Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSODs - finding a reason (+minidumps)

08 Nov 2010   #1
klayman

Windows 7
 
 
BSODs - finding a reason (+minidumps)

Hello,
I keep having BSODs for quite a long time. Basicly since I have this computer (5 months). Usually it happens during rendering, playing a game or if computer is running for a long time.
I tried to find out the reason for myself, but I don't understand it too much and usually it says a different reason/error when crashing. So I'm guessing it's a hardware problem and I'm suspecting RAM but I don't really know.
Thank you for help.

- Windows 7 Professional x64
- installed from cd
- retail version
- OS reinstalled in the beginning of September (BSODs happened before as well)

- CPU - Intel® Core™ i7-930 (8MB cache,2.80 GHz, 4.80 GT/s) LGA 1366
- GPU - ATI Radeon HD 5850 1GB Vapor-X DDR5, HDMI, DP, DVI, OC, PCI-Express
- HDD - WD CAVIAR Green 15EARS 1.5TB HDD, SATA/300, IntelliPower, 64MB cache, AFT
- RAM - Kingston HyperX 3x2GB 1600MHz DDR3 Non-ECC CL9 Intel XMP
- MB - ASUS P6T, X58, ICH10R, 1366, Triple DDR3 1333, SATA2, RAID, IEEE, GLAN, ATX
- PWR - Fortron BlueStorm II 500W ATX v2.2, 12cmFan, FSP500-GLN, 80PLUS

(I have Daemon installed at the moment and I know it can cause BSODs, but I had it uninstalled for a while ago and nothing changed)
I also attached minidumps to the .zip file.
Thanks.


My System SpecsSystem Spec
.
08 Nov 2010   #2
cybercore

Windows 7 x64
 
 

Ok, let's see ...


Edit:


Your most recent crash was caused by Realtek 8136/8168/8169, others by memory and pool corruption, and others as a result of system service exception.


Update:

AsIO.sys Mon Dec 17 04:11:49 2007
ASUS I/O driver - probably an ASUS utility

jraid.sys Wed May 27 01:39:35 2009
JMicron JMB36X RAID Driver

LHidFilt.Sys Wed Jun 17 12:49:39 2009
Logitech SetPoint

RTKVHD64.sys Fri May 22 14:04:20 2009
Realtek Audio

adfs.SYS Thu Jun 26 16:52:37 2008
Adobe



Uninstall Daemon Tools:

sptd.sys Sun Mar 22 08:35:35 2009



Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110810-18267-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c54000 PsLoadedModuleList = 0xfffff800`02e91e50
Debug session time: Mon Nov  8 11:50:49.606 2010 (UTC - 4:00)
System Uptime: 0 days 0:25:44.636
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff88008e54b10, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+147d2 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88008e54b10, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
+6566386232313737
fffff880`08e54b10 285ae5          sub     byte ptr [rdx-1Bh],bl

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efc0e0
 0000000000000000 

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88008e55a28 -- (.exr 0xfffff88008e55a28)
ExceptionAddress: fffff80002c85d71 (nt!RtlGetNextEntryHashTable+0x000000000000001d)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88008e55ad0 -- (.trap 0xfffff88008e55ad0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffbfa80065cf4d0 rbx=0000000000000000 rcx=00000000ffd7dbcc
rdx=fffff88008e55dd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c85d71 rsp=fffff88008e55c68 rbp=0000000000000010
 r8=fffffa8007787818  r9=0000000000000000 r10=fffff88008e55dd8
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlGetNextEntryHashTable+0x1d:
fffff800`02c85d71 48394810        cmp     qword ptr [rax+10h],rcx ds:8be6:fffbfa80`065cf4e0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002d56bdb to fffff80002cc4740

STACK_TEXT:  
fffff880`08e54a58 fffff800`02d56bdb : 00000000`0000001e ffffffff`c0000005 fffff880`08e54b10 00000000`00000000 : nt!KeBugCheckEx
fffff880`08e54a60 fffff800`02d15d30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KipFatalFilter+0x1b
fffff880`08e54aa0 fffff800`02cf2d1c : 00000000`00000003 00000000`00000001 00000000`00000003 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`08e54ae0 fffff800`02cea40d : fffff800`02e10bc4 fffff880`08e56210 00000000`00000000 fffff800`02c54000 : nt!_C_specific_handler+0x8c
fffff880`08e54b50 fffff800`02cf1a90 : fffff800`02e10bc4 fffff880`08e54bc8 fffff880`08e55a28 fffff800`02c54000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`08e54b80 fffff800`02cfe9ef : fffff880`08e55a28 fffff880`08e55290 fffff880`00000000 fffffa80`064c8a00 : nt!RtlDispatchException+0x410
fffff880`08e55260 fffff800`02cc3d82 : fffff880`08e55a28 fffffa80`077877f0 fffff880`08e55ad0 fffffa80`077877f0 : nt!KiDispatchException+0x16f
fffff880`08e558f0 fffff800`02cc268a : fffffa80`065c6000 fffffa80`079c7180 fffffa80`065da000 fffffa80`06f525c0 : nt!KiExceptionDispatch+0xc2
fffff880`08e55ad0 fffff800`02c85d71 : fffff880`0184447f 00000000`00000002 fffff880`06828be6 fffffa80`064c8a00 : nt!KiGeneralProtectionFault+0x10a
fffff880`08e55c68 fffff880`0184447f : 00000000`00000002 fffff880`06828be6 fffffa80`064c8a00 00000000`00000000 : nt!RtlGetNextEntryHashTable+0x1d
fffff880`08e55c70 fffff880`0185e392 : fffffa80`065da138 00000000`00000000 fffff880`01967800 fffff880`01967800 : tcpip!IppFindNextHopAtDpc+0x44f
fffff880`08e55ee0 fffff880`0185c592 : fffffa80`06c964a0 00000000`00000000 fffffa80`06be5601 00ffffff`00000010 : tcpip!IpFlcReceivePackets+0xec2
fffff880`08e560e0 fffff880`01875e5a : fffffa80`06be5600 fffff880`08e56210 fffffa80`06be5600 fffff880`08e50001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`08e561c0 fffff800`02cd3e5a : fffffa80`06e3c030 fffff880`08e51000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`08e56210 fffff880`01875882 : fffff880`01875d80 fffff880`08e56320 00ffffff`00ffff02 00ffffff`00ffffff : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`08e562f0 fffff880`0179d0eb : fffffa80`06f7c010 00000000`00000000 fffffa80`069b81a0 fffff880`08e564f0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`08e56360 fffff880`01766fc6 : 00ffffff`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`08e563d0 fffff880`016e0ef1 : fffffa80`069b81a0 00000000`00000002 00000000`00000002 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`08e56850 fffff880`04fa47d2 : fffffa80`06c34000 00000000`00000000 fffffa80`06c34600 fffff880`065ab450 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`08e568a0 fffffa80`06c34000 : 00000000`00000000 fffffa80`06c34600 fffff880`065ab450 00000000`00000001 : Rt64win7+0x147d2
fffff880`08e568a8 00000000`00000000 : fffffa80`06c34600 fffff880`065ab450 00000000`00000001 fffff800`02cca9a2 : 0xfffffa80`06c34000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Rt64win7+147d2
fffff880`04fa47d2 ??              ???

SYMBOL_STACK_INDEX:  13

SYMBOL_NAME:  Rt64win7+147d2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Rt64win7

IMAGE_NAME:  Rt64win7.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c21cf95

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+147d2

BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+147d2

Followup: MachineOwner
---------

2: kd> lmvm Rt64win7
start             end                 module name
fffff880`04f90000 fffff880`04fe6000   Rt64win7 T (no symbols)           
    Loaded symbol image file: Rt64win7.sys
    Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
    Image name: Rt64win7.sys
    Timestamp:        Wed Jun 23 05:10:45 2010 (4C21CF95)
    CheckSum:         00063352
    ImageSize:        00056000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110810-20950-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c56000 PsLoadedModuleList = 0xfffff800`02e93e50
Debug session time: Mon Nov  8 11:23:30.302 2010 (UTC - 4:00)
System Uptime: 0 days 6:37:10.333
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002dfa0cd, fffff88008e61980, 0}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+241 )

Followup: Pool_corruption
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002dfa0cd, Address of the instruction which caused the bugcheck
Arg3: fffff88008e61980, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!ExDeferredFreePool+241
fffff800`02dfa0cd 4c3910          cmp     qword ptr [rax],r10

CONTEXT:  fffff88008e61980 -- (.cxr 0xfffff88008e61980)
rax=fffbfa80080476d0 rbx=0000000000000000 rcx=fffff80002e55b20
rdx=fffffa8008047780 rsi=0000000000000000 rdi=fffffa8008b6d670
rip=fffff80002dfa0cd rsp=fffff88008e62350 rbp=0000000000000000
 r8=fffffa8007cbb010  r9=fffffa8008047800 r10=fffffa8008047810
r11=0000000000000001 r12=fffff80002e55880 r13=0000000000000000
r14=0000000000000017 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ExDeferredFreePool+0x241:
fffff800`02dfa0cd 4c3910          cmp     qword ptr [rax],r10 ds:002b:fffbfa80`080476d0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  winamp.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002dfa0cd

STACK_TEXT:  
fffff880`08e62350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x241


FOLLOWUP_IP: 
nt!ExDeferredFreePool+241
fffff800`02dfa0cd 4c3910          cmp     qword ptr [rax],r10

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExDeferredFreePool+241

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff88008e61980 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+241

BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+241

Followup: Pool_corruption
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110510-18236-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
Debug session time: Thu Nov  4 20:28:21.129 2010 (UTC - 4:00)
System Uptime: 0 days 3:56:05.159
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002cac07e, fffff88002922f20, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiRundownMutants+7e )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cac07e, Address of the instruction which caused the bugcheck
Arg3: fffff88002922f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!KiRundownMutants+7e
fffff800`02cac07e 807b3100        cmp     byte ptr [rbx+31h],0

CONTEXT:  fffff88002922f20 -- (.cxr 0xfffff88002922f20)
rax=0000000000000000 rbx=fffbfa8006817800 rcx=fffffa8006817510
rdx=fffffa8006817510 rsi=fffbfa8006817818 rdi=fffffa8006817510
rip=fffff80002cac07e rsp=fffff880029238f0 rbp=fffffa8006817818
 r8=0000000000000000  r9=0000000000000000 r10=fffff80002c5b000
r11=fffffa8006817510 r12=fffff880030f9180 r13=0000000000000000
r14=0000000000000000 r15=0000000000000002
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
nt!KiRundownMutants+0x7e:
fffff800`02cac07e 807b3100        cmp     byte ptr [rbx+31h],0 ds:002b:fffbfa80`06817831=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  SC2.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002cac07e

STACK_TEXT:  
fffff880`029238f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRundownMutants+0x7e


FOLLOWUP_IP: 
nt!KiRundownMutants+7e
fffff800`02cac07e 807b3100        cmp     byte ptr [rbx+31h],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiRundownMutants+7e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88002922f20 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiRundownMutants+7e

BUCKET_ID:  X64_0x3B_nt!KiRundownMutants+7e

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110710-18283-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
Debug session time: Sat Nov  6 18:00:50.669 2010 (UTC - 4:00)
System Uptime: 0 days 10:35:35.700
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002cfe510, fffff8800811aff0, 0}

Probably caused by : memory_corruption ( nt!MiLocateAddress+40 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cfe510, Address of the instruction which caused the bugcheck
Arg3: fffff8800811aff0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MiLocateAddress+40
fffff800`02cfe510 483b4818        cmp     rcx,qword ptr [rax+18h]

CONTEXT:  fffff8800811aff0 -- (.cxr 0xfffff8800811aff0)
rax=fffbfa800734d640 rbx=0000000000000001 rcx=000000007fefccbe
rdx=fffffa8007751060 rsi=0000000000000000 rdi=fffffa8007982b60
rip=fffff80002cfe510 rsp=fffff8800811b9c8 rbp=fffff8800811bca0
 r8=86800001925fa867  r9=fffff80002e09e00 r10=fffff683ff7e65f0
r11=0000000000000000 r12=000000007fefccbe r13=fffffa80066a1260
r14=000007fefccbe000 r15=0000000000000001
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!MiLocateAddress+0x40:
fffff800`02cfe510 483b4818        cmp     rcx,qword ptr [rax+18h] ds:002b:fffbfa80`0734d658=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002cfe510

STACK_TEXT:  
fffff880`0811b9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiLocateAddress+0x40


FOLLOWUP_IP: 
nt!MiLocateAddress+40
fffff800`02cfe510 483b4818        cmp     rcx,qword ptr [rax+18h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiLocateAddress+40

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff8800811aff0 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x3B_nt!MiLocateAddress+40

BUCKET_ID:  X64_0x3B_nt!MiLocateAddress+40

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110810-18470-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
Debug session time: Mon Nov  8 12:18:11.405 2010 (UTC - 4:00)
System Uptime: 0 days 0:26:12.436
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff8800a7dabc0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+147d2 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800a7dabc0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
+6530333162336438
fffff880`0a7dabc0 d8ba7d0a80f8    fdivr   dword ptr [rdx-77FF583h]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f030e0
 0000000000000000 

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff8800a7dbad8 -- (.exr 0xfffff8800a7dbad8)
ExceptionAddress: fffff80002c8cd71 (nt!RtlGetNextEntryHashTable+0x000000000000001d)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff8800a7dbb80 -- (.trap 0xfffff8800a7dbb80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffbfa80065cf480 rbx=0000000000000000 rcx=00000000ac5c9947
rdx=fffff8800a7dbe88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c8cd71 rsp=fffff8800a7dbd18 rbp=0000000000000010
 r8=fffffa8006be7818  r9=0000000000000000 r10=fffff8800a7dbe88
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlGetNextEntryHashTable+0x1d:
fffff800`02c8cd71 48394810        cmp     qword ptr [rax+10h],rcx ds:9f26:fffbfa80`065cf490=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002d5dbdb to fffff80002ccb740

STACK_TEXT:  
fffff880`0a7dab08 fffff800`02d5dbdb : 00000000`0000001e ffffffff`c0000005 fffff880`0a7dabc0 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a7dab10 fffff800`02d1cd30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KipFatalFilter+0x1b
fffff880`0a7dab50 fffff800`02cf9d1c : 00000000`00000003 00000000`00000001 00000000`00000003 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`0a7dab90 fffff800`02cf140d : fffff800`02e17bc4 fffff880`0a7dc2c0 00000000`00000000 fffff800`02c5b000 : nt!_C_specific_handler+0x8c
fffff880`0a7dac00 fffff800`02cf8a90 : fffff800`02e17bc4 fffff880`0a7dac78 fffff880`0a7dbad8 fffff800`02c5b000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0a7dac30 fffff800`02d059ef : fffff880`0a7dbad8 fffff880`0a7db340 fffff880`00000000 fffffa80`064f0c80 : nt!RtlDispatchException+0x410
fffff880`0a7db310 fffff800`02ccad82 : fffff880`0a7dbad8 fffffa80`06be77f0 fffff880`0a7dbb80 fffffa80`06be77f0 : nt!KiDispatchException+0x16f
fffff880`0a7db9a0 fffff800`02cc968a : fffffa80`065def00 00000000`00000000 fffffa80`0647ab01 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0a7dbb80 fffff800`02c8cd71 : fffff880`0184547f 00000000`00000002 fffff880`066e9f26 fffffa80`064f0c80 : nt!KiGeneralProtectionFault+0x10a
fffff880`0a7dbd18 fffff880`0184547f : 00000000`00000002 fffff880`066e9f26 fffffa80`064f0c80 00000000`00000000 : nt!RtlGetNextEntryHashTable+0x1d
fffff880`0a7dbd20 fffff880`0185ecde : fffffa80`065d0000 00000000`00000000 00000000`2000000c fffff880`01968800 : tcpip!IppFindNextHopAtDpc+0x44f
fffff880`0a7dbf90 fffff880`0185d592 : fffffa80`06fbce30 00000000`00000000 fffffa80`06f98301 00000000`00000001 : tcpip!IpFlcReceivePackets+0x80e
fffff880`0a7dc190 fffff880`01876e5a : fffffa80`06f983f0 fffff880`0a7dc2c0 fffffa80`06f983f0 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0a7dc270 fffff800`02cdae5a : fffffa80`06dc8ae0 fffff880`0a7d7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0a7dc2c0 fffff880`01876882 : fffff880`01876d80 fffff880`0a7dc3d0 fffffa80`06e1fb02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0a7dc3a0 fffff880`016d00eb : fffffa80`06fdb8d0 00000000`00000000 fffffa80`06a171a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0a7dc410 fffff880`01699fc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0a7dc480 fffff880`01613ef1 : fffffa80`06a171a0 00000000`00000002 00000000`00000001 00000000`00000200 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0a7dc900 fffff880`048147d2 : fffffa80`06d5e000 00000000`00000000 fffffa80`06d5e5f0 fffff880`065585c0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`0a7dc950 fffffa80`06d5e000 : 00000000`00000000 fffffa80`06d5e5f0 fffff880`065585c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`0a7dc958 00000000`00000000 : fffffa80`06d5e5f0 fffff880`065585c0 fffffa80`00000001 fffffa80`05ef6030 : 0xfffffa80`06d5e000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Rt64win7+147d2
fffff880`048147d2 ??              ???

SYMBOL_STACK_INDEX:  13

SYMBOL_NAME:  Rt64win7+147d2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Rt64win7

IMAGE_NAME:  Rt64win7.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c21cf95

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+147d2

BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+147d2

Followup: MachineOwner
---------

0: kd> lmvm Rt64win7
start             end                 module name
fffff880`04800000 fffff880`04856000   Rt64win7 T (no symbols)           
    Loaded symbol image file: Rt64win7.sys
    Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
    Image name: Rt64win7.sys
    Timestamp:        Wed Jun 23 05:10:45 2010 (4C21CF95)
    CheckSum:         00063352
    ImageSize:        00056000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
0: kd> lmtn
start             end                 module name
fffff880`04452000 fffff880`04490000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`07a71000 fffff880`07a89000   adfs     adfs.SYS     Thu Jun 26 16:52:37 2008 (48640195)
fffff880`02d07000 fffff880`02d91000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`044f5000 fffff880`0450b000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00e1d000 fffff880`00e28000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04490000 fffff880`04498000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`0415f000 fffff880`04166000   AsIO     AsIO.sys     Mon Dec 17 04:11:49 2007 (47663D55)
fffff880`08b85000 fffff880`08b90000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00fbb000 fffff880`00fc4000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fc4000 fffff880`00fee000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0576e000 fffff880`0578e000   AtihdW76 AtihdW76.sys Thu Jul 15 08:46:49 2010 (4C3F0339)
fffff880`0486e000 fffff880`04fdc000   atikmdag atikmdag.sys Tue Aug 03 21:39:08 2010 (4C58C4BC)
fffff880`041a2000 fffff880`041e9000   atikmpag atikmpag.sys Tue Aug 03 21:15:45 2010 (4C58BF41)
fffff960`00950000 fffff960`009b1000   ATMFD    ATMFD.DLL    unavailable (00000000)
fffff880`04498000 fffff880`044dc000   awo9rs9u awo9rs9u.SYS Sat Mar 21 10:48:32 2009 (49C4FE40)
fffff880`02c5b000 fffff880`02c62000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0414e000 fffff880`0415f000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07b94000 fffff880`07bb2000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00730000 fffff960`00757000   cdd      cdd.dll      unavailable (00000000)
fffff880`02c28000 fffff880`02c52000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cc6000 fffff880`00d86000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c68000 fffff880`00cc6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0154f000 fffff880`015c2000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`044e5000 fffff880`044f5000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`06fc7000 fffff880`06fd5000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`040ad000 fffff880`04130000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`04130000 fffff880`0414e000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0409e000 fffff880`040ad000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`014c0000 fffff880`014d6000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`057cb000 fffff880`057ed000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06fe1000 fffff880`06fea000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06fd5000 fffff880`06fe1000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06fea000 fffff880`06ffd000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06e00000 fffff880`06e0c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`042bc000 fffff880`043b0000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`043b0000 fffff880`043f6000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00dd2000 fffff880`00de6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00d86000 fffff880`00dd2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`015d3000 fffff880`015dd000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01486000 fffff880`014c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0178f000 fffff880`017d9000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02c12000 fffff800`02c5b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04200000 fffff880`04224000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0561d000 fffff880`05636000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05636000 fffff880`0563e080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06e0c000 fffff880`06e1a000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`07acc000 fffff880`07b94000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`017f1000 fffff880`017fa000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0418c000 fffff880`041a2000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e00000 fffff880`00e1d000   jraid    jraid.sys    Wed May 27 01:39:35 2009 (4A1CD217)
fffff880`045cb000 fffff880`045da000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05652000 fffff880`05660000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9b000 fffff800`00ba5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04400000 fffff880`04443000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01535000 fffff880`0154f000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01764000 fffff880`0178f000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`057ed000 fffff880`057f2200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0563f000 fffff880`05652000   LHidFilt LHidFilt.Sys Wed Jun 17 12:49:39 2009 (4A391EA3)
fffff880`04298000 fffff880`042ad000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0567d000 fffff880`05691000   LMouFilt LMouFilt.Sys Wed Jun 17 12:49:43 2009 (4A391EA7)
fffff880`056ba000 fffff880`056dd000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`05660000 fffff880`05670000   LUsbFilt LUsbFilt.Sys Wed Jun 17 12:49:46 2009 (4A391EAA)
fffff880`00c10000 fffff880`00c54000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`056ac000 fffff880`056ba000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`045da000 fffff880`045e9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05670000 fffff880`0567d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fa1000 fffff880`00fbb000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`07bb2000 fffff880`07bca000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07bca000 fffff880`07bf7000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`07a00000 fffff880`07a4e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`07a4e000 fffff880`07a71000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02cc0000 fffff880`02ccb000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01057000 fffff880`01061000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`014d7000 fffff880`01535000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`04093000 fffff880`0409e000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01600000 fffff880`01612000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01612000 fffff880`01704000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0452f000 fffff880`0453b000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0453b000 fffff880`0456a000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05759000 fffff880`0576e000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02ddf000 fffff880`02dee000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d91000 fffff880`02dd6000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01704000 fffff880`01764000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02ccb000 fffff880`02cdc000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04087000 fffff880`04093000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c5b000 fffff800`03237000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01233000 fffff880`013d6000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02c52000 fffff880`02c5b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02c00000 fffff880`02c26000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`011dc000 fffff880`011f1000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00eed000 fffff880`00f20000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011f1000 fffff880`011f8000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f91000 fffff880`00fa1000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`015c2000 fffff880`015d3000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`088c2000 fffff880`08968000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0578e000 fffff880`057cb000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c54000 fffff880`00c68000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`00e28000 fffff880`00e33e00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`0450b000 fffff880`0452f000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0456a000 fffff880`04585000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04585000 fffff880`045a6000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`045a6000 fffff880`045c0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`04036000 fffff880`04087000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`045c0000 fffff880`045cb000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02ca5000 fffff880`02cae000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02cae000 fffff880`02cb7000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02cb7000 fffff880`02cc0000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0144c000 fffff880`01486000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04856000 fffff880`0486e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04800000 fffff880`04856000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`06e1a000 fffff880`06fc6900   RTKVHD64 RTKVHD64.sys Fri May 22 14:04:20 2009 (4A16E924)
fffff880`011ad000 fffff880`011dc000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`08968000 fffff880`08973000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`017e9000 fffff880`017f1000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01070000 fffff880`011a4000   sptd     sptd.sys     Sun Mar 22 08:35:35 2009 (49C63097)
fffff880`08a7e000 fffff880`08b14000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`08800000 fffff880`08867000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`08973000 fffff880`089a0000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`045e9000 fffff880`045ea480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`089a0000 fffff880`089b2000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02cfa000 fffff880`02d07000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02cdc000 fffff880`02cfa000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`04022000 fffff880`04036000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00550000 fffff960`0055a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`04166000 fffff880`0418c000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`045eb000 fffff880`045fd000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05600000 fffff880`0561d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`06ffd000 fffff880`06ffef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04287000 fffff880`04298000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`056ff000 fffff880`05759000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04231000 fffff880`04287000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05691000 fffff880`056ac000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`04224000 fffff880`04231000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`01061000 fffff880`0106e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02c62000 fffff880`02c70000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02c70000 fffff880`02c95000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d9000 fffff880`017e9000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f20000 fffff880`00f35000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f35000 fffff880`00f91000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01400000 fffff880`0144c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`04007000 fffff880`04022000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02c95000 fffff880`02ca5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e3a000 fffff880`00ede000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ede000 fffff880`00eed000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02dd6000 fffff880`02ddf000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003ef000   win32k   win32k.sys   unavailable (00000000)
fffff880`044dc000 fffff880`044e5000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`011a4000 fffff880`011ad000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`056dd000 fffff880`056fe000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`08b14000 fffff880`08b85000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`015dd000 fffff880`015eb000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`015eb000 fffff880`015f7000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`015f7000 fffff880`01600000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`013d6000 fffff880`013e9000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
09 Nov 2010   #3
klayman

Windows 7
 
 

Thank you for your time. I managed to update jMicron, Logitech SetPoint, Raeltek Audio and I couldn't find ASUS I/O update so I uninstalled ASUS utilities.
I also uninstalled Daemon.

No more bluescreens yesterday but I will see if it helped a little bit later. I will post back if more bluescreens happen.
Thanks
My System SpecsSystem Spec
.

09 Nov 2010   #4
richc46

Microsoft Community Contributor Award Recipient

Windows 10, Home Clean Install
 
 

Since you did not use the sptd unistall tool (post does not say that you did)
In an cmd prompt, type driverquery, make sure sptd does not show.
My System SpecsSystem Spec
09 Nov 2010   #5
cybercore

Windows 7 x64
 
 

Also, you can use Duplex Secure installer/uninstaller found here:

DuplexSecure - FAQ
My System SpecsSystem Spec
09 Nov 2010   #6
klayman

Windows 7
 
 

I did use Duplex Secure (read about it in some other post). I also checked driverquery and sptd is not there so it should be ok.
My System SpecsSystem Spec
09 Nov 2010   #7
richc46

Microsoft Community Contributor Award Recipient

Windows 10, Home Clean Install
 
 

Your ok, then. I just wanted to be sure, because the uninstaller was not mentioned.
My System SpecsSystem Spec
09 Nov 2010   #8
klayman

Windows 7
 
 

Hmm .. so it just bluescreened again. Here are all the files once more.
Thanks for help
My System SpecsSystem Spec
09 Nov 2010   #9
richc46

Microsoft Community Contributor Award Recipient

Windows 10, Home Clean Install
 
 

Memory corruption

Download memtest86 and test RAM
www.sevenforums.com/tutorials/105647-ram-test-memtest86.html
My System SpecsSystem Spec
10 Nov 2010   #10
klayman

Windows 7
 
 

I ran the memtest last night and it found some errors. I know I should now test each stick separately and after that each slot but I can't open pc because of assurance so this is as far as I can go. I have to take it to the shop.
So thank you for your help. If there is anything else I should know, let me know :).
My System SpecsSystem Spec
Reply

 BSODs - finding a reason (+minidumps)




Thread Tools




Similar help and support threads
Thread Forum
BSODs (No Minidumps, Driver Verifier freezes OS on boot)
So I've been getting BSODs lately. I would get the occasional one, but lately I've been able to have them happen without fail when trying to both host and play on a Minecraft server. I did 2 passes with Windows' 'Diagnose your computer's memory problems' tool and it found no error, so I assume...
BSOD Help and Support
Random BSODs, New Computer Build, minidumps included
This is my first computer build, completed in September. Desktop has been used infrequently but will need to be used daily here soon. This computer is primarily going to be used for flash animation and video editing. There has been no pattern when receiving a BSOD. From what I can recall,...
BSOD Help and Support
NEW PC HARDWARE BSODS - minidumps in
Hi you all!! Well, I've had a lot of bsods. I've test hdd, ram, change cpu but they still here... So I need your help;) Bsods always happen after few minutes - three, four - system is logged. And, after first bsod, such restart means another bsod...:mad: So, I turn pc off and go to sleep. In...
BSOD Help and Support
Help me with Win 7 64-bit endless BSODs - minidumps
So many! Can't take it anymore! I installed win 7 64 bit few weeks ago and I had allot of Random BSOD since! 50 Minidumps included: Salvege me from the situation! Thank you so much.
BSOD Help and Support
Memory Management BSODs + Minidumps
Hi, For the past month I've been having an absolute nightmare in regards to Bluescreens on a new build. Originally I thought that a faulty stick of ram (Failed Memtest) was the problem but even after replacing the stick I'm still plagued with BSODs whenever the computer attempts anything to...
BSOD Help and Support
I'm back, more new, sudden BSODs three minidumps
Hello you 7 gurus. I'm back with some new minidump files. Any help you ppl can give me would be greatly appreciated. BTW, no commonality to give you on these other than the computer was at rest(not in use). It was not sleeping or in hibernation, just resting. Wish I could give you more help. I...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 11:15.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App