Problem Devices:
Code:
TSSTcorp DVD+-RW TS-H653A ATA Device IDE\CDROMTSSTCORP_DVD+-RW_TS-H653A_______________D500____\5&10CFBC0E&0&0.0.0 This device is disabled.
Security Software:
Code:
sdwinsec.exe c:\program files (x86)\spybot - search & destroy\sdwinsec.exe 2444 8 200 1380 4/2/2012 4:28 PM 1.0.0.12 1.10 MB (1,153,368 bytes) 2/22/2012 2:45 AM
msmpeng.exe c:\program files\microsoft security client\antimalware\msmpeng.exe 144 8 200 1380 4/2/2012 4:28 PM 3.0.8402.0 12.48 KB (12,784 bytes) 4/27/2011 5:21 PM
nissrv.exe c:\program files\microsoft security client\antimalware\nissrv.exe 3012 8 200 1380 4/2/2012 4:28 PM 3.0.8402.0 281.52 KB (288,272 bytes) 4/27/2011 5:21 PM
msseces.exe c:\program files\microsoft security client\msseces.exe 3352 8 200 1380 4/2/2012 4:31 PM 2.1.1116.0 1.37 MB (1,436,736 bytes) 6/15/2011 2:35 PM
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Kingston\BSODDmpFiles\soulnotsoldier4\Windows_NT6_BSOD_jcgriff2\040212-21294-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0320f000 PsLoadedModuleList = 0xfffff800`03454670
Debug session time: Mon Apr 2 15:27:07.378 2012 (UTC - 6:00)
System Uptime: 0 days 0:23:54.533
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800032b7d93, fffff88008a358e0, 0}
Probably caused by : memory_corruption ( nt!MmCopyToCachedPage+223 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800032b7d93, Address of the instruction which caused the bugcheck
Arg3: fffff88008a358e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MmCopyToCachedPage+223
fffff800`032b7d93 8b7838 mov edi,dword ptr [rax+38h]
CONTEXT: fffff88008a358e0 -- (.cxr 0xfffff88008a358e0)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000fffffffff
rdx=fffff8000320f000 rsi=ffffffffffffffff rdi=fffffa800fe84810
rip=fffff800032b7d93 rsp=fffff88008a362c0 rbp=fffff88008a36300
r8=0000098000000000 r9=0000000002157040 r10=0000058000000000
r11=fffff88008a36248 r12=fffff6fcc00b5e38 r13=0000000000000000
r14=0000000000001000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010292
nt!MmCopyToCachedPage+0x223:
fffff800`032b7d93 8b7838 mov edi,dword ptr [rax+38h] ds:002b:00000000`00000038=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800032b7d93
STACK_TEXT:
fffff880`08a362c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCopyToCachedPage+0x223
FOLLOWUP_IP:
nt!MmCopyToCachedPage+223
fffff800`032b7d93 8b7838 mov edi,dword ptr [rax+38h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmCopyToCachedPage+223
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff88008a358e0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MmCopyToCachedPage+223
BUCKET_ID: X64_0x3B_nt!MmCopyToCachedPage+223
Followup: MachineOwner
---------
First, did you go through the steps in Illustrator crashes | Wacom tablet installed ?
Check your memory for errors:- Run the boot version of Memtest86+ paying close attention to Parts 2 and 3 of the tutorial. Also, in case Memtest86+ misses anything and comes up with no errors, run the extended version of the Windows Memory Diagnostics Tool for at least five passes. These you may want to run overnight since they take a long time to complete (run them an hour before bed each of the next two nights and check before going to sleep that they are still running).
If you swap any memory components, follow these steps for ESD safety:
- Shut down and turn off your computer.
- Unplug all power supplies to the computer (AC Power then battery for laptops, AC power for desktops)
- Hold down the power button for 30 seconds to close the circuit and ensure all power drains from components.
- Make sure you are grounded by using proper grounding techniques, i.e. work on an anti-static workbench, anti-static desk, or an anti-static pad. Hold something metallic while touching it to the anti-static surface, or use an anti-static wristband to attach to the anti-static material while working.
Once these steps have been followed, it is safe to remove and replace components within your computer.