BSOD Suspect: Isolated


  1. Posts : 22
    Windows 7 Ultimate
       #1

    BSOD Suspect: Isolated


    I posted earlier in the forums but my thread has had no attention.

    I dont know if any of the genius on here can help me but I bring something new to the table for you to feast upon.

    I have been repeatedly presented with an error on BS which ready:

    'system is attempting to access memory beyond the end of allocation something..'

    Also there is a mention of a 'system-driver conflict'.

    I express again as I did earlier that following instruction I think I can minidump and send the info needed but as for the system health report my Performance Monitor just gives up after the 60 seconds with an Error and timeout.

    This stupid BS is making me very angry and I have no idea what to do or how to do it.

    Please, help!

    Regards.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    Where's you attachment? Give link plz.
      My Computer


  3. Posts : 22
    Windows 7 Ultimate
    Thread Starter
       #3

    I was unsure as to what link you mean, but if you are referring to my first post please find it here>>

    https://www.sevenforums.com/crashes-d...-possible.html

    Many thanks

    On Edit:

    Please find the dump enclosed. Looking forward to any responses to my prob. Thanks all again,

    Best.
    Last edited by Dazzletoad; 25 Oct 2010 at 22:40.
      My Computer


  4. Posts : 670
    Windows 7 x64
       #4

    You got too many outdated drivers 2006-2008. A few of them directly caused your bsod crashes. Update them and uninstall Avast as it was also involved.

    Alright,

    PAGE_FAULT_BEYOND_END_OF_ALLOCATION (cd)
    DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
    PROCESS_NAME: System
    PROCESS_NAME: LManager.exe
    0xCD_VRF_dump_wmimmc+6db9 (C:\Program Files\Rappelz\GameGuard\)


    PAGE_FAULT_IN_NONPAGED_AREA (50)
    PROCESS_NAME: dwm.exe
    MODULE_NAME: hardware
    IP_MISALIGNED


    IRQL_NOT_LESS_OR_EQUAL (a)
    PROCESS_NAME: msnmsgr.exe
    0xA_pacer!PcFilterSendNetBufferLists+256
    aswTdi.SYS
    mdvrmng.sys


    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
    PROCESS_NAME: SFrame.exe
    Probably caused by : hardware ( nt!KiTrap0E+c )
    IP_MISALIGNED


    DRIVER_CORRUPTED_EXPOOL (c5)
    DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
    PROCESS_NAME: System
    Probably caused by : fileinfo.sys ( fileinfo!FIStreamQueryWorker+76 )


    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    PROCESS_NAME: System
    Probably caused by : netw5v32.sys ( netw5v32+1bb58f )


    ~~~~~~~~~~~



    What to do:


    1. Uninstall Avast, Malware bytes is enough for now:

    avast! Uninstall Utility





    2. Update - visit your notebook support as well as mnufacturers' support sites:


    C:\Program Files\Rappelz\GameGuard\
    Gameguard - Disable or remove

    netw5v32.sys
    Intel® Wireless WiFi Link Adapter

    b57nd60x.sys Sun Apr 26 14:15:34 2009
    Broadcom NetXtreme Gigabit Ethernet Driver

    DKbFltr.sys Thu Mar 26 05:10:12 2009
    Dritek 64-bit PS/2 Keyboard

    iaStor.sys Fri Jun 05 04:42:33 2009
    Intel Matrix Storage

    mdvrmng.sys Mon May 28 17:37:13 2007
    SmartRoaming Client - update or remove

    rimsptsk.sys Thu Jun 25 10:10:46 2009
    Ricoh Memorystick Controller

    RTKVHDA.sys Thu Jul 23 12:55:58 2009
    Realtek Audio

    SCDEmu.SYS Mon Nov 09 05:21:19 2009
    PowerISO

    SynTP.sys Wed May 09 22:16:25 2007
    Synaptics Touchpad

    tdrpm251.sys Fri Jul 31 17:00:11 2009
    Acronis Try&Decide

    timntr.sys Mon Aug 17 10:16:54 2009
    Acronis True Image

    VSTCNXT3.SYS Thu Oct 16 03:29:13 2008
    Conexant SoftK56 Modem

    winbondcir.sys Wed Mar 28 08:51:32 2007
    Winbond CIR Transceiver Winbond Electronics Corporation






    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\102510-43430-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e16000 PsLoadedModuleList = 0x82f5e810
    Debug session time: Mon Oct 25 22:25:32.935 2010 (UTC - 5:00)
    System Uptime: 1 days 3:22:49.762
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................................
    Loading User Symbols
    Loading unloaded module list
    .....................
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_BEYOND_END_OF_ALLOCATION (cd)
    N bytes of memory was allocated and more than N bytes are being referenced.
    This cannot be protected by try-except.
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: 8fcb3000, memory referenced
    Arg2: 00000000, value 0 = read operation, 1 = write operation
    Arg3: 82ed9cb2, if non-zero, the address which referenced memory.
    Arg4: 00000000, Mm internal code.
    
    Debugging Details:
    ------------------
    
    Unable to load image \??\C:\Program Files\Rappelz\GameGuard\dump_wmimmc.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for dump_wmimmc.sys
    *** ERROR: Module load completed but symbols could not be loaded for dump_wmimmc.sys
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82f7e718
    Unable to read MiSystemVaType memory at 82f5e160
     8fcb3000 
    
    FAULTING_IP: 
    nt!_output_l+50e
    82ed9cb2 663918          cmp     word ptr [eax],bx
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xCD
    
    PROCESS_NAME:  LManager.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  97bbf0d0 -- (.trap 0xffffffff97bbf0d0)
    ErrCode = 00000000
    eax=8fcb3000 ebx=00000000 ecx=7fffffee edx=8fcb2fe0 esi=97bbf473 edi=00000007
    eip=82ed9cb2 esp=97bbf144 ebp=97bbf3a0 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!_output_l+0x50e:
    82ed9cb2 663918          cmp     word ptr [eax],bx        ds:0023:8fcb3000=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82e5c638 to 82e9b903
    
    STACK_TEXT:  
    97bbf0b8 82e5c638 00000000 8fcb3000 00000000 nt!MmAccessFault+0x106
    97bbf0b8 82ed9cb2 00000000 8fcb3000 00000000 nt!KiTrap0E+0xdc
    97bbf3a0 82eda611 97bbf3c4 97bbf473 00000000 nt!_output_l+0x50e
    97bbf3e4 82eda11a 97bbf828 00000400 97bbf41c nt!_vsnprintf_l+0x72
    97bbf400 9058ddb9 97bbf828 00000400 97bbf41c nt!_vsnprintf+0x18
    WARNING: Stack unwind information not available. Following frames may be wrong.
    97bbfc28 905a0d59 000000a0 90588dc0 9369f19c dump_wmimmc+0x6db9
    97bbfc88 9058b5be 00000114 000b2054 00000114 dump_wmimmc+0x19d59
    97bbfccc 9058b6d6 751fa08f 00000114 000b2054 dump_wmimmc+0x45be
    97bbfd34 770664f4 badb0d00 0012fbd4 00000000 dump_wmimmc+0x46d6
    97bbfd38 badb0d00 0012fbd4 00000000 00000000 0x770664f4
    97bbfd3c 0012fbd4 00000000 00000000 00000000 0xbadb0d00
    97bbfd40 00000000 00000000 00000000 00000000 0x12fbd4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dump_wmimmc+6db9
    9058ddb9 ??              ???
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  dump_wmimmc+6db9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dump_wmimmc
    
    IMAGE_NAME:  dump_wmimmc.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c162f49
    
    FAILURE_BUCKET_ID:  0xCD_VRF_dump_wmimmc+6db9
    
    BUCKET_ID:  0xCD_VRF_dump_wmimmc+6db9
    
    Followup: MachineOwner
    
    
               
        Loaded symbol image file: dump_wmimmc.sys
        Image path: \??\C:\Program Files\Rappelz\GameGuard\dump_wmimmc.sys
        Image name: dump_wmimmc.sys
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\092310-48937-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e4e000 PsLoadedModuleList = 0x82f96810
    Debug session time: Thu Sep 23 18:05:27.102 2010 (UTC - 5:00)
    System Uptime: 0 days 0:02:20.803
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................................
    Loading User Symbols
    Loading unloaded module list
    ......
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: ffd5d78d, memory referenced.
    Arg2: 00000000, value 0 = read operation, 1 = write operation.
    Arg3: 830e101d, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 00000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82fb6718
    Unable to read MiSystemVaType memory at 82f96160
     ffd5d78d 
    
    FAULTING_IP: 
    nt!NtQueryInformationJobObject+10
    830e101d f6              ???
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  dwm.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  9fdd5c9c -- (.trap 0xffffffff9fdd5c9c)
    ErrCode = 00000000
    eax=000000e8 ebx=830e100d ecx=8a4bf318 edx=830e100d esi=02c0ecdc edi=00000000
    eip=830e101d esp=9fdd5d10 ebp=9fdd5d34 iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    nt!NtQueryInformationJobObject+0x10:
    830e101d f6              ???
    Resetting default scope
    
    MISALIGNED_IP: 
    nt!NtQueryInformationJobObject+10
    830e101d f6              ???
    
    LAST_CONTROL_TRANSFER:  from 82e94638 to 82ed3903
    
    STACK_TEXT:  
    9fdd5c84 82e94638 00000000 ffd5d78d 00000000 nt!MmAccessFault+0x106
    9fdd5c84 830e101d 00000000 ffd5d78d 00000000 nt!KiTrap0E+0xdc
    9fdd5d34 76e764f4 badb0d00 02c0ecc8 00000000 nt!NtQueryInformationJobObject+0x10
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    9fdd5d38 badb0d00 02c0ecc8 00000000 00000000 0x76e764f4
    9fdd5d3c 02c0ecc8 00000000 00000000 00000000 0xbadb0d00
    9fdd5d40 00000000 00000000 00000000 00000000 0x2c0ecc8
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!NtQueryInformationJobObject+10
    830e101d f6              ???
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!NtQueryInformationJobObject+10
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: hardware
    
    FAILURE_BUCKET_ID:  IP_MISALIGNED
    
    BUCKET_ID:  IP_MISALIGNED
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\093010-36816-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e55000 PsLoadedModuleList = 0x82f9d810
    Debug session time: Thu Sep 30 05:17:48.548 2010 (UTC - 5:00)
    System Uptime: 0 days 8:32:34.390
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................................
    Loading User Symbols
    Loading unloaded module list
    ................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {368fc777, 2, 0, 82eda89d}
    
    *** WARNING: Unable to verify timestamp for aswTdi.SYS
    *** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
    *** WARNING: Unable to verify timestamp for aswRdr.SYS
    *** ERROR: Module load completed but symbols could not be loaded for aswRdr.SYS
    *** WARNING: Unable to verify timestamp for mdvrmng.sys
    *** ERROR: Module load completed but symbols could not be loaded for mdvrmng.sys
    Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferLists+256 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 368fc777, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 82eda89d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82fbd718
    Unable to read MiSystemVaType memory at 82f9d160
     368fc777 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MmAccessFault+a0
    82eda89d 8b06            mov     eax,dword ptr [esi]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  msnmsgr.exe
    
    TRAP_FRAME:  a397f110 -- (.trap 0xffffffffa397f110)
    ErrCode = 00000000
    eax=db3ab0c7 ebx=00000000 ecx=a397f1e0 edx=00004700 esi=8823d224 edi=886ef0e0
    eip=8ba7fc96 esp=a397f184 ebp=a397f198 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    ndis!ndisMAllocSGList+0x10:
    8ba7fc96 8b4d08          mov     ecx,dword ptr [ebp+8] ss:0010:a397f1a0=886ef0e0
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82eda89d to 82e9b82b
    
    STACK_TEXT:  
    a397f01c 82eda89d badb0d00 00000080 00000000 nt!KiTrap0E+0x2cf
    a397f0f8 82e9b638 00000000 8b565308 00000000 nt!MmAccessFault+0xa0
    a397f0f8 8ba7fc96 00000000 8b565308 00000000 nt!KiTrap0E+0xdc
    a397f198 8ba87464 886ef0e0 8823d224 85efae00 ndis!ndisMAllocSGList+0x10
    a397f1c0 8ba8730a a397f1e0 a397f1e0 00000000 ndis!ndisMSendPacketsXToMiniport+0xc1
    a397f228 8ba1f59d 886ef0e0 85efae48 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
    a397f248 8ba1f623 85efae48 85efae48 00000000 ndis!ndisFilterSendNetBufferLists+0x87
    a397f260 90de5c20 88938858 85efae48 00000000 ndis!NdisFSendNetBufferLists+0x38
    a397f2dc 8ba1f474 85d04730 01efae48 00000000 pacer!PcFilterSendNetBufferLists+0x256
    a397f308 8ba83d8c 886ef0e0 85efae48 00000000 ndis!ndisSendNBLToFilter+0xf2
    a397f338 90c1bbf8 88940a60 85efae48 00000000 ndis!NdisSendNetBufferLists+0x162
    a397f394 8bca1861 02ca4bd8 00000000 88260002 wanarp!WanIpSendPackets+0x1f4
    a397f3e8 8bca1573 8bd21d98 00000000 00000000 tcpip!IppFragmentPackets+0x2e2
    a397f420 8bca9313 8bd21d98 8826baac 8826bb48 tcpip!IppDispatchSendPacketHelper+0x266
    a397f4c0 8bcaf3ae 0026baac a397f5a0 85a5a130 tcpip!IppPacketizeDatagrams+0x8d6
    a397f540 8bcaf635 00000000 00000007 8bd21d98 tcpip!IppSendDatagramsCommon+0x652
    a397f560 8bc8f3a8 88260788 a397f578 a397f6e0 tcpip!IpNlpSendDatagrams+0x4b
    a397f5ec 8bc8f339 88260788 a397f6e0 858829a0 tcpip!IppSlowSendDatagram+0x31
    a397f64c 8bc926c4 88260788 00000001 a397f6e0 tcpip!IpNlpFastSendDatagram+0xefd
    a397f79c 8bc96555 859aedf8 00000000 00000001 tcpip!TcpTcbSend+0x78b
    a397f7bc 8bc943e9 859aedf8 85c20020 00000000 tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0x157
    a397f81c 8bc968e6 859aedf8 a397f91c 00000000 tcpip!TcpEnqueueTcbSend+0x3ca
    a397f838 82ee4faa a397f8c8 856ef5d6 00000000 tcpip!TcpTlConnectionSendCalloutRoutine+0x17
    a397f8a0 8bc95aab 8bc968cf a397f8c8 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
    a397f8d8 90daed27 859aed01 a397f900 85a1a150 tcpip!TcpTlConnectionSend+0x73
    a397f93c 90db42e3 00e11008 85a1a150 85a1a1e4 tdx!TdxSendConnection+0x1d7
    a397f958 82e914bc 8836add8 85a1a150 88420768 tdx!TdxTdiDispatchInternalDeviceControl+0x115
    a397f970 90dcf23b 334ad9d6 00000000 85a1a208 nt!IofCallDriver+0x63
    WARNING: Stack unwind information not available. Following frames may be wrong.
    a397f9a8 90dca977 88420738 85a1a150 8836add8 aswTdi+0x523b
    a397f9f0 82e914bc 8836add8 85a1a150 88442a78 aswTdi+0x977
    a397fa08 90dd44d8 884429c0 a397fa2c 82e914bc nt!IofCallDriver+0x63
    a397fa14 82e914bc 884429c0 85a1a150 8a3d7608 aswRdr+0x4d8
    a397fa2c 8b41be15 85b893a0 8a3d7608 a397fab8 nt!IofCallDriver+0x63
    a397fa48 82e914bc 00000001 00000000 85a1a820 mdvrmng+0x1e15
    a397fa60 8b7bfa0e 28ed4a96 a397fb20 00000001 nt!IofCallDriver+0x63
    a397fab0 8b7ac542 00000000 8b7ac542 85df9630 afd!AfdFastConnectionSend+0x2a6
    a397fc28 830af985 89a97a01 00000001 0050f83c afd!AfdFastIoDeviceControl+0x53d
    a397fcd0 830b253a 8841ae10 000008b0 00000000 nt!IopXxxControlFile+0x2d0
    a397fd04 82e9844a 00000db8 000008b0 00000000 nt!NtDeviceIoControlFile+0x2a
    a397fd04 773964f4 00000db8 000008b0 00000000 nt!KiFastCallEntry+0x12a
    0050f890 00000000 00000000 00000000 00000000 0x773964f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    pacer!PcFilterSendNetBufferLists+256
    90de5c20 5b              pop     ebx
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  pacer!PcFilterSendNetBufferLists+256
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: pacer
    
    IMAGE_NAME:  pacer.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc916
    
    FAILURE_BUCKET_ID:  0xA_pacer!PcFilterSendNetBufferLists+256
    
    BUCKET_ID:  0xA_pacer!PcFilterSendNetBufferLists+256
    
    Followup: MachineOwner
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\101510-40575-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e03000 PsLoadedModuleList = 0x82f4b810
    Debug session time: Fri Oct 15 03:19:03.390 2010 (UTC - 5:00)
    System Uptime: 0 days 0:42:27.231
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................................
    Loading User Symbols
    Loading unloaded module list
    ............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007F, {8, 801de000, 0, 0}
    
    Probably caused by : hardware ( nt!KiTrap0E+c )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 801de000
    Arg3: 00000000
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  SFrame.exe
    
    CURRENT_IRQL:  0
    
    MISALIGNED_IP: 
    nt!KiTrap0E+c
    82e49568 a0bb300000      mov     al,byte ptr ds:[000030BBh]
    
    LAST_CONTROL_TRANSFER:  from 00000000 to 82e49568
    
    STACK_TEXT:  
    084dfee8 00000000 00000000 00000000 00000000 nt!KiTrap0E+0xc
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiTrap0E+c
    82e49568 a0bb300000      mov     al,byte ptr ds:[000030BBh]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiTrap0E+c
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: hardware
    
    FAILURE_BUCKET_ID:  IP_MISALIGNED
    
    BUCKET_ID:  IP_MISALIGNED
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\102410-40232-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e46000 PsLoadedModuleList = 0x82f8e810
    Debug session time: Sun Oct 24 07:31:03.596 2010 (UTC - 5:00)
    System Uptime: 0 days 0:00:53.422
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C5, {ddacb008, 2, 0, 82f6605b}
    
    Probably caused by : fileinfo.sys ( fileinfo!FIStreamQueryWorker+76 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_CORRUPTED_EXPOOL (c5)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is
    caused by drivers that have corrupted the system pool.  Run the driver
    verifier against any new (or suspect) drivers, and if that doesn't turn up
    the culprit, then use gflags to enable special pool.
    Arguments:
    Arg1: ddacb008, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 82f6605b, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xC5_2
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!ExAllocatePoolWithTag+4ab
    82f6605b 3932            cmp     dword ptr [edx],esi
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  8873d724 -- (.trap 0xffffffff8873d724)
    ErrCode = 00000000
    eax=82f7bb70 ebx=82f7b8c0 ecx=9dacb008 edx=ddacb008 esi=82f7bb70 edi=82f7b8c4
    eip=82f6605b esp=8873d798 ebp=8873d7e4 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    nt!ExAllocatePoolWithTag+0x4ab:
    82f6605b 3932            cmp     dword ptr [edx],esi  ds:0023:ddacb008=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82f6605b to 82e8c82b
    
    STACK_TEXT:  
    8873d724 82f6605b badb0d00 ddacb008 00000003 nt!KiTrap0E+0x2cf
    8873d7e4 8306a080 00000000 000000b0 e56c6946 nt!ExAllocatePoolWithTag+0x4ab
    8873d810 83069eea 946f8300 8873d838 00000080 nt!ObpAllocateObject+0xe2
    8873d844 8308aed5 00000000 857e0938 8873d880 nt!ObCreateObject+0x128
    8873d89c 8308629a 8873d96c 8c7c0b78 8c716a38 nt!IopAllocRealFileObject+0x50
    8873d990 8306726b 8c716a38 877e0938 946f8308 nt!IopParseDevice+0xac4
    8873da0c 8308d2d9 00000000 8873da60 00000240 nt!ObpLookupObjectName+0x4fa
    8873da68 8308562b 8873db90 857e0938 00010000 nt!ObOpenObjectByName+0x165
    8873dae4 830bce29 8cfa97d4 00100001 8873db90 nt!IopCreateFile+0x673
    8873db40 85d3cde3 8cfa97d4 00100001 8873db90 nt!IoCreateFileEx+0x9e
    8873dbd0 85d3e033 00000000 00000000 8cfa9758 fltmgr!FltpNormalizeNameFromCache+0xe5
    8873dbfc 85d3edf4 01fa9758 00000000 8cfa9758 fltmgr!FltpExpandShortNames+0x2b5
    8873dc18 85d3f505 8cfa0000 00000000 918ed574 fltmgr!FltpGetNormalizedFileNameWorker+0xae
    8873dc30 85d3c765 8cfa9758 00000000 8cfa9758 fltmgr!FltpGetNormalizedFileName+0x19
    8873dc48 85d26b21 8cfa9758 9db180f0 00000000 fltmgr!FltpCreateFileNameInformation+0x81
    8873dc78 85d3ccd9 9d3ebfd4 00000001 00000000 fltmgr!FltpGetFileNameInformation+0x321
    8873dc8c 85d594e0 9db180f0 8cf34008 8cfa9758 fltmgr!FltGetFileNameInformationUnsafe+0x59
    8873dccc 85d433c8 8af175f8 8cf34008 00000899 fileinfo!FIStreamQueryWorker+0x76
    8873dd00 82eb3f3b 00000000 00000000 857de4c0 fltmgr!FltpProcessGenericWorkItem+0x38
    8873dd50 830546d3 00000001 a0a7514e 00000000 nt!ExpWorkerThread+0x10d
    8873dd90 82f060f9 82eb3e2e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    fileinfo!FIStreamQueryWorker+76
    85d594e0 85c0            test    eax,eax
    
    SYMBOL_STACK_INDEX:  11
    
    SYMBOL_NAME:  fileinfo!FIStreamQueryWorker+76
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: fileinfo
    
    IMAGE_NAME:  fileinfo.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18f
    
    FAILURE_BUCKET_ID:  0xC5_2_VRF_fileinfo!FIStreamQueryWorker+76
    
    BUCKET_ID:  0xC5_2_VRF_fileinfo!FIStreamQueryWorker+76
    
    Followup: MachineOwner
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\102410-36613-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e3b000 PsLoadedModuleList = 0x82f83810
    Debug session time: Sun Oct 24 03:27:28.264 2010 (UTC - 5:00)
    System Uptime: 0 days 0:00:31.106
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {75, 2, 1, 91fbe58f}
    
    Unable to load image \SystemRoot\system32\DRIVERS\netw5v32.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for netw5v32.sys
    *** ERROR: Module load completed but symbols could not be loaded for netw5v32.sys
    Probably caused by : netw5v32.sys ( netw5v32+1bb58f )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000075, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, value 0 = read operation, 1 = write operation
    Arg4: 91fbe58f, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82fa3718
    Unable to read MiSystemVaType memory at 82f83160
     00000075 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    netw5v32+1bb58f
    91fbe58f 0000            add     byte ptr [eax],al
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  8d9381f4 -- (.trap 0xffffffff8d9381f4)
    ErrCode = 00000002
    eax=00000075 ebx=00000000 ecx=887ad000 edx=881bbca0 esi=887ad000 edi=887ad05c
    eip=91fbe58f esp=8d938268 ebp=8d93827c iopl=0         nv up ei ng nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00210282
    netw5v32+0x1bb58f:
    91fbe58f 0000            add     byte ptr [eax],al          ds:0023:00000075=??
    Resetting default scope
    
    LOCK_ADDRESS:  82fa0f60 -- (!locks 82fa0f60)
    
    Resource @ nt!PiEngineLock (0x82fa0f60)    Available
    
    WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
    
    
    WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
    
    1 total locks
    
    PNP_TRIAGE: 
    	Lock address  : 0x82fa0f60
    	Thread Count  : 0
    	Thread address: 0x00000000
    	Thread wait   : 0x0
    
    LAST_CONTROL_TRANSFER:  from 91fbe58f to 82e8182b
    
    STACK_TEXT:  
    8d9381f4 91fbe58f badb0d00 881bbca0 00000000 nt!KiTrap0E+0x2cf
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8d93827c 91fb761c 887ad000 00000000 920b5830 netw5v32+0x1bb58f
    8d9384a4 91e13690 887ad000 887f97b0 887fbfe0 netw5v32+0x1b461c
    8d9384d4 91e14525 887f97b0 00000000 887f97b0 netw5v32+0x10690
    8d9384ec 91e11379 887f97b0 887fbfe0 882d8c10 netw5v32+0x11525
    8d938508 91f94c4d 881bb5d0 00000004 00000001 netw5v32+0xe379
    8d9385b8 91e04bdb 882d8c10 882d8008 8b8175c0 netw5v32+0x191c4d
    8d9385e8 920922c3 00000000 881b9f84 00000003 netw5v32+0x1bdb
    8d938618 8b885368 880d30e0 92437f50 8d938670 netw5v32+0x28f2c3
    8d9388e4 8b884aea 87f5b920 880d30e0 87f5b788 ndis!ndisMInitializeAdapter+0x76b
    8d93891c 8b884963 87f5b920 880d3028 87e1d860 ndis!ndisInitializeAdapter+0x10a
    8d938944 8b881247 880d3028 8817af94 8817afb8 ndis!ndisPnPStartDevice+0x130
    8d938988 82e774bc 880d3028 8817af00 8d938a10 ndis!ndisPnPDispatch+0x62f
    8d9389a0 82fe3d78 00000000 85ed6568 87d66008 nt!IofCallDriver+0x63
    8d9389bc 82e4f479 8d9389ec 82e4eb67 87d66008 nt!PnpAsynchronousCall+0x92
    8d938a20 82fe9bf4 82e4eb67 87d66008 85eba6f0 nt!PnpStartDevice+0xe1
    8d938a7c 82fe9abd 87d66008 0000003d 00000000 nt!PnpStartDeviceNode+0x12c
    8d938a98 82fe28b9 00000000 00000001 00000000 nt!PipProcessStartPhase1+0x62
    8d938c94 82fc6a42 855fb008 87f539c0 8d938cc8 nt!PipProcessDevNodeTree+0x188
    8d938cd4 82e4ef9c 87f539c0 82f9ee80 855cba70 nt!PiProcessStartSystemDevices+0x6d
    8d938d00 82ea8f3b 00000000 00000000 855cba70 nt!PnpDeviceActionWorker+0x241
    8d938d50 830496d3 00000001 ab681a7a 00000000 nt!ExpWorkerThread+0x10d
    8d938d90 82efb0f9 82ea8e2e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    netw5v32+1bb58f
    91fbe58f 0000            add     byte ptr [eax],al
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  netw5v32+1bb58f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: netw5v32
    
    IMAGE_NAME:  netw5v32.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c0406d7
    
    FAILURE_BUCKET_ID:  0xD1_netw5v32+1bb58f
    
    BUCKET_ID:  0xD1_netw5v32+1bb58f
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\092110-43586-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e03000 PsLoadedModuleList = 0x82f4b810
    Debug session time: Tue Sep 21 19:49:16.405 2010 (UTC - 5:00)
    System Uptime: 0 days 8:12:42.246
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................................
    Loading User Symbols
    Loading unloaded module list
    ....................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {d, 0, 0, 0}
    
    Probably caused by : hardware ( nt!KiSystemFatalException+f )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000d, EXCEPTION_GP_FAULT
    Arg2: 00000000
    Arg3: 00000000
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_d
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  audiodg.exe
    
    CURRENT_IRQL:  1b
    
    EXCEPTION_RECORD:  aa1f1ce0 -- (.exr 0xffffffffaa1f1ce0)
    ExceptionAddress: 00000000
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000008
       Parameter[1]: 00000000
    Attempt to execute non-executable address 00000000
    
    TRAP_FRAME:  aa1f1d34 -- (.trap 0xffffffffaa1f1d34)
    ErrCode = 00000014
    eax=02455400 ebx=00a2eea0 ecx=00a2eea0 edx=00000002 esi=00000000 edi=000001e0
    eip=00000000 esp=024a070c ebp=00000000 iopl=0         nv up ei pl zr na pe nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010246
    001b:00000000 ??              ???
    Resetting default scope
    
    MISALIGNED_IP: 
    nt!RtlpCopyExtendedContext+17
    82ec08db 0085c00f8c9e    add     byte ptr [ebp-6173F040h],al
    
    LAST_CONTROL_TRANSFER:  from 82ebd477 to 82e49f6b
    
    STACK_TEXT:  
    aa1f1284 82ebd477 badb0d00 00000001 001dcdc6 nt!KiSystemFatalException+0xf
    aa1f12f4 82ec2df7 82e3cc74 aa1f1318 aa1f131c nt!RtlLookupFunctionTable+0x48
    aa1f1320 82ebbff8 aa1f13b0 00000000 aa1f17d0 nt!RtlIsValidHandler+0x1b
    aa1f13a0 82ec0352 aa1f17d0 aa1f13b0 00010017 nt!RtlDispatchException+0x76
    aa1f17b4 82e47036 aa1f17d0 00000000 aa1f1824 nt!KiDispatchException+0x17c
    aa1f181c 82e46fea aa1f18a4 82ec08db badb0d00 nt!CommonDispatchException+0x4a
    aa1f18a4 82ec0510 00000001 024a06f4 aa1f1c68 nt!Kei386EoiHelper+0x192
    aa1f18a8 00000000 024a06f4 aa1f1c68 0001003f nt!KiDispatchException+0x338
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiSystemFatalException+f
    82e49f6b c3              ret
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiSystemFatalException+f
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: hardware
    
    FAILURE_BUCKET_ID:  IP_MISALIGNED
    
    BUCKET_ID:  IP_MISALIGNED
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\102610-40965-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e39000 PsLoadedModuleList = 0x82f81810
    Debug session time: Tue Oct 26 03:00:19.339 2010 (UTC - 5:00)
    System Uptime: 0 days 0:25:41.165
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................
    Loading User Symbols
    Loading unloaded module list
    .....
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_BEYOND_END_OF_ALLOCATION (cd)
    N bytes of memory was allocated and more than N bytes are being referenced.
    This cannot be protected by try-except.
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: 8fb3b000, memory referenced
    Arg2: 00000000, value 0 = read operation, 1 = write operation
    Arg3: 82efccb2, if non-zero, the address which referenced memory.
    Arg4: 00000000, Mm internal code.
    
    Debugging Details:
    ------------------
    
    Unable to load image \??\C:\Program Files\Rappelz\GameGuard\dump_wmimmc.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for dump_wmimmc.sys
    *** ERROR: Module load completed but symbols could not be loaded for dump_wmimmc.sys
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82fa1718
    Unable to read MiSystemVaType memory at 82f81160
     8fb3b000 
    
    FAULTING_IP: 
    nt!_output_l+50e
    82efccb2 663918          cmp     word ptr [eax],bx
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xCD
    
    PROCESS_NAME:  LManager.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  8817a0d0 -- (.trap 0xffffffff8817a0d0)
    ErrCode = 00000000
    eax=8fb3b000 ebx=00000000 ecx=7fffffee edx=8fb3afe0 esi=8817a473 edi=00000007
    eip=82efccb2 esp=8817a144 ebp=8817a3a0 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!_output_l+0x50e:
    82efccb2 663918          cmp     word ptr [eax],bx        ds:0023:8fb3b000=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82e7f638 to 82ebe903
    
    STACK_TEXT:  
    8817a0b8 82e7f638 00000000 8fb3b000 00000000 nt!MmAccessFault+0x106
    8817a0b8 82efccb2 00000000 8fb3b000 00000000 nt!KiTrap0E+0xdc
    8817a3a0 82efd611 8817a3c4 8817a473 00000000 nt!_output_l+0x50e
    8817a3e4 82efd11a 8817a828 00000400 8817a41c nt!_vsnprintf_l+0x72
    8817a400 9f87ddb9 8817a828 00000400 8817a41c nt!_vsnprintf+0x18
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8817ac28 9f890d59 000000a0 9f878dc0 92b6719c dump_wmimmc+0x6db9
    8817ac88 9f87b5be 00000114 000b2054 00000114 dump_wmimmc+0x19d59
    8817accc 9f87b6d6 75aaa08f 00000114 000b2054 dump_wmimmc+0x45be
    8817ad34 777c64f4 badb0d00 0012fbd4 00000000 dump_wmimmc+0x46d6
    8817ad38 badb0d00 0012fbd4 00000000 00000000 0x777c64f4
    8817ad3c 0012fbd4 00000000 00000000 00000000 0xbadb0d00
    8817ad40 00000000 00000000 00000000 00000000 0x12fbd4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dump_wmimmc+6db9
    9f87ddb9 ??              ???
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  dump_wmimmc+6db9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dump_wmimmc
    
    IMAGE_NAME:  dump_wmimmc.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c162f49
    
    FAILURE_BUCKET_ID:  0xCD_VRF_dump_wmimmc+6db9
    
    BUCKET_ID:  0xCD_VRF_dump_wmimmc+6db9
    
    Followup: MachineOwner
    ---------
    
    
    
    9f877000 9f8cf100   dump_wmimmc T (no symbols)           
        Loaded symbol image file: dump_wmimmc.sys
        Image path: \??\C:\Program Files\Rappelz\GameGuard\dump_wmimmc.sys
        Image name: dump_wmimmc.sys
        Timestamp:        Mon Jun 14 16:31:53 2010 (4C162F49)
    
    
    
    916a3000 916cf000   1394ohci 1394ohci.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
    85a8b000 85ad3000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
    85d81000 85ddb000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
    8ff81000 8ff93000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
    85d33000 85d3c000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
    9200c000 9200eb00   aswFsBlk aswFsBlk.SYS Tue Sep 07 17:47:05 2010 (4C865069)
    85bc3000 85bfa000   aswMonFlt aswMonFlt.sys Tue Sep 07 17:47:28 2010 (4C865080)
    8edd5000 8edd9100   aswRdr   aswRdr.SYS   Tue Sep 07 17:47:44 2010 (4C865090)
    8f702000 8f728c80   aswSP    aswSP.SYS    Tue Sep 07 17:52:01 2010 (4C865191)
    8edcb000 8edd4c00   aswTdi   aswTdi.SYS   Tue Sep 07 17:52:23 2010 (4C8651A7)
    85cfd000 85d06000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
    85d06000 85d29000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
    91667000 916a3000   b57nd60x b57nd60x.sys Sun Apr 26 14:15:34 2009 (49F44256)
    85b32000 85b3d000   BATTC    BATTC.SYS    Tue Jul 14 02:19:15 2009 (4A5BC0F3)
    8ed37000 8ed3e000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
    8f6f4000 8f702000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
    858a9000 858b1000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
    9b123000 9b13c000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
    95d90000 95dae000   cdd      cdd.dll      Tue Jul 14 04:04:18 2009 (4A5BD992)
    8ed11000 8ed30000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
    858f3000 8599e000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
    90ddc000 90dea000   circlass circlass.sys Tue Jul 14 02:51:17 2009 (4A5BC875)
    865c7000 865ec000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
    858b1000 858f3000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    917de000 917e1700   CmBatt   CmBatt.sys   Tue Jul 14 02:19:18 2009 (4A5BC0F6)
    85f95000 85ff2000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
    85b2a000 85b32000   compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
    917eb000 917f8000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
    925a3000 925b0000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
    8f678000 8f6dc000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
    8f6dc000 8f6f4000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
    8f66c000 8f678000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
    865b6000 865c7000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
    9178c000 91796000   DKbFltr  DKbFltr.sys  Thu Mar 26 05:10:12 2009 (49CAF214)
    924fc000 92515000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
    925b0000 925c1000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
    8ec21000 8ecfb000   dump_iaStor dump_iaStor.sys Fri Jun 05 04:42:33 2009 (4A287809)
    9f877000 9f8cf100   dump_wmimmc dump_wmimmc.sys Mon Jun 14 16:31:53 2010 (4C162F49)
    925c1000 925cb000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
    8fe0d000 8fec4000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
    8fec4000 8fefd000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
    9b000000 9b02a000   fastfat  fastfat.SYS  Tue Jul 14 02:14:01 2009 (4A5BBFB9)
    85d70000 85d81000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    85d3c000 85d70000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
    85e00000 85e09000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
    86584000 865b6000   fvevol   fvevol.sys   Sat Sep 26 05:24:21 2009 (4ABD7B55)
    86349000 8637a000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
    82e02000 82e39000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
    8ff62000 8ff81000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
    921e2000 921f5000   HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
    921d3000 921e2000   hidir    hidir.sys    Tue Jul 14 02:51:04 2009 (4A5BC868)
    921f5000 921fb480   HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
    92598000 925a3000   hidusb   hidusb.sys   Tue Jul 14 02:51:04 2009 (4A5BC868)
    9b09e000 9b123000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
    8657c000 86584000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
    91774000 9178c000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
    8599e000 859e9000   iaNvStor iaNvStor.sys Thu Jul 02 03:54:06 2009 (4A4C052E)
    85c23000 85cfd000   iaStor   iaStor.sys   Fri Jun 05 04:42:33 2009 (4A287809)
    85b98000 85b9f000   intelide intelide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
    8f74a000 8f75c000   intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
    91796000 917a3000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    92000000 9200c000   kbdhid   kbdhid.sys   Tue Jul 14 02:45:09 2009 (4A5BC705)
    80bcf000 80bd7000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
    8f75c000 8f790000   ks       ks.sys       Thu Mar 04 05:57:52 2010 (4B8F2FC0)
    85f82000 85f95000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
    86123000 86148000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:04:22 2009 (4B21C4C6)
    8f7e5000 8f7f5000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
    925d6000 925f1000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
    9f86f000 9f872780   mbam     mbam.sys     Thu Apr 29 20:14:15 2010 (4BD9BE67)
    85820000 85898000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
    9221a000 9222e000   mdvrmng  mdvrmng.sys  Mon May 28 17:37:13 2007 (465AE919)
    921c6000 921d3000   modem    modem.sys    Tue Jul 14 02:55:24 2009 (4A5BC96C)
    925cb000 925d6000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
    917d1000 917de000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    92552000 9255d000   mouhid   mouhid.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    85bad000 85bc3000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
    9b13c000 9b14e000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
    9b14e000 9b171000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:32:02 2010 (4B88CA72)
    9b171000 9b1ac000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
    9b1ac000 9b1c7000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
    85d29000 85d33000   msahci   msahci.sys   Tue Jul 14 02:45:50 2009 (4A5BC72E)
    8ed90000 8ed9b000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
    85adc000 85ae4000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
    9f875000 9f876700   MSPCLOCK MSPCLOCK.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
    9f873000 9f874580   MSPQM    MSPQM.sys    Tue Jul 14 02:45:07 2009 (4A5BC703)
    85f57000 85f82000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
    8f662000 8f66c000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    8656c000 8657c000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
    8602e000 860e5000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
    8ffab000 8ffb6000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
    9b07b000 9b08b000   ndisuio  ndisuio.sys  Tue Jul 14 02:53:51 2009 (4A5BC90F)
    8ffb6000 8ffd8000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
    8f7d4000 8f7e5000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
    8ec00000 8ec0e000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
    86400000 86432000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
    860e5000 86123000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
    91008000 91667000   NETwLv32 NETwLv32.sys Mon Aug 16 17:26:04 2010 (4C694A7C)
    8ed9b000 8eda9000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
    8f658000 8f662000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
    82e39000 83249000   nt       ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
    85e28000 85f57000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
    8ed30000 8ed37000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
    90dac000 90dad040   nvBridge nvBridge.kmd Sat Oct 16 20:04:23 2010 (4CB9DB17)
    9040f000 90dab5a0   nvlddmkm nvlddmkm.sys Sat Oct 16 20:07:56 2010 (4CB9DBEC)
    9b035000 9b07b000   nwifi    nwifi.sys    Tue Jul 14 02:51:59 2009 (4A5BC89F)
    8ede1000 8ee00000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
    85b19000 85b2a000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
    85ae4000 85b0e000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
    85b9f000 85bad000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
    85ff2000 86000000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    9f02f000 9f0c6000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
    924cd000 924fc000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
    85898000 858a9000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
    8ff93000 8ffab000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
    8ffd8000 8fff0000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
    90dae000 90dc5000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
    90dc5000 90ddc000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
    8f617000 8f658000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
    8fff0000 8fffa000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
    8ed78000 8ed80000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
    8ed80000 8ed88000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
    8ed88000 8ed90000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
    8653f000 8656c000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
    916e8000 916f9000   rimmptsk rimmptsk.sys Thu Jun 25 10:58:09 2009 (4A432E11)
    916f9000 9170d000   rimsptsk rimsptsk.sys Thu Jun 25 10:10:46 2009 (4A4322F6)
    9170d000 9175f000   rixdptsk rixdptsk.sys Thu Jun 25 10:25:57 2009 (4A432685)
    9b08b000 9b09e000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
    92232000 924cca40   RTKVHDA  RTKVHDA.sys  Thu Jul 23 12:55:58 2009 (4A6833AE)
    863d2000 863dfa60   SCDEmu   SCDEmu.SYS   Mon Nov 09 05:21:19 2009 (4AF78AAF)
    916cf000 916e8000   sdbus    sdbus.sys    Sat Oct 10 05:31:24 2009 (4ACFF1FC)
    9f0c6000 9f0d0000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
    917f8000 917fdf00   seehcri  seehcri.sys  Wed Jan 09 10:41:37 2008 (478488C1)
    8651a000 8653ec20   snapman  snapman.sys  Tue Sep 08 10:57:17 2009 (4AA60E5D)
    86512000 8651a000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
    9f81e000 9f86f000   srv      srv.sys      Fri Aug 27 06:31:26 2010 (4C77318E)
    9f168000 9f1b7000   srv2     srv2.sys     Fri Aug 27 06:30:45 2010 (4C773165)
    9f0d0000 9f0f1000   srvnet   srvnet.sys   Fri Aug 27 06:30:39 2010 (4C77315F)
    917fe000 917ff380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    917a3000 917cee00   SynTP    SynTP.sys    Wed May 09 22:16:25 2007 (46421E09)
    86200000 86349000   tcpip    tcpip.sys    Mon Jun 14 06:36:59 2010 (4C15A3DB)
    9f0f1000 9f0fe000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
    8edc0000 8edcb000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
    86437000 86511b00   tdrpm251 tdrpm251.sys Fri Jul 31 17:00:11 2009 (4A72F8EB)
    8eda9000 8edc0000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
    863c2000 863d2000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
    86148000 861d1880   timntr   timntr.sys   Mon Aug 17 10:16:54 2009 (4A8903E6)
    95d60000 95d69000   TSDDD    TSDDD.dll    unavailable (00000000)
    8f729000 8f74a000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
    90dea000 90df8000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
    9255d000 92574000   usbccgp  usbccgp.sys  Tue Jul 14 02:51:31 2009 (4A5BC883)
    917cf000 917d0700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
    8ff53000 8ff62000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
    8f790000 8f7d4000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
    8ff08000 8ff53000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
    8fefd000 8ff08000   usbuhci  usbuhci.sys  Tue Jul 14 02:51:10 2009 (4A5BC86E)
    92574000 92597b80   usbvideo usbvideo.sys Thu Mar 04 06:04:40 2010 (4B8F3158)
    85b0e000 85b19000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
    8ed3e000 8ed4a000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
    8ed4a000 8ed6b000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
    8637a000 86382380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
    85b3d000 85b4d000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    85b4d000 85b98000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
    86383000 863c2000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
    92515000 92552000   VSTAZL3  VSTAZL3.SYS  Thu Oct 16 03:30:03 2008 (48F68B0B)
    92111000 921c6000   VSTCNXT3 VSTCNXT3.SYS Thu Oct 16 03:29:13 2008 (48F68AD9)
    9200f000 92111000   VSTDPV3  VSTDPV3.SYS  Thu Oct 16 03:32:04 2008 (48F68B84)
    8ec0e000 8ec21000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
    8ed6b000 8ed78000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
    85a0c000 85a7d000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
    85a7d000 85a8b000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    8edda000 8ede1000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
    95b00000 95d4b000   win32k   win32k.sys   Wed Sep 01 05:34:29 2010 (4C7DBBB5)
    9175f000 91774000   winbondcir winbondcir.sys Wed Mar 28 08:51:32 2007 (460A0264)
    917e2000 917eb000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:19:16 2009 (4A5BC0F4)
    85ad3000 85adc000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
    92200000 9221a000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)
    
    Unloaded modules:
    9f0fe000 9f168000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0006A000
    9b1c7000 9b1df000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00018000
    865ec000 865f9000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    8ec26000 8ed00000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  000DA000
    8ed00000 8ed11000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
      My Computer


  5. Posts : 22
    Windows 7 Ultimate
    Thread Starter
       #5

    Checklist


    I haven't uninstalled Avast as of yet. Is this really a must? It has been an incredibly reliable product for me and hasnt caused any issues in the past :S


    cybercore said:
    C:\Program Files\Rappelz\GameGuard\
    Gameguard - Disable or remove
    I have uninstalled this since the Gameguard (As much as a bloody nightmare as it is, is essential to play this game) Maybe a reinstall combined with the following alterations will resolve the Bluescreen upon launch.

    cybercore said:
    netw5v32.sys
    Intel® Wireless WiFi Link Adapter
    Recently updated only a couple of days ago.

    cybercore said:
    b57nd60x.sys Sun Apr 26 14:15:34 2009
    Broadcom NetXtreme Gigabit Ethernet Driver
    I have uninstalled the modem through the device manager but cannot find any other.

    cybercore said:
    DKbFltr.sys Thu Mar 26 05:10:12 2009
    Dritek 64-bit PS/2 Keyboard
    Keyboard was auto insalled via windows update. I have no idea why this was 64-bit or included such. However, uninstalled all and Windows update downloaded defaults.

    cybercore said:
    iaStor.sys Fri Jun 05 04:42:33 2009
    Intel Matrix Storage
    Two instances. Since the latest driver was from 2009 I just uninstalled both.

    cybercore said:
    mdvrmng.sys Mon May 28 17:37:13 2007
    SmartRoaming Client - update or remove
    I need help with this. I cannot find any means of locating or uninstalling this. Could you please point me in the right direction?

    cybercore said:
    rimsptsk.sys Thu Jun 25 10:10:46 2009
    Ricoh Memorystick Controller
    Updated driver software.

    cybercore said:
    RTKVHDA.sys Thu Jul 23 12:55:58 2009
    Realtek Audio
    Updated driver software via download from Realtek since Windows update didn't find any better driver. Manual install of driver dated this month.

    cybercore said:
    SCDEmu.SYS Mon Nov 09 05:21:19 2009
    PowerISO
    Uninstalled.

    cybercore said:
    SynTP.sys Wed May 09 22:16:25 2007
    Synaptics Touchpad
    Uninstalled.

    cybercore said:
    tdrpm251.sys Fri Jul 31 17:00:11 2009
    Acronis Try&Decide
    Uninstalled.

    cybercore said:
    timntr.sys Mon Aug 17 10:16:54 2009
    Acronis True Image
    Uninstalled.

    cybercore said:
    VSTCNXT3.SYS Thu Oct 16 03:29:13 2008
    Conexant SoftK56 Modem
    I cannot find this either. Could you please point me as to where I might find it?

    cybercore said:
    winbondcir.sys Wed Mar 28 08:51:32 2007
    Winbond CIR Transceiver Winbond Electronics Corporation
    Likewise I cannot find this. Could you please point me as to where I might find it?


    I have quoted your advice and listed all my actions taken in every instance you mentioned.

    My computer maker is Acer and they are terrible for keeping on their drivers. I have even had to use a manually made (by whom I dont know) PowerMizer switch for my NVidia driver.

    This is to disable the powermizer since when its active it is making my laptop screen flicker and fuzz every few seconds. (NVidia 8600M GT (512mb)

    I will reinstall Rappelz, try and run it and let you know of any change.

    In the meantime, I thank you so very, very much for all your time and help.

    You guys are great
      My Computer


  6. Posts : 670
    Windows 7 x64
       #6

    BSOD are caused by a) drivers b) hardware.

    Avast was involved in one of your crashes. MSE is really BSOD proof and works with anything, not resulting in crashes. But if you're still getting crashes it's a must do to uninstall Avast. Also make sure you use only 1 AV system, as mixing them occasionally results in BSODs.

    You want:

    1. Only 1 AV system year 2010, preferably MSE as it doesn't bsod

    2. Up to date drivers, no later than 2009 preferably 2010





    Winbond Electronics Corporation
    Winbond - Technical Support
    I don't know, not familiar with this one. Locate it in Programs and Components and uninstall - your version is outdated.


    SmartRoaming Client - if this is a Trend Micro product then uninstall it. It caused one of your crashes.


    Intel Matrix Storage - the latest version is 2010.


    Dritek 64-bit PS/2 Keyboard - not sure about this one, leave it as it is for now.


    Broadcom NetXtreme Gigabit Ethernet Driver - just leave it as it is if no updates for it. Check here Broadcom.com - Downloads & Support.


    Gameguard - it just happenned to cause a couple of your crashes. Later if it's all stable you can try it again.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 23:01.
Find Us