Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD and boot errors

05 Feb 2011   #1
JDMorrison

windows 7 home preminum 64 bit
 
 
BSOD and boot errors

I had a compaq cq5110y pc Replaced the mobo with a msi x58m corsair xms3 3x2GB DDR3 ram and a i7 950 cpu. about 2 weeks in I started getting blue screens pointing towards my GC it was a 9800 gt. I replaced it with a Nivida GTS 450 still got bsod so I reinstalled windows fresh reinstall. About a week later happend again a friend suggest it could be the PSU had a TT 430 watt got a crosair gs 700 watt. And I am still getting bsod and some boot error event ID 100. Ran Memtest 5 passes and got no memory errors. Not sure if my mobo is bad or what!


My System SpecsSystem Spec
.
05 Feb 2011   #2
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Hi, JD and welcome to the forum. Your two most recent dumps are Driver Verifier enabled dumps. Both of these blame Windows system files for the crashes and these are highly unlikely to be the real causes. Your other two dumps blame a Windows system core file which is also unlikely to be the real cause. All four of your dumps show different bugcheck codes. Usually this means a hardware or hardware related problem. You can turn off Driver Verifier for now.

Update this drive through the link provided; it is really obsolete and can definitely create conflicts and BSOD's. If there is no udate for it, I recommend that you upgrade your wireless adapter.
Quote:
scmndisp.sys Wed Jan 17 02:48:03 2007 - Netgear Neutral Wireless Solution. Support Home Page.
You have another out dated driver that might create conflicts, To the best of my knowledge, there is no update for it. I suggest you rename it and uninstall the software it is associated with. The software is obsolete.
Quote:
WinRing0x64.sys Sat Jul 26 09:29:37 2008 - many different programs that center around the using of the WinRing libraries. OEM - none at Winring.
Renaming drivers: create a restore point, using Windows Explorer, navigate to C:\Windows\System32\Drivers, locate the driver file, and rename it from .sys to .old. If you do not find the driver in the \System32\Driver folder, do a search of your C: drive for it using Windows Explorer. Reboot and the driver will not load. This will break whatever software or hardware the driver is associated with.

Let's see how your system runs with these two drivers updated or removed. Post back and let us know. If you get another BSOD, upload it and we will go from there.

Code:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e0f000 PsLoadedModuleList = 0xfffff800`0304ce50
Debug session time: Sat Feb  5 11:06:35.855 2011 (GMT-5)
System Uptime: 0 days 0:08:08.042
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C1, {fffff980281baf70, fffff980281bae26, 4d4090, 32}

Probably caused by : dxgmms1.sys ( dxgmms1!VidMmCloseAllocation+44 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption.  Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff980281baf70, address trying to free
Arg2: fffff980281bae26, address where one bit is corrupted
Arg3: 00000000004d4090, (reserved)
Arg4: 0000000000000032, caller is freeing an address where nearby bytes within the same page have a single bit error

Debugging Details:
------------------


BUGCHECK_STR:  0xC1_32

SPECIAL_POOL_CORRUPTION_TYPE:  32

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002f0f5f3 to fffff80002e7f740

STACK_TEXT:  
fffff880`08aa81c8 fffff800`02f0f5f3 : 00000000`000000c1 fffff980`281baf70 fffff980`281bae26 00000000`004d4090 : nt!KeBugCheckEx
fffff880`08aa81d0 fffff800`02f86693 : fffff980`185feff0 00000000`00000000 fffff980`281baf70 00000000`00000000 : nt!MiCheckSpecialPoolSlop+0x83
fffff880`08aa8210 fffff800`02fb2356 : 00000000`00000174 00000000`6d4d6956 00000000`000067fc fffff980`2a3bcfd0 : nt!MmFreeSpecialPool+0x1d3
fffff880`08aa8340 fffff880`04356ecc : fffff980`2a3bcfd0 fffff880`00000000 00000000`00000010 00000000`00000000 : nt!ExDeferredFreePool+0xf13
fffff880`08aa83f0 fffff880`04298c10 : 00000000`00000000 fffff8a0`013d1000 fffff8a0`013d1000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`08aa8420 fffff880`0429854b : fffff8a0`013d1000 fffff8a0`013d2300 fffff980`00000000 fffff880`042984a8 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`08aa8510 fffff880`042c6647 : fffff980`18434f10 fffff980`1a258f40 fffff980`18434f10 fffff880`08aa8930 : dxgkrnl!DXGDEVICE::ProcessTerminationList+0xa3
fffff880`08aa8560 fffff880`042c5d73 : fffff980`18434f10 fffff980`18434f10 fffff880`08aa88c0 fffff880`08aa88f0 : dxgkrnl!DXGCONTEXT::Present+0x2cb
fffff880`08aa8880 fffff960`0023bbfc : fffffa80`08dedb60 00000000`00000000 fffff980`3602aff0 fffff980`00000010 : dxgkrnl!DxgkPresent+0x543
fffff880`08aa8bf0 fffff800`02e7e993 : 00000000`01d6feb8 fffff880`08aa8ca0 00000000`00000000 00000000`00000000 : win32k!NtGdiDdDDIPresent+0x18
fffff880`08aa8c20 000007fe`ff4c13ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0225ed98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`ff4c13ca


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VidMmCloseAllocation+44
fffff880`04356ecc 4533c0          xor     r8d,r8d

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgmms1!VidMmCloseAllocation+44

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

FAILURE_BUCKET_ID:  X64_0xC1_32_VRF_dxgmms1!VidMmCloseAllocation+44

BUCKET_ID:  X64_0xC1_32_VRF_dxgmms1!VidMmCloseAllocation+44

Followup: MachineOwner
---------

Debug session time: Fri Feb  4 16:03:53.247 2011 (GMT-5)
System Uptime: 0 days 6:01:55.434
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D3, {fffff880010c93a2, 2, 0, fffff80002ef97a2}

Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+122 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_PORTION_MUST_BE_NONPAGED (d3)
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers marking code or data as pageable when it should be
marked nonpaged.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff880010c93a2, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80002ef97a2, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031040e0
 fffff880010c93a2 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!RtlDispatchException+122
fffff800`02ef97a2 410fb60c24      movzx   ecx,byte ptr [r12]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xD3

PROCESS_NAME:  firefox.exe

TRAP_FRAME:  fffff8800a503a60 -- (.trap 0xfffff8800a503a60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880010c620c rbx=0000000000000000 rcx=fffff880010c93da
rdx=fffff880010c92d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ef97a2 rsp=fffff8800a503bf0 rbp=fffff8800a504a98
 r8=0000000000000181  r9=0000000000000181 r10=fffff8800a5051a0
r11=fffff8800a503c38 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlDispatchException+0x122:
fffff800`02ef97a2 410fb60c24      movzx   ecx,byte ptr [r12] ds:00000000`00000000=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ecbca9 to fffff80002ecc740

STACK_TEXT:  
fffff880`0a503918 fffff800`02ecbca9 : 00000000`0000000a fffff880`010c93a2 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a503920 fffff800`02eca920 : 00000000`00000000 00000000`000000d2 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0a503a60 fffff800`02ef97a2 : fffff880`010c93a2 fffff880`0a503c38 fffff880`0a504a98 fffff800`02e5c000 : nt!KiPageFault+0x260
fffff880`0a503bf0 fffff800`02f069ef : fffff880`0a504a98 fffff880`0a504300 fffff880`00000000 00000000`00000007 : nt!RtlDispatchException+0x122
fffff880`0a5042d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16f


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!RtlDispatchException+122
fffff800`02ef97a2 410fb60c24      movzx   ecx,byte ptr [r12]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!RtlDispatchException+122

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xD3_VRF_nt!RtlDispatchException+122

BUCKET_ID:  X64_0xD3_VRF_nt!RtlDispatchException+122

Followup: MachineOwner
---------

Debug session time: Thu Feb  3 22:06:08.028 2011 (GMT-5)
System Uptime: 0 days 12:35:32.184
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800031bb1ce, fffff88006205ac0, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObpWaitForMultipleObjects+173 )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031bb1ce, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88006205ac0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObpWaitForMultipleObjects+173
fffff800`031bb1ce 0fb64718        movzx   eax,byte ptr [rdi+18h]

CONTEXT:  fffff88006205ac0 -- (.cxr 0xfffff88006205ac0)
rax=00000000ffeffffe rbx=fffff8a002612e10 rcx=fffdfa800618b9f0
rdx=fffffa8005522201 rsi=000000000000002a rdi=fffdfa800618b9f0
rip=fffff800031bb1ce rsp=fffff88006206490 rbp=fffff88006206ca0
 r8=0000000000000008  r9=fffff8a002620000 r10=fffffa8007b40510
r11=fffffffffffffd80 r12=fffff88006206ae8 r13=fffff8a001cf3820
r14=0000000000000029 r15=000000000000003f
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!ObpWaitForMultipleObjects+0x173:
fffff800`031bb1ce 0fb64718        movzx   eax,byte ptr [rdi+18h] ds:002b:fffdfa80`0618ba08=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031bb1ce

STACK_TEXT:  
fffff880`06206490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpWaitForMultipleObjects+0x173


FOLLOWUP_IP: 
nt!ObpWaitForMultipleObjects+173
fffff800`031bb1ce 0fb64718        movzx   eax,byte ptr [rdi+18h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpWaitForMultipleObjects+173

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88006205ac0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObpWaitForMultipleObjects+173

BUCKET_ID:  X64_0x3B_nt!ObpWaitForMultipleObjects+173

Followup: MachineOwner
---------

Debug session time: Fri Jan 21 13:27:38.458 2011 (GMT-5)
System Uptime: 0 days 3:22:43.630
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+4b5952f01a8dc54
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002f8c328 -- (.exr 0xfffff88002f8c328)
ExceptionAddress: fffff80002cdc302 (nt!KiTimerWaitTest+0x00000000000001e2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002f8c3d0 -- (.trap 0xfffff88002f8c3d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cdc302 rsp=fffff88002f8c560 rbp=fffffa800dd6ac28
 r8=fffff88002f66301  r9=0000000000000002 r10=00000000000000e8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiTimerWaitTest+0x1e2:
fffff800`02cdc302 f0490fbaaf9044000000 lock bts qword ptr [r15+4490h],0 ds:8f90:00000000`00004490=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cca46e to fffff80002cd2710

STACK_TEXT:  
fffff880`02f8b418 fffff800`02cca46e : 00000000`00000000 fffff880`01488af4 fffff880`02f8bb90 fffff800`02cff668 : nt!KeBugCheck
fffff880`02f8b420 fffff800`02cf840d : fffff800`02ee0b7c fffff800`02e1ae84 fffff800`02c62000 fffff880`02f8c328 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8b450 fffff800`02cffa90 : fffff800`02e21b14 fffff880`02f8b4c8 fffff880`02f8c328 fffff800`02c62000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8b480 fffff800`02d0c9ef : fffff880`02f8c328 fffff880`02f8bb90 fffff880`00000000 fffffa80`0dd6ac20 : nt!RtlDispatchException+0x410
fffff880`02f8bb60 fffff800`02cd1d82 : fffff880`02f8c328 fffffa80`0dd6ac28 fffff880`02f8c3d0 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`02f8c1f0 fffff800`02cd068a : 00000000`0000000a fffffa80`064fb3b0 fffff880`02f64180 fffff800`02cdede0 : nt!KiExceptionDispatch+0xc2
fffff880`02f8c3d0 fffff800`02cdc302 : fffff880`03115100 fffffa80`09530000 00000000`00000002 00000000`000000ff : nt!KiGeneralProtectionFault+0x10a
fffff880`02f8c560 fffff800`02cddd7d : fffffa80`0dd6ac20 fffffa80`05d70628 fffffa80`05d70628 00000000`00000102 : nt!KiTimerWaitTest+0x1e2
fffff880`02f8c5e0 fffff800`02cde4be : 0000001c`5216c671 fffff880`02f8cc58 00000000`000be0e8 fffff880`02f68288 : nt!KiProcessExpiredTimerList+0x6d
fffff880`02f8cc30 fffff800`02cddcb7 : 00000008`80c72fc1 00000008`000be0e8 00000008`80c72ff4 00000000`000000e8 : nt!KiTimerExpiration+0x1be
fffff880`02f8ccd0 fffff800`02cdaeea : fffff880`02f64180 fffff880`02f6f0c0 00000000`00000000 fffff800`02d8b230 : nt!KiRetireDpcList+0x277
fffff880`02f8cd80 00000000`00000000 : fffff880`02f8d000 fffff880`02f87000 fffff880`02f8cd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02cca46e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------

2: kd> lmtsmn
start             end                 module name
fffff880`03c00000 fffff880`03c3e000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ef6000 fffff880`00f4d000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`01969000 fffff880`019f3000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03de2000 fffff880`03df8000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00e33000 fffff880`00e3e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`08b86000 fffff880`08b91000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e09000 fffff880`00e33000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`06156000 fffff880`06173000   avgntflt avgntflt.sys Thu Nov 11 10:59:48 2010 (4CDC12F4)
fffff880`02d99000 fffff880`02dbb000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
fffff880`0601d000 fffff880`060ed000   bcmwlhigh664 bcmwlhigh664.sys Thu Nov 05 19:27:07 2009 (4AF36D5B)
fffff880`018bd000 fffff880`018c4000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02d88000 fffff880`02d99000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07b92000 fffff880`07bb0000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006e0000 fffff960`00707000   cdd      cdd.dll      unavailable (00000000)
fffff880`066f7000 fffff880`06714000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`0188a000 fffff880`018b4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d1e000 fffff880`00dde000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01824000 fffff880`01854000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cc0000 fffff880`00d1e000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01187000 fffff880`011fa000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03dd2000 fffff880`03de2000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`06714000 fffff880`06722000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02d6a000 fffff880`02d88000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02d5b000 fffff880`02d6a000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01235000 fffff880`0124b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0443d000 fffff880`0445f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0672e000 fffff880`06737000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06722000 fffff880`0672e000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06737000 fffff880`0674a000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06789000 fffff880`06795000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03c4d000 fffff880`03d41000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03d41000 fffff880`03d87000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01115000 fffff880`01129000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010c9000 fffff880`01115000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01086000 fffff880`010c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02c19000 fffff800`02c62000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03d87000 fffff880`03dab000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0456a000 fffff880`045c6000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`06758000 fffff880`06771000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`06771000 fffff880`06779080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0674a000 fffff880`06758000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`07aca000 fffff880`07b92000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f2000 fffff880`015fb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`02de1000 fffff880`02df7000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0feb5000 fffff880`0fec4000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06125000 fffff880`06133000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba1000 fffff800`00bab000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`044a6000 fffff880`044e9000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0445f000 fffff880`04464200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`06173000 fffff880`06188000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06133000 fffff880`06156000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c68000 fffff880`00cac000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`060fa000 fffff880`06108000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0fec4000 fffff880`0fed3000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0677c000 fffff880`06789000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fe1000 fffff880`00ffb000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`07bb0000 fffff880`07bc8000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07bc8000 fffff880`07bf5000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`07a00000 fffff880`07a4e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`07a4e000 fffff880`07a71000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01922000 fffff880`0192d000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f56000 fffff880`00f60000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01129000 fffff880`01187000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02d50000 fffff880`02d5b000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e0000 fffff880`015f2000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01486000 fffff880`01578000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fe24000 fffff880`0fe30000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`061db000 fffff880`061ee000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0fe30000 fffff880`0fe5f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04555000 fffff880`0456a000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02c98000 fffff880`02ca7000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c0e000 fffff880`02c53000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01578000 fffff880`015d8000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0192d000 fffff880`0193e000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02d44000 fffff880`02d50000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c62000 fffff800`0323e000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0124e000 fffff880`013f1000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018b4000 fffff880`018bd000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b39000 fffff880`10b3a180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`0fede000 fffff880`10b38d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`06188000 fffff880`061db000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02c5c000 fffff880`02c82000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fa0000 fffff880`00fb5000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f60000 fffff880`00f93000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fca000 fffff880`00fd1000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fd1000 fffff880`00fe1000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06400000 fffff880`064a6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04400000 fffff880`0443d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cac000 fffff880`00cc0000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0fe00000 fffff880`0fe24000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0fe5f000 fffff880`0fe7a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0fe7a000 fffff880`0fe9b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0fe9b000 fffff880`0feb5000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02cf3000 fffff880`02d44000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01907000 fffff880`01910000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01910000 fffff880`01919000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01919000 fffff880`01922000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`06000000 fffff880`06018000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`10b91000 fffff880`10bf7000   Rt64win7 Rt64win7.sys Thu Nov 11 01:35:36 2010 (4CDB8EB8)
fffff880`064aa000 fffff880`066f6f80   RTKVHD64 RTKVHD64.sys Tue Jul 06 06:05:16 2010 (4C32FFDC)
fffff880`01475000 fffff880`0147f000   scmndisp scmndisp.sys Wed Jan 17 02:48:03 2007 (45ADD4B3)
fffff880`07a71000 fffff880`07a7c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03c3e000 fffff880`03c4a000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02ca7000 fffff880`02cc4000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015d8000 fffff880`015e0000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`08a7f000 fffff880`08b15000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06795000 fffff880`067fc000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`07a7c000 fffff880`07aa9000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03df8000 fffff880`03df9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`07aa9000 fffff880`07abb000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0195c000 fffff880`01969000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0193e000 fffff880`0195c000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02cdf000 fffff880`02cf3000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005f0000 fffff960`005fa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`02dbb000 fffff880`02de1000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`044e9000 fffff880`044fb000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06108000 fffff880`06125000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0677a000 fffff880`0677bf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03db8000 fffff880`03dc9000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`044fb000 fffff880`04555000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`10b3b000 fffff880`10b91000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03dab000 fffff880`03db8000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f93000 fffff880`00fa0000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`018c4000 fffff880`018d2000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`018d2000 fffff880`018f7000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fb5000 fffff880`00fca000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`060ed000 fffff880`060fa000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02c82000 fffff880`02c98000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02cc4000 fffff880`02cdf000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`018f7000 fffff880`01907000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e43000 fffff880`00ee7000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ee7000 fffff880`00ef6000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c53000 fffff880`02c5c000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00370000   win32k   win32k.sys   unavailable (00000000)
fffff880`08b91000 fffff880`08b98000   WinRing0x64 WinRing0x64.sys Sat Jul 26 09:29:37 2008 (488B26C1)
fffff880`03dc9000 fffff880`03dd2000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f4d000 fffff880`00f56000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`08b15000 fffff880`08b86000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01854000 fffff880`01862000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01862000 fffff880`0186e000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0186e000 fffff880`01877000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01877000 fffff880`0188a000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
05 Feb 2011   #3
JDMorrison

windows 7 home preminum 64 bit
 
 

okay thanks I will try that! I kinda suspected the wifi problem did not start untill I installed that. There are no 64 bit drivers for my Wifi Adaptor so I just uninstalled it for now. I will go look for that system file now.
My System SpecsSystem Spec
.

05 Feb 2011   #4
JDMorrison

windows 7 home preminum 64 bit
 
 

okay well since I uninstalled the wifi drivers everthing was running ok for a hour or then my moniter went to sleep and windows restarted. during restart I got a other bsod I have attached the file!
My System SpecsSystem Spec
05 Feb 2011   #5
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Turn off Driver Verifier for now: Driver Verifier - Enable and Disable. This latest dump is another Driver Verifier enabled dump blaming a Windows system core file. The dump does not tell us much. Let's see what you system does without Driver Verifier running.

If you get another BSOD, upload the dump and test your RAM with Memtest86 following the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest froma cold boot after your computer has been off for at least an hour. Let it run for a minimum of seven passes; this will take 6-8 hours. If you see any errors, you can stop the test. Post back with your results.


Code:
 Debug session time: Sat Feb  5 21:38:10.718 2011 (GMT-5)
System Uptime: 0 days 0:00:37.843
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff8000316cc06, 2, 0, fffff80002ef57a2}

Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+122 )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8000316cc06, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ef57a2, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031000e0
 fffff8000316cc06 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!RtlDispatchException+122
fffff800`02ef57a2 410fb60c24      movzx   ecx,byte ptr [r12]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88003561680 -- (.trap 0xfffff88003561680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff800030e81ec rbx=0000000000000000 rcx=fffff8000316cc44
rdx=fffff8000316cbac rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ef57a2 rsp=fffff88003561810 rbp=fffff880035626b8
 r8=0000000000002029  r9=0000000000002029 r10=fffff88003562d40
r11=fffff88003561858 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlDispatchException+0x122:
fffff800`02ef57a2 410fb60c24      movzx   ecx,byte ptr [r12] ds:00000000`00000000=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ec7ca9 to fffff80002ec8740

STACK_TEXT:  
fffff880`03561538 fffff800`02ec7ca9 : 00000000`0000000a fffff800`0316cc06 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03561540 fffff800`02ec6920 : 00000000`00000000 00000000`0000005a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03561680 fffff800`02ef57a2 : fffff800`0316cc06 fffff880`03561858 fffff880`035626b8 fffff880`0119a000 : nt!KiPageFault+0x260
fffff880`03561810 fffff800`02f029ef : fffff880`035626b8 fffff880`03561f20 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`03561ef0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16f


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!RtlDispatchException+122
fffff800`02ef57a2 410fb60c24      movzx   ecx,byte ptr [r12]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!RtlDispatchException+122

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_VRF_nt!RtlDispatchException+122

BUCKET_ID:  X64_0xA_VRF_nt!RtlDispatchException+122

Followup: MachineOwner
---------
My System SpecsSystem Spec
07 Mar 2011   #6
JDMorrison

windows 7 home preminum 64 bit
 
 

everything has been okay for awhile now today got a other bsod here is the dump
My System SpecsSystem Spec
Reply

 BSOD and boot errors




Thread Tools




Similar help and support threads
Thread Forum
BSOD after cold boot, lots of different errors
List of some of the errors that I can list off the top of my head: memory_management SYSTEM_SERVICE_EXCEPTION The minidump logs aren't saving either, even after I configured them to in the Control Panel, which is weird. I hope I can get this fixed.
BSOD Help and Support
BSOD after cold boot (8 hrs+) lots of errors listed in post
Here are the errors I'm getting (that I can list off the top of my head) BAD_POOL_HEADER memory_management IRQL_NOT_LESS_OR_EQUAL attempted_write_to_readonly_memory I've been getting these on and off for a while now. They seem to come in sessions, and at seemingly random times. After I get...
BSOD Help and Support
BSOD every boot 0x1e, safe mode boots ~1/2 the time, scannow errors
Hi folks, I'm getting BSOD 0x1e every time I try to boot, can boot into safe mode with or without networking about half the time, get BSOD at the end of the screen that shows which .sys files are being loaded when safe mode bsods. I'm currently bed bound following back surgery and not being able...
BSOD Help and Support
BSOD after every boot up, errors 0x000000f4 and 0x0000007a
Hello all, First off, thanks for taking the time to read this posting. Been meaning to get around to this, but it's always been more of an annoying (if chronic) inconvenience than anything system-breaking at this point. The problem has been occurring for almost a year, shortly after I...
BSOD Help and Support
Win7 crash/boot errors. File: \boot\memtest.exe Status: 0xc000000f
I own a Asus N71Jq Series laptop. I was browsing the web. The laptop crashed. When trying to reboot, the "Starting windows" would appear, together with the big Windows logo. I could reboot in normal mode and in safe mode. I chose for safe mode, to no avail. After this, the screen went black and all...
BSOD Help and Support
Boot errors,shutdown errors, wake errors.
Wake from sleep is slow and I loose control over curser for 10 sec. These are most of the errors and their numbers that I have been getting over the past 5 days. Boot duration 100,101,109,103 Stanby duration 300 Driver caused delay 351 Thumbdrive driver delay
Performance & Maintenance


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 13:10.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App