Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD's/Restarts have me stumped

31 Jan 2011   #31
jcgriff2

Windows 7 - Vista
 
 

Hi -

Update your Intel 82562V-2 10/100 Network Connection Ethernet driver -
Code:
e1e6032e.sys    Tue Mar 24 14:17:23 2009 (49C923B3)
Intel Driver downloads - http://downloadcenter.intel.com/Default.aspx?lang=eng


Remove Daemon Tools.


"mouse" is mentioned in one of the 3 dumps.


Windbg Logs
--> http://sysnative.com/bsod2011/jcgrif..._jcgriff2_.txt
--> http://sysnative.com/bsod2011/jcgrif...riff2_.txt.zip

Regards. . .

jcgriff2

`


BSOD BUGCHECK SUMMARY
Code:
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Debug session time: Mon Jan 31 02:48:45.039 2011 (GMT-5)
System Uptime: 0 days 0:29:31.161
Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+47e )
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  System
FAILURE_BUCKET_ID:  X64_0xA_mouclass!MouseClassServiceCallback+47e
Bugcheck code 0000000A
Arguments 00000000`00000048 00000000`00000002 00000000`00000000 fffff800`028c10a2
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Debug session time: Mon Jan 31 01:06:08.353 2011 (GMT-5)
System Uptime: 0 days 0:03:21.085
Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+433 )
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  Steam.exe
FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433
Bugcheck code 0000000A
Arguments 00000000`00000018 00000000`00000002 00000000`00000001 fffff800`02883313
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Debug session time: Mon Jan 31 01:01:15.133 2011 (GMT-5)
System Uptime: 0 days 0:22:51.255
Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+433 )
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  wmpnetwk.exe
FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433
Bugcheck code 0000000A
Arguments 00000000`00010002 00000000`00000002 00000000`00000001 fffff800`028bf313
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
 
by jcgriff2     
 
      J. C. Griffith, Microsoft MVP   
 
        https://mvp.support.microsoft.com/profile/Griffith   
 
        www.sysnative.com
 
        www.jcgriff2.com 
 
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии



My System SpecsSystem Spec
.
31 Jan 2011   #32
rtc0523

Win 7 Ultimate 64 Bit
 
 

Ive been trying to update the Intel driver but I cant stay on the computer long enough before it reboots itself to get and install the driver.
My System SpecsSystem Spec
31 Jan 2011   #33
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Can you install it in the safe mode?
My System SpecsSystem Spec
.

31 Jan 2011   #34
rtc0523

Win 7 Ultimate 64 Bit
 
 

Ok I managed to install the drivers but the computer was still restarting. So I also installed the software for my mouse and keyboard. Still had restarting/BSOD's. Next I opened up the computer and reseated the RAM and my video card and it fixed nothing. So now I took out my video card and hooked up to my motherboard's integrated video and am still having the same problems. I even tried disconnecting my mouse and using a different one which also didnt fix anything. Ive been trying to post this message on the computer with the problem but I keep BSOD or restarting. So once it gives me enough time I will upload the most recent BSOD's to see if there is anything new.


Added dumps
My System SpecsSystem Spec
31 Jan 2011   #35
CarlTR6

Windows 7 Ultimate 32 bit
 
 

I looked at your 7 dumps. Out of the 7 dumps, there are 5 different bugcheck codes. This indicates a hardware or hardware related (driver) problem.

I suggest you test your RAM with Mentest86 following the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off for an hour or so. Let it run for at least 7 passes. This will take 6 - 8 hours. Post back with your results.

If Memtest shows no errors, enable Driver Verifier carefully following the instructions in this tutorial: Driver Verifier - Enable and Disable. Upload all dumps triggered by Driver Verifier.


Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0284c000 PsLoadedModuleList = 0xfffff800`02a89e50
Debug session time: Mon Jan 31 14:09:25.610 2011 (GMT-5)
System Uptime: 0 days 0:06:12.343
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {190, 2, 0, fffff800028c48db}

Probably caused by : ntkrnlmp.exe ( nt!KiSearchForNewThread+26b )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000190, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028c48db, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002af40e0
 0000000000000190 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiSearchForNewThread+26b
fffff800`028c48db 66453b9080010000 cmp     r10w,word ptr [r8+180h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f1bb50 -- (.trap 0xfffff88002f1bb50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000100 rbx=0000000000000000 rcx=fffff88002fd8700
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028c48db rsp=fffff88002f1bce0 rbp=0000000000000001
 r8=0000000000000010  r9=0000000000000008 r10=0000000000000000
r11=fffff880031a1b80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiSearchForNewThread+0x26b:
fffff800`028c48db 66453b9080010000 cmp     r10w,word ptr [r8+180h] ds:bc98:00000000`00000190=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028bbca9 to fffff800028bc740

STACK_TEXT:  
fffff880`02f1ba08 fffff800`028bbca9 : 00000000`0000000a 00000000`00000190 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1ba10 fffff800`028ba920 : 00000000`2f45b17c 00000000`00000000 fffffa80`05766101 fffffa80`047bf1b0 : nt!KiBugCheckDispatch+0x69
fffff880`02f1bb50 fffff800`028c48db : 00000000`33f0a83b 00000000`0000003b fffffa80`043db600 400000c2`400000c1 : nt!KiPageFault+0x260
fffff880`02f1bce0 fffff800`0287409a : 00000000`00000000 00000000`00000000 fffff880`00000000 00000000`00000001 : nt!KiSearchForNewThread+0x26b
fffff880`02f1bd50 fffff800`028c4fc6 : fffff880`009e6180 fffff880`009f0fc0 00000000`00000000 fffff880`00c14f44 : nt!KiIdleSchedule+0x7a
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x136


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSearchForNewThread+26b
fffff800`028c48db 66453b9080010000 cmp     r10w,word ptr [r8+180h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiSearchForNewThread+26b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!KiSearchForNewThread+26b

BUCKET_ID:  X64_0xA_nt!KiSearchForNewThread+26b

Followup: MachineOwner
---------

Debug session time: Mon Jan 31 14:32:19.893 2011 (GMT-5)
System Uptime: 0 days 0:05:40.000
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8800318dc47, 1, fffff80002883590, 0}


Could not read faulting driver name
Probably caused by : memory_corruption

Followup: memory_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8800318dc47, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002883590, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abd0e0
 fffff8800318dc47 

FAULTING_IP: 
nt!KiGeneralProtectionFault+10
fffff800`02883590 c645ab01        mov     byte ptr [rbp-55h],1

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880031851c0 -- (.trap 0xfffff880031851c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002f63180 rbx=0000000000000000 rcx=ffff00000573ead0
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002883590 rsp=fffff88003185350 rbp=fffff8800318dc9c
 r8=fffffa8003b24348  r9=fffffa8003b24240 r10=fffffa8005f6c010
r11=fffffa8003b24390 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po nc
nt!KiGeneralProtectionFault+0x10:
fffff800`02883590 c645ab01        mov     byte ptr [rbp-55h],1 ss:0018:fffff880`0318dc47=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002905f14 to fffff80002885740

STACK_TEXT:  
fffff880`03185058 fffff800`02905f14 : 00000000`00000050 fffff880`0318dc47 00000000`00000001 fffff880`031851c0 : nt!KeBugCheckEx
fffff880`03185060 fffff800`0288382e : 00000000`00000001 fffffa80`047c8100 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`031851c0 fffff800`02883590 : 00000000`00000000 fffffa80`00fa5200 00000580`00000001 fffffa80`039f8f48 : nt!KiPageFault+0x16e
fffff880`03185350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
30 errors : !nt (fffff8000288358c-fffff8000288367d)
fffff80002883580  55  48  81  ec  58  01  00  00  48  8d  ac  24 *4c *89  00  00 UH..X...H..$L...
fffff80002883590  c6  45  ab  01  48  89  45  b0  48  89  4d  b8 *65 *4c  55  c0 .E..H.E.H.M.eLU.
fffff800028835a0  4c  89  45  c8  4c  89  4d  d0  4c  89  55  d8 *80 *fa  5d  e0 L.E.L.M.L.U...].
fffff800028835b0  f6  85  f0  00  00  00  01  74  64  0f  01  f8 *00 *00  8b  14 .......td.......
fffff800028835c0  25  88  01  00  00  41  f6  42  03  80  74  3c *79 *82  01  00 %....A.B..t<y...
fffff800028835d0  c0  0f  32  48  c1  e2  20  48  0b  c2  49  39 *8a *c4  00  00 ..2H.. H..I9....
fffff800028835e0  00  74  25  49  39  82  b0  01  00  00  74  1c *83 *02  92  b8 .t%I9.....t.....
fffff800028835f0  01  00  00  41  0f  ba  6a  4c  0b  66  41  ff *00 *fc  01  00 ...A..jL.fA.....
fffff80002883600  00  48  89  82  80  00  00  00  41  f6  42  03 *af *55  c7  85 .H......A.B..U..
fffff80002883610  80  00  00  00  00  00  74  05  e8  d3  25  00 *29 *65  0f  ae ......t...%.)e..
fffff80002883620  5d  ac  65  0f  ae  14  25  80  01  00  00  0f *01 *00  f0  0f ].e...%.........
fffff80002883630  29  4d  00  0f  29  55  10  0f  29  5d  20  0f *00 *00  30  0f )M..)U..)] ...0.
...
fffff80002883650  85  e0  00  00  00  48  f7  85  f8  00  00  00 *33 *d2  00  00 .....H......3...
fffff80002883660  74  01  fb  b9  01  00  00  10  ba  02  00  00 *7f *e1  8b  8d t...............
fffff80002883670  e0  00  00  00  41  81  e1  ff  ff  00  00  4d *48 *83  4c  8b ....A......MH.L.

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption
---------

Debug session time: Mon Jan 31 14:36:48.806 2011 (GMT-5)
System Uptime: 0 days 0:03:59.912
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000284b95b, fffff88006f10e60, 0}

Probably caused by : ntkrnlmp.exe ( nt!ExQueryPoolUsage+e0 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000284b95b, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88006f10e60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExQueryPoolUsage+e0
fffff800`0284b95b 8379e400        cmp     dword ptr [rcx-1Ch],0

CONTEXT:  fffff88006f10e60 -- (.cxr 0xfffff88006f10e60)
rax=000000000288a6dc rbx=0000000000000000 rcx=000003880000049f
rdx=fffff88006f1197c rsi=0000000000033cc3 rdi=00000000001bf290
rip=fffff8000284b95b rsp=fffff88006f11830 rbp=fffff88006f11ca0
 r8=fffff88006f11978  r9=fffff80002a31720 r10=0000000000000005
r11=fffff88006f1195c r12=0000000000000004 r13=0000000000009a62
r14=fffff80002ac4900 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010203
nt!ExQueryPoolUsage+0xe0:
fffff800`0284b95b 8379e400        cmp     dword ptr [rcx-1Ch],0 ds:002b:00000388`00000483=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  WMIADAP.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b897ab to fffff8000284b95b

STACK_TEXT:  
fffff880`06f11830 fffff800`02b897ab : 00000000`00000000 00000000`00033cc3 00000000`00033cc3 00000000`00000026 : nt!ExQueryPoolUsage+0xe0
fffff880`06f11840 fffff800`02b8b1e5 : 00000000`001bf290 fffff800`02b8710e 00000000`00000003 00000000`00000000 : nt!ExpQuerySystemInformation+0x5a9
fffff880`06f11be0 fffff800`0288b993 : 00000000`00000164 fffff880`06f11ca0 ffffffff`fffe7960 00000000`00000000 : nt!NtQuerySystemInformation+0x4d
fffff880`06f11c20 00000000`773500ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001bf1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773500ba


FOLLOWUP_IP: 
nt!ExQueryPoolUsage+e0
fffff800`0284b95b 8379e400        cmp     dword ptr [rcx-1Ch],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExQueryPoolUsage+e0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88006f10e60 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExQueryPoolUsage+e0

BUCKET_ID:  X64_0x3B_nt!ExQueryPoolUsage+e0

Followup: MachineOwner
---------

Debug session time: Mon Jan 31 15:01:04.954 2011 (GMT-5)
System Uptime: 0 days 0:00:40.060
Loading Kernel Symbols
...............................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1, {744a2dd9, 0, ffff, fffff88002baeca0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->KernelApcDisable field. A negative value indicates that a driver
has disabled APC calls without re-enabling them.  A positive value indicates
that the reverse is true. This check is made on exit from a system call.
Arguments:
Arg1: 00000000744a2dd9, address of system function (system call)
Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
Arg3: 000000000000ffff, Thread->KernelApcDisable
Arg4: fffff88002baeca0, Previous KernelApcDisable

Debugging Details:
------------------


FAULTING_IP: 
+5ac0952f01a5def0
00000000`744a2dd9 c3              ret

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1

PROCESS_NAME:  AvastSvc.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8000287dca9 to fffff8000287e740

STACK_TEXT:  
fffff880`02baea68 fffff800`0287dca9 : 00000000`00000001 00000000`744a2dd9 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff880`02baea70 fffff800`0287dbe0 : 00000000`04fafd20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02baebb0 00000000`744a2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`04faf0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x744a2dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceExit+245
fffff800`0287dbe0 4883ec50        sub     rsp,50h

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceExit+245

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1_nt!KiSystemServiceExit+245

BUCKET_ID:  X64_0x1_nt!KiSystemServiceExit+245

Followup: MachineOwner
---------

Debug session time: Mon Jan 31 13:14:37.323 2011 (GMT-5)
System Uptime: 0 days 0:04:52.055
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+5ac0952f01b7ddf0
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000b9c248 -- (.exr 0xfffff80000b9c248)
ExceptionAddress: fffff800028c90a2 (nt!KiDeferredReadyThread+0x00000000000001c2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000b9c2f0 -- (.trap 0xfffff80000b9c2f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff000002a4cb80 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028c90a2 rsp=fffff80000b9c480 rbp=0000000000000002
 r8=0000000000000001  r9=fffff80002bb78dc r10=fffff80002854000
r11=fffff80002a3ee80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiDeferredReadyThread+0x1c2:
fffff800`028c90a2 663b5048        cmp     dx,word ptr [rax+48h] ds:ffff0000`02a4cbc8=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028bc46e to fffff800028c4710

STACK_TEXT:  
fffff800`00b9b338 fffff800`028bc46e : 00000000`00000000 00000000`00000000 fffff800`00b9bab0 fffff800`028f1668 : nt!KeBugCheck
fffff800`00b9b340 fffff800`028ea40d : fffff800`02ad2b7c fffff800`02a0ce84 fffff800`02854000 fffff800`00b9c248 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00b9b370 fffff800`028f1a90 : fffff800`02a13b14 fffff800`00b9b3e8 fffff800`00b9c248 fffff800`02854000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b9b3a0 fffff800`028fe9ef : fffff800`00b9c248 fffff800`00b9bab0 fffff800`00000000 fffffa80`039fc040 : nt!RtlDispatchException+0x410
fffff800`00b9ba80 fffff800`028c3d82 : fffff800`00b9c248 fffff880`02f63180 fffff800`00b9c2f0 fffff800`02a3ee80 : nt!KiDispatchException+0x16f
fffff800`00b9c110 fffff800`028c268a : 00000000`00000000 fffffa80`05e0c050 fffff880`04341250 fffffa80`03fef1a8 : nt!KiExceptionDispatch+0xc2
fffff800`00b9c2f0 fffff800`028c90a2 : fffffa80`00000000 00000000`00000002 fffff800`00b9c540 00000000`215e7003 : nt!KiGeneralProtectionFault+0x10a
fffff800`00b9c480 fffff800`028cc1aa : 00000000`00000000 fffff800`02a695f8 fffffa80`039fc040 fffffa80`039fc148 : nt!KiDeferredReadyThread+0x1c2
fffff800`00b9c500 fffff800`028d029e : fffffa80`06d59cd0 fffff800`00b9c618 00000000`00000002 00000000`00000003 : nt!ExQueueWorkItem+0x21a
fffff800`00b9c570 fffff800`028cfdd6 : fffffa80`05e5c1f0 fffffa80`05e5c1f0 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`00b9c5e0 fffff800`028d04be : 00000000`ae1423a2 fffff800`00b9cc58 00000000`00004921 fffff800`02a416a8 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cc30 fffff800`028cfcb7 : 00000000`28c116c3 00000000`00004921 00000000`28c11663 00000000`00000021 : nt!KiTimerExpiration+0x1be
fffff800`00b9ccd0 fffff800`028cceea : fffff800`02a3ee80 fffff800`02a4cc40 00000000`00000000 fffff880`03f60db0 : nt!KiRetireDpcList+0x277
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`028bc46e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------
My System SpecsSystem Spec
31 Jan 2011   #36
rtc0523

Win 7 Ultimate 64 Bit
 
 

Ok since I had already ran memtest I started to stress test my pc with prime95 with one stick of ram in. It ran fine no restarts no BSOD's. Added another stick ran fine. Added a 3rd stick ran fine. Added a 4th stick and I got a BSOD pretty much right as I started the stress test. So I removed the stick in slot 4 and put it into slot 3 and it ran fine. This was all done with my DVD drive disconnected and video card removed. So i put the DVD drive back in and it ran fine through the stress test also. Now that I put my video card back in and started the stress test a few minutes in my computer restarted with no BSOD this time. Ill attach the dump from the BSOD I had with the 4 stick of ram in. Does this mean its my PSU? It seems when I add too much to draw from the PSU is when this happens.



Also I used driver verifier for a little while before I formatted and didnt get any BSOD's either. And its a fresh install so I don't really see it being software related anymore.
My System SpecsSystem Spec
31 Jan 2011   #37
Maguscreed

Microsoft Community Contributor Award Recipient

Windows 7 x64
 
 

Code:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002891313, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac40e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiDeferredReadyThread+433
fffff800`02891313 4c8900          mov     qword ptr [rax],r8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  prime95.exe

TRAP_FRAME:  fffff88002f22600 -- (.trap 0xfffff88002f22600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80039f81a0
rdx=fffff88002f67710 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002891313 rsp=fffff88002f22790 rbp=0000000000000002
 r8=fffffa8005c37100  r9=0000000000000009 r10=fffff8000281c000
r11=fffff88002f227e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiDeferredReadyThread+0x433:
fffff800`02891313 4c8900          mov     qword ptr [rax],r8 ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000288bca9 to fffff8000288c740

STACK_TEXT:  
fffff880`02f224b8 fffff800`0288bca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f224c0 fffff800`0288a920 : fffffa80`05c6d128 fffff880`02f63180 fffffa80`04854c50 fffff880`01686fa4 : nt!KiBugCheckDispatch+0x69
fffff880`02f22600 fffff800`02891313 : fffffa80`05c39248 fffffa80`05c39248 00000000`00000000 fffffa80`05c39240 : nt!KiPageFault+0x260
fffff880`02f22790 fffff800`02897e67 : fffffa80`067bac20 fffffa80`060b4420 fffffa80`060b4420 fffffa80`05695c00 : nt!KiDeferredReadyThread+0x433
fffff880`02f22810 fffff800`028984be : 00000000`3709af64 fffff880`02f22e88 00000000`0000171f fffff880`009e8968 : nt!KiProcessExpiredTimerList+0x157
fffff880`02f22e60 fffff800`02897cb7 : fffff880`009e61c5 fffffa80`0000171f fffffa80`0396a050 00000000`0000001f : nt!KiTimerExpiration+0x1be
fffff880`02f22f00 fffff800`02892865 : 00000000`00000000 fffffa80`0501db60 00000000`00000000 fffff800`029acda0 : nt!KiRetireDpcList+0x277
fffff880`02f22fb0 fffff800`0289267c : fffff880`009e6180 fffff800`02899618 fffff880`068feca0 00000000`00000056 : nt!KxRetireDpcList+0x5
fffff880`068febe0 fffff800`028d6113 : fffff800`028993ac fffff800`02899418 00000000`01fb1600 fffff880`068feca0 : nt!KiDispatchInterruptContinue
fffff880`068fec10 fffff800`02899418 : 00000000`01fb1600 fffff880`068feca0 00000000`6863c140 00000000`6864f35c : nt!KiDpcInterruptBypass+0x13
fffff880`068fec20 00000001`40089735 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSecondaryClockInterrupt+0x1a8
00000000`0410f2f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1`40089735


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDeferredReadyThread+433
fffff800`02891313 4c8900          mov     qword ptr [rax],r8

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiDeferredReadyThread+433

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433

BUCKET_ID:  X64_0xA_nt!KiDeferredReadyThread+433

Followup: MachineOwner
---------

1: kd> lm t n
start             end                 module name
fffff800`00ba9000 fffff800`00bb3000   kdcom    kdcom.dll    Mon Jul 13 20:31:07 2009 (4A5BDFDB)
fffff800`0281c000 fffff800`02df8000   nt       ntkrnlmp.exe Fri Jun 18 23:16:41 2010 (4C1C44A9)
fffff800`02df8000 fffff800`02e41000   hal      hal.dll      Mon Jul 13 20:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 18:20:33 2009 (4A5BC141)
fffff880`00c5c000 fffff880`00c6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 18:19:48 2009 (4A5BC114)
fffff880`00c6c000 fffff880`00c86000   mountmgr mountmgr.sys Mon Jul 13 18:19:54 2009 (4A5BC11A)
fffff880`00c86000 fffff880`00c8f000   atapi    atapi.sys    Mon Jul 13 18:19:47 2009 (4A5BC113)
fffff880`00cab000 fffff880`00cef000   mcupdate mcupdate.dll Mon Jul 13 20:29:10 2009 (4A5BDF66)
fffff880`00cef000 fffff880`00d03000   PSHED    PSHED.dll    Mon Jul 13 20:32:23 2009 (4A5BE027)
fffff880`00d03000 fffff880`00d61000   CLFS     CLFS.SYS     Mon Jul 13 18:19:57 2009 (4A5BC11D)
fffff880`00d61000 fffff880`00d94000   pci      pci.sys      Mon Jul 13 18:19:51 2009 (4A5BC117)
fffff880`00d94000 fffff880`00da9000   partmgr  partmgr.sys  Mon Jul 13 18:19:58 2009 (4A5BC11E)
fffff880`00da9000 fffff880`00db5000   BATTC    BATTC.SYS    Mon Jul 13 18:31:01 2009 (4A5BC3B5)
fffff880`00db5000 fffff880`00dca000   volmgr   volmgr.sys   Mon Jul 13 18:19:57 2009 (4A5BC11D)
fffff880`00dca000 fffff880`00df4000   ataport  ataport.SYS  Mon Jul 13 18:19:52 2009 (4A5BC118)
fffff880`00df4000 fffff880`00dff000   amdxata  amdxata.sys  Tue May 19 12:56:59 2009 (4A12F2EB)
fffff880`00e00000 fffff880`00e0f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 18:19:54 2009 (4A5BC11A)
fffff880`00e0f000 fffff880`00e66000   ACPI     ACPI.sys     Mon Jul 13 18:19:34 2009 (4A5BC106)
fffff880`00e66000 fffff880`00e6f000   WMILIB   WMILIB.SYS   Mon Jul 13 18:19:51 2009 (4A5BC117)
fffff880`00e6f000 fffff880`00e79000   msisadrv msisadrv.sys Mon Jul 13 18:19:26 2009 (4A5BC0FE)
fffff880`00e79000 fffff880`00e86000   vdrvroot vdrvroot.sys Mon Jul 13 19:01:31 2009 (4A5BCADB)
fffff880`00e86000 fffff880`00e8f000   compbatt compbatt.sys Mon Jul 13 18:31:02 2009 (4A5BC3B6)
fffff880`00e8f000 fffff880`00e96000   pciide   pciide.sys   Mon Jul 13 18:19:49 2009 (4A5BC115)
fffff880`00e99000 fffff880`00f59000   CI       CI.dll       Mon Jul 13 20:32:13 2009 (4A5BE01D)
fffff880`00f59000 fffff880`00ffd000   Wdf01000 Wdf01000.sys Mon Jul 13 18:22:07 2009 (4A5BC19F)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 18:49:40 2009 (4A5BC814)
fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Mon Jul 13 18:20:08 2009 (4A5BC128)
fffff880`010f5000 fffff880`01141000   fltmgr   fltmgr.sys   Mon Jul 13 18:19:59 2009 (4A5BC11F)
fffff880`01141000 fffff880`01155000   fileinfo fileinfo.sys Mon Jul 13 18:34:25 2009 (4A5BC481)
fffff880`01155000 fffff880`011b3000   msrpc    msrpc.sys    Mon Jul 13 18:21:32 2009 (4A5BC17C)
fffff880`011b3000 fffff880`011ed000   rdyboost rdyboost.sys Mon Jul 13 18:34:34 2009 (4A5BC48A)
fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 18:19:45 2009 (4A5BC111)
fffff880`01230000 fffff880`013d3000   Ntfs     Ntfs.sys     Mon Jul 13 18:20:47 2009 (4A5BC14F)
fffff880`013d3000 fffff880`013ed000   ksecdd   ksecdd.sys   Mon Jul 13 18:20:54 2009 (4A5BC156)
fffff880`013ed000 fffff880`013fe000   pcw      pcw.sys      Mon Jul 13 18:19:27 2009 (4A5BC0FF)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 18:21:08 2009 (4A5BC164)
fffff880`0144a000 fffff880`0145a000   vmstorfl vmstorfl.sys Mon Jul 13 18:42:54 2009 (4A5BC67E)
fffff880`0145b000 fffff880`0154d000   ndis     ndis.sys     Mon Jul 13 18:21:40 2009 (4A5BC184)
fffff880`0154d000 fffff880`015ad000   NETIO    NETIO.SYS    Thu Apr 08 21:43:59 2010 (4BBE946F)
fffff880`015ad000 fffff880`015d8000   ksecpkg  ksecpkg.sys  Fri Dec 11 00:03:32 2009 (4B21E0B4)
fffff880`015d8000 fffff880`015e0000   spldr    spldr.sys    Mon May 11 11:56:27 2009 (4A0858BB)
fffff880`015e0000 fffff880`015f2000   mup      mup.sys      Mon Jul 13 18:23:45 2009 (4A5BC201)
fffff880`015f2000 fffff880`015fb000   hwpolicy hwpolicy.sys Mon Jul 13 18:19:22 2009 (4A5BC0FA)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 22:39:04 2010 (4C15A458)
fffff880`01800000 fffff880`0180e000   monitor  monitor.sys  Mon Jul 13 18:38:52 2009 (4A5BC58C)
fffff880`01826000 fffff880`01860000   fvevol   fvevol.sys   Fri Sep 25 21:34:26 2009 (4ABD7DB2)
fffff880`01860000 fffff880`01876000   disk     disk.sys     Mon Jul 13 18:19:57 2009 (4A5BC11D)
fffff880`01876000 fffff880`018a6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 18:19:58 2009 (4A5BC11E)
fffff880`018a6000 fffff880`018c9000   luafv    luafv.sys    Mon Jul 13 18:26:13 2009 (4A5BC295)
fffff880`018c9000 fffff880`018de000   lltdio   lltdio.sys   Mon Jul 13 19:08:50 2009 (4A5BCC92)
fffff880`018de000 fffff880`018f6000   rspndr   rspndr.sys   Mon Jul 13 19:08:50 2009 (4A5BCC92)
fffff880`01906000 fffff880`0190f000   Null     Null.SYS     Mon Jul 13 18:19:37 2009 (4A5BC109)
fffff880`0190f000 fffff880`01916000   Beep     Beep.SYS     Mon Jul 13 19:00:13 2009 (4A5BCA8D)
fffff880`01916000 fffff880`01924000   vga      vga.sys      Mon Jul 13 18:38:47 2009 (4A5BC587)
fffff880`01924000 fffff880`01949000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 18:38:51 2009 (4A5BC58B)
fffff880`01949000 fffff880`01959000   watchdog watchdog.sys Mon Jul 13 18:37:35 2009 (4A5BC53F)
fffff880`01959000 fffff880`01962000   RDPCDD   RDPCDD.sys   Mon Jul 13 19:16:34 2009 (4A5BCE62)
fffff880`01962000 fffff880`0196b000   rdpencdd rdpencdd.sys Mon Jul 13 19:16:34 2009 (4A5BCE62)
fffff880`0196b000 fffff880`01974000   rdprefmp rdprefmp.sys Mon Jul 13 19:16:35 2009 (4A5BCE63)
fffff880`01974000 fffff880`0197f000   Msfs     Msfs.SYS     Mon Jul 13 18:19:47 2009 (4A5BC113)
fffff880`0197f000 fffff880`01990000   Npfs     Npfs.SYS     Mon Jul 13 18:19:48 2009 (4A5BC114)
fffff880`01990000 fffff880`019ae000   tdx      tdx.sys      Mon Jul 13 18:21:15 2009 (4A5BC16B)
fffff880`019ae000 fffff880`019bb000   TDI      TDI.SYS      Mon Jul 13 18:21:18 2009 (4A5BC16E)
fffff880`019bb000 fffff880`019fe000   ks       ks.sys       Wed Mar 03 22:32:25 2010 (4B8F37D9)
fffff880`02649000 fffff880`02711000   HTTP     HTTP.sys     Mon Jul 13 18:22:16 2009 (4A5BC1A8)
fffff880`02711000 fffff880`0272f000   bowser   bowser.sys   Mon Jul 13 18:23:50 2009 (4A5BC206)
fffff880`0272f000 fffff880`02747000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:08:25 2009 (4A5BCC79)
fffff880`02747000 fffff880`02774000   mrxsmb   mrxsmb.sys   Sat Feb 27 01:52:19 2010 (4B88CF33)
fffff880`02774000 fffff880`027c2000   mrxsmb10 mrxsmb10.sys Sat Feb 27 01:52:28 2010 (4B88CF3C)
fffff880`027c2000 fffff880`027e5000   mrxsmb20 mrxsmb20.sys Sat Feb 27 01:52:26 2010 (4B88CF3A)
fffff880`02c00000 fffff880`02c0f000   discache discache.sys Mon Jul 13 18:37:18 2009 (4A5BC52E)
fffff880`02c0f000 fffff880`02c1e000   mouclass mouclass.sys Mon Jul 13 18:19:50 2009 (4A5BC116)
fffff880`02c1e000 fffff880`02c30000   umbus    umbus.sys    Mon Jul 13 19:06:56 2009 (4A5BCC20)
fffff880`02c30000 fffff880`02c44000   LMouFilt LMouFilt.Sys Tue Aug 24 12:21:43 2010 (4C73FFA7)
fffff880`02c44000 fffff880`02cce000   afd      afd.sys      Mon Jul 13 18:21:40 2009 (4A5BC184)
fffff880`02cce000 fffff880`02d13000   netbt    netbt.sys    Mon Jul 13 18:21:28 2009 (4A5BC178)
fffff880`02d13000 fffff880`02d1c000   wfplwf   wfplwf.sys   Mon Jul 13 19:09:26 2009 (4A5BCCB6)
fffff880`02d1c000 fffff880`02d42000   pacer    pacer.sys    Mon Jul 13 19:09:41 2009 (4A5BCCC5)
fffff880`02d42000 fffff880`02d51000   netbios  netbios.sys  Mon Jul 13 19:09:26 2009 (4A5BCCB6)
fffff880`02d51000 fffff880`02d6c000   wanarp   wanarp.sys   Mon Jul 13 19:10:21 2009 (4A5BCCED)
fffff880`02d6c000 fffff880`02d80000   termdd   termdd.sys   Mon Jul 13 19:16:36 2009 (4A5BCE64)
fffff880`02d80000 fffff880`02d8a000   SASKUTIL64 SASKUTIL64.SYS Tue Feb 09 16:27:34 2010 (4B71E156)
fffff880`02d8a000 fffff880`02d94000   SASDIFSV64 SASDIFSV64.SYS Mon Feb 08 18:11:52 2010 (4B70A848)
fffff880`02d94000 fffff880`02de5000   rdbss    rdbss.sys    Mon Jul 13 18:24:09 2009 (4A5BC219)
fffff880`02de5000 fffff880`02df1000   nsiproxy nsiproxy.sys Mon Jul 13 18:21:02 2009 (4A5BC15E)
fffff880`02df1000 fffff880`02dfc000   mssmbios mssmbios.sys Mon Jul 13 18:31:10 2009 (4A5BC3BE)
fffff880`03a00000 fffff880`03a1b000   raspppoe raspppoe.sys Mon Jul 13 19:10:17 2009 (4A5BCCE9)
fffff880`03a1b000 fffff880`03a3c000   raspptp  raspptp.sys  Mon Jul 13 19:10:18 2009 (4A5BCCEA)
fffff880`03a3c000 fffff880`03a56000   rassstp  rassstp.sys  Mon Jul 13 19:10:25 2009 (4A5BCCF1)
fffff880`03a56000 fffff880`03a65000   kbdclass kbdclass.sys Mon Jul 13 18:19:50 2009 (4A5BC116)
fffff880`03a69000 fffff880`03aec000   csc      csc.sys      Mon Jul 13 18:24:26 2009 (4A5BC22A)
fffff880`03aec000 fffff880`03b0a000   dfsc     dfsc.sys     Mon Jul 13 18:23:44 2009 (4A5BC200)
fffff880`03b0a000 fffff880`03b1b000   blbdrive blbdrive.sys Mon Jul 13 18:35:59 2009 (4A5BC4DF)
fffff880`03b1b000 fffff880`03b41000   tunnel   tunnel.sys   Mon Jul 13 19:09:37 2009 (4A5BCCC1)
fffff880`03b41000 fffff880`03b57000   intelppm intelppm.sys Mon Jul 13 18:19:25 2009 (4A5BC0FD)
fffff880`03b57000 fffff880`03bad000   USBPORT  USBPORT.SYS  Mon Jul 13 19:06:31 2009 (4A5BCC07)
fffff880`03bad000 fffff880`03bd1000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:10:11 2009 (4A5BCCE3)
fffff880`03bd1000 fffff880`03c00000   ndiswan  ndiswan.sys  Mon Jul 13 19:10:11 2009 (4A5BCCE3)
fffff880`04000000 fffff880`04046000   dxgmms1  dxgmms1.sys  Mon Nov 01 21:50:56 2010 (4CCF7C90)
fffff880`04046000 fffff880`0408f000   e1e6232e e1e6232e.sys Fri Mar 26 03:14:14 2010 (4BAC6CD6)
fffff880`0408f000 fffff880`0409c000   usbuhci  usbuhci.sys  Mon Jul 13 19:06:27 2009 (4A5BCC03)
fffff880`0409c000 fffff880`040ad000   usbehci  usbehci.sys  Mon Jul 13 19:06:30 2009 (4A5BCC06)
fffff880`040ad000 fffff880`040d1000   HDAudBus HDAudBus.sys Mon Jul 13 19:06:13 2009 (4A5BCBF5)
fffff880`040d1000 fffff880`040e1000   CompositeBus CompositeBus.sys Mon Jul 13 19:00:33 2009 (4A5BCAA1)
fffff880`040e1000 fffff880`040ec000   rdpbus   rdpbus.sys   Mon Jul 13 19:17:46 2009 (4A5BCEAA)
fffff880`040ec000 fffff880`041e0000   dxgkrnl  dxgkrnl.sys  Mon Nov 01 21:51:31 2010 (4CCF7CB3)
fffff880`041e0000 fffff880`041f6000   AgileVpn AgileVpn.sys Mon Jul 13 19:10:24 2009 (4A5BCCF0)
fffff880`041f6000 fffff880`041f7480   swenum   swenum.sys   Mon Jul 13 19:00:18 2009 (4A5BCA92)
fffff880`04400000 fffff880`0440e000   kbdhid   kbdhid.sys   Mon Jul 13 19:00:20 2009 (4A5BCA94)
fffff880`0440e000 fffff880`0441b000   mouhid   mouhid.sys   Mon Jul 13 19:00:20 2009 (4A5BCA94)
fffff880`04422000 fffff880`0447c000   usbhub   usbhub.sys   Mon Jul 13 19:07:09 2009 (4A5BCC2D)
fffff880`0447c000 fffff880`04491000   NDProxy  NDProxy.SYS  Mon Jul 13 19:10:05 2009 (4A5BCCDD)
fffff880`04491000 fffff880`044ed000   HdAudio  HdAudio.sys  Mon Jul 13 19:06:59 2009 (4A5BCC23)
fffff880`044ed000 fffff880`0452a000   portcls  portcls.sys  Mon Jul 13 19:06:27 2009 (4A5BCC03)
fffff880`0452a000 fffff880`0454c000   drmk     drmk.sys     Mon Jul 13 20:01:25 2009 (4A5BD8E5)
fffff880`0454c000 fffff880`04551200   ksthunk  ksthunk.sys  Mon Jul 13 19:00:19 2009 (4A5BCA93)
fffff880`04552000 fffff880`04560000   crashdmp crashdmp.sys Mon Jul 13 19:01:01 2009 (4A5BCABD)
fffff880`04560000 fffff880`0456c000   dump_ataport dump_ataport.sys Mon Jul 13 18:19:47 2009 (4A5BC113)
fffff880`0456c000 fffff880`04575000   dump_atapi dump_atapi.sys Mon Jul 13 18:19:47 2009 (4A5BC113)
fffff880`04575000 fffff880`04588000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 18:21:51 2009 (4A5BC18F)
fffff880`04588000 fffff880`04594000   Dxapi    Dxapi.sys    Mon Jul 13 18:38:28 2009 (4A5BC574)
fffff880`04594000 fffff880`045b1000   usbccgp  usbccgp.sys  Mon Jul 13 19:06:45 2009 (4A5BCC15)
fffff880`045b1000 fffff880`045b2f00   USBD     USBD.SYS     Mon Jul 13 19:06:23 2009 (4A5BCBFF)
fffff880`045b3000 fffff880`045c1000   hidusb   hidusb.sys   Mon Jul 13 19:06:22 2009 (4A5BCBFE)
fffff880`045c1000 fffff880`045da000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:06:21 2009 (4A5BCBFD)
fffff880`045da000 fffff880`045e2080   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:06:17 2009 (4A5BCBF9)
fffff880`045e3000 fffff880`045f8000   LHidFilt LHidFilt.Sys Tue Aug 24 12:21:36 2010 (4C73FFA0)
fffff880`0480b000 fffff880`04deffe0   igdkmd64 igdkmd64.sys Wed Sep 23 14:22:57 2009 (4ABA7591)
fffff880`04df0000 fffff880`04dfc000   ndistapi ndistapi.sys Mon Jul 13 19:10:00 2009 (4A5BCCD8)
fffff880`05a00000 fffff880`05a67000   srv2     srv2.sys     Thu Aug 26 22:37:46 2010 (4C77330A)
fffff880`05acf000 fffff880`05b75000   peauth   peauth.sys   Mon Jul 13 20:01:19 2009 (4A5BD8DF)
fffff880`05b75000 fffff880`05b80000   secdrv   secdrv.SYS   Wed Sep 13 08:18:38 2006 (4508052E)
fffff880`05b80000 fffff880`05bad000   srvnet   srvnet.sys   Thu Aug 26 22:37:24 2010 (4C7732F4)
fffff880`05bad000 fffff880`05bbf000   tcpipreg tcpipreg.sys Mon Jul 13 19:09:49 2009 (4A5BCCCD)
fffff880`05cf9000 fffff880`05d8f000   srv      srv.sys      Thu Aug 26 22:38:00 2010 (4C773318)
fffff880`05d8f000 fffff880`05d97000   ALSysIO64 ALSysIO64.sys Sun Apr 19 14:41:04 2009 (49EB7E50)
fffff880`05d97000 fffff880`05dcd000   fastfat  fastfat.SYS  Mon Jul 13 18:23:28 2009 (4A5BC1F0)
fffff960`000a0000 fffff960`003b0000   win32k   win32k.sys   Tue Oct 19 22:08:46 2010 (4CBE5D3E)
fffff960`005b0000 fffff960`005ba000   TSDDD    TSDDD.dll    Mon Jul 13 19:16:34 2009 (4A5BCE62)
fffff960`00600000 fffff960`00627000   cdd      cdd.dll      Mon Nov 01 23:59:22 2010 (4CCF9AAA)

Unloaded modules:
fffff880`018a6000 fffff880`018b4000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018b4000 fffff880`018c0000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018c0000 fffff880`018c9000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018c9000 fffff880`018dc000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`018dc000 fffff880`01906000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
I have to say that is just... nuts. It's like looking into a microscope and seeing a thousand dancing bananas.
My System SpecsSystem Spec
31 Jan 2011   #38
rtc0523

Win 7 Ultimate 64 Bit
 
 

Now I took out my video card and am back on integrated video. And while watching a video it had a BSOD. So I unplugged my mouse and DVD burner and it crashed this time while I was scrolling through my Google reader feeds.
My System SpecsSystem Spec
31 Jan 2011   #39
rtc0523

Win 7 Ultimate 64 Bit
 
 

Weird weird error now. Never saw this one before.

Added another dump.

More dumps.

I really dont know anymore or have any ideas short of throwing this thing out the window.
My System SpecsSystem Spec
01 Feb 2011   #40
rtc0523

Win 7 Ultimate 64 Bit
 
 

Ive established that if i try watching a 720p video on youtube full screened pretty quickly my computer will restart. If that helps to diagnose anything at all.

But I guess that can be caused by the fact Im using integrated video right now.
My System SpecsSystem Spec
Reply

 BSOD's/Restarts have me stumped




Thread Tools




Similar help and support threads
Thread Forum
BSOD, stumped, dump files attached
For the past week or so I have been getting the BSOD, sometimes multiple times a day, when I'm actively using my computer and have also opened it back up to find them after I've been at work, I have tried everything I can think of to figure out what the problem is but it is beyond my skills, so I...
BSOD Help and Support
FF has me STUMPED?
Hi Folks, When a new version of FF is released, I normally disable my Firewall as it tends to block access to certain items during the upgrade. On this occasion, I forgot to do so. Now when I open a web page, (this one for example) the vertical scroll bar is visible till I scoll the page using...
Browsers & Mail
8 BSOD since 22 Jan (fltmgr,ntkrnlpa,ntfs, halmacpi & CI) I am stumped
I have been trying to help my 82 year old father deal with these irritating but not disastrous BSOD faults but I have failed. The machine is a relatively new build and I have run memtest with no problems being reported. I have also cloned the OS to a new SSD from the previous HDD. Any...
BSOD Help and Support
im stumped and down know what to do BSOD Destruction...
0x0000000A (0x0000000000000000, 0x0000000000000002, 0xfffff80002a79b7e) this it the error i get every time i start my computer now. i was using it and it did a restart that wasnt prompted or anything and all i did was accept a java update from my eset security. i can load safe mode but dont know...
BSOD Help and Support
I'm stumped by this BSOD
My sister gave me her laptop to take a look at (me being the "one who can fix 'em" ). There's a persistent BSOD at windows load right before it tries to get to the login screen. The error message flashes so fast I can't really seem to make out but I THINK it's a 0x0000007e error (though I'm not...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

й Designer Media Ltd

All times are GMT -5. The time now is 03:04.
Twitter Facebook Google+