Frequest BSODs and Crashing Programs


  1. Posts : 5
    Windows 7 Home Premium x64
       #1

    Frequest BSODs and Crashing Programs


    Hi!

    I'm experiencing frequent crashes on my desktop and I'd be grateful if someone can help me out. :)

    These crashes have always been there. I've tried reinstalling Windows twice, updates Windows and all my drivers, and even ran a registry cleanup.

    I'm also experiencing some instability in some programs especially web browsers (firefox, chrome, IE) they seem to crash very often so that may or may not be related to the BSODs.

    Specs:
    Processor: Intel Quad Core 2
    Motherboard: Asus P5P43TD
    RAM: G Skill 4GB
    Graphics Card: ATI HD5830
    OS: Windows 7 - 64 bit Home

    I'm using an assembled desktop so the windows installation was carried out by myself.

    So, um... help?
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    Happy New Year,

    could you give us some info we need:

    https://www.sevenforums.com/crashes-d...tructions.html
      My Computer


  3. Posts : 5
    Windows 7 Home Premium x64
    Thread Starter
       #3

    Yeah sorry for that.

    Attached it in this post.
      My Computer


  4. Posts : 670
    Windows 7 x64
       #4

    DISABLE the Driver Verifier.

    Update the causer of your crashes, Realtek 8180/8185 Wireless:

    RTL85n64.sys Fri Oct 16 03:25:11 2009


    Update your network and keyboard drivers too:

    L1E62x64.sys Sun Aug 23 01:08:09 2009
    Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller(NDIS6.20)

    Lycosa.sys Fri Jan 18 03:51:42 2008
    Razer Tarantula Keyboard



    If BSOD's reoccur after the updates, remove Avast and install MSE:

    avast! Uninstall Utility

    https://www.microsoft.com/security_essentials/



    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\122310-27939-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a53000 PsLoadedModuleList = 0xfffff800`02c90e50
    Debug session time: Wed Dec 22 15:09:21.042 2010 (UTC - 5:00)
    System Uptime: 0 days 7:51:12.509
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {0, 0, 0, 0}
    
    Unable to load image \SystemRoot\system32\DRIVERS\RTL85n64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for RTL85n64.sys
    *** ERROR: Module load completed but symbols could not be loaded for RTL85n64.sys
    Probably caused by : nwifi.sys ( nwifi!EtwEx_tidActivityInfoTransfer+1ac )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: 0000000000000000, The exception code that was not handled
    Arg2: 0000000000000000, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (Win32) 0 (0) -                           .
    
    FAULTING_IP: 
    +6436323963333630
    00000000`00000000 ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
    
    BUGCHECK_STR:  0x1E_0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    PROCESS_NAME:  RtWLan.exe
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff80000ba2a08 -- (.exr 0xfffff80000ba2a08)
    ExceptionAddress: fffff8800158945c (ndis!ndisMSendCompleteNetBufferListsInternal+0x00000000000000fc)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: ffffffffffffffff
       Parameter[1]: 0000000000000000
    Attempt to execute non-executable address 0000000000000000
    
    TRAP_FRAME:  fffff80000ba2ab0 -- (.trap 0xfffff80000ba2ab0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800158945c rsp=fffff80000ba2c40 rbp=fffef9800f3c88d0
     r8=0000000000000000  r9=fffef9800f3c88d0 r10=0000000000000000
    r11=0000000001a290b5 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    ndis!ndisMSendCompleteNetBufferListsInternal+0xfc:
    fffff880`0158945c 488b8d90050000  mov     rcx,qword ptr [rbp+590h] ss:0018:fffef980`0f3c8e60=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002abb46e to fffff80002ac3710
    
    STACK_TEXT:  
    fffff800`00ba1af8 fffff800`02abb46e : fffffa80`0397a9f0 fffff800`02f57f6d fffff800`00ba2270 fffff800`02af0668 : nt!KeBugCheck
    fffff800`00ba1b00 fffff800`02ae940d : fffff800`02cd1b7c fffff800`02c0be84 fffff800`02a53000 fffff800`00ba2a08 : nt!KiKernelCalloutExceptionHandler+0xe
    fffff800`00ba1b30 fffff800`02af0a90 : fffff800`02c12a40 fffff800`00ba1ba8 fffff800`00ba2a08 fffff800`02a53000 : nt!RtlpExecuteHandlerForException+0xd
    fffff800`00ba1b60 fffff800`02afd9ef : fffff800`00ba2a08 fffff800`00ba2270 fffff800`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
    fffff800`00ba2240 fffff800`02ac2d82 : fffff800`00ba2a08 00000000`00000000 fffff800`00ba2ab0 fffffa80`058af1a0 : nt!KiDispatchException+0x16f
    fffff800`00ba28d0 fffff800`02ac1552 : fffff6fc`c0328690 fffff800`02f56dfe fffff800`00ba2ac0 fffff800`00b9d000 : nt!KiExceptionDispatch+0xc2
    fffff800`00ba2ab0 fffff880`0158945c : fffff980`650d2e90 fffff800`02f678ef fffff880`03b50ea0 00000000`00000300 : nt!KiStackFault+0x112
    fffff800`00ba2c40 fffff880`038fbeb0 : fffffa80`00000000 fffff980`20904d30 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0xfc
    fffff800`00ba2ce0 fffff880`038f7f58 : 00000000`00000000 fffffa80`050244f0 00000000`00000000 fffff880`03b4fe8c : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
    fffff800`00ba2d30 fffff880`038fb860 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`03b84dac : nwifi!Dot11SendCompletion+0x44
    fffff800`00ba2d60 fffff880`015895ad : fffffa80`058af1a0 00000000`00000000 fffff980`51a04fe0 fffff980`1f93ef50 : nwifi!Pt6SendComplete+0x28
    fffff800`00ba2d90 fffff880`03b4c1af : fffff980`0bbf0ca0 00000000`00000000 fffffa80`058af1a0 fffffa80`058af1a0 : ndis!NdisMSendNetBufferListsComplete+0x6d
    fffff800`00ba2dd0 fffff980`0bbf0ca0 : 00000000`00000000 fffffa80`058af1a0 fffffa80`058af1a0 fffffa80`05cc54c0 : RTL85n64+0xcf1af
    fffff800`00ba2dd8 00000000`00000000 : fffffa80`058af1a0 fffffa80`058af1a0 fffffa80`05cc54c0 fffff880`0155a759 : 0xfffff980`0bbf0ca0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nwifi!EtwEx_tidActivityInfoTransfer+1ac
    fffff880`038fbeb0 f0838348130000ff lock add dword ptr [rbx+1348h],0FFFFFFFFh
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  nwifi!EtwEx_tidActivityInfoTransfer+1ac
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nwifi
    
    IMAGE_NAME:  nwifi.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc3b
    
    FAILURE_BUCKET_ID:  X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac
    
    BUCKET_ID:  X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\122110-41589-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a0e000 PsLoadedModuleList = 0xfffff800`02c4be50
    Debug session time: Tue Dec 21 10:59:16.733 2010 (UTC - 5:00)
    System Uptime: 0 days 2:38:46.201
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    ..............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {0, 0, 0, 0}
    
    Unable to load image \SystemRoot\system32\DRIVERS\RTL85n64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for RTL85n64.sys
    *** ERROR: Module load completed but symbols could not be loaded for RTL85n64.sys
    Probably caused by : nwifi.sys ( nwifi!EtwEx_tidActivityInfoTransfer+1ac )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: 0000000000000000, The exception code that was not handled
    Arg2: 0000000000000000, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (Win32) 0 (0) -                           .
    
    FAULTING_IP: 
    +6366393030376137
    00000000`00000000 ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
    
    BUGCHECK_STR:  0x1E_0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff88002f1b798 -- (.exr 0xfffff88002f1b798)
    ExceptionAddress: fffff8800157345c (ndis!ndisMSendCompleteNetBufferListsInternal+0x00000000000000fc)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: ffffffffffffffff
       Parameter[1]: 0000000000000000
    Attempt to execute non-executable address 0000000000000000
    
    TRAP_FRAME:  fffff88002f1b840 -- (.trap 0xfffff88002f1b840)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800157345c rsp=fffff88002f1b9d0 rbp=fffef9800eaaa8d0
     r8=0000000000000000  r9=fffef9800eaaa8d0 r10=0000000000000000
    r11=00000000002500e2 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    ndis!ndisMSendCompleteNetBufferListsInternal+0xfc:
    fffff880`0157345c 488b8d90050000  mov     rcx,qword ptr [rbp+590h] ss:0018:fffef980`0eaaae60=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a7646e to fffff80002a7e710
    
    STACK_TEXT:  
    fffff880`02f1a888 fffff800`02a7646e : fffffa80`039784f0 fffff800`02f12f6d fffff880`02f1b000 fffff800`02aab668 : nt!KeBugCheck
    fffff880`02f1a890 fffff800`02aa440d : fffff800`02c8cb7c fffff800`02bc6e84 fffff800`02a0e000 fffff880`02f1b798 : nt!KiKernelCalloutExceptionHandler+0xe
    fffff880`02f1a8c0 fffff800`02aaba90 : fffff800`02bcdb14 fffff880`02f1a938 fffff880`02f1b798 fffff800`02a0e000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`02f1a8f0 fffff800`02ab89ef : fffff880`02f1b798 fffff880`02f1b000 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
    fffff880`02f1afd0 fffff800`02a7dd82 : fffff880`02f1b798 00000000`00000000 fffff880`02f1b840 fffffa80`0584c1a0 : nt!KiDispatchException+0x16f
    fffff880`02f1b660 fffff800`02a7c552 : fffff6fc`c00c5c80 fffff800`02f11dfe fffff880`02f1b850 fffff880`02f16000 : nt!KiExceptionDispatch+0xc2
    fffff880`02f1b840 fffff880`0157345c : fffff980`18b90e90 fffff800`02f228ef fffff880`0413fea0 00000000`00000000 : nt!KiStackFault+0x112
    fffff880`02f1b9d0 fffff880`03ab5eb0 : fffffa80`00000000 fffff980`10df2d30 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0xfc
    fffff880`02f1ba70 fffff880`03ab1f58 : 00000000`00000000 fffffa80`06184050 00000000`00000000 fffff880`0413ee8c : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
    fffff880`02f1bac0 fffff880`03ab5860 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`04173dac : nwifi!Dot11SendCompletion+0x44
    fffff880`02f1baf0 fffff880`015735ad : fffffa80`0584c1a0 00000000`00000000 fffff980`1bbf4fe0 fffff980`0c840f50 : nwifi!Pt6SendComplete+0x28
    fffff880`02f1bb20 fffff880`0413b1af : fffff980`0b9f0ca0 00000000`00000000 fffffa80`0584c1a0 fffffa80`0584c1a0 : ndis!NdisMSendNetBufferListsComplete+0x6d
    fffff880`02f1bb60 fffff980`0b9f0ca0 : 00000000`00000000 fffffa80`0584c1a0 fffffa80`0584c1a0 fffffa80`05bdd580 : RTL85n64+0xcf1af
    fffff880`02f1bb68 00000000`00000000 : fffffa80`0584c1a0 fffffa80`0584c1a0 fffffa80`05bdd580 00000000`00000000 : 0xfffff980`0b9f0ca0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nwifi!EtwEx_tidActivityInfoTransfer+1ac
    fffff880`03ab5eb0 f0838348130000ff lock add dword ptr [rbx+1348h],0FFFFFFFFh
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  nwifi!EtwEx_tidActivityInfoTransfer+1ac
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nwifi
    
    IMAGE_NAME:  nwifi.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc3b
    
    FAILURE_BUCKET_ID:  X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac
    
    BUCKET_ID:  X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\122210-31605-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
    Debug session time: Wed Dec 22 07:17:25.562 2010 (UTC - 5:00)
    System Uptime: 0 days 0:16:19.404
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffff80002d25c06, 0, 0, fffff80002aae7a2}
    
    Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+122 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffff80002d25c06, memory referenced
    Arg2: 0000000000000000, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002aae7a2, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb90e0
     fffff80002d25c06 
    
    CURRENT_IRQL:  0
    
    FAULTING_IP: 
    nt!RtlDispatchException+122
    fffff800`02aae7a2 410fb60c24      movzx   ecx,byte ptr [r12]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  wuauclt.exe
    
    TRAP_FRAME:  fffff880033627c0 -- (.trap 0xfffff880033627c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff80002ca11ec rbx=0000000000000000 rcx=fffff80002d25c44
    rdx=fffff80002d25bac rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002aae7a2 rsp=fffff88003362950 rbp=fffff880033637f8
     r8=0000000000002029  r9=0000000000002029 r10=fffff88003363d00
    r11=fffff88003362998 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!RtlDispatchException+0x122:
    fffff800`02aae7a2 410fb60c24      movzx   ecx,byte ptr [r12] ds:00000000`00000000=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a80ca9 to fffff80002a81740
    
    STACK_TEXT:  
    fffff880`03362678 fffff800`02a80ca9 : 00000000`0000000a fffff800`02d25c06 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
    fffff880`03362680 fffff800`02a7f920 : 00000000`00000000 00000000`0000005a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`033627c0 fffff800`02aae7a2 : fffff800`02d25c06 fffff880`03362998 fffff880`033637f8 fffff800`02a11000 : nt!KiPageFault+0x260
    fffff880`03362950 fffff800`02abb9ef : fffff880`033637f8 fffff880`03363060 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
    fffff880`03363030 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16f
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!RtlDispatchException+122
    fffff800`02aae7a2 410fb60c24      movzx   ecx,byte ptr [r12]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!RtlDispatchException+122
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_VRF_nt!RtlDispatchException+122
    
    BUCKET_ID:  X64_0xA_VRF_nt!RtlDispatchException+122
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\122310-28470-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a05000 PsLoadedModuleList = 0xfffff800`02c42e50
    Debug session time: Wed Dec 22 15:13:44.092 2010 (UTC - 5:00)
    System Uptime: 0 days 0:01:41.559
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {ffffffffc0000005, fffff80002ba88c7, fffff880031a1878, fffff880031a10e0}
    
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+14d3 )
    
    Followup: Pool_corruption
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002ba88c7, The address that the exception occurred at
    Arg3: fffff880031a1878, Exception Record Address
    Arg4: fffff880031a10e0, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!ExDeferredFreePool+14d3
    fffff800`02ba88c7 4c3910          cmp     qword ptr [rax],r10
    
    EXCEPTION_RECORD:  fffff880031a1878 -- (.exr 0xfffff880031a1878)
    ExceptionAddress: fffff80002ba88c7 (nt!ExDeferredFreePool+0x00000000000014d3)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff880031a10e0 -- (.cxr 0xfffff880031a10e0)
    rax=fffef8a00284ec40 rbx=fffff8a0028bc150 rcx=0000000000000541
    rdx=fffff8a0028bc190 rsi=fffffa80039fcb60 rdi=fffffa800397d148
    rip=fffff80002ba88c7 rsp=fffff880031a1ab0 rbp=0000000000000000
     r8=0000000000000001  r9=fffff8a0028bc1a0 r10=fffff8a0028bc1a0
    r11=000000000000010d r12=0000000000000001 r13=fffff8a0028bc160
    r14=0000000000000000 r15=fffffa800397d140
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    nt!ExDeferredFreePool+0x14d3:
    fffff800`02ba88c7 4c3910          cmp     qword ptr [rax],r10 ds:002b:fffef8a0`0284ec40=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cad0e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+14d3
    fffff800`02ba88c7 4c3910          cmp     qword ptr [rax],r10
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from fffff80002d69bfe to fffff80002ba88c7
    
    STACK_TEXT:  
    fffff880`031a1ab0 fffff800`02d69bfe : 00000000`936c134e 00000000`00000200 fffff8a0`624e4d43 00000000`00000000 : nt!ExDeferredFreePool+0x14d3
    fffff880`031a1b60 fffff800`02d69ac8 : fffff8a0`00c856f8 00000000`00000001 fffff8a0`00022010 ffffffff`ffffffff : nt!CmpDereferenceNameControlBlockWithLock+0xd6
    fffff880`031a1b90 fffff800`02d68400 : 00000000`00000000 fffff800`02d6855d 00000000`624e4d43 00000000`00010216 : nt!CmpCleanUpKcbCacheWithLock+0x34
    fffff880`031a1bc0 fffff800`02d6860b : 00000000`00000000 00000000`00000001 fffff8a0`00022010 00000000`00000001 : nt!CmpDereferenceKeyControlBlockWithLock+0x150
    fffff880`031a1bf0 fffff800`02d689c4 : 00000000`00000000 00000000`00000001 fffff8a0`00022010 fffffa80`039fcb60 : nt!CmpDereferenceKeyControlBlock+0x11f
    fffff880`031a1c40 fffff800`02a82961 : fffff800`02d688dc fffff800`02c1a5f8 fffffa80`039fcb60 00000000`00000000 : nt!CmpDelayDerefKCBWorker+0xe8
    fffff880`031a1c70 fffff800`02d19c06 : 00000000`00000bec fffffa80`039fcb60 00000000`00000080 fffffa80`039e3040 : nt!ExpWorkerThread+0x111
    fffff880`031a1d00 fffff800`02a53c26 : fffff880`02f64180 fffffa80`039fcb60 fffff880`02f6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`031a1d40 00000000`00000000 : fffff880`031a2000 fffff880`0319c000 fffff880`031a15a0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+14d3
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    STACK_COMMAND:  .cxr 0xfffff880031a10e0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x7E_VRF_nt!ExDeferredFreePool+14d3
    
    BUCKET_ID:  X64_0x7E_VRF_nt!ExDeferredFreePool+14d3
    
    Followup: Pool_corruption
    ---------


    Drivers:

    Code:
    start             end                 module name
    fffff880`00ef4000 fffff880`00f4b000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`0183b000 fffff880`018c5000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04010000 fffff880`04026000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00e33000 fffff880`00e3e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`041d8000 fffff880`041e0000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
    fffff880`02c67000 fffff880`02c6d000   AsIO     AsIO.sys     Mon Apr 06 03:21:08 2009 (49D9AD64)
    fffff880`02c61000 fffff880`02c67000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
    fffff880`05c00000 fffff880`05c09000   aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:09 2010 (4C86506D)
    fffff880`05dc3000 fffff880`05dfd000   aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084)
    fffff880`019e5000 fffff880`019ef000   aswRdr   aswRdr.SYS   Tue Sep 07 10:47:47 2010 (4C865093)
    fffff880`02c3e000 fffff880`02c61000   aswSP    aswSP.SYS    Tue Sep 07 10:52:07 2010 (4C865197)
    fffff880`0182b000 fffff880`0183b000   aswTdi   aswTdi.SYS   Tue Sep 07 10:52:27 2010 (4C8651AB)
    fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e09000 fffff880`00e33000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`03fd8000 fffff880`03ff8000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
    fffff880`048a0000 fffff880`050b1000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
    fffff880`03e6a000 fffff880`03eb6000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
    fffff880`01964000 fffff880`0196b000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02c2d000 fffff880`02c3e000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`03ac8000 fffff880`03ae6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00680000 fffff960`006a7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`01931000 fffff880`0195b000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018cb000 fffff880`018fb000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d45000 fffff880`00da3000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010c6000 fffff880`01139000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`04000000 fffff880`04010000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05cdf000 fffff880`05ced000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02c0f000 fffff880`02c2d000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02c00000 fffff880`02c0f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01200000 fffff880`01216000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05c4f000 fffff880`05c71000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05cf9000 fffff880`05d02000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05ced000 fffff880`05cf9000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05d02000 fffff880`05d15000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05cd3000 fffff880`05cdf000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`050b1000 fffff880`051a5000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`051a5000 fffff880`051eb000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`01054000 fffff880`01068000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01008000 fffff880`01054000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`013f3000 fffff880`013fd000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`011bf000 fffff880`011f9000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`041ec000 fffff880`041f9000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02fe1000 fffff800`0302a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04800000 fffff880`04824000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`05c77000 fffff880`05cd3000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`05d62000 fffff880`05d7b000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05d7b000 fffff880`05d83080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05d54000 fffff880`05d62000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`03a00000 fffff880`03ac8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015e7000 fffff880`015f0000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`02c93000 fffff880`02ca9000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`04032000 fffff880`04041000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05d84000 fffff880`05d92000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bd1000 fffff800`00bdb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`03f6e000 fffff880`03fb1000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`013c8000 fffff880`013e2000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05c71000 fffff880`05c76200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`051eb000 fffff880`051fd000   L1E62x64 L1E62x64.sys Sun Aug 23 01:08:09 2009 (4A90CEB9)
    fffff880`02ca9000 fffff880`02cbe000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05da0000 fffff880`05dc3000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`05d4f000 fffff880`05d53980   Lycosa   Lycosa.sys   Fri Jan 18 03:51:42 2008 (4790689E)
    fffff880`00ced000 fffff880`00d31000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`05d92000 fffff880`05da0000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03f5f000 fffff880`03f6e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`03b77000 fffff880`03b84000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fdf000 fffff880`00ff9000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03b84000 fffff880`03b9c000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03b9c000 fffff880`03bc9000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`06213000 fffff880`06261000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`06261000 fffff880`06284000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`019c9000 fffff880`019d4000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f54000 fffff880`00f5e000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01068000 fffff880`010c6000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02ded000 fffff880`02df8000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`0147d000 fffff880`0148f000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01495000 fffff880`01587000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04026000 fffff880`04032000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03b4c000 fffff880`03b5f000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`03eda000 fffff880`03f09000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03fc3000 fffff880`03fd8000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d35000 fffff880`02d44000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02cc1000 fffff880`02d06000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01587000 fffff880`015e7000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`019d4000 fffff880`019e5000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02de1000 fffff880`02ded000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a05000 fffff800`02fe1000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01225000 fffff880`013c8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0195b000 fffff880`01964000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03af9000 fffff880`03b4c000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02d0f000 fffff880`02d35000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`041bb000 fffff880`041d8000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00f9e000 fffff880`00fb3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f5e000 fffff880`00f91000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fc8000 fffff880`00fcf000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fcf000 fffff880`00fdf000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013e2000 fffff880`013f3000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06284000 fffff880`0632a000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05c12000 fffff880`05c4f000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d31000 fffff880`00d45000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03eb6000 fffff880`03eda000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03f09000 fffff880`03f24000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`03f24000 fffff880`03f45000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03f45000 fffff880`03f5f000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02d90000 fffff880`02de1000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`019ae000 fffff880`019b7000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019b7000 fffff880`019c0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019c0000 fffff880`019c9000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01185000 fffff880`011bf000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`03b5f000 fffff880`03b77000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04043000 fffff880`041bb000   RTL85n64 RTL85n64.sys Fri Oct 16 03:25:11 2009 (4AD81FD7)
    fffff880`0632a000 fffff880`06335000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`041e0000 fffff880`041ec000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02d44000 fffff880`02d61000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01475000 fffff880`0147d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`06eab000 fffff880`06f41000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`06374000 fffff880`063db000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`06335000 fffff880`06362000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`04041000 fffff880`04042480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`06362000 fffff880`06374000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0181e000 fffff880`0182b000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01800000 fffff880`0181e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02d7c000 fffff880`02d90000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`02c6d000 fffff880`02c93000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`03fb1000 fffff880`03fc3000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05d32000 fffff880`05d4f000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05d30000 fffff880`05d31f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04887000 fffff880`04898000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03e00000 fffff880`03e5a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`04831000 fffff880`04887000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05d15000 fffff880`05d30000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`04824000 fffff880`04831000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00f91000 fffff880`00f9e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`0196b000 fffff880`01979000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01979000 fffff880`0199e000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fb3000 fffff880`00fc8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00da3000 fffff880`00dff000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01139000 fffff880`01185000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02d61000 fffff880`02d7c000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`0199e000 fffff880`019ae000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e41000 fffff880`00ee5000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ee5000 fffff880`00ef4000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d06000 fffff880`02d0f000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00060000 fffff960`0036f000   win32k   win32k.sys   unavailable (00000000)
    fffff880`00f4b000 fffff880`00f54000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`018fb000 fffff880`0191c000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`018fb000 fffff880`01909000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01909000 fffff880`01915000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01915000 fffff880`0191e000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`0191e000 fffff880`01931000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


  5. Posts : 5
    Windows 7 Home Premium x64
    Thread Starter
       #5

    Thanks for the quick reply Cybercore.

    To do list:

    1. DISABLE the Driver Verifier. Check
    2. Update Realtek 8180/8185 Wireless driver. Check
    3. Update your LAN drivers. (Couldn't find, skipped)
    4. Update keyboard drivers. Check
    5. Remove Avast and install MSE. Pending

    I'll post tomorrow on how my machine is running.
      My Computer


  6. Posts : 5
    Windows 7 Home Premium x64
    Thread Starter
       #6

    Two days so far without BSODs which is new for me.

    Thanks for the help Cybercore.
      My Computer


  7. Posts : 5
    Windows 7 Home Premium x64
    Thread Starter
       #7

    My computer's been working fine until today. Suddenly I've getting non-stop BSODs. Help.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 05:09.
Find Us