BSODs - finding a reason (+minidumps)

Page 1 of 2 12 LastLast

  1. Posts : 6
    Windows 7
       #1

    BSODs - finding a reason (+minidumps)


    Hello,
    I keep having BSODs for quite a long time. Basicly since I have this computer (5 months). Usually it happens during rendering, playing a game or if computer is running for a long time.
    I tried to find out the reason for myself, but I don't understand it too much and usually it says a different reason/error when crashing. So I'm guessing it's a hardware problem and I'm suspecting RAM but I don't really know.
    Thank you for help.

    - Windows 7 Professional x64
    - installed from cd
    - retail version
    - OS reinstalled in the beginning of September (BSODs happened before as well)

    - CPU - Intel® Core™ i7-930 (8MB cache,2.80 GHz, 4.80 GT/s) LGA 1366
    - GPU - ATI Radeon HD 5850 1GB Vapor-X DDR5, HDMI, DP, DVI, OC, PCI-Express
    - HDD - WD CAVIAR Green 15EARS 1.5TB HDD, SATA/300, IntelliPower, 64MB cache, AFT
    - RAM - Kingston HyperX 3x2GB 1600MHz DDR3 Non-ECC CL9 Intel XMP
    - MB - ASUS P6T, X58, ICH10R, 1366, Triple DDR3 1333, SATA2, RAID, IEEE, GLAN, ATX
    - PWR - Fortron BlueStorm II 500W ATX v2.2, 12cmFan, FSP500-GLN, 80PLUS

    (I have Daemon installed at the moment and I know it can cause BSODs, but I had it uninstalled for a while ago and nothing changed)
    I also attached minidumps to the .zip file.
    Thanks.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    Ok, let's see ...


    Edit:


    Your most recent crash was caused by Realtek 8136/8168/8169, others by memory and pool corruption, and others as a result of system service exception.


    Update:

    AsIO.sys Mon Dec 17 04:11:49 2007
    ASUS I/O driver - probably an ASUS utility

    jraid.sys Wed May 27 01:39:35 2009
    JMicron JMB36X RAID Driver

    LHidFilt.Sys Wed Jun 17 12:49:39 2009
    Logitech SetPoint

    RTKVHD64.sys Fri May 22 14:04:20 2009
    Realtek Audio

    adfs.SYS Thu Jun 26 16:52:37 2008
    Adobe



    Uninstall Daemon Tools:

    sptd.sys Sun Mar 22 08:35:35 2009



    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\110810-18267-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c54000 PsLoadedModuleList = 0xfffff800`02e91e50
    Debug session time: Mon Nov  8 11:50:49.606 2010 (UTC - 4:00)
    System Uptime: 0 days 0:25:44.636
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff88008e54b10, 0, 0}
    
    Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rt64win7.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
    Probably caused by : Rt64win7.sys ( Rt64win7+147d2 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff88008e54b10, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    +6566386232313737
    fffff880`08e54b10 285ae5          sub     byte ptr [rdx-1Bh],bl
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efc0e0
     0000000000000000 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff88008e55a28 -- (.exr 0xfffff88008e55a28)
    ExceptionAddress: fffff80002c85d71 (nt!RtlGetNextEntryHashTable+0x000000000000001d)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff88008e55ad0 -- (.trap 0xfffff88008e55ad0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffbfa80065cf4d0 rbx=0000000000000000 rcx=00000000ffd7dbcc
    rdx=fffff88008e55dd8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002c85d71 rsp=fffff88008e55c68 rbp=0000000000000010
     r8=fffffa8007787818  r9=0000000000000000 r10=fffff88008e55dd8
    r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!RtlGetNextEntryHashTable+0x1d:
    fffff800`02c85d71 48394810        cmp     qword ptr [rax+10h],rcx ds:8be6:fffbfa80`065cf4e0=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002d56bdb to fffff80002cc4740
    
    STACK_TEXT:  
    fffff880`08e54a58 fffff800`02d56bdb : 00000000`0000001e ffffffff`c0000005 fffff880`08e54b10 00000000`00000000 : nt!KeBugCheckEx
    fffff880`08e54a60 fffff800`02d15d30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KipFatalFilter+0x1b
    fffff880`08e54aa0 fffff800`02cf2d1c : 00000000`00000003 00000000`00000001 00000000`00000003 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x95d
    fffff880`08e54ae0 fffff800`02cea40d : fffff800`02e10bc4 fffff880`08e56210 00000000`00000000 fffff800`02c54000 : nt!_C_specific_handler+0x8c
    fffff880`08e54b50 fffff800`02cf1a90 : fffff800`02e10bc4 fffff880`08e54bc8 fffff880`08e55a28 fffff800`02c54000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`08e54b80 fffff800`02cfe9ef : fffff880`08e55a28 fffff880`08e55290 fffff880`00000000 fffffa80`064c8a00 : nt!RtlDispatchException+0x410
    fffff880`08e55260 fffff800`02cc3d82 : fffff880`08e55a28 fffffa80`077877f0 fffff880`08e55ad0 fffffa80`077877f0 : nt!KiDispatchException+0x16f
    fffff880`08e558f0 fffff800`02cc268a : fffffa80`065c6000 fffffa80`079c7180 fffffa80`065da000 fffffa80`06f525c0 : nt!KiExceptionDispatch+0xc2
    fffff880`08e55ad0 fffff800`02c85d71 : fffff880`0184447f 00000000`00000002 fffff880`06828be6 fffffa80`064c8a00 : nt!KiGeneralProtectionFault+0x10a
    fffff880`08e55c68 fffff880`0184447f : 00000000`00000002 fffff880`06828be6 fffffa80`064c8a00 00000000`00000000 : nt!RtlGetNextEntryHashTable+0x1d
    fffff880`08e55c70 fffff880`0185e392 : fffffa80`065da138 00000000`00000000 fffff880`01967800 fffff880`01967800 : tcpip!IppFindNextHopAtDpc+0x44f
    fffff880`08e55ee0 fffff880`0185c592 : fffffa80`06c964a0 00000000`00000000 fffffa80`06be5601 00ffffff`00000010 : tcpip!IpFlcReceivePackets+0xec2
    fffff880`08e560e0 fffff880`01875e5a : fffffa80`06be5600 fffff880`08e56210 fffffa80`06be5600 fffff880`08e50001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`08e561c0 fffff800`02cd3e5a : fffffa80`06e3c030 fffff880`08e51000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
    fffff880`08e56210 fffff880`01875882 : fffff880`01875d80 fffff880`08e56320 00ffffff`00ffff02 00ffffff`00ffffff : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`08e562f0 fffff880`0179d0eb : fffffa80`06f7c010 00000000`00000000 fffffa80`069b81a0 fffff880`08e564f0 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`08e56360 fffff880`01766fc6 : 00ffffff`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`08e563d0 fffff880`016e0ef1 : fffffa80`069b81a0 00000000`00000002 00000000`00000002 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`08e56850 fffff880`04fa47d2 : fffffa80`06c34000 00000000`00000000 fffffa80`06c34600 fffff880`065ab450 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff880`08e568a0 fffffa80`06c34000 : 00000000`00000000 fffffa80`06c34600 fffff880`065ab450 00000000`00000001 : Rt64win7+0x147d2
    fffff880`08e568a8 00000000`00000000 : fffffa80`06c34600 fffff880`065ab450 00000000`00000001 fffff800`02cca9a2 : 0xfffffa80`06c34000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Rt64win7+147d2
    fffff880`04fa47d2 ??              ???
    
    SYMBOL_STACK_INDEX:  13
    
    SYMBOL_NAME:  Rt64win7+147d2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Rt64win7
    
    IMAGE_NAME:  Rt64win7.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c21cf95
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+147d2
    
    BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+147d2
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmvm Rt64win7
    start             end                 module name
    fffff880`04f90000 fffff880`04fe6000   Rt64win7 T (no symbols)           
        Loaded symbol image file: Rt64win7.sys
        Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
        Image name: Rt64win7.sys
        Timestamp:        Wed Jun 23 05:10:45 2010 (4C21CF95)
        CheckSum:         00063352
        ImageSize:        00056000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\110810-20950-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c56000 PsLoadedModuleList = 0xfffff800`02e93e50
    Debug session time: Mon Nov  8 11:23:30.302 2010 (UTC - 4:00)
    System Uptime: 0 days 6:37:10.333
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff80002dfa0cd, fffff88008e61980, 0}
    
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+241 )
    
    Followup: Pool_corruption
    ---------
    
    6: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002dfa0cd, Address of the instruction which caused the bugcheck
    Arg3: fffff88008e61980, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!ExDeferredFreePool+241
    fffff800`02dfa0cd 4c3910          cmp     qword ptr [rax],r10
    
    CONTEXT:  fffff88008e61980 -- (.cxr 0xfffff88008e61980)
    rax=fffbfa80080476d0 rbx=0000000000000000 rcx=fffff80002e55b20
    rdx=fffffa8008047780 rsi=0000000000000000 rdi=fffffa8008b6d670
    rip=fffff80002dfa0cd rsp=fffff88008e62350 rbp=0000000000000000
     r8=fffffa8007cbb010  r9=fffffa8008047800 r10=fffffa8008047810
    r11=0000000000000001 r12=fffff80002e55880 r13=0000000000000000
    r14=0000000000000017 r15=0000000000000001
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    nt!ExDeferredFreePool+0x241:
    fffff800`02dfa0cd 4c3910          cmp     qword ptr [rax],r10 ds:002b:fffbfa80`080476d0=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  winamp.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002dfa0cd
    
    STACK_TEXT:  
    fffff880`08e62350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x241
    
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+241
    fffff800`02dfa0cd 4c3910          cmp     qword ptr [rax],r10
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+241
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    STACK_COMMAND:  .cxr 0xfffff88008e61980 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+241
    
    BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+241
    
    Followup: Pool_corruption
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\110510-18236-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
    Debug session time: Thu Nov  4 20:28:21.129 2010 (UTC - 4:00)
    System Uptime: 0 days 3:56:05.159
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff80002cac07e, fffff88002922f20, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiRundownMutants+7e )
    
    Followup: MachineOwner
    ---------
    
    6: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002cac07e, Address of the instruction which caused the bugcheck
    Arg3: fffff88002922f20, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!KiRundownMutants+7e
    fffff800`02cac07e 807b3100        cmp     byte ptr [rbx+31h],0
    
    CONTEXT:  fffff88002922f20 -- (.cxr 0xfffff88002922f20)
    rax=0000000000000000 rbx=fffbfa8006817800 rcx=fffffa8006817510
    rdx=fffffa8006817510 rsi=fffbfa8006817818 rdi=fffffa8006817510
    rip=fffff80002cac07e rsp=fffff880029238f0 rbp=fffffa8006817818
     r8=0000000000000000  r9=0000000000000000 r10=fffff80002c5b000
    r11=fffffa8006817510 r12=fffff880030f9180 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000002
    iopl=0         nv up ei ng nz na po cy
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
    nt!KiRundownMutants+0x7e:
    fffff800`02cac07e 807b3100        cmp     byte ptr [rbx+31h],0 ds:002b:fffbfa80`06817831=??
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  SC2.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002cac07e
    
    STACK_TEXT:  
    fffff880`029238f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRundownMutants+0x7e
    
    
    FOLLOWUP_IP: 
    nt!KiRundownMutants+7e
    fffff800`02cac07e 807b3100        cmp     byte ptr [rbx+31h],0
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiRundownMutants+7e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    STACK_COMMAND:  .cxr 0xfffff88002922f20 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!KiRundownMutants+7e
    
    BUCKET_ID:  X64_0x3B_nt!KiRundownMutants+7e
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\110710-18283-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
    Debug session time: Sat Nov  6 18:00:50.669 2010 (UTC - 4:00)
    System Uptime: 0 days 10:35:35.700
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff80002cfe510, fffff8800811aff0, 0}
    
    Probably caused by : memory_corruption ( nt!MiLocateAddress+40 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002cfe510, Address of the instruction which caused the bugcheck
    Arg3: fffff8800811aff0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!MiLocateAddress+40
    fffff800`02cfe510 483b4818        cmp     rcx,qword ptr [rax+18h]
    
    CONTEXT:  fffff8800811aff0 -- (.cxr 0xfffff8800811aff0)
    rax=fffbfa800734d640 rbx=0000000000000001 rcx=000000007fefccbe
    rdx=fffffa8007751060 rsi=0000000000000000 rdi=fffffa8007982b60
    rip=fffff80002cfe510 rsp=fffff8800811b9c8 rbp=fffff8800811bca0
     r8=86800001925fa867  r9=fffff80002e09e00 r10=fffff683ff7e65f0
    r11=0000000000000000 r12=000000007fefccbe r13=fffffa80066a1260
    r14=000007fefccbe000 r15=0000000000000001
    iopl=0         nv up ei ng nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
    nt!MiLocateAddress+0x40:
    fffff800`02cfe510 483b4818        cmp     rcx,qword ptr [rax+18h] ds:002b:fffbfa80`0734d658=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002cfe510
    
    STACK_TEXT:  
    fffff880`0811b9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiLocateAddress+0x40
    
    
    FOLLOWUP_IP: 
    nt!MiLocateAddress+40
    fffff800`02cfe510 483b4818        cmp     rcx,qword ptr [rax+18h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!MiLocateAddress+40
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    STACK_COMMAND:  .cxr 0xfffff8800811aff0 ; kb
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!MiLocateAddress+40
    
    BUCKET_ID:  X64_0x3B_nt!MiLocateAddress+40
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\110810-18470-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
    Debug session time: Mon Nov  8 12:18:11.405 2010 (UTC - 4:00)
    System Uptime: 0 days 0:26:12.436
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff8800a7dabc0, 0, 0}
    
    Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rt64win7.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
    Probably caused by : Rt64win7.sys ( Rt64win7+147d2 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff8800a7dabc0, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    +6530333162336438
    fffff880`0a7dabc0 d8ba7d0a80f8    fdivr   dword ptr [rdx-77FF583h]
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f030e0
     0000000000000000 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff8800a7dbad8 -- (.exr 0xfffff8800a7dbad8)
    ExceptionAddress: fffff80002c8cd71 (nt!RtlGetNextEntryHashTable+0x000000000000001d)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff8800a7dbb80 -- (.trap 0xfffff8800a7dbb80)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffbfa80065cf480 rbx=0000000000000000 rcx=00000000ac5c9947
    rdx=fffff8800a7dbe88 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002c8cd71 rsp=fffff8800a7dbd18 rbp=0000000000000010
     r8=fffffa8006be7818  r9=0000000000000000 r10=fffff8800a7dbe88
    r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!RtlGetNextEntryHashTable+0x1d:
    fffff800`02c8cd71 48394810        cmp     qword ptr [rax+10h],rcx ds:9f26:fffbfa80`065cf490=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002d5dbdb to fffff80002ccb740
    
    STACK_TEXT:  
    fffff880`0a7dab08 fffff800`02d5dbdb : 00000000`0000001e ffffffff`c0000005 fffff880`0a7dabc0 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0a7dab10 fffff800`02d1cd30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KipFatalFilter+0x1b
    fffff880`0a7dab50 fffff800`02cf9d1c : 00000000`00000003 00000000`00000001 00000000`00000003 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x95d
    fffff880`0a7dab90 fffff800`02cf140d : fffff800`02e17bc4 fffff880`0a7dc2c0 00000000`00000000 fffff800`02c5b000 : nt!_C_specific_handler+0x8c
    fffff880`0a7dac00 fffff800`02cf8a90 : fffff800`02e17bc4 fffff880`0a7dac78 fffff880`0a7dbad8 fffff800`02c5b000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`0a7dac30 fffff800`02d059ef : fffff880`0a7dbad8 fffff880`0a7db340 fffff880`00000000 fffffa80`064f0c80 : nt!RtlDispatchException+0x410
    fffff880`0a7db310 fffff800`02ccad82 : fffff880`0a7dbad8 fffffa80`06be77f0 fffff880`0a7dbb80 fffffa80`06be77f0 : nt!KiDispatchException+0x16f
    fffff880`0a7db9a0 fffff800`02cc968a : fffffa80`065def00 00000000`00000000 fffffa80`0647ab01 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`0a7dbb80 fffff800`02c8cd71 : fffff880`0184547f 00000000`00000002 fffff880`066e9f26 fffffa80`064f0c80 : nt!KiGeneralProtectionFault+0x10a
    fffff880`0a7dbd18 fffff880`0184547f : 00000000`00000002 fffff880`066e9f26 fffffa80`064f0c80 00000000`00000000 : nt!RtlGetNextEntryHashTable+0x1d
    fffff880`0a7dbd20 fffff880`0185ecde : fffffa80`065d0000 00000000`00000000 00000000`2000000c fffff880`01968800 : tcpip!IppFindNextHopAtDpc+0x44f
    fffff880`0a7dbf90 fffff880`0185d592 : fffffa80`06fbce30 00000000`00000000 fffffa80`06f98301 00000000`00000001 : tcpip!IpFlcReceivePackets+0x80e
    fffff880`0a7dc190 fffff880`01876e5a : fffffa80`06f983f0 fffff880`0a7dc2c0 fffffa80`06f983f0 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`0a7dc270 fffff800`02cdae5a : fffffa80`06dc8ae0 fffff880`0a7d7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
    fffff880`0a7dc2c0 fffff880`01876882 : fffff880`01876d80 fffff880`0a7dc3d0 fffffa80`06e1fb02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`0a7dc3a0 fffff880`016d00eb : fffffa80`06fdb8d0 00000000`00000000 fffffa80`06a171a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`0a7dc410 fffff880`01699fc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`0a7dc480 fffff880`01613ef1 : fffffa80`06a171a0 00000000`00000002 00000000`00000001 00000000`00000200 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`0a7dc900 fffff880`048147d2 : fffffa80`06d5e000 00000000`00000000 fffffa80`06d5e5f0 fffff880`065585c0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff880`0a7dc950 fffffa80`06d5e000 : 00000000`00000000 fffffa80`06d5e5f0 fffff880`065585c0 fffffa80`00000001 : Rt64win7+0x147d2
    fffff880`0a7dc958 00000000`00000000 : fffffa80`06d5e5f0 fffff880`065585c0 fffffa80`00000001 fffffa80`05ef6030 : 0xfffffa80`06d5e000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Rt64win7+147d2
    fffff880`048147d2 ??              ???
    
    SYMBOL_STACK_INDEX:  13
    
    SYMBOL_NAME:  Rt64win7+147d2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Rt64win7
    
    IMAGE_NAME:  Rt64win7.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c21cf95
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+147d2
    
    BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+147d2
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmvm Rt64win7
    start             end                 module name
    fffff880`04800000 fffff880`04856000   Rt64win7 T (no symbols)           
        Loaded symbol image file: Rt64win7.sys
        Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
        Image name: Rt64win7.sys
        Timestamp:        Wed Jun 23 05:10:45 2010 (4C21CF95)
        CheckSum:         00063352
        ImageSize:        00056000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    0: kd> lmtn
    start             end                 module name
    fffff880`04452000 fffff880`04490000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`07a71000 fffff880`07a89000   adfs     adfs.SYS     Thu Jun 26 16:52:37 2008 (48640195)
    fffff880`02d07000 fffff880`02d91000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`044f5000 fffff880`0450b000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00e1d000 fffff880`00e28000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`04490000 fffff880`04498000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
    fffff880`0415f000 fffff880`04166000   AsIO     AsIO.sys     Mon Dec 17 04:11:49 2007 (47663D55)
    fffff880`08b85000 fffff880`08b90000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00fbb000 fffff880`00fc4000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fc4000 fffff880`00fee000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`0576e000 fffff880`0578e000   AtihdW76 AtihdW76.sys Thu Jul 15 08:46:49 2010 (4C3F0339)
    fffff880`0486e000 fffff880`04fdc000   atikmdag atikmdag.sys Tue Aug 03 21:39:08 2010 (4C58C4BC)
    fffff880`041a2000 fffff880`041e9000   atikmpag atikmpag.sys Tue Aug 03 21:15:45 2010 (4C58BF41)
    fffff960`00950000 fffff960`009b1000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`04498000 fffff880`044dc000   awo9rs9u awo9rs9u.SYS Sat Mar 21 10:48:32 2009 (49C4FE40)
    fffff880`02c5b000 fffff880`02c62000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`0414e000 fffff880`0415f000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`07b94000 fffff880`07bb2000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00730000 fffff960`00757000   cdd      cdd.dll      unavailable (00000000)
    fffff880`02c28000 fffff880`02c52000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cc6000 fffff880`00d86000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c68000 fffff880`00cc6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0154f000 fffff880`015c2000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`044e5000 fffff880`044f5000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`06fc7000 fffff880`06fd5000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`040ad000 fffff880`04130000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`04130000 fffff880`0414e000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`0409e000 fffff880`040ad000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`014c0000 fffff880`014d6000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`057cb000 fffff880`057ed000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06fe1000 fffff880`06fea000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`06fd5000 fffff880`06fe1000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`06fea000 fffff880`06ffd000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`06e00000 fffff880`06e0c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`042bc000 fffff880`043b0000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`043b0000 fffff880`043f6000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`00dd2000 fffff880`00de6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`00d86000 fffff880`00dd2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`015d3000 fffff880`015dd000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01486000 fffff880`014c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0178f000 fffff880`017d9000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02c12000 fffff800`02c5b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04200000 fffff880`04224000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`0561d000 fffff880`05636000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05636000 fffff880`0563e080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`06e0c000 fffff880`06e1a000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`07acc000 fffff880`07b94000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`017f1000 fffff880`017fa000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`0418c000 fffff880`041a2000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00e00000 fffff880`00e1d000   jraid    jraid.sys    Wed May 27 01:39:35 2009 (4A1CD217)
    fffff880`045cb000 fffff880`045da000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05652000 fffff880`05660000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00b9b000 fffff800`00ba5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04400000 fffff880`04443000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01535000 fffff880`0154f000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01764000 fffff880`0178f000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`057ed000 fffff880`057f2200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0563f000 fffff880`05652000   LHidFilt LHidFilt.Sys Wed Jun 17 12:49:39 2009 (4A391EA3)
    fffff880`04298000 fffff880`042ad000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0567d000 fffff880`05691000   LMouFilt LMouFilt.Sys Wed Jun 17 12:49:43 2009 (4A391EA7)
    fffff880`056ba000 fffff880`056dd000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`05660000 fffff880`05670000   LUsbFilt LUsbFilt.Sys Wed Jun 17 12:49:46 2009 (4A391EAA)
    fffff880`00c10000 fffff880`00c54000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`056ac000 fffff880`056ba000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`045da000 fffff880`045e9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05670000 fffff880`0567d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fa1000 fffff880`00fbb000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`07bb2000 fffff880`07bca000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`07bca000 fffff880`07bf7000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`07a00000 fffff880`07a4e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`07a4e000 fffff880`07a71000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`02cc0000 fffff880`02ccb000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01057000 fffff880`01061000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`014d7000 fffff880`01535000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`04093000 fffff880`0409e000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01600000 fffff880`01612000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01612000 fffff880`01704000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0452f000 fffff880`0453b000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`0453b000 fffff880`0456a000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`05759000 fffff880`0576e000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02ddf000 fffff880`02dee000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d91000 fffff880`02dd6000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01704000 fffff880`01764000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`02ccb000 fffff880`02cdc000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`04087000 fffff880`04093000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c5b000 fffff800`03237000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01233000 fffff880`013d6000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`02c52000 fffff880`02c5b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02c00000 fffff880`02c26000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`011dc000 fffff880`011f1000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00eed000 fffff880`00f20000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`011f1000 fffff880`011f8000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00f91000 fffff880`00fa1000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`015c2000 fffff880`015d3000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`088c2000 fffff880`08968000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`0578e000 fffff880`057cb000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c54000 fffff880`00c68000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`00e28000 fffff880`00e33e00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
    fffff880`0450b000 fffff880`0452f000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0456a000 fffff880`04585000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04585000 fffff880`045a6000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`045a6000 fffff880`045c0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`04036000 fffff880`04087000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`045c0000 fffff880`045cb000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`02ca5000 fffff880`02cae000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02cae000 fffff880`02cb7000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02cb7000 fffff880`02cc0000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0144c000 fffff880`01486000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`04856000 fffff880`0486e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04800000 fffff880`04856000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`06e1a000 fffff880`06fc6900   RTKVHD64 RTKVHD64.sys Fri May 22 14:04:20 2009 (4A16E924)
    fffff880`011ad000 fffff880`011dc000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`08968000 fffff880`08973000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`017e9000 fffff880`017f1000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`01070000 fffff880`011a4000   sptd     sptd.sys     Sun Mar 22 08:35:35 2009 (49C63097)
    fffff880`08a7e000 fffff880`08b14000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`08800000 fffff880`08867000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`08973000 fffff880`089a0000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`045e9000 fffff880`045ea480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`089a0000 fffff880`089b2000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`02cfa000 fffff880`02d07000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`02cdc000 fffff880`02cfa000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`04022000 fffff880`04036000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00550000 fffff960`0055a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`04166000 fffff880`0418c000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`045eb000 fffff880`045fd000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05600000 fffff880`0561d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`06ffd000 fffff880`06ffef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04287000 fffff880`04298000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`056ff000 fffff880`05759000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`04231000 fffff880`04287000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05691000 fffff880`056ac000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`04224000 fffff880`04231000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`01061000 fffff880`0106e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`02c62000 fffff880`02c70000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`02c70000 fffff880`02c95000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`017d9000 fffff880`017e9000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00f20000 fffff880`00f35000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00f35000 fffff880`00f91000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01400000 fffff880`0144c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`04007000 fffff880`04022000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`02c95000 fffff880`02ca5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e3a000 fffff880`00ede000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ede000 fffff880`00eed000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02dd6000 fffff880`02ddf000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000e0000 fffff960`003ef000   win32k   win32k.sys   unavailable (00000000)
    fffff880`044dc000 fffff880`044e5000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`011a4000 fffff880`011ad000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`056dd000 fffff880`056fe000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`08b14000 fffff880`08b85000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`015dd000 fffff880`015eb000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`015eb000 fffff880`015f7000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`015f7000 fffff880`01600000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`013d6000 fffff880`013e9000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    Last edited by cybercore; 08 Nov 2010 at 13:28.
      My Computer


  3. Posts : 6
    Windows 7
    Thread Starter
       #3

    Thank you for your time. I managed to update jMicron, Logitech SetPoint, Raeltek Audio and I couldn't find ASUS I/O update so I uninstalled ASUS utilities.
    I also uninstalled Daemon.

    No more bluescreens yesterday but I will see if it helped a little bit later. I will post back if more bluescreens happen.
    Thanks
      My Computer


  4. Posts : 17,796
    Windows 10, Home Clean Install
       #4

    Since you did not use the sptd unistall tool (post does not say that you did)
    In an cmd prompt, type driverquery, make sure sptd does not show.
      My Computer


  5. Posts : 670
    Windows 7 x64
       #5

    Also, you can use Duplex Secure installer/uninstaller found here:

    DuplexSecure - FAQ
      My Computer


  6. Posts : 6
    Windows 7
    Thread Starter
       #6

    I did use Duplex Secure (read about it in some other post). I also checked driverquery and sptd is not there so it should be ok.
      My Computer


  7. Posts : 17,796
    Windows 10, Home Clean Install
       #7

    Your ok, then. I just wanted to be sure, because the uninstaller was not mentioned.
      My Computer


  8. Posts : 6
    Windows 7
    Thread Starter
       #8

    Hmm .. so it just bluescreened again. Here are all the files once more.
    Thanks for help
      My Computer


  9. Posts : 17,796
    Windows 10, Home Clean Install
       #9

    Memory corruption

    Download memtest86 and test RAM
    www.sevenforums.com/tutorials/105647-ram-test-memtest86.html
      My Computer


  10. Posts : 6
    Windows 7
    Thread Starter
       #10

    I ran the memtest last night and it found some errors. I know I should now test each stick separately and after that each slot but I can't open pc because of assurance so this is as far as I can go. I have to take it to the shop.
    So thank you for your help. If there is anything else I should know, let me know :).
      My Computer


 
Page 1 of 2 12 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 06:40.
Find Us