Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD's/Restarts have me stumped

31 Jan 2011   #31
jcgriff2

Windows 7 - Vista
 
 

Hi -

Update your Intel 82562V-2 10/100 Network Connection Ethernet driver -
Code:
e1e6032e.sys    Tue Mar 24 14:17:23 2009 (49C923B3)
Intel Driver downloads - http://downloadcenter.intel.com/Default.aspx?lang=eng


Remove Daemon Tools.


"mouse" is mentioned in one of the 3 dumps.


Windbg Logs
--> http://sysnative.com/bsod2011/jcgrif..._jcgriff2_.txt
--> http://sysnative.com/bsod2011/jcgrif...riff2_.txt.zip

Regards. . .

jcgriff2

`


BSOD BUGCHECK SUMMARY
Code:
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Debug session time: Mon Jan 31 02:48:45.039 2011 (GMT-5)
System Uptime: 0 days 0:29:31.161
Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+47e )
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  System
FAILURE_BUCKET_ID:  X64_0xA_mouclass!MouseClassServiceCallback+47e
Bugcheck code 0000000A
Arguments 00000000`00000048 00000000`00000002 00000000`00000000 fffff800`028c10a2
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Debug session time: Mon Jan 31 01:06:08.353 2011 (GMT-5)
System Uptime: 0 days 0:03:21.085
Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+433 )
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  Steam.exe
FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433
Bugcheck code 0000000A
Arguments 00000000`00000018 00000000`00000002 00000000`00000001 fffff800`02883313
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Debug session time: Mon Jan 31 01:01:15.133 2011 (GMT-5)
System Uptime: 0 days 0:22:51.255
Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+433 )
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  wmpnetwk.exe
FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433
Bugcheck code 0000000A
Arguments 00000000`00010002 00000000`00000002 00000000`00000001 fffff800`028bf313
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
 
by jcgriff2     
 
      J. C. Griffith, Microsoft MVP   
 
        https://mvp.support.microsoft.com/profile/Griffith   
 
        www.sysnative.com
 
        www.jcgriff2.com 
 
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии



My System SpecsSystem Spec
.
31 Jan 2011   #32
rtc0523

Win 7 Ultimate 64 Bit
 
 

Ive been trying to update the Intel driver but I cant stay on the computer long enough before it reboots itself to get and install the driver.
My System SpecsSystem Spec
31 Jan 2011   #33
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Can you install it in the safe mode?
My System SpecsSystem Spec
.

31 Jan 2011   #34
rtc0523

Win 7 Ultimate 64 Bit
 
 

Ok I managed to install the drivers but the computer was still restarting. So I also installed the software for my mouse and keyboard. Still had restarting/BSOD's. Next I opened up the computer and reseated the RAM and my video card and it fixed nothing. So now I took out my video card and hooked up to my motherboard's integrated video and am still having the same problems. I even tried disconnecting my mouse and using a different one which also didnt fix anything. Ive been trying to post this message on the computer with the problem but I keep BSOD or restarting. So once it gives me enough time I will upload the most recent BSOD's to see if there is anything new.


Added dumps
My System SpecsSystem Spec
31 Jan 2011   #35
CarlTR6

Windows 7 Ultimate 32 bit
 
 

I looked at your 7 dumps. Out of the 7 dumps, there are 5 different bugcheck codes. This indicates a hardware or hardware related (driver) problem.

I suggest you test your RAM with Mentest86 following the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off for an hour or so. Let it run for at least 7 passes. This will take 6 - 8 hours. Post back with your results.

If Memtest shows no errors, enable Driver Verifier carefully following the instructions in this tutorial: Driver Verifier - Enable and Disable. Upload all dumps triggered by Driver Verifier.


Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0284c000 PsLoadedModuleList = 0xfffff800`02a89e50
Debug session time: Mon Jan 31 14:09:25.610 2011 (GMT-5)
System Uptime: 0 days 0:06:12.343
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {190, 2, 0, fffff800028c48db}

Probably caused by : ntkrnlmp.exe ( nt!KiSearchForNewThread+26b )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000190, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028c48db, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002af40e0
 0000000000000190 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiSearchForNewThread+26b
fffff800`028c48db 66453b9080010000 cmp     r10w,word ptr [r8+180h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f1bb50 -- (.trap 0xfffff88002f1bb50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000100 rbx=0000000000000000 rcx=fffff88002fd8700
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028c48db rsp=fffff88002f1bce0 rbp=0000000000000001
 r8=0000000000000010  r9=0000000000000008 r10=0000000000000000
r11=fffff880031a1b80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiSearchForNewThread+0x26b:
fffff800`028c48db 66453b9080010000 cmp     r10w,word ptr [r8+180h] ds:bc98:00000000`00000190=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028bbca9 to fffff800028bc740

STACK_TEXT:  
fffff880`02f1ba08 fffff800`028bbca9 : 00000000`0000000a 00000000`00000190 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1ba10 fffff800`028ba920 : 00000000`2f45b17c 00000000`00000000 fffffa80`05766101 fffffa80`047bf1b0 : nt!KiBugCheckDispatch+0x69
fffff880`02f1bb50 fffff800`028c48db : 00000000`33f0a83b 00000000`0000003b fffffa80`043db600 400000c2`400000c1 : nt!KiPageFault+0x260
fffff880`02f1bce0 fffff800`0287409a : 00000000`00000000 00000000`00000000 fffff880`00000000 00000000`00000001 : nt!KiSearchForNewThread+0x26b
fffff880`02f1bd50 fffff800`028c4fc6 : fffff880`009e6180 fffff880`009f0fc0 00000000`00000000 fffff880`00c14f44 : nt!KiIdleSchedule+0x7a
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x136


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSearchForNewThread+26b
fffff800`028c48db 66453b9080010000 cmp     r10w,word ptr [r8+180h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiSearchForNewThread+26b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!KiSearchForNewThread+26b

BUCKET_ID:  X64_0xA_nt!KiSearchForNewThread+26b

Followup: MachineOwner
---------

Debug session time: Mon Jan 31 14:32:19.893 2011 (GMT-5)
System Uptime: 0 days 0:05:40.000
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8800318dc47, 1, fffff80002883590, 0}


Could not read faulting driver name
Probably caused by : memory_corruption

Followup: memory_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8800318dc47, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002883590, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abd0e0
 fffff8800318dc47 

FAULTING_IP: 
nt!KiGeneralProtectionFault+10
fffff800`02883590 c645ab01        mov     byte ptr [rbp-55h],1

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880031851c0 -- (.trap 0xfffff880031851c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002f63180 rbx=0000000000000000 rcx=ffff00000573ead0
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002883590 rsp=fffff88003185350 rbp=fffff8800318dc9c
 r8=fffffa8003b24348  r9=fffffa8003b24240 r10=fffffa8005f6c010
r11=fffffa8003b24390 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po nc
nt!KiGeneralProtectionFault+0x10:
fffff800`02883590 c645ab01        mov     byte ptr [rbp-55h],1 ss:0018:fffff880`0318dc47=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002905f14 to fffff80002885740

STACK_TEXT:  
fffff880`03185058 fffff800`02905f14 : 00000000`00000050 fffff880`0318dc47 00000000`00000001 fffff880`031851c0 : nt!KeBugCheckEx
fffff880`03185060 fffff800`0288382e : 00000000`00000001 fffffa80`047c8100 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`031851c0 fffff800`02883590 : 00000000`00000000 fffffa80`00fa5200 00000580`00000001 fffffa80`039f8f48 : nt!KiPageFault+0x16e
fffff880`03185350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
30 errors : !nt (fffff8000288358c-fffff8000288367d)
fffff80002883580  55  48  81  ec  58  01  00  00  48  8d  ac  24 *4c *89  00  00 UH..X...H..$L...
fffff80002883590  c6  45  ab  01  48  89  45  b0  48  89  4d  b8 *65 *4c  55  c0 .E..H.E.H.M.eLU.
fffff800028835a0  4c  89  45  c8  4c  89  4d  d0  4c  89  55  d8 *80 *fa  5d  e0 L.E.L.M.L.U...].
fffff800028835b0  f6  85  f0  00  00  00  01  74  64  0f  01  f8 *00 *00  8b  14 .......td.......
fffff800028835c0  25  88  01  00  00  41  f6  42  03  80  74  3c *79 *82  01  00 %....A.B..t<y...
fffff800028835d0  c0  0f  32  48  c1  e2  20  48  0b  c2  49  39 *8a *c4  00  00 ..2H.. H..I9....
fffff800028835e0  00  74  25  49  39  82  b0  01  00  00  74  1c *83 *02  92  b8 .t%I9.....t.....
fffff800028835f0  01  00  00  41  0f  ba  6a  4c  0b  66  41  ff *00 *fc  01  00 ...A..jL.fA.....
fffff80002883600  00  48  89  82  80  00  00  00  41  f6  42  03 *af *55  c7  85 .H......A.B..U..
fffff80002883610  80  00  00  00  00  00  74  05  e8  d3  25  00 *29 *65  0f  ae ......t...%.)e..
fffff80002883620  5d  ac  65  0f  ae  14  25  80  01  00  00  0f *01 *00  f0  0f ].e...%.........
fffff80002883630  29  4d  00  0f  29  55  10  0f  29  5d  20  0f *00 *00  30  0f )M..)U..)] ...0.
...
fffff80002883650  85  e0  00  00  00  48  f7  85  f8  00  00  00 *33 *d2  00  00 .....H......3...
fffff80002883660  74  01  fb  b9  01  00  00  10  ba  02  00  00 *7f *e1  8b  8d t...............
fffff80002883670  e0  00  00  00  41  81  e1  ff  ff  00  00  4d *48 *83  4c  8b ....A......MH.L.

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption
---------

Debug session time: Mon Jan 31 14:36:48.806 2011 (GMT-5)
System Uptime: 0 days 0:03:59.912
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000284b95b, fffff88006f10e60, 0}

Probably caused by : ntkrnlmp.exe ( nt!ExQueryPoolUsage+e0 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000284b95b, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88006f10e60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExQueryPoolUsage+e0
fffff800`0284b95b 8379e400        cmp     dword ptr [rcx-1Ch],0

CONTEXT:  fffff88006f10e60 -- (.cxr 0xfffff88006f10e60)
rax=000000000288a6dc rbx=0000000000000000 rcx=000003880000049f
rdx=fffff88006f1197c rsi=0000000000033cc3 rdi=00000000001bf290
rip=fffff8000284b95b rsp=fffff88006f11830 rbp=fffff88006f11ca0
 r8=fffff88006f11978  r9=fffff80002a31720 r10=0000000000000005
r11=fffff88006f1195c r12=0000000000000004 r13=0000000000009a62
r14=fffff80002ac4900 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010203
nt!ExQueryPoolUsage+0xe0:
fffff800`0284b95b 8379e400        cmp     dword ptr [rcx-1Ch],0 ds:002b:00000388`00000483=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  WMIADAP.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b897ab to fffff8000284b95b

STACK_TEXT:  
fffff880`06f11830 fffff800`02b897ab : 00000000`00000000 00000000`00033cc3 00000000`00033cc3 00000000`00000026 : nt!ExQueryPoolUsage+0xe0
fffff880`06f11840 fffff800`02b8b1e5 : 00000000`001bf290 fffff800`02b8710e 00000000`00000003 00000000`00000000 : nt!ExpQuerySystemInformation+0x5a9
fffff880`06f11be0 fffff800`0288b993 : 00000000`00000164 fffff880`06f11ca0 ffffffff`fffe7960 00000000`00000000 : nt!NtQuerySystemInformation+0x4d
fffff880`06f11c20 00000000`773500ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001bf1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773500ba


FOLLOWUP_IP: 
nt!ExQueryPoolUsage+e0
fffff800`0284b95b 8379e400        cmp     dword ptr [rcx-1Ch],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExQueryPoolUsage+e0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88006f10e60 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExQueryPoolUsage+e0

BUCKET_ID:  X64_0x3B_nt!ExQueryPoolUsage+e0

Followup: MachineOwner
---------

Debug session time: Mon Jan 31 15:01:04.954 2011 (GMT-5)
System Uptime: 0 days 0:00:40.060
Loading Kernel Symbols
...............................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1, {744a2dd9, 0, ffff, fffff88002baeca0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->KernelApcDisable field. A negative value indicates that a driver
has disabled APC calls without re-enabling them.  A positive value indicates
that the reverse is true. This check is made on exit from a system call.
Arguments:
Arg1: 00000000744a2dd9, address of system function (system call)
Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
Arg3: 000000000000ffff, Thread->KernelApcDisable
Arg4: fffff88002baeca0, Previous KernelApcDisable

Debugging Details:
------------------


FAULTING_IP: 
+5ac0952f01a5def0
00000000`744a2dd9 c3              ret

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1

PROCESS_NAME:  AvastSvc.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8000287dca9 to fffff8000287e740

STACK_TEXT:  
fffff880`02baea68 fffff800`0287dca9 : 00000000`00000001 00000000`744a2dd9 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff880`02baea70 fffff800`0287dbe0 : 00000000`04fafd20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02baebb0 00000000`744a2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`04faf0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x744a2dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceExit+245
fffff800`0287dbe0 4883ec50        sub     rsp,50h

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceExit+245

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1_nt!KiSystemServiceExit+245

BUCKET_ID:  X64_0x1_nt!KiSystemServiceExit+245

Followup: MachineOwner
---------

Debug session time: Mon Jan 31 13:14:37.323 2011 (GMT-5)
System Uptime: 0 days 0:04:52.055
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+5ac0952f01b7ddf0
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000b9c248 -- (.exr 0xfffff80000b9c248)
ExceptionAddress: fffff800028c90a2 (nt!KiDeferredReadyThread+0x00000000000001c2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000b9c2f0 -- (.trap 0xfffff80000b9c2f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff000002a4cb80 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028c90a2 rsp=fffff80000b9c480 rbp=0000000000000002
 r8=0000000000000001  r9=fffff80002bb78dc r10=fffff80002854000
r11=fffff80002a3ee80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiDeferredReadyThread+0x1c2:
fffff800`028c90a2 663b5048        cmp     dx,word ptr [rax+48h] ds:ffff0000`02a4cbc8=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028bc46e to fffff800028c4710

STACK_TEXT:  
fffff800`00b9b338 fffff800`028bc46e : 00000000`00000000 00000000`00000000 fffff800`00b9bab0 fffff800`028f1668 : nt!KeBugCheck
fffff800`00b9b340 fffff800`028ea40d : fffff800`02ad2b7c fffff800`02a0ce84 fffff800`02854000 fffff800`00b9c248 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00b9b370 fffff800`028f1a90 : fffff800`02a13b14 fffff800`00b9b3e8 fffff800`00b9c248 fffff800`02854000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b9b3a0 fffff800`028fe9ef : fffff800`00b9c248 fffff800`00b9bab0 fffff800`00000000 fffffa80`039fc040 : nt!RtlDispatchException+0x410
fffff800`00b9ba80 fffff800`028c3d82 : fffff800`00b9c248 fffff880`02f63180 fffff800`00b9c2f0 fffff800`02a3ee80 : nt!KiDispatchException+0x16f
fffff800`00b9c110 fffff800`028c268a : 00000000`00000000 fffffa80`05e0c050 fffff880`04341250 fffffa80`03fef1a8 : nt!KiExceptionDispatch+0xc2
fffff800`00b9c2f0 fffff800`028c90a2 : fffffa80`00000000 00000000`00000002 fffff800`00b9c540 00000000`215e7003 : nt!KiGeneralProtectionFault+0x10a
fffff800`00b9c480 fffff800`028cc1aa : 00000000`00000000 fffff800`02a695f8 fffffa80`039fc040 fffffa80`039fc148 : nt!KiDeferredReadyThread+0x1c2
fffff800`00b9c500 fffff800`028d029e : fffffa80`06d59cd0 fffff800`00b9c618 00000000`00000002 00000000`00000003 : nt!ExQueueWorkItem+0x21a
fffff800`00b9c570 fffff800`028cfdd6 : fffffa80`05e5c1f0 fffffa80`05e5c1f0 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`00b9c5e0 fffff800`028d04be : 00000000`ae1423a2 fffff800`00b9cc58 00000000`00004921 fffff800`02a416a8 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cc30 fffff800`028cfcb7 : 00000000`28c116c3 00000000`00004921 00000000`28c11663 00000000`00000021 : nt!KiTimerExpiration+0x1be
fffff800`00b9ccd0 fffff800`028cceea : fffff800`02a3ee80 fffff800`02a4cc40 00000000`00000000 fffff880`03f60db0 : nt!KiRetireDpcList+0x277
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`028bc46e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------
My System SpecsSystem Spec
31 Jan 2011   #36
rtc0523

Win 7 Ultimate 64 Bit
 
 

Ok since I had already ran memtest I started to stress test my pc with prime95 with one stick of ram in. It ran fine no restarts no BSOD's. Added another stick ran fine. Added a 3rd stick ran fine. Added a 4th stick and I got a BSOD pretty much right as I started the stress test. So I removed the stick in slot 4 and put it into slot 3 and it ran fine. This was all done with my DVD drive disconnected and video card removed. So i put the DVD drive back in and it ran fine through the stress test also. Now that I put my video card back in and started the stress test a few minutes in my computer restarted with no BSOD this time. Ill attach the dump from the BSOD I had with the 4 stick of ram in. Does this mean its my PSU? It seems when I add too much to draw from the PSU is when this happens.



Also I used driver verifier for a little while before I formatted and didnt get any BSOD's either. And its a fresh install so I don't really see it being software related anymore.
My System SpecsSystem Spec
31 Jan 2011   #37
Maguscreed

Microsoft Community Contributor Award Recipient

Windows 7 x64
 
 

Code:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002891313, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac40e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiDeferredReadyThread+433
fffff800`02891313 4c8900          mov     qword ptr [rax],r8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  prime95.exe

TRAP_FRAME:  fffff88002f22600 -- (.trap 0xfffff88002f22600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80039f81a0
rdx=fffff88002f67710 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002891313 rsp=fffff88002f22790 rbp=0000000000000002
 r8=fffffa8005c37100  r9=0000000000000009 r10=fffff8000281c000
r11=fffff88002f227e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiDeferredReadyThread+0x433:
fffff800`02891313 4c8900          mov     qword ptr [rax],r8 ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000288bca9 to fffff8000288c740

STACK_TEXT:  
fffff880`02f224b8 fffff800`0288bca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f224c0 fffff800`0288a920 : fffffa80`05c6d128 fffff880`02f63180 fffffa80`04854c50 fffff880`01686fa4 : nt!KiBugCheckDispatch+0x69
fffff880`02f22600 fffff800`02891313 : fffffa80`05c39248 fffffa80`05c39248 00000000`00000000 fffffa80`05c39240 : nt!KiPageFault+0x260
fffff880`02f22790 fffff800`02897e67 : fffffa80`067bac20 fffffa80`060b4420 fffffa80`060b4420 fffffa80`05695c00 : nt!KiDeferredReadyThread+0x433
fffff880`02f22810 fffff800`028984be : 00000000`3709af64 fffff880`02f22e88 00000000`0000171f fffff880`009e8968 : nt!KiProcessExpiredTimerList+0x157
fffff880`02f22e60 fffff800`02897cb7 : fffff880`009e61c5 fffffa80`0000171f fffffa80`0396a050 00000000`0000001f : nt!KiTimerExpiration+0x1be
fffff880`02f22f00 fffff800`02892865 : 00000000`00000000 fffffa80`0501db60 00000000`00000000 fffff800`029acda0 : nt!KiRetireDpcList+0x277
fffff880`02f22fb0 fffff800`0289267c : fffff880`009e6180 fffff800`02899618 fffff880`068feca0 00000000`00000056 : nt!KxRetireDpcList+0x5
fffff880`068febe0 fffff800`028d6113 : fffff800`028993ac fffff800`02899418 00000000`01fb1600 fffff880`068feca0 : nt!KiDispatchInterruptContinue
fffff880`068fec10 fffff800`02899418 : 00000000`01fb1600 fffff880`068feca0 00000000`6863c140 00000000`6864f35c : nt!KiDpcInterruptBypass+0x13
fffff880`068fec20 00000001`40089735 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSecondaryClockInterrupt+0x1a8
00000000`0410f2f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1`40089735


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDeferredReadyThread+433
fffff800`02891313 4c8900          mov     qword ptr [rax],r8

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiDeferredReadyThread+433

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433

BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433

Followup: MachineOwner
---------

1: kd> lm t n
start             end                 module name
fffff800`00ba9000 fffff800`00bb3000   kdcom    kdcom.dll    Mon Jul 13 20:31:07 2009 (4A5BDFDB)
fffff800`0281c000 fffff800`02df8000   nt       ntkrnlmp.exe Fri Jun 18 23:16:41 2010 (4C1C44A9)
fffff800`02df8000 fffff800`02e41000   hal      hal.dll      Mon Jul 13 20:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 18:20:33 2009 (4A5BC141)
fffff880`00c5c000 fffff880`00c6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 18:19:48 2009 (4A5BC114)
fffff880`00c6c000 fffff880`00c86000   mountmgr mountmgr.sys Mon Jul 13 18:19:54 2009 (4A5BC11A)
fffff880`00c86000 fffff880`00c8f000   atapi    atapi.sys    Mon Jul 13 18:19:47 2009 (4A5BC113)
fffff880`00cab000 fffff880`00cef000   mcupdate mcupdate.dll Mon Jul 13 20:29:10 2009 (4A5BDF66)
fffff880`00cef000 fffff880`00d03000   PSHED    PSHED.dll    Mon Jul 13 20:32:23 2009 (4A5BE027)
fffff880`00d03000 fffff880`00d61000   CLFS     CLFS.SYS     Mon Jul 13 18:19:57 2009 (4A5BC11D)
fffff880`00d61000 fffff880`00d94000   pci      pci.sys      Mon Jul 13 18:19:51 2009 (4A5BC117)
fffff880`00d94000 fffff880`00da9000   partmgr  partmgr.sys  Mon Jul 13 18:19:58 2009 (4A5BC11E)
fffff880`00da9000 fffff880`00db5000   BATTC    BATTC.SYS    Mon Jul 13 18:31:01 2009 (4A5BC3B5)
fffff880`00db5000 fffff880`00dca000   volmgr   volmgr.sys   Mon Jul 13 18:19:57 2009 (4A5BC11D)
fffff880`00dca000 fffff880`00df4000   ataport  ataport.SYS  Mon Jul 13 18:19:52 2009 (4A5BC118)
fffff880`00df4000 fffff880`00dff000   amdxata  amdxata.sys  Tue May 19 12:56:59 2009 (4A12F2EB)
fffff880`00e00000 fffff880`00e0f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 18:19:54 2009 (4A5BC11A)
fffff880`00e0f000 fffff880`00e66000   ACPI     ACPI.sys     Mon Jul 13 18:19:34 2009 (4A5BC106)
fffff880`00e66000 fffff880`00e6f000   WMILIB   WMILIB.SYS   Mon Jul 13 18:19:51 2009 (4A5BC117)
fffff880`00e6f000 fffff880`00e79000   msisadrv msisadrv.sys Mon Jul 13 18:19:26 2009 (4A5BC0FE)
fffff880`00e79000 fffff880`00e86000   vdrvroot vdrvroot.sys Mon Jul 13 19:01:31 2009 (4A5BCADB)
fffff880`00e86000 fffff880`00e8f000   compbatt compbatt.sys Mon Jul 13 18:31:02 2009 (4A5BC3B6)
fffff880`00e8f000 fffff880`00e96000   pciide   pciide.sys   Mon Jul 13 18:19:49 2009 (4A5BC115)
fffff880`00e99000 fffff880`00f59000   CI       CI.dll       Mon Jul 13 20:32:13 2009 (4A5BE01D)
fffff880`00f59000 fffff880`00ffd000   Wdf01000 Wdf01000.sys Mon Jul 13 18:22:07 2009 (4A5BC19F)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 18:49:40 2009 (4A5BC814)
fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Mon Jul 13 18:20:08 2009 (4A5BC128)
fffff880`010f5000 fffff880`01141000   fltmgr   fltmgr.sys   Mon Jul 13 18:19:59 2009 (4A5BC11F)
fffff880`01141000 fffff880`01155000   fileinfo fileinfo.sys Mon Jul 13 18:34:25 2009 (4A5BC481)
fffff880`01155000 fffff880`011b3000   msrpc    msrpc.sys    Mon Jul 13 18:21:32 2009 (4A5BC17C)
fffff880`011b3000 fffff880`011ed000   rdyboost rdyboost.sys Mon Jul 13 18:34:34 2009 (4A5BC48A)
fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 18:19:45 2009 (4A5BC111)
fffff880`01230000 fffff880`013d3000   Ntfs     Ntfs.sys     Mon Jul 13 18:20:47 2009 (4A5BC14F)
fffff880`013d3000 fffff880`013ed000   ksecdd   ksecdd.sys   Mon Jul 13 18:20:54 2009 (4A5BC156)
fffff880`013ed000 fffff880`013fe000   pcw      pcw.sys      Mon Jul 13 18:19:27 2009 (4A5BC0FF)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 18:21:08 2009 (4A5BC164)
fffff880`0144a000 fffff880`0145a000   vmstorfl vmstorfl.sys Mon Jul 13 18:42:54 2009 (4A5BC67E)
fffff880`0145b000 fffff880`0154d000   ndis     ndis.sys     Mon Jul 13 18:21:40 2009 (4A5BC184)
fffff880`0154d000 fffff880`015ad000   NETIO    NETIO.SYS    Thu Apr 08 21:43:59 2010 (4BBE946F)
fffff880`015ad000 fffff880`015d8000   ksecpkg  ksecpkg.sys  Fri Dec 11 00:03:32 2009 (4B21E0B4)
fffff880`015d8000 fffff880`015e0000   spldr    spldr.sys    Mon May 11 11:56:27 2009 (4A0858BB)
fffff880`015e0000 fffff880`015f2000   mup      mup.sys      Mon Jul 13 18:23:45 2009 (4A5BC201)
fffff880`015f2000 fffff880`015fb000   hwpolicy hwpolicy.sys Mon Jul 13 18:19:22 2009 (4A5BC0FA)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 22:39:04 2010 (4C15A458)
fffff880`01800000 fffff880`0180e000   monitor  monitor.sys  Mon Jul 13 18:38:52 2009 (4A5BC58C)
fffff880`01826000 fffff880`01860000   fvevol   fvevol.sys   Fri Sep 25 21:34:26 2009 (4ABD7DB2)
fffff880`01860000 fffff880`01876000   disk     disk.sys     Mon Jul 13 18:19:57 2009 (4A5BC11D)
fffff880`01876000 fffff880`018a6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 18:19:58 2009 (4A5BC11E)
fffff880`018a6000 fffff880`018c9000   luafv    luafv.sys    Mon Jul 13 18:26:13 2009 (4A5BC295)
fffff880`018c9000 fffff880`018de000   lltdio   lltdio.sys   Mon Jul 13 19:08:50 2009 (4A5BCC92)
fffff880`018de000 fffff880`018f6000   rspndr   rspndr.sys   Mon Jul 13 19:08:50 2009 (4A5BCC92)
fffff880`01906000 fffff880`0190f000   Null     Null.SYS     Mon Jul 13 18:19:37 2009 (4A5BC109)
fffff880`0190f000 fffff880`01916000   Beep     Beep.SYS     Mon Jul 13 19:00:13 2009 (4A5BCA8D)
fffff880`01916000 fffff880`01924000   vga      vga.sys      Mon Jul 13 18:38:47 2009 (4A5BC587)
fffff880`01924000 fffff880`01949000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 18:38:51 2009 (4A5BC58B)
fffff880`01949000 fffff880`01959000   watchdog watchdog.sys Mon Jul 13 18:37:35 2009 (4A5BC53F)
fffff880`01959000 fffff880`01962000   RDPCDD   RDPCDD.sys   Mon Jul 13 19:16:34 2009 (4A5BCE62)
fffff880`01962000 fffff880`0196b000   rdpencdd rdpencdd.sys Mon Jul 13 19:16:34 2009 (4A5BCE62)
fffff880`0196b000 fffff880`01974000   rdprefmp rdprefmp.sys Mon Jul 13 19:16:35 2009 (4A5BCE63)
fffff880`01974000 fffff880`0197f000   Msfs     Msfs.SYS     Mon Jul 13 18:19:47 2009 (4A5BC113)
fffff880`0197f000 fffff880`01990000   Npfs     Npfs.SYS     Mon Jul 13 18:19:48 2009 (4A5BC114)
fffff880`01990000 fffff880`019ae000   tdx      tdx.sys      Mon Jul 13 18:21:15 2009 (4A5BC16B)
fffff880`019ae000 fffff880`019bb000   TDI      TDI.SYS      Mon Jul 13 18:21:18 2009 (4A5BC16E)
fffff880`019bb000 fffff880`019fe000   ks       ks.sys       Wed Mar 03 22:32:25 2010 (4B8F37D9)
fffff880`02649000 fffff880`02711000   HTTP     HTTP.sys     Mon Jul 13 18:22:16 2009 (4A5BC1A8)
fffff880`02711000 fffff880`0272f000   bowser   bowser.sys   Mon Jul 13 18:23:50 2009 (4A5BC206)
fffff880`0272f000 fffff880`02747000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:08:25 2009 (4A5BCC79)
fffff880`02747000 fffff880`02774000   mrxsmb   mrxsmb.sys   Sat Feb 27 01:52:19 2010 (4B88CF33)
fffff880`02774000 fffff880`027c2000   mrxsmb10 mrxsmb10.sys Sat Feb 27 01:52:28 2010 (4B88CF3C)
fffff880`027c2000 fffff880`027e5000   mrxsmb20 mrxsmb20.sys Sat Feb 27 01:52:26 2010 (4B88CF3A)
fffff880`02c00000 fffff880`02c0f000   discache discache.sys Mon Jul 13 18:37:18 2009 (4A5BC52E)
fffff880`02c0f000 fffff880`02c1e000   mouclass mouclass.sys Mon Jul 13 18:19:50 2009 (4A5BC116)
fffff880`02c1e000 fffff880`02c30000   umbus    umbus.sys    Mon Jul 13 19:06:56 2009 (4A5BCC20)
fffff880`02c30000 fffff880`02c44000   LMouFilt LMouFilt.Sys Tue Aug 24 12:21:43 2010 (4C73FFA7)
fffff880`02c44000 fffff880`02cce000   afd      afd.sys      Mon Jul 13 18:21:40 2009 (4A5BC184)
fffff880`02cce000 fffff880`02d13000   netbt    netbt.sys    Mon Jul 13 18:21:28 2009 (4A5BC178)
fffff880`02d13000 fffff880`02d1c000   wfplwf   wfplwf.sys   Mon Jul 13 19:09:26 2009 (4A5BCCB6)
fffff880`02d1c000 fffff880`02d42000   pacer    pacer.sys    Mon Jul 13 19:09:41 2009 (4A5BCCC5)
fffff880`02d42000 fffff880`02d51000   netbios  netbios.sys  Mon Jul 13 19:09:26 2009 (4A5BCCB6)
fffff880`02d51000 fffff880`02d6c000   wanarp   wanarp.sys   Mon Jul 13 19:10:21 2009 (4A5BCCED)
fffff880`02d6c000 fffff880`02d80000   termdd   termdd.sys   Mon Jul 13 19:16:36 2009 (4A5BCE64)
fffff880`02d80000 fffff880`02d8a000   SASKUTIL64 SASKUTIL64.SYS Tue Feb 09 16:27:34 2010 (4B71E156)
fffff880`02d8a000 fffff880`02d94000   SASDIFSV64 SASDIFSV64.SYS Mon Feb 08 18:11:52 2010 (4B70A848)
fffff880`02d94000 fffff880`02de5000   rdbss    rdbss.sys    Mon Jul 13 18:24:09 2009 (4A5BC219)
fffff880`02de5000 fffff880`02df1000   nsiproxy nsiproxy.sys Mon Jul 13 18:21:02 2009 (4A5BC15E)
fffff880`02df1000 fffff880`02dfc000   mssmbios mssmbios.sys Mon Jul 13 18:31:10 2009 (4A5BC3BE)
fffff880`03a00000 fffff880`03a1b000   raspppoe raspppoe.sys Mon Jul 13 19:10:17 2009 (4A5BCCE9)
fffff880`03a1b000 fffff880`03a3c000   raspptp  raspptp.sys  Mon Jul 13 19:10:18 2009 (4A5BCCEA)
fffff880`03a3c000 fffff880`03a56000   rassstp  rassstp.sys  Mon Jul 13 19:10:25 2009 (4A5BCCF1)
fffff880`03a56000 fffff880`03a65000   kbdclass kbdclass.sys Mon Jul 13 18:19:50 2009 (4A5BC116)
fffff880`03a69000 fffff880`03aec000   csc      csc.sys      Mon Jul 13 18:24:26 2009 (4A5BC22A)
fffff880`03aec000 fffff880`03b0a000   dfsc     dfsc.sys     Mon Jul 13 18:23:44 2009 (4A5BC200)
fffff880`03b0a000 fffff880`03b1b000   blbdrive blbdrive.sys Mon Jul 13 18:35:59 2009 (4A5BC4DF)
fffff880`03b1b000 fffff880`03b41000   tunnel   tunnel.sys   Mon Jul 13 19:09:37 2009 (4A5BCCC1)
fffff880`03b41000 fffff880`03b57000   intelppm intelppm.sys Mon Jul 13 18:19:25 2009 (4A5BC0FD)
fffff880`03b57000 fffff880`03bad000   USBPORT  USBPORT.SYS  Mon Jul 13 19:06:31 2009 (4A5BCC07)
fffff880`03bad000 fffff880`03bd1000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:10:11 2009 (4A5BCCE3)
fffff880`03bd1000 fffff880`03c00000   ndiswan  ndiswan.sys  Mon Jul 13 19:10:11 2009 (4A5BCCE3)
fffff880`04000000 fffff880`04046000   dxgmms1  dxgmms1.sys  Mon Nov 01 21:50:56 2010 (4CCF7C90)
fffff880`04046000 fffff880`0408f000   e1e6232e e1e6232e.sys Fri Mar 26 03:14:14 2010 (4BAC6CD6)
fffff880`0408f000 fffff880`0409c000   usbuhci  usbuhci.sys  Mon Jul 13 19:06:27 2009 (4A5BCC03)
fffff880`0409c000 fffff880`040ad000   usbehci  usbehci.sys  Mon Jul 13 19:06:30 2009 (4A5BCC06)
fffff880`040ad000 fffff880`040d1000   HDAudBus HDAudBus.sys Mon Jul 13 19:06:13 2009 (4A5BCBF5)
fffff880`040d1000 fffff880`040e1000   CompositeBus CompositeBus.sys Mon Jul 13 19:00:33 2009 (4A5BCAA1)
fffff880`040e1000 fffff880`040ec000   rdpbus   rdpbus.sys   Mon Jul 13 19:17:46 2009 (4A5BCEAA)
fffff880`040ec000 fffff880`041e0000   dxgkrnl  dxgkrnl.sys  Mon Nov 01 21:51:31 2010 (4CCF7CB3)
fffff880`041e0000 fffff880`041f6000   AgileVpn AgileVpn.sys Mon Jul 13 19:10:24 2009 (4A5BCCF0)
fffff880`041f6000 fffff880`041f7480   swenum   swenum.sys   Mon Jul 13 19:00:18 2009 (4A5BCA92)
fffff880`04400000 fffff880`0440e000   kbdhid   kbdhid.sys   Mon Jul 13 19:00:20 2009 (4A5BCA94)
fffff880`0440e000 fffff880`0441b000   mouhid   mouhid.sys   Mon Jul 13 19:00:20 2009 (4A5BCA94)
fffff880`04422000 fffff880`0447c000   usbhub   usbhub.sys   Mon Jul 13 19:07:09 2009 (4A5BCC2D)
fffff880`0447c000 fffff880`04491000   NDProxy  NDProxy.SYS  Mon Jul 13 19:10:05 2009 (4A5BCCDD)
fffff880`04491000 fffff880`044ed000   HdAudio  HdAudio.sys  Mon Jul 13 19:06:59 2009 (4A5BCC23)
fffff880`044ed000 fffff880`0452a000   portcls  portcls.sys  Mon Jul 13 19:06:27 2009 (4A5BCC03)
fffff880`0452a000 fffff880`0454c000   drmk     drmk.sys     Mon Jul 13 20:01:25 2009 (4A5BD8E5)
fffff880`0454c000 fffff880`04551200   ksthunk  ksthunk.sys  Mon Jul 13 19:00:19 2009 (4A5BCA93)
fffff880`04552000 fffff880`04560000   crashdmp crashdmp.sys Mon Jul 13 19:01:01 2009 (4A5BCABD)
fffff880`04560000 fffff880`0456c000   dump_ataport dump_ataport.sys Mon Jul 13 18:19:47 2009 (4A5BC113)
fffff880`0456c000 fffff880`04575000   dump_atapi dump_atapi.sys Mon Jul 13 18:19:47 2009 (4A5BC113)
fffff880`04575000 fffff880`04588000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 18:21:51 2009 (4A5BC18F)
fffff880`04588000 fffff880`04594000   Dxapi    Dxapi.sys    Mon Jul 13 18:38:28 2009 (4A5BC574)
fffff880`04594000 fffff880`045b1000   usbccgp  usbccgp.sys  Mon Jul 13 19:06:45 2009 (4A5BCC15)
fffff880`045b1000 fffff880`045b2f00   USBD     USBD.SYS     Mon Jul 13 19:06:23 2009 (4A5BCBFF)
fffff880`045b3000 fffff880`045c1000   hidusb   hidusb.sys   Mon Jul 13 19:06:22 2009 (4A5BCBFE)
fffff880`045c1000 fffff880`045da000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:06:21 2009 (4A5BCBFD)
fffff880`045da000 fffff880`045e2080   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:06:17 2009 (4A5BCBF9)
fffff880`045e3000 fffff880`045f8000   LHidFilt LHidFilt.Sys Tue Aug 24 12:21:36 2010 (4C73FFA0)
fffff880`0480b000 fffff880`04deffe0   igdkmd64 igdkmd64.sys Wed Sep 23 14:22:57 2009 (4ABA7591)
fffff880`04df0000 fffff880`04dfc000   ndistapi ndistapi.sys Mon Jul 13 19:10:00 2009 (4A5BCCD8)
fffff880`05a00000 fffff880`05a67000   srv2     srv2.sys     Thu Aug 26 22:37:46 2010 (4C77330A)
fffff880`05acf000 fffff880`05b75000   peauth   peauth.sys   Mon Jul 13 20:01:19 2009 (4A5BD8DF)
fffff880`05b75000 fffff880`05b80000   secdrv   secdrv.SYS   Wed Sep 13 08:18:38 2006 (4508052E)
fffff880`05b80000 fffff880`05bad000   srvnet   srvnet.sys   Thu Aug 26 22:37:24 2010 (4C7732F4)
fffff880`05bad000 fffff880`05bbf000   tcpipreg tcpipreg.sys Mon Jul 13 19:09:49 2009 (4A5BCCCD)
fffff880`05cf9000 fffff880`05d8f000   srv      srv.sys      Thu Aug 26 22:38:00 2010 (4C773318)
fffff880`05d8f000 fffff880`05d97000   ALSysIO64 ALSysIO64.sys Sun Apr 19 14:41:04 2009 (49EB7E50)
fffff880`05d97000 fffff880`05dcd000   fastfat  fastfat.SYS  Mon Jul 13 18:23:28 2009 (4A5BC1F0)
fffff960`000a0000 fffff960`003b0000   win32k   win32k.sys   Tue Oct 19 22:08:46 2010 (4CBE5D3E)
fffff960`005b0000 fffff960`005ba000   TSDDD    TSDDD.dll    Mon Jul 13 19:16:34 2009 (4A5BCE62)
fffff960`00600000 fffff960`00627000   cdd      cdd.dll      Mon Nov 01 23:59:22 2010 (4CCF9AAA)

Unloaded modules:
fffff880`018a6000 fffff880`018b4000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018b4000 fffff880`018c0000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018c0000 fffff880`018c9000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018c9000 fffff880`018dc000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`018dc000 fffff880`01906000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
I have to say that is just... nuts. It's like looking into a microscope and seeing a thousand dancing bananas.
My System SpecsSystem Spec
31 Jan 2011   #38
rtc0523

Win 7 Ultimate 64 Bit
 
 

Now I took out my video card and am back on integrated video. And while watching a video it had a BSOD. So I unplugged my mouse and DVD burner and it crashed this time while I was scrolling through my Google reader feeds.
My System SpecsSystem Spec
31 Jan 2011   #39
rtc0523

Win 7 Ultimate 64 Bit
 
 

Weird weird error now. Never saw this one before.

Added another dump.

More dumps.

I really dont know anymore or have any ideas short of throwing this thing out the window.
My System SpecsSystem Spec
01 Feb 2011   #40
rtc0523

Win 7 Ultimate 64 Bit
 
 

Ive established that if i try watching a 720p video on youtube full screened pretty quickly my computer will restart. If that helps to diagnose anything at all.

But I guess that can be caused by the fact Im using integrated video right now.
My System SpecsSystem Spec
Reply

 BSOD's/Restarts have me stumped




Thread Tools




Similar help and support threads
Thread Forum
FF has me STUMPED?
Hi Folks, When a new version of FF is released, I normally disable my Firewall as it tends to block access to certain items during the upgrade. On this occasion, I forgot to do so. Now when I open a web page, (this one for example) the vertical scroll bar is visible till I scoll the page using...
Browsers & Mail
8 BSOD since 22 Jan (fltmgr,ntkrnlpa,ntfs, halmacpi & CI) I am stumped
I have been trying to help my 82 year old father deal with these irritating but not disastrous BSOD faults but I have failed. The machine is a relatively new build and I have run memtest with no problems being reported. I have also cloned the OS to a new SSD from the previous HDD. Any...
BSOD Help and Support
i am stumped
hi all I have a xfinity gateway all in one wifi built in it. this what was going on in the back room of the house my wifes laptop would lose wifi all the time so I got a new gateway thinking the first one was bad but it dose the same thing . so I got a asus 802.11ac rt-56u router thinking the...
Network & Sharing
im stumped and down know what to do BSOD Destruction...
0x0000000A (0x0000000000000000, 0x0000000000000002, 0xfffff80002a79b7e) this it the error i get every time i start my computer now. i was using it and it did a restart that wasnt prompted or anything and all i did was accept a java update from my eset security. i can load safe mode but dont know...
BSOD Help and Support
Ok - I'm stumped
After installing a new program - Revo Unistaller, and un/reinstalling Yahoo Mssngr, and Google Earth - I have had what appears to be the Win7 security sheild, I'm guessing (it's blue/gold or yelloe) attached to the icons. I was thinking it was probably a compatability issue, or maybe a security...
General Discussion
I'm stumped by this BSOD
My sister gave me her laptop to take a look at (me being the "one who can fix 'em" ). There's a persistent BSOD at windows load right before it tries to get to the login screen. The error message flashes so fast I can't really seem to make out but I THINK it's a 0x0000007e error (though I'm not...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

й Designer Media Ltd

All times are GMT -5. The time now is 23:05.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App