Windows 7 BSOD and hardware issue

Temzen

New Member
Link Removed due to 404 ErrorLink Removed due to 404 ErrorHello there.

This computer is having serious bsod issues. For some reason i could only find very few dumps, and im gonna describe the problems in more detail.

Normally I have 4 ram blocks in my computer, but the more ram i have plugged in, the higher the chance that programs crash and i get bsod. Sounds like bad ram i know, but memtest doesnt give any errors, and all ram works OK, if i input them alone, and only use one block at a time.

During start up, my computer somtimes takes forever to get past the very first image that is shown when bios is starting up, then it goes bib and moves on, normally this only takes two secs, but often it takes forever.

I also used manufactor diagnostic on my harddrive. With no result.

Sometimes when i start my computer after crash, i get error: "disk read error occured", then i have to turn off computer for some time, before it will let me turn it back on.

I know some of my drivers are not up to date, but this problem persist through driver updates, and i am 100% sure there is hardware problems, and i need to find out what hardware has issues, so i can send it in for repair.

I would post a picture of CPU-Z, but right now i only have 1/4 ram block in, so i could write this, without risiking computer failing. Should i post anyway?

Thank you in advance!
 

Attachments

  • Minidump.rar
    148.2 KB · Views: 262
Normally I have 4 ram blocks in my computer, but the more ram i have plugged in, the higher the chance that programs crash and i get bsod.


Oh yes, if you plug in different sticks whose rates are not the same such as ddr533 and 667, you'll be getting blue screens for sure.

Attach:

- cpuz MEMORY tab
- cpuz CPU tab
- Passmark RAMMon HTML.zip


I also used manufactor diagnostic on my harddrive. With no result.

Sometimes when i start my computer after crash, i get error: "disk read error occured", then i have to turn off computer for some time, before it will let me turn it back on.


Interesting. In the command prompt type: chkdsk /f. Then make sure there's enough free space and defragment the hard drive. When done, in the command prompt type: sfc /scannow.


~~~~~~~~~~

Your crashes seem to be related to memory:

BugCheck A, {fffffa86051bf2f0, 2, 1, fffff80002105d5c}
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+d0 )

BugCheck 3B, {c0000005, fffff800020b1d5c, fffff8800c074010, 0}
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+d0 )

BugCheck 1000007E, {ffffffffc0000005, fffff88003c2522e, fffff880040b0658, fffff880040afeb0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2 )

BugCheck 19, {22, fffffa80086d3000, 0, 0}
Probably caused by : rdyboost.sys ( rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeMergeNodes+174 )


1. Atach the memory info, cpuz and rammon.
2. Uninstall Avast. Install MSE.
3. Uninstall OpenVPN driver:
tap0901.sys Wed Nov 19 13:22:35 2008

4. Do more hdd testing since memory errors can come from virtual memory too:
HDDScan
HD Tune website

5. When done, report your results.




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041611-15640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`0204d000 PsLoadedModuleList = 0xfffff800`02290e90
Debug session time: Sat Apr 16 02:33:26.765 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:21.531
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff900c263b4c8, 0, fffff880032fdf99, 7}

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys

Could not read faulting driver name
Probably caused by : nvlddmkm.sys ( nvlddmkm+e6f99 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c263b4c8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880032fdf99, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800022fc0e8
 fffff900c263b4c8 

FAULTING_IP: 
nvlddmkm+e6f99
fffff880`032fdf99 8b4128          mov     eax,dword ptr [rcx+28h]

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880042aff80 -- (.trap 0xfffff880042aff80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff900c263b4a0
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880032fdf99 rsp=fffff880042b0110 rbp=0000000000000000
 r8=fffffa80080cf000  r9=0000000000000002 r10=fffff880042b0620
r11=0000000003a27900 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nvlddmkm+0xe6f99:
fffff880`032fdf99 8b4128          mov     eax,dword ptr [rcx+28h] ds:0800:fffff900`c263b4c8=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800020759eb to fffff800020d1cc0

STACK_TEXT:  
fffff880`042afe18 fffff800`020759eb : 00000000`00000050 fffff900`c263b4c8 00000000`00000000 fffff880`042aff80 : nt!KeBugCheckEx
fffff880`042afe20 fffff800`020cfdee : 00000000`00000000 fffffa80`08b43010 fffffa80`08efab00 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x45a5b
fffff880`042aff80 fffff880`032fdf99 : 00000000`00010000 00000000`00000003 00000000`3e085000 00000000`00030000 : nt!KiPageFault+0x16e
fffff880`042b0110 00000000`00010000 : 00000000`00000003 00000000`3e085000 00000000`00030000 fffff880`042b01b0 : nvlddmkm+0xe6f99
fffff880`042b0118 00000000`00000003 : 00000000`3e085000 00000000`00030000 fffff880`042b01b0 fffffa80`08eec010 : 0x10000
fffff880`042b0120 00000000`3e085000 : 00000000`00030000 fffff880`042b01b0 fffffa80`08eec010 00000000`00000000 : 0x3
fffff880`042b0128 00000000`00030000 : fffff880`042b01b0 fffffa80`08eec010 00000000`00000000 00000000`00001000 : 0x3e085000
fffff880`042b0130 fffff880`042b01b0 : fffffa80`08eec010 00000000`00000000 00000000`00001000 00000000`00010000 : 0x30000
fffff880`042b0138 fffffa80`08eec010 : 00000000`00000000 00000000`00001000 00000000`00010000 fffff880`042b0180 : 0xfffff880`042b01b0
fffff880`042b0140 00000000`00000000 : 00000000`00001000 00000000`00010000 fffff880`042b0180 00000000`00000000 : 0xfffffa80`08eec010


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nvlddmkm+e6f99
fffff880`032fdf99 8b4128          mov     eax,dword ptr [rcx+28h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nvlddmkm+e6f99

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4cb9dd0e

FAILURE_BUCKET_ID:  X64_0x50_nvlddmkm+e6f99

BUCKET_ID:  X64_0x50_nvlddmkm+e6f99

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041511-16125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`02061000 PsLoadedModuleList = 0xfffff800`022a4e90
Debug session time: Fri Apr 15 15:30:53.531 2011 (UTC - 4:00)
System Uptime: 0 days 2:04:39.312
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A0, {b, 17f94a000, 3, 1e47c000}

Probably caused by : ntkrnlmp.exe ( nt!PopWriteHiberPages+a3 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000000b, The hibernation file is too small.
Arg2: 000000017f94a000, Size of the hibernation file.
Arg3: 0000000000000003, HIBERFILE_PROGRESS_MEMORY_RANGES
Arg4: 000000001e47c000, Size of the remaining memory ranges.

Debugging Details:
------------------


BUGCHECK_STR:  0xA0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002318623 to fffff800020e5cc0

STACK_TEXT:  
fffff880`0c5201b8 fffff800`02318623 : 00000000`000000a0 00000000`0000000b 00000001`7f94a000 00000000`00000003 : nt!KeBugCheckEx
fffff880`0c5201c0 fffff800`02318ccb : fffffa80`08240c00 00000000`0000e000 fffffa80`08240c00 00000000`0000f260 : nt!PopWriteHiberPages+0xa3
fffff880`0c5203c0 fffff800`02318e35 : 00001355`44f0241a fffff880`0c5206c8 fffff880`0000e000 00000000`00000010 : nt!PopAddPagesToCompressedPageSet+0x1eb
fffff880`0c520450 fffff800`0231a242 : fffff880`00bb4000 fffff880`0c5206c8 00000000`00000002 00000000`00000048 : nt!PopBufferCompressedPageSet+0xd5
fffff880`0c5204c0 fffff800`0231aa29 : fffffa80`0000b570 fffff880`0a34d000 00000000`0017f94a 00000000`0000f260 : nt!PopWriteHiberImage+0x3d2
fffff880`0c5206b0 fffff800`0201f09e : ffffffff`ffd0b000 00000000`00000000 fffff800`0231a840 00000000`00000000 : nt!PopSaveHiberContext+0x1ea
fffff880`0c520860 fffff800`0231fd59 : 00000000`00003705 00000000`00000000 00000000`00000000 fffff800`020f57d3 : hal!HaliAcpiSleep+0x18f
fffff880`0c5208d0 fffff800`0231fdff : 00000000`00000000 fffffa80`08240c00 fffff800`02287480 00000000`0231ba50 : nt!PopHandleNextState+0x12a
fffff880`0c520920 fffff800`02325480 : 00000000`00000005 00000000`00000001 00000000`00000000 fffff880`0c520aa0 : nt!PopIssueNextState+0x1f
fffff880`0c520950 fffff800`023258e4 : 00000000`00000000 00000000`0022fa00 00000000`00000000 00000000`00000001 : nt!PopInvokeSystemStateHandler+0x3c0
fffff880`0c520b10 fffff800`02321734 : ffffffff`ffffffff ffffffff`ffffffff 00000000`0022fa00 00000000`00000000 : nt!PopEndMirroring+0x84
fffff880`0c520be0 fffff800`02325c65 : fffff880`0c520d00 fffff880`00000008 00000000`00000000 fffffa80`00000008 : nt!MmDuplicateMemory+0xb64
fffff880`0c520cd0 fffff800`023822c2 : fffffa80`0a4a69a0 fffffa80`069f6680 fffffa80`069f6680 fffff800`020dd917 : nt!PopTransitionToSleep+0xd5
fffff880`0c520d40 fffff800`020d3946 : fffff880`009bf180 fffffa80`0a4a69a0 fffffa80`0913d2f0 fffff880`01250b30 : nt!PspSystemThreadStartup+0x5a
fffff880`0c520d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!PopWriteHiberPages+a3
fffff800`02318623 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!PopWriteHiberPages+a3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ca43a80

FAILURE_BUCKET_ID:  X64_0xA0_nt!PopWriteHiberPages+a3

BUCKET_ID:  X64_0xA0_nt!PopWriteHiberPages+a3

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041211-16343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`02059000 PsLoadedModuleList = 0xfffff800`0229ce90
Debug session time: Tue Apr 12 02:03:04.917 2011 (UTC - 4:00)
System Uptime: 0 days 1:20:41.683
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffffa86051bf2f0, 2, 1, fffff80002105d5c}

Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+d0 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa86051bf2f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002105d5c, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800023080e8
 fffffa86051bf2f0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiReplenishPageSlist+d0
fffff800`02105d5c f00fba6b1000    lock bts dword ptr [rbx+10h],0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  Skype.exe

TRAP_FRAME:  fffff8800cf186b0 -- (.trap 0xfffff8800cf186b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000201b3fba rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000004f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002105d5c rsp=fffff8800cf18840 rbp=fffffa80051b02e0
 r8=fffff8000230a400  r9=fffffa8006900000 r10=fffffa8006900930
r11=fffff8800cf18930 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiReplenishPageSlist+0xd0:
fffff800`02105d5c f00fba6b1000    lock bts dword ptr [rbx+10h],0 ds:00000000`00000010=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800020dd269 to fffff800020ddcc0

STACK_TEXT:  
fffff880`0cf18568 fffff800`020dd269 : 00000000`0000000a fffffa86`051bf2f0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0cf18570 fffff800`020dbee0 : 00000000`00000000 fffffa86`051bf2e0 fffffa80`08d1ba20 00000000`00004315 : nt!KiBugCheckDispatch+0x69
fffff880`0cf186b0 fffff800`02105d5c : fffffa80`08d59000 0000007f`ffffffff 00000980`00000000 0000007f`fffffff8 : nt!KiPageFault+0x260
fffff880`0cf18840 fffff800`02105b3f : fffffa80`06900910 00000000`0000003a fffffa80`051d12e0 00000000`0000003a : nt!MiReplenishPageSlist+0xd0
fffff880`0cf188b0 fffff800`020f69d6 : 00000000`00000002 00000000`00000002 fffffa80`0a7ecec8 00000000`00000002 : nt!MiRemoveAnyPage+0x24f
fffff880`0cf189d0 fffff800`020f0a26 : 00000000`00000001 00000000`0af53ff8 fffff880`0cf18c20 fffff680`00057a98 : nt!MiResolveDemandZeroFault+0x586
fffff880`0cf18ac0 fffff800`020dbdee : 00000000`00000001 00000000`0af36fe0 00000000`00000001 00000000`7ef5c000 : nt!MmAccessFault+0x5c6
fffff880`0cf18c20 00000000`7743b308 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0996f9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7743b308


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiReplenishPageSlist+d0
fffff800`02105d5c f00fba6b1000    lock bts dword ptr [rbx+10h],0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiReplenishPageSlist+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4ca43a80

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0xA_nt!MiReplenishPageSlist+d0

BUCKET_ID:  X64_0xA_nt!MiReplenishPageSlist+d0

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041011-14906-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`0201b000 PsLoadedModuleList = 0xfffff800`0225ee90
Debug session time: Sun Apr 10 03:19:06.765 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:11.546
Loading Kernel Symbols
..................................................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {22, fffffa80086d3000, 0, 0}

Probably caused by : rdyboost.sys ( rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeMergeNodes+174 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022, 
Arg2: fffffa80086d3000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x19_22

POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800022ca0e8
 fffffa80086d3000 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff800020f645e to fffff8000209fcc0

STACK_TEXT:  
fffff880`02539978 fffff800`020f645e : 00000000`00000019 00000000`00000022 fffffa80`086d3000 00000000`00000000 : nt!KeBugCheckEx
fffff880`02539980 fffff800`021c42d8 : 00000000`00000000 fffff880`02539ad0 fffff880`02539a40 0000000a`00000001 : nt! ?? ::FNODOBFM::`string'+0x75c6
fffff880`02539a10 fffff880`01965f1c : fffffa80`079f6128 fffffa80`079f6130 fffffa80`079f6118 00000000`00000000 : nt!ExFreePoolWithTag+0x468
fffff880`02539ac0 fffff880`019654a1 : fffffa80`086c8000 fffffa80`07904830 fffffa80`086d3000 00000000`00000000 : rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeMergeNodes+0x174
fffff880`02539b00 fffff880`019647f9 : fffffa80`07904830 fffffa80`086c86dc fffffa80`08822970 fffffa80`086c8000 : rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeDeleteEx+0x241
fffff880`02539b50 fffff880`0196d623 : 00000000`00000000 fffff880`0196c2c8 fffffa80`08822970 00000000`0000000f : rdyboost!ST_STORE<SMD_TRAITS>::StDmPageRemove+0x2e9
fffff880`02539c80 fffff880`0196c41a : fffffa80`08822970 00000000`00000080 00000000`00000080 fffffa80`079f6f88 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x22f
fffff880`02539ce0 fffff800`0233c2c2 : 00000000`00000000 fffff880`00000000 fffffa80`079ef970 fffffa80`069e8040 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x152
fffff880`02539d40 fffff800`0208d946 : fffff880`01e5d180 fffffa80`079ef970 fffff880`01e67fc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02539d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeMergeNodes+174
fffff880`01965f1c 44017618        add     dword ptr [rsi+18h],r14d

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeMergeNodes+174

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rdyboost

IMAGE_NAME:  rdyboost.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ca43db7

FAILURE_BUCKET_ID:  X64_0x19_22_rdyboost!B_TREE__SMD_STORE_KEY,ST_STORE_SMD_TRAITS_::_ST_PAGE_ENTRY,4096,NP_CONTEXT_::BTreeMergeNodes+174

BUCKET_ID:  X64_0x19_22_rdyboost!B_TREE__SMD_STORE_KEY,ST_STORE_SMD_TRAITS_::_ST_PAGE_ENTRY,4096,NP_CONTEXT_::BTreeMergeNodes+174

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040911-16125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`0204c000 PsLoadedModuleList = 0xfffff800`0228fe90
Debug session time: Sat Apr  9 02:22:18.730 2011 (UTC - 4:00)
System Uptime: 0 days 0:11:25.496
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff88003c2522e, fffff880040b0658, fffff880040afeb0}

Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003c2522e, The address that the exception occurred at
Arg3: fffff880040b0658, Exception Record Address
Arg4: fffff880040afeb0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2
fffff880`03c2522e 488b48c8        mov     rcx,qword ptr [rax-38h]

EXCEPTION_RECORD:  fffff880040b0658 -- (.exr 0xfffff880040b0658)
ExceptionAddress: fffff88003c2522e (dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+0x00000000000000c2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880040afeb0 -- (.cxr 0xfffff880040afeb0)
rax=fa800896ad0004c0 rbx=fffff8a002fa97f0 rcx=fffffa8006e01a70
rdx=fffffa80099e9010 rsi=fffffa8009a06000 rdi=fffff8a002fa97f0
rip=fffff88003c2522e rsp=fffff880040b0890 rbp=0000000000000000
 r8=fffff8a002fa97f0  r9=fffff880040b08c0 r10=fffff88003c11c40
r11=fffff8a0083faa30 r12=0000000000000002 r13=000000000006f64f
r14=0000000000000200 r15=fffff880040b0ca0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+0xc2:
fffff880`03c2522e 488b48c8        mov     rcx,qword ptr [rax-38h] ds:002b:fa800896`ad000488=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800022fb0e8
 ffffffffffffffff 

FOLLOWUP_IP: 
dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2
fffff880`03c2522e 488b48c8        mov     rcx,qword ptr [rax-38h]

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff88003c250f6 to fffff88003c2522e

STACK_TEXT:  
fffff880`040b0890 fffff880`03c250f6 : 00000000`00000000 00000000`00000200 fffffa80`09a06000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+0xc2
fffff880`040b0a20 fffff880`03c2e642 : fffffa80`09a15660 00000000`00000000 00000000`00000200 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegment+0x13e
fffff880`040b0a90 fffff880`03c2d889 : fffff8a0`02fa97f0 00000000`00000000 fffffa80`06e6b400 fffffa80`09a15660 : dxgmms1!VIDMM_APERTURE_SEGMENT::UnmapApertureRange+0x7a
fffff880`040b0ae0 fffff880`03c2025d : fffff8a0`02fa97f0 fffffa80`09a06000 fffffa80`06e6b480 fffffa80`09a06000 : dxgmms1!VIDMM_APERTURE_SEGMENT::EvictResource+0xf9
fffff880`040b0b30 fffff880`03c1b358 : fffffa80`0a34cf20 00000000`00000000 00000000`00000000 fffff880`040b0ca0 : dxgmms1!VIDMM_GLOBAL::ProcessDeferredCommand+0x96d
fffff880`040b0c50 fffff880`03c3916d : fffffa80`00000000 fffffa80`09998410 00000000`6d4d6956 fffff880`00000174 : dxgmms1!VidMmiProcessTerminationCommand+0x4c
fffff880`040b0ca0 fffff880`03c383f8 : fffff880`01e61f40 fffffa80`06d3d3c0 00000000`00000000 fffffa80`09998410 : dxgmms1!VidSchiSubmitDeviceCommand+0x39
fffff880`040b0cd0 fffff880`03c37e96 : 00000000`00000000 fffffa80`06d3d3c0 00000000`00000080 fffffa80`09998410 : dxgmms1!VidSchiSubmitQueueCommand+0xb0
fffff880`040b0d00 fffff800`0236d2c2 : 00000000`028136d3 fffffa80`099a8b60 fffffa80`069e8040 fffffa80`099a8b60 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`040b0d40 fffff800`020be946 : fffff880`01e5d180 fffffa80`099a8b60 fffff880`01e67fc0 fffff880`01228a90 : nt!PspSystemThreadStartup+0x5a
fffff880`040b0d80 00000000`00000000 : fffff880`040b1000 fffff880`040ab000 fffff880`040b0480 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

STACK_COMMAND:  .cxr 0xfffff880040afeb0 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2

BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050711-16906-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`02005000 PsLoadedModuleList = 0xfffff800`02248e90
Debug session time: Sat May  7 09:42:13.058 2011 (UTC - 4:00)
System Uptime: 0 days 0:19:15.777
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800020b1d5c, fffff8800c074010, 0}

Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+d0 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020b1d5c, Address of the instruction which caused the bugcheck
Arg3: fffff8800c074010, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MiReplenishPageSlist+d0
fffff800`020b1d5c f00fba6b1000    lock bts dword ptr [rbx+10h],0

CONTEXT:  fffff8800c074010 -- (.cxr 0xfffff8800c074010)
rax=fffffa800024a440 rbx=fffef28006decc00 rcx=0000000000000000
rdx=000000000000004b rsi=0000000000000007 rdi=0000000000000004
rip=fffff800020b1d5c rsp=fffff8800c0749f0 rbp=fffffa800024bc40
 r8=fffff800022b6400  r9=fffffa8005100000 r10=fffffa8005101100
r11=fffff8800c074af0 r12=fffff800022b6400 r13=2aaaaaaaaaaaaaab
r14=fdffffffffffffff r15=0000058000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210202
nt!MiReplenishPageSlist+0xd0:
fffff800`020b1d5c f00fba6b1000    lock bts dword ptr [rbx+10h],0 ds:002b:fffef280`06decc10=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  2

TRAP_FRAME:  fffff8800c074860 -- (.trap 0xfffff8800c074860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800024a440 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000004b rsi=0000000000000000 rdi=0000000000000000
rip=fffff800020b1d5c rsp=fffff8800c0749f0 rbp=fffffa800024bc40
 r8=fffff800022b6400  r9=fffffa8005100000 r10=fffffa8005101100
r11=fffff8800c074af0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!MiReplenishPageSlist+0xd0:
fffff800`020b1d5c f00fba6b1000    lock bts dword ptr [rbx+10h],0 ds:fffe:00000000`00000010=????????
Resetting default scope

EXCEPTION_RECORD:  fffff8800c0747b8 -- (.exr 0xfffff8800c0747b8)
ExceptionAddress: fffff800020b1d5c (nt!MiReplenishPageSlist+0x00000000000000d0)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

LAST_CONTROL_TRANSFER:  from fffff800020b1b3f to fffff800020b1d5c

STACK_TEXT:  
fffff880`0c0749f0 fffff800`020b1b3f : fffffa80`051010e0 00000000`0000006c fffffa80`0024ec40 00000000`0000006c : nt!MiReplenishPageSlist+0xd0
fffff880`0c074a60 fffff800`020a29d6 : 00000000`00000002 fffff880`00000002 fffff880`08feac00 00000000`00000000 : nt!MiRemoveAnyPage+0x24f
fffff880`0c074b80 fffff800`020b2e04 : 00000000`00000001 fffff900`c3357000 fffff880`0c074ee0 fffff6fc`80619ab8 : nt!MiResolveDemandZeroFault+0x586
fffff880`0c074c70 fffff800`0209cd51 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDispatchFault+0x8c4
fffff880`0c074d80 fffff800`02087dee : 00000000`00000001 fffff900`c32cf000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x8f1
fffff880`0c074ee0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e


FOLLOWUP_IP: 
nt!MiReplenishPageSlist+d0
fffff800`020b1d5c f00fba6b1000    lock bts dword ptr [rbx+10h],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiReplenishPageSlist+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4ca43a80

STACK_COMMAND:  .cxr 0xfffff8800c074010 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x3B_nt!MiReplenishPageSlist+d0

BUCKET_ID:  X64_0x3B_nt!MiReplenishPageSlist+d0

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050711-21796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`02019000 PsLoadedModuleList = 0xfffff800`0225ce90
Debug session time: Sat May  7 10:07:39.717 2011 (UTC - 4:00)
System Uptime: 0 days 0:14:35.483
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {3, fffffa80051792a0, fffffa80051793a0, fffffa80051793a0}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a96 )

Followup: Pool_corruption
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa80051792a0, the pool entry being checked.
Arg3: fffffa80051793a0, the read back flink freelist value (should be the same as 2).
Arg4: fffffa80051793a0, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR:  0x19_3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Skype.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800021c1d5f to fffff8000209dcc0

STACK_TEXT:  
fffff880`096ae0b8 fffff800`021c1d5f : 00000000`00000019 00000000`00000003 fffffa80`051792a0 fffffa80`051793a0 : nt!KeBugCheckEx
fffff880`096ae0c0 fffff800`024e0ed8 : fffff8a0`00000001 00000000`00000000 fffffa80`05602c00 00000000`00000000 : nt!ExDeferredFreePool+0xa96
fffff880`096ae1b0 fffff800`021aee31 : 00000000`000007ff 00000000`00000330 fffff8a0`00000001 fffff8a0`0b670c70 : nt!PfpRpFileKeyUpdate+0x98
fffff880`096ae240 fffff880`0119155d : 00000000`00000000 00000000`00000000 fffff880`096ae3d8 fffffa80`05792aa0 : nt!PfFileInfoNotify+0x5a1
fffff880`096ae2d0 fffff880`01191ba8 : fffffa80`06356010 fffff8a0`0a59b740 fffff880`096ae4b0 fffff880`096ae4b0 : fileinfo!FIStreamLog+0x89
fffff880`096ae3a0 fffff880`011913c8 : fffff8a0`0a59b740 00000000`00000000 fffff880`096ae4b0 fffff880`096ae4b0 : fileinfo!FIStreamSetFileInfo+0x14c
fffff880`096ae410 fffff880`0118fbdb : fffff140`025e1d27 00000000`00000001 00000000`00000000 00000000`00002db9 : fileinfo!FIStreamGetInfo+0x17c
fffff880`096ae490 fffff880`01140298 : 00000000`00000000 fffff8a0`0a59b740 fffffa80`05634820 00000000`00000000 : fileinfo!FIPostCreateCallback+0x1c7
fffff880`096ae520 fffff880`0113f6db : fffffa80`062e4030 fffffa80`057b0e00 fffffa80`0710f010 fffffa80`0710f230 : fltmgr!FltpPerformPostCallbacks+0x368
fffff880`096ae5f0 fffff880`0115e4c9 : fffffa80`05634480 fffffa80`06356010 fffffa80`05634400 fffffa80`0619f9e0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x39b
fffff880`096ae680 fffff800`0239dde5 : 00000000`00000005 fffffa80`0557f1c8 fffffa80`05863010 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`096ae730 fffff800`02391698 : fffffa80`060e7c50 fffff800`00000000 fffffa80`0557f010 00000000`00000001 : nt!IopParseDevice+0x5a5
fffff880`096ae8c0 fffff800`02392306 : 00000000`00000000 fffffa80`0557f010 fffff8a0`01208a70 fffffa80`051f4210 : nt!ObpLookupObjectName+0x588
fffff880`096ae9b0 fffff800`0239f407 : 00000000`000007ff 00000000`00000001 fffffa80`055cf901 ffffffff`ffffffff : nt!ObOpenObjectByName+0x306
fffff880`096aea80 fffff800`023a1f58 : 00000000`0008e2e8 fffff8a0`80100080 fffff880`01ecc180 00000000`0008e300 : nt!IopCreateFile+0x2b7
fffff880`096aeb20 fffff800`0209cf53 : 00000000`00000000 fffffa80`08d0cb00 00000000`746c6644 fffff880`096aec38 : nt!NtCreateFile+0x78
fffff880`096aebb0 00000000`77b020ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b020ca


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+a96
fffff800`021c1d5f cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExDeferredFreePool+a96

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a96

BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a96

Followup: Pool_corruption
---------





DRIVERS

Code:
start             end                 module name
fffff880`00f3b000 fffff880`00f92000   ACPI     ACPI.sys     Thu Sep 30 03:15:46 2010 (4CA43922)
fffff880`02a02000 fffff880`02a8b000   afd      afd.sys      Thu Sep 30 03:19:04 2010 (4CA439E8)
fffff880`03f46000 fffff880`03f5c000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01131000 fffff880`0113c000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`045e0000 fffff880`045e9000   aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:09 2010 (4C86506D)
fffff880`045a6000 fffff880`045e0000   aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084)
fffff880`02a8b000 fffff880`02a95000   aswRdr   aswRdr.SYS   Tue Sep 07 10:47:47 2010 (4C865093)
fffff880`02d30000 fffff880`02d53000   aswSP    aswSP.SYS    Tue Sep 07 10:52:07 2010 (4C865197)
fffff880`01090000 fffff880`010a0000   aswTdi   aswTdi.SYS   Tue Sep 07 10:52:27 2010 (4C8651AB)
fffff880`010fe000 fffff880`01107000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01107000 fffff880`01131000   ataport  ataport.SYS  Thu Sep 30 03:15:54 2010 (4CA4392A)
fffff880`019e0000 fffff880`019e7000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02d1f000 fffff880`02d30000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0abc1000 fffff880`0abdf000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006e0000 fffff960`00707000   cdd      cdd.dll      Thu Sep 30 06:13:44 2010 (4CA462D8)
fffff880`0148b000 fffff880`014b5000   cdrom    cdrom.sys    Thu Sep 30 03:15:59 2010 (4CA4392F)
fffff880`00cf9000 fffff880`00db9000   CI       CI.dll       Thu Sep 30 06:25:44 2010 (4CA465A8)
fffff880`01971000 fffff880`019a1000   CLASSPNP CLASSPNP.SYS Thu Sep 30 03:16:01 2010 (4CA43931)
fffff880`00c9b000 fffff880`00cf9000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01072000   cng      cng.sys      Thu Sep 30 03:58:22 2010 (4CA4431E)
fffff880`03f36000 fffff880`03f46000   CompositeBus CompositeBus.sys Thu Sep 30 04:17:45 2010 (4CA447A9)
fffff880`0aa9e000 fffff880`0aaa7000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`04fe1000 fffff880`04fef000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c7e000 fffff880`02d01000   csc      csc.sys      Thu Sep 30 03:21:40 2010 (4CA43A84)
fffff880`02d01000 fffff880`02d1f000   dfsc     dfsc.sys     Thu Sep 30 03:21:02 2010 (4CA43A5E)
fffff880`02c6f000 fffff880`02c7e000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0195b000 fffff880`01971000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`044db000 fffff880`044fd000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04e00000 fffff880`04e09000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04fef000 fffff880`04ffb000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04503000 fffff880`04516000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04fd5000 fffff880`04fe1000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03ccd000 fffff880`03dc1000   dxgkrnl  dxgkrnl.sys  Thu Sep 30 03:43:53 2010 (4CA43FB9)
fffff880`03c00000 fffff880`03c46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01188000 fffff880`0119c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0113c000 fffff880`01188000   fltmgr   fltmgr.sys   Thu Sep 30 03:15:58 2010 (4CA4392E)
fffff880`013ea000 fffff880`013f4000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01921000 fffff880`0195b000   fvevol   fvevol.sys   Thu Sep 30 03:19:10 2010 (4CA439EE)
fffff880`0181e000 fffff880`01868000   fwpkclnt fwpkclnt.sys Thu Sep 30 03:17:38 2010 (4CA43992)
fffff800`02601000 fffff800`02649000   hal      hal.dll      Thu Sep 30 06:17:53 2010 (4CA463D1)
fffff880`03e27000 fffff880`03e32000   hamachi  hamachi.sys  Thu Feb 19 05:36:41 2009 (499D3639)
fffff880`03c46000 fffff880`03c6a000   HDAudBus HDAudBus.sys Thu Sep 30 04:26:51 2010 (4CA449CB)
fffff880`04541000 fffff880`0455a000   HIDCLASS HIDCLASS.SYS Thu Sep 30 04:26:57 2010 (4CA449D1)
fffff880`04e0b000 fffff880`04e13080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04533000 fffff880`04541000   hidusb   hidusb.sys   Thu Sep 30 04:26:57 2010 (4CA449D1)
fffff880`0aaf8000 fffff880`0abc1000   HTTP     HTTP.sys     Thu Sep 30 03:19:08 2010 (4CA439EC)
fffff880`01918000 fffff880`01921000   hwpolicy hwpolicy.sys Thu Sep 30 03:15:30 2010 (4CA43912)
fffff880`02d79000 fffff880`02d8f000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03bdc000 fffff880`03bff000   irda     irda.sys     Mon Jul 13 20:09:01 2009 (4A5BCC9D)
fffff880`03f04000 fffff880`03f0d000   irenum   irenum.sys   Mon Jul 13 20:08:59 2009 (4A5BCC9B)
fffff880`03ef8000 fffff880`03f04000   irsir    irsir.sys    Sat Jan 19 01:36:11 2008 (47919A5B)
fffff880`03e3d000 fffff880`03e4c000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04567000 fffff880`04575000   kbdhid   kbdhid.sys   Thu Sep 30 04:17:39 2010 (4CA447A3)
fffff800`01f02000 fffff800`01f0c000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`03c7b000 fffff880`03cbe000   ks       ks.sys       Thu Sep 30 04:17:39 2010 (4CA447A3)
fffff880`013be000 fffff880`013d9000   ksecdd   ksecdd.sys   Thu Sep 30 03:17:31 2010 (4CA4398B)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`044fd000 fffff880`04502200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03e8e000 fffff880`03e91d80   LGBusEnum LGBusEnum.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
fffff880`0b321000 fffff880`0b323480   LGVirHid LGVirHid.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
fffff880`045e9000 fffff880`045fe000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04583000 fffff880`045a6000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c38000 fffff880`00c87000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Thu Sep 30 06:19:44 2010 (4CA46440)
fffff880`04575000 fffff880`04583000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03e4c000 fffff880`03e5b000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0455a000 fffff880`04567000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00db9000 fffff880`00dd3000   mountmgr mountmgr.sys Thu Sep 30 03:15:59 2010 (4CA4392F)
fffff880`0abdf000 fffff880`0abf7000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0aa00000 fffff880`0aa2d000   mrxsmb   mrxsmb.sys   Thu Sep 30 03:21:28 2010 (4CA43A78)
fffff880`0aa2d000 fffff880`0aa7a000   mrxsmb10 mrxsmb10.sys Thu Sep 30 03:21:30 2010 (4CA43A7A)
fffff880`0aa7a000 fffff880`0aa9e000   mrxsmb20 mrxsmb20.sys Thu Sep 30 03:21:23 2010 (4CA43A73)
fffff880`015ed000 fffff880`015f8000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f9b000 fffff880`00fa5000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0119c000 fffff880`011fb000   msrpc    msrpc.sys    Thu Sep 30 03:18:33 2010 (4CA439C9)
fffff880`02c64000 fffff880`02c6f000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01906000 fffff880`01918000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014cc000 fffff880`015bf000   ndis     ndis.sys     Thu Sep 30 03:18:38 2010 (4CA439CE)
fffff880`03f80000 fffff880`03f8c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03f8c000 fffff880`03fbb000   ndiswan  ndiswan.sys  Thu Sep 30 04:35:21 2010 (4CA44BC9)
fffff880`04460000 fffff880`04475000   NDProxy  NDProxy.SYS  Thu Sep 30 04:35:12 2010 (4CA44BC0)
fffff880`02b9e000 fffff880`02bad000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02a95000 fffff880`02ada000   netbt    netbt.sys    Thu Sep 30 03:18:22 2010 (4CA439BE)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Thu Sep 30 03:18:55 2010 (4CA439DF)
fffff880`014b5000 fffff880`014c6000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c58000 fffff880`02c64000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02019000 fffff800`02601000   nt       ntkrnlmp.exe Thu Sep 30 03:21:36 2010 (4CA43A80)
fffff880`0121a000 fffff880`013be000   Ntfs     Ntfs.sys     Thu Sep 30 03:17:37 2010 (4CA43991)
fffff880`019d7000 fffff880`019e0000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03bda000 fffff880`03bdb180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
fffff880`04475000 fffff880`0449e000   nvhda64v nvhda64v.sys Tue Sep 07 16:08:40 2010 (4C869BC8)
fffff880`03000000 fffff880`03bd9a80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
fffff880`02b78000 fffff880`02b9e000   pacer    pacer.sys    Thu Sep 30 04:33:20 2010 (4CA44B50)
fffff880`03f0d000 fffff880`03f2a000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00fe5000 fffff880`00ffa000   partmgr  partmgr.sys  Thu Sep 30 03:16:06 2010 (4CA43936)
fffff880`00fb2000 fffff880`00fe5000   pci      pci.sys      Thu Sep 30 03:15:45 2010 (4CA43921)
fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e78000 fffff880`00e88000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d9000 fffff880`013ea000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0ae8f000 fffff880`0af35000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0449e000 fffff880`044db000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c87000 fffff880`00c9b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03f5c000 fffff880`03f80000   rasl2tp  rasl2tp.sys  Thu Sep 30 04:35:20 2010 (4CA44BC8)
fffff880`03fbb000 fffff880`03fd6000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03fd6000 fffff880`03ff7000   raspptp  raspptp.sys  Thu Sep 30 04:35:21 2010 (4CA44BC9)
fffff880`03e00000 fffff880`03e1a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c07000 fffff880`02c58000   rdbss    rdbss.sys    Thu Sep 30 03:21:34 2010 (4CA43A7E)
fffff880`03e32000 fffff880`03e3d000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01610000 fffff880`01619000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019f5000 fffff880`019fe000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015e4000 fffff880`015ed000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018cc000 fffff880`01906000   rdyboost rdyboost.sys Thu Sep 30 03:35:19 2010 (4CA43DB7)
fffff880`03e6d000 fffff880`03e85000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e93000 fffff880`03ef8000   Rt64win7 Rt64win7.sys Mon Oct 25 05:33:07 2010 (4CC54ED3)
fffff880`00dd3000 fffff880`00ded000   SCDEmu   SCDEmu.SYS   Mon Apr 12 04:52:25 2010 (4BC2DF49)
fffff880`0af35000 fffff880`0af40000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03f2a000 fffff880`03f36000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02bad000 fffff880`02bca000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`018c4000 fffff880`018cc000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0b288000 fffff880`0b321000   srv      srv.sys      Thu Sep 30 03:23:26 2010 (4CA43AEE)
fffff880`0ae00000 fffff880`0ae6a000   srv2     srv2.sys     Thu Sep 30 03:23:11 2010 (4CA43ADF)
fffff880`0af40000 fffff880`0af6d000   srvnet   srvnet.sys   Thu Sep 30 03:23:05 2010 (4CA43AD9)
fffff880`03e8c000 fffff880`03e8d480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`03e1a000 fffff880`03e27000   tap0901  tap0901.sys  Wed Nov 19 13:22:35 2008 (4924596B)
fffff880`0161b000 fffff880`0181e000   tcpip    tcpip.sys    Thu Sep 30 03:21:03 2010 (4CA43A5F)
fffff880`0afde000 fffff880`0aff0000   tcpipreg tcpipreg.sys Thu Sep 30 04:34:41 2010 (4CA44BA1)
fffff880`01200000 fffff880`0120d000   TDI      TDI.SYS      Thu Sep 30 03:18:13 2010 (4CA439B5)
fffff880`01072000 fffff880`01090000   tdx      tdx.sys      Thu Sep 30 03:18:22 2010 (4CA439BE)
fffff880`02be5000 fffff880`02bf9000   termdd   termdd.sys   Thu Sep 30 04:45:43 2010 (4CA44E37)
fffff960`00490000 fffff960`0049a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`02d53000 fffff880`02d79000   tunnel   tunnel.sys   Thu Sep 30 04:33:16 2010 (4CA44B4C)
fffff880`03e5b000 fffff880`03e6d000   umbus    umbus.sys    Thu Sep 30 04:27:58 2010 (4CA44A0E)
fffff880`04516000 fffff880`04533000   usbccgp  usbccgp.sys  Thu Sep 30 04:27:07 2010 (4CA449DB)
fffff880`04e09000 fffff880`04e0af00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03c6a000 fffff880`03c7b000   usbehci  usbehci.sys  Thu Sep 30 04:27:01 2010 (4CA449D5)
fffff880`04406000 fffff880`04460000   usbhub   usbhub.sys   Thu Sep 30 04:27:55 2010 (4CA44A0B)
fffff880`02d8f000 fffff880`02de5000   USBPORT  USBPORT.SYS  Thu Sep 30 04:27:05 2010 (4CA449D9)
fffff880`00fa5000 fffff880`00fb2000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019e7000 fffff880`019f5000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04e14000 fffff880`04fd5000   viahduaa viahduaa.sys Wed Aug 04 03:51:53 2010 (4C591C19)
fffff880`015bf000 fffff880`015e4000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`010ae000 fffff880`010ea000   vmbus    vmbus.sys    Thu Sep 30 03:49:29 2010 (4CA44109)
fffff880`01868000 fffff880`01878000   vmstorfl vmstorfl.sys Thu Sep 30 03:49:24 2010 (4CA44104)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Thu Sep 30 03:16:01 2010 (4CA43931)
fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01878000 fffff880`018c4000   volsnap  volsnap.sys  Thu Sep 30 03:16:10 2010 (4CA4393A)
fffff880`02ada000 fffff880`02b6f000   vsdatant vsdatant.sys Sun May 09 12:28:58 2010 (4BE6E2CA)
fffff880`02bca000 fffff880`02be5000   wanarp   wanarp.sys   Thu Sep 30 04:35:22 2010 (4CA44BCA)
fffff880`01600000 fffff880`01610000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e88000 fffff880`00f2c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f2c000 fffff880`00f3b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02b6f000 fffff880`02b78000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00020000 fffff960`00330000   win32k   win32k.sys   Thu Sep 30 03:44:59 2010 (4CA43FFB)
fffff880`010ea000 fffff880`010fe000   winhv    winhv.sys    Thu Sep 30 03:16:08 2010 (4CA43938)
fffff880`00f92000 fffff880`00f9b000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03dc1000 fffff880`03de2000   WudfPf   WudfPf.sys   Thu Sep 30 04:25:42 2010 (4CA44986)
fffff880`019a1000 fffff880`019d2000   WUDFRd   WUDFRd.sys   Thu Sep 30 04:26:46 2010 (4CA449C6)

Unloaded modules:
fffff880`0af6d000 fffff880`0afde000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`019a1000 fffff880`019af000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019af000 fffff880`019bb000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`019bb000 fffff880`019c4000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`019c4000 fffff880`019d7000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`03e5b000 fffff880`03e8c000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`03e5b000 fffff880`03e8c000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
 
Following my above post please note the importance of freeing up hard disk space, since one of your crash dumps reads:

BugCheck A0, {b, .... which means there's not enough space on disk as required for hyberfile.sys.
 
Okay I will get started on the homework you gave me :p

Note that the ram ive been using, are the same that used to work from the start when i bought the computer. Right now I have two sticks in and its running "ok". I have more than 1tb free memory.
 
Free as much disk space as you can, follow all other steps in my post and attach this stuff:

- cpuz MEMORY tab
- cpuz CPU tab
- Passmark RAMMon HTML.zip
 
Okay posting the first results.

I deleted avast and installed MSE
Pretty sure I deleted the openvpn also.

tried doing the chkdsk but.

Code:
C:\Users\Menace>chkdsk /f
The type of the file system is NTFS.
Cannot lock current drive.

Chkdsk cannot run because the volume is in use by another
process.  Would you like to schedule this volume to be
checked the next time the system restarts? (Y/N) n

C:\Users\Menace>sfc /scannow

Beginning system scan.  This process will take some time.

Beginning verification phase of system scan.
Verification 100% complete.
Windows Resource Protection found corrupt files but was unable to fix some of th
em.
Details are included in the CBS.Log windir\Logs\CBS\CBS.log. For example
C:\Windows\Logs\CBS\CBS.log

gonna do the hddscan and hddtune now.
 

Attachments

  • RAMMon - SPD Info.rar
    2.4 KB · Views: 275
  • cpuzcpu.JPG
    cpuzcpu.JPG
    59.9 KB · Views: 413
  • cpuzmemory.JPG
    cpuzmemory.JPG
    43.4 KB · Views: 475
Rammon is useless here, it failed to detect your RAM. Attach cpuz S P D screens under EACH slot.


checked the next time the system restarts? (Y/N) n

You should have pressed "Y" to confirm.
 
[langtitle=de]Re: BSOD and hardware issue[/langtitle]

[lang=de]Not sure about what to post. Im not pro at this. Didnt see anything obvious interessting.[/lang]
 

Attachments

  • ST31500341AS-9VS4CRPK-SMART.rar
    3.3 KB · Views: 292
cybercore;215721 You should have pressed &amp;quot;Y&amp;quot; to confirm.[/QUOTE said:
I tried doing that, and restart but nothing happened.... It has done automatic checkdisk before i think though, when it failed. I will post S P D screens.
 
All the ram blocks has the exact same stats as in this picture. (if you need proof that this is true, i will post the other 3 slot-pictures ^^, thank you for help!)
 

Attachments

  • spd.JPG
    spd.JPG
    49 KB · Views: 395
Last edited:
What you have attached is slot #1. Attach also slots #2 3 and 4.

Yes i know, thats exactly what i wrote lol. As I said, every slot is 100% similar.
 

Attachments

  • slot3.JPG
    slot3.JPG
    50.6 KB · Views: 463
  • slot2.JPG
    slot2.JPG
    50.7 KB · Views: 429
  • slo1.JPG
    slo1.JPG
    53.3 KB · Views: 423
  • slot4.JPG
    slot4.JPG
    53.3 KB · Views: 427
Sure, but I always want to verify it especially that you mentioned changing ram configurations.

What you have now looks good to me, 4 GSkills DDR 1333 CL 9-9-9-24 1.5v.

HDD SMART tests show you have errors:

Reallocation Sector Count 100 100 036 - this is uncorrectable
Airflow Temperature 052 043 48 C - bad cooling
HDA Temperature 048 057 48 C
- bad cooling
UltraDMA CRC Errors 200 065
- uncorrectable

So basically try another hard dtive and see how it goes.
Run 10 passes of Memtest86+ - Advanced Memory Diagnostic Tool.
 
So I eventually bought a new harddrive, which fixed some bsods for a while.

But then i quickly just got a bunch of new ones.

If someone would be so kind to tell me what is wrong, I'd really appriciate it.
 

Attachments

  • bsod minidump.rar
    543.3 KB · Views: 229
Back
Top