88002f22910 rbp=0000000000000000
r8=000000000000b450 r9=0000000000000040 r10=fffff80002c19000
r11=0000000000000482 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!ExFreePoolWithTag+0x1ef:
fffff800`02dbe29f 66833d612d100001 cmp word ptr [nt!KeNumberNodes (fffff800`02ec1008)],1 ds:000d:fffff800`02ec1008=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c88ca9 to fffff80002c89740
STACK_TEXT:
fffff880`02f22638 fffff800`02c88ca9 : 00000000`0000000a fffff800`00102d6d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f22640 fffff800`02c87920 : fffffa80`0b3ded20 fffffa80`0cdb3c10 fffffa80`0c78ea60 fffffa80`0b3de050 : nt!KiBugCheckDispatch+0x69
fffff880`02f22780 fffff800`02dbe29f : 00000000`00000000 00000000`00000000 fffff880`0324f180 fffffa80`09f92060 : nt!KiPageFault+0x260
fffff880`02f22910 fffff880`0409e2ba : fffffa80`0c78ea60 fffff880`05035ad4 fffffa80`42554855 fffffa80`0be02060 : nt!ExFreePoolWithTag+0x1ef
fffff880`02f229c0 fffff880`0406e58f : 00000000`00000103 fffffa80`0be02060 fffffa80`0c78ea60 fffffa80`0b97e1a0 : usbhub!UsbhDecPdoIoCount+0xc6
fffff880`02f22a10 fffff880`0409ecab : 00000000`00000000 00000000`00000000 fffffa80`0be02060 00000000`a0000003 : usbhub!UsbhFdoUrbPdoFilter+0x107
fffff880`02f22a40 fffff880`0406cfb7 : fffffa80`0c78ea60 fffffa80`0c828060 fffffa80`0c828420 fffffa80`0a22de10 : usbhub!UsbhPdoInternalDeviceControl+0x373
fffff880`02f22a90 fffff880`074d348f : 00000000`00000004 fffffa80`0c78ea60 00000000`0000000a 00000000`000007ff : usbhub!UsbhGenDispatch+0x57
fffff880`02f22ac0 fffff880`074d2f5b : fffffa80`0c78ec50 fffffa80`0c828101 fffff880`02f22b80 fffffa80`0c828060 : hidusb!HumReadReport+0x13f
fffff880`02f22b10 fffff880`074e365d : fffffa80`0c89ae01 fffffa80`0c89ae40 fffffa80`0c78ea60 00000000`0000000c : hidusb!HumInternalIoctl+0x137
fffff880`02f22b80 fffff880`074e3e7d : fffffa80`0c89ae40 fffffa80`0c8281d0 00000000`00000000 00000000`0000000c : HIDCLASS!HidpSubmitInterruptRead+0xdd
fffff880`02f22be0 fffff800`02c8bd26 : fffffa80`0c78ec53 00000000`00000000 fffffa80`0c828001 fffffa80`0c78ea00 : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff880`02f22c70 fffff880`050445d9 : fffffa80`0b3de050 fffffa80`0a22de00 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f22d50 fffff880`05044ab7 : fffffa80`0dbcdc02 fffffa80`0c78ea60 00000000`ffffffff fffffa80`0b3deea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f22e30 fffff880`0504264f : fffffa80`0b3deea8 fffffa80`0b3de1a0 fffffa80`0b3df040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f22e90 fffff880`05033f89 : fffffa80`0b3de050 00000000`00000000 fffffa80`0b3dee02 fffffa80`0b3deea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f22ed0 fffff800`02c94bfc : fffff880`009eb180 fffffa80`0b3deea8 fffffa80`0b3deec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f22f00 fffff800`02c8f865 : 00000598`00000000 fffffa80`09f44b60 00000000`00000000 fffff880`05033db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f22fb0 fffff800`02c8f67c : fffffa80`0a596a80 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`09995a50 fffff800`02cd3113 : fffff800`02c85123 fffff800`02c8518f 00000000`00000005 fffff880`09995b10 : nt!KiDispatchInterruptContinue
fffff880`09995a80 fffff800`02c8518f : 00000000`00000005 fffff880`09995b10 00000000`00000000 00000000`fff9e000 : nt!KiDpcInterruptBypass+0x13
fffff880`09995a90 fffff800`02c88993 : 00000000`0046a6d0 fffff880`09995ca0 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0x19f
fffff880`09995c20 00000000`74052dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03f1f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74052dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
hidusb!HumReadReport+13f
fffff880`074d348f 488b4c2460 mov rcx,qword ptr [rsp+60h]
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: hidusb!HumReadReport+13f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hidusb
IMAGE_NAME: hidusb.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcbfe
FAILURE_BUCKET_ID: X64_0xC5_2_hidusb!HumReadReport+13f
BUCKET_ID: X64_0xC5_2_hidusb!HumReadReport+13f
Followup: MachineOwner
---------
Kernel base = 0xfffff800`02c1e000 PsLoadedModuleList = 0xfffff800`02e5be50
Debug session time: Wed Sep 29 20:10:29.994 2010 (GMT-4)
System Uptime: 0 days 8:04:25.366
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 9C, {0, fffff88003172d70, 0, 0}
Probably caused by : intelppm.sys ( intelppm!C1Halt+2 )
Followup: MachineOwner
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MACHINE_CHECK_EXCEPTION (9c)
A fatal Machine Check Exception has occurred.
KeBugCheckEx parameters;
x86 Processors
If the processor has ONLY MCE feature available (For example Intel
Pentium), the parameters are:
1 - Low 32 bits of P5_MC_TYPE MSR
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of P5_MC_ADDR MSR
4 - Low 32 bits of P5_MC_ADDR MSR
If the processor also has MCA feature available (For example Intel
Pentium Pro), the parameters are:
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
IA64 Processors
1 - Bugcheck Type
1 - MCA_ASSERT
2 - MCA_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing MCA.
3 - MCA_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA.
4 - MCA_FATAL
FW reported a fatal MCA.
5 - MCA_NONFATAL
SAL reported a recoverable MCA and we don't support currently
support recovery or SAL generated an MCA and then couldn't
produce an error record.
0xB - INIT_ASSERT
0xC - INIT_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing INIT event.
0xD - INIT_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event.
0xE - INIT_FATAL
Not used.
2 - Address of log
3 - Size of log
4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO
AMD64 Processors
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
Arguments:
Arg1: 0000000000000000
Arg2: fffff88003172d70
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x9C_GenuineIntel
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: f
LAST_CONTROL_TRANSFER: from fffff8000320c6e0 to fffff80002c8e740
STACK_TEXT:
fffff880`03172d38 fffff800`0320c6e0 : 00000000`0000009c 00000000`00000000 fffff880`03172d70 00000000`00000000 : nt!KeBugCheckEx
fffff880`03172d40 fffff800`0320be1f : 00000000`0000000c 00000000`00000000 00000000`0000000c 00000000`00000000 : hal!HalpMcaReportError+0x164
fffff880`03172e90 fffff800`031ffe88 : 00000000`00000000 fffff880`0316a180 00000000`00000000 00000000`00000000 : hal!HalpMceHandlerWithRendezvous+0x9f
fffff880`03172ec0 fffff800`02c8cfec : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalHandleMcheck+0x40
fffff880`03172ef0 fffff800`02c8ce53 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxMcheckAbort+0x6c
fffff880`03173030 fffff880`011e89c2 : fffff800`02c9c24a 00000000`003545a8 fffffa80`0b4f1dd8 00000017`a05981f0 : nt!KiMcheckAbort+0x153
fffff880`03192c98 fffff800`02c9c24a : 00000000`003545a8 fffffa80`0b4f1dd8 00000017`a05981f0 0000000d`b079ed7d : intelppm!C1Halt+0x2
fffff880`03192ca0 fffff800`02c96ebc : fffff880`0316a180 fffff880`00000000 00000000`00000000 fffff800`02daeda0 : nt!PoIdle+0x53a
fffff880`03192d80 00000000`00000000 : fffff880`03193000 fffff880`0318d000 fffff880`03192d40 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
intelppm!C1Halt+2
fffff880`011e89c2 c3 ret
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: intelppm!C1Halt+2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: intelppm
IMAGE_NAME: intelppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc0fd
FAILURE_BUCKET_ID: X64_0x9C_GenuineIntel_intelppm!C1Halt+2
BUCKET_ID: X64_0x9C_GenuineIntel_intelppm!C1Halt+2
Followup: MachineOwner
---------
Kernel base = 0xfffff800`02c0c000 PsLoadedModuleList = 0xfffff800`02e49e50
Debug session time: Fri Oct 1 03:58:16.546 2010 (GMT-4)
System Uptime: 0 days 3:04:14.918
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050033, 6f8, fffff8800459de16}
Probably caused by : USBPORT.SYS ( USBPORT!MPf_PollEndpoint+26 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff8800459de16
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: fsx.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002c7bca9 to fffff80002c7c740
STACK_TEXT:
fffff880`009f1ee8 fffff800`02c7bca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009f1ef0 fffff800`02c7a172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009f2030 fffff880`0459de16 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
ffff7880`02f22de0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBPORT!MPf_PollEndpoint+0x26
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!MPf_PollEndpoint+26
fffff880`0459de16 e80db30200 call USBPORT!USBPORT_AssertSig (fffff880`045c9128)
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBPORT!MPf_PollEndpoint+26
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc07
FAILURE_BUCKET_ID: X64_0x7f_8_USBPORT!MPf_PollEndpoint+26
BUCKET_ID: X64_0x7f_8_USBPORT!MPf_PollEndpoint+26
Followup: MachineOwner
---------
1: kd> lmtsmn
start end module name
fffff880`0463f000 fffff880`0466a000 000 000.fcl Fri Sep 26 09:11:22 2008 (48DCDF7A)
fffff880`0512e000 fffff880`0516c000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f8b000 fffff880`00fe2000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`04273000 fffff880`042fd000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0518d000 fffff880`051a3000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01185000 fffff880`01190000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0516c000 fffff880`05174000 ASACPI ASACPI.sys Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`04255000 fffff880`0425b000 AsIO AsIO.sys Mon Apr 06 03:21:08 2009 (49D9AD64)
fffff880`07471000 fffff880`0747c000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`01147000 fffff880`01150000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01150000 fffff880`0117a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`058da000 fffff880`058fd000 AtiHdmi AtiHdmi.sys Thu May 06 05:20:39 2010 (4BE289E7)
fffff880`04839000 fffff880`04fa7000 atikmdag atikmdag.sys Tue Aug 03 21:39:08 2010 (4C58C4BC)
fffff880`04461000 fffff880`044a8000 atikmpag atikmpag.sys Tue Aug 03 21:15:45 2010 (4C58BF41)
fffff880`02c3d000 fffff880`02c44000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`04244000 fffff880`04255000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02b72000 fffff880`02b90000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`007d0000 fffff960`007f7000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`02c00000 fffff880`02c2a000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ecb000 fffff880`00f8b000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01200000 fffff880`01230000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`02c2a000 fffff880`02c34000 CLBStor CLBStor.sys Mon Oct 13 23:34:50 2008 (48F4135A)
fffff880`02add000 fffff880`02b45000 CLBUDF CLBUDF.SYS Mon Oct 13 23:34:47 2008 (48F41357)
fffff880`00d13000 fffff880`00d71000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0156e000 fffff880`015e1000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0517d000 fffff880`0518d000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`059ca000 fffff880`059d8000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04226000 fffff880`04244000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`04217000 fffff880`04226000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`017c6000 fffff880`017dc000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0593a000 fffff880`0595c000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`059d8000 fffff880`059eb000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`02ca2000 fffff880`02dbe000 dump_iaStor dump_iaStor.sys Thu Jun 04 21:53:40 2009 (4A287AA4)
fffff880`059be000 fffff880`059ca000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`044a8000 fffff880`0459c000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04fa7000 fffff880`04fed000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`011dc000 fffff880`011f0000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01190000 fffff880`011dc000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`015f2000 fffff880`015fc000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0178c000 fffff880`017c6000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01699000 fffff880`016e3000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`031e8000 fffff800`03231000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04800000 fffff880`04824000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05962000 fffff880`059be000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`07576000 fffff880`0758f000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`0758f000 fffff880`07597080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`07568000 fffff880`07576000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02a00000 fffff880`02ac8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01783000 fffff880`0178c000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0102b000 fffff880`01147000 iaStor iaStor.sys Thu Jun 04 21:53:40 2009 (4A287AA4)
fffff880`0425b000 fffff880`04271000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`05085000 fffff880`05094000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`075a5000 fffff880`075b3000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bcf000 fffff800`00bd9000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04400000 fffff880`04443000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01554000 fffff880`0156e000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0166e000 fffff880`01699000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0595c000 fffff880`05961200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02b45000 fffff880`02b5a000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0581d000 fffff880`05840000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cbb000 fffff880`00cff000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`059eb000 fffff880`059f9000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`05094000 fffff880`050a3000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`07598000 fffff880`075a5000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00c6c000 fffff880`00c86000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02b90000 fffff880`02ba8000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02ba8000 fffff880`02bd5000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`046dd000 fffff880`0472b000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0472b000 fffff880`0474e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0117a000 fffff880`01185000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02ddb000 fffff880`02de6000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00feb000 fffff880`00ff5000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`014f6000 fffff880`01554000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`0420c000 fffff880`04217000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01771000 fffff880`01783000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01400000 fffff880`014f2000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`051c7000 fffff880`051d3000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`05000000 fffff880`0502f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`058c5000 fffff880`058da000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04371000 fffff880`04380000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`042fd000 fffff880`04342000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0160e000 fffff880`0166e000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02de6000 fffff880`02df7000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04200000 fffff880`0420c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c0c000 fffff800`031e8000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01237000 fffff880`013da000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02c34000 fffff880`02c3d000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`051d3000 fffff880`051e9000 nusb3hub nusb3hub.sys Fri Sep 25 09:58:23 2009 (4ABCCC7F)
fffff880`00c86000 fffff880`00cb6000 nusb3xhc nusb3xhc.sys Fri Sep 25 09:58:31 2009 (4ABCCC87)
fffff880`0434b000 fffff880`04371000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00da4000 fffff880`00db9000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d71000 fffff880`00da4000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ec0000 fffff880`00ec7000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00c5c000 fffff880`00c6c000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`015e1000 fffff880`015f2000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0474e000 fffff880`047f4000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`058fd000 fffff880`0593a000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cff000 fffff880`00d13000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`051a3000 fffff880`051c7000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0502f000 fffff880`0504a000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0504a000 fffff880`0506b000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0506b000 fffff880`05085000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`043af000 fffff880`04400000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02c87000 fffff880`02c90000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02c90000 fffff880`02c99000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02c99000 fffff880`02ca2000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01737000 fffff880`01771000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02b5a000 fffff880`02b72000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`047f4000 fffff880`047ff000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0172f000 fffff880`01737000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`074d2000 fffff880`07568000 srv srv.sys Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`0466a000 fffff880`046d2000 srv2 srv2.sys Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`04600000 fffff880`0462d000 srvnet srvnet.sys Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`050a3000 fffff880`050a4480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01801000 fffff880`019fe000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0462d000 fffff880`0463f000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`017ea000 fffff880`017f7000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`013da000 fffff880`013f8000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`0439b000 fffff880`043af000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005b0000 fffff960`005ba000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`01000000 fffff880`01026000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`050a5000 fffff880`050b7000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05800000 fffff880`0581d000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04271000 fffff880`04272f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04fed000 fffff880`04ffe000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0586b000 fffff880`058c5000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0459c000 fffff880`045f2000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`075b3000 fffff880`075ce000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`04824000 fffff880`04831000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00eb3000 fffff880`00ec0000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02c44000 fffff880`02c52000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02c52000 fffff880`02c77000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00db9000 fffff880`00dce000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`016e3000 fffff880`0172f000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`04380000 fffff880`0439b000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02c77000 fffff880`02c87000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ea4000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea4000 fffff880`00eb3000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04342000 fffff880`0434b000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000b0000 fffff960`003bf000 win32k win32k.sys Sat Jun 19 00:31:59 2010 (4C1C483F)
fffff880`05174000 fffff880`0517d000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fe2000 fffff880`00feb000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05840000 fffff880`05861000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`075ce000 fffff880`075ff000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE)
fffff880`050c9000 fffff880`0512e000 yk62x64 yk62x64.sys Mon Sep 28 04:19:31 2009 (4AC07193)
Unloaded modules:
fffff880`07400000 fffff880`07471000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`017dc000 fffff880`017ea000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`02cac000 fffff880`02dc8000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`02dc8000 fffff880`02ddb000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Though I suspect the problem is more that just drivers, you do have three out of date drivers on your system. Out of date drivers can and do cause conflicts, memory corruption and crashes. Whether these drivers are the cans of your crashes or not, they are not helping the stability of your system, especially the 2008 driver. It is obsolete. Update these drivers.
Download a copy of Memtest86 and burn the ISO to a CD using Iso Recorder or another ISO burning program. Boot from the CD, and leave it running for at least 7 passes. Here is a good thread on Memtest: Memtest86+ Guide/How To's - Overclockers Forums. And here is a good tutorial:
RAM - Test with Memtest86+
Do a CPU stress test as well, using Prime95: https://www.sevenforums.com/tutorials...t-prime95.html
Test your temps with Speedfan.
Please post back with the results.