Windows 7 BSOD Combo! (the same error)

jesterdvine

New Member
Joined
Nov 5, 2009
Hi guys. I am having a couple BSODs tonight. The reason? Apparently the same. Dumps are attached. So please help me! Thanks..
 

Attachments

  • 013111-16832-01 - Copy.rar
    35.1 KB · Views: 215
  • 013111-28672-01 - Copy.rar
    38.4 KB · Views: 258
  • 2.JPG
    2.JPG
    50.5 KB · Views: 481
  • 1c.JPG
    1c.JPG
    53.1 KB · Views: 450
  • 1d.JPG
    1d.JPG
    43.2 KB · Views: 440
  • 1a.JPG
    1a.JPG
    53.4 KB · Views: 469
  • 1b.JPG
    1b.JPG
    42.6 KB · Views: 437
  • 1.JPG
    1.JPG
    41.8 KB · Views: 458
Last edited:
Uninstall Kaspersky 2009:

Removal tool for Kaspersky Lab products

Link Removed due to 404 Error


http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html
Attach your CPU-Z screenshots of these tabs - memory and spd of each slot.











Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\013111-28672-01 - Copy.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c61000 PsLoadedModuleList = 0xfffff800`02e9ee50
Debug session time: Mon Jan 31 10:11:07.929 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:36.271
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002fcc67c, fffff8800698a080, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+20 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002fcc67c, Address of the instruction which caused the bugcheck
Arg3: fffff8800698a080, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObDereferenceSecurityDescriptor+20
fffff800`02fcc67c 8b4610          mov     eax,dword ptr [rsi+10h]

CONTEXT:  fffff8800698a080 -- (.cxr 0xfffff8800698a080)
rax=fffff8800698aa88 rbx=0000000000000000 rcx=ff00000000000000
rdx=0000000000000001 rsi=feffffffffffffe0 rdi=0000000000000000
rip=fffff80002fcc67c rsp=fffff8800698aa60 rbp=fffffa8007bc1500
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff8800698ab38 r12=0000000000000001 r13=fffffa80078cd060
r14=0000000004255800 r15=fffff8a002a922c0
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObDereferenceSecurityDescriptor+0x20:
fffff800`02fcc67c 8b4610          mov     eax,dword ptr [rsi+10h] ds:002b:feffffff`fffffff0=????????
Resetting default scope

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002f97bf8 to fffff80002fcc67c

STACK_TEXT:  
fffff880`0698aa60 fffff800`02f97bf8 : 00000000`00000000 fffffa80`07bc1500 fffffa80`0539d200 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x20
fffff880`0698aa90 fffff800`02cd80ee : 00000000`00000000 fffffa80`078cd060 fffffa80`0539d200 00000000`00000000 : nt!SeDefaultObjectMethod+0xa8
fffff880`0698aae0 fffff800`02fe6194 : fffffa80`078cd060 00000000`00000000 fffffa80`0796d060 00000000`00000000 : nt!ObfDereferenceObject+0x10e
fffff880`0698ab40 fffff800`02fe6094 : 00000000`000006ec fffffa80`078cd060 fffff8a0`02a922c0 00000000`000006ec : nt!ObpCloseHandleTableEntry+0xc4
fffff880`0698abd0 fffff800`02cd2153 : fffffa80`0796d060 fffff880`0698aca0 00000000`042f09a0 fffffa80`07bc1500 : nt!ObpCloseHandle+0x94
fffff880`0698ac20 00000000`7757fe4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0491f758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7757fe4a


FOLLOWUP_IP: 
nt!ObDereferenceSecurityDescriptor+20
fffff800`02fcc67c 8b4610          mov     eax,dword ptr [rsi+10h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObDereferenceSecurityDescriptor+20

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

STACK_COMMAND:  .cxr 0xfffff8800698a080 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+20

BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+20

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\013111-16832-01 - Copy.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
Debug session time: Mon Jan 31 11:22:20.719 2011 (UTC - 5:00)
System Uptime: 0 days 1:10:01.061
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002cd0105, fffff88009db98e0, 0}

*** WARNING: Unable to verify timestamp for win32k.syウ
*** ERROR: Module load completed but symbols could not be loaded for win32k.syウ
Probably caused by : memory_corruption

Followup: memory_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cd0105, Address of the instruction which caused the bugcheck
Arg3: fffff88009db98e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02cd0105 498b08          mov     rcx,qword ptr [r8]

CONTEXT:  fffff88009db98e0 -- (.cxr 0xfffff88009db98e0)
rax=000000040d0d0006 rbx=fffffa800893e3e0 rcx=fffff880009e9b20
rdx=00fffa80089fe671 rsi=fffff880009e9b20 rdi=0000000000000000
rip=fffff80002cd0105 rsp=fffff88009dba2c0 rbp=fffff80002e5a880
 r8=00fffa80089fe670  r9=fffff80002c5b000 r10=fffff880009e9b20
r11=fffff88009dba498 r12=0000000000000004 r13=0000000000000000
r14=0000000000000002 r15=0000000042786454
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02cd0105 498b08          mov     rcx,qword ptr [r8] ds:002b:00fffa80`089fe670=????????????????
Resetting default scope

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x3B

PROCESS_NAME:  uTorrent.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002dff4d3 to fffff80002cd0105

STACK_TEXT:  
fffff880`09dba2c0 fffff800`02dff4d3 : 00000000`00000000 00000000`00000002 fffffa80`085ba06c 00fffa80`085ba079 : nt!ExpInterlockedPopEntrySListFault16
fffff880`09dba2d0 fffff880`02b9dd09 : fffffa80`05544810 fffffa80`0893e3e0 fffffa80`089b9a00 00fffa80`0893e3e0 : nt!ExAllocatePoolWithTag+0x103
fffff880`09dba3c0 fffffa80`05544810 : fffffa80`0893e3e0 fffffa80`089b9a00 00fffa80`0893e3e0 00000000`00000000 : 0xfffff880`02b9dd09
fffff880`09dba3c8 fffffa80`0893e3e0 : fffffa80`089b9a00 00fffa80`0893e3e0 00000000`00000000 fffffa80`078fbc00 : 0xfffffa80`05544810
fffff880`09dba3d0 fffffa80`089b9a00 : 00fffa80`0893e3e0 00000000`00000000 fffffa80`078fbc00 00000000`00000000 : 0xfffffa80`0893e3e0
fffff880`09dba3d8 00fffa80`0893e3e0 : 00000000`00000000 fffffa80`078fbc00 00000000`00000000 fffffa80`0663f5f0 : 0xfffffa80`089b9a00
fffff880`09dba3e0 00000000`00000000 : fffffa80`078fbc00 00000000`00000000 fffffa80`0663f5f0 fffffa80`084ce134 : 0xfffa80`0893e3e0


CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
65 errors : !nt (fffff80002cd00b7-fffff80002cd0ea7)
fffff80002cd00b0  48  8b  11  48  8b  41  08 *00  c0  74  03  fe  c8  c3  48  8b H..H.A...t....H.
fffff80002cd00c0  c2  48  25  00  00  00  fe *00  0c  48  83  f8  01  f5  48 *00 .H%......H....H.
...
fffff80002cd00f0  84  d2  74  2f  eb  07  49 *00  02  49  8b  52  08  4c  8b  c2 ..t/..I..I.R.L..
...
fffff80002cd0110  f0  49  0f  c7  0a  75  df *00  8b  c0  5b  c3  41  0f  0d *00 .I...u....[.A...
...
fffff80002cd0130  81  c8  ff  ff  1f  00  49 *00  c8  15  49  8b  18  48  c1  e3 ......I...I..H..
fffff80002cd0140  15  8b  c8  66  ff  c9  48 *00  e1  ff  ff  ff  01  48  0b  d9 ...f..H......H..
fffff80002cd0150  f0  49  0f  b1  1a  75  c9  eb  be  cc  cc  cc  cc  cc  cc *00 .I...u..........
...
fffff80002cd0190  0a  75  e8  49  8b  c0  5b *00  48  bb  00  00  00  00  80 *00 .u.I..[.H.......
...
fffff80002cd01c0  d8  49  c1  f8  14  4d  89  03  67  8d  98  01  00  01  00 *00 .I...M..g.......
fffff80002cd01d0  e3  ff  ff  ff  01  48  0b  d9  f0  49  0f  b1  1a  75  d0 *00 .....H...I...u..
fffff80002cd01e0  b2  cc  cc  cc  cc  cc  cc *00  0f  1f  84  00  00  00  00  00 ................
fffff80002cd01f0  48  53  0f  0d  09  4c  8b *00  48  8b  01  48  8b  51  08  84 HS...L..H..H.Q..
fffff80002cd0200  d2  74  1f  4c  8b  c2  49  ff  c8  74  12  48  33  c9  fe *00 .t.L..I..t.H3...
...
fffff80002cd0220  5b  c3  4c  8b  c0  49  81  e0  00  00  00  fe  74  ef  8b *00 [.L..I......t...
...
fffff80002cd0260  53  08  84  d2  74  24  fe  c1  4c  8b  d2  41  80  e2  f0 *00 S...t$..L..A....
...
fffff80002cd04d0  08  48  8d  4d  e8  48  89 *00  f0  48  89  11  48  89  08  48 .H.M.H...H..H..H
fffff80002cd04e0  89  4a  08  f0  81  27  7f  ff  ff  ff  4c  8b  ac  24  b8 *00 .J...'....L..$..
fffff80002cd04f0  00  00  48  8d  45  18  41  ff  c4  48  89  45  08  48  83 *00 ..H.E.A..H.E.H..
...
fffff80002cd0530  48  03  c0  4d  89  5c  c3 *00  4d  8b  c8  44  8b  44  24  24 H..M.\..M..D.D$$
...
fffff80002cd0590  86  b8  fd  ff  ff  e9  cb *00  06  00  83  c8  20  89  46 *00 ............ .F.
fffff80002cd05a0  e9  45  fe  ff  ff  48  0f  be  c2  44  38  7c  30  4a  0f *00 .E...H...D8|0J..
fffff80002cd05b0  68  06  00  00  84  d2  0f *ff  c9  01  00  00  44  38  7e  4a h...........D8~J
...
fffff80002cd0620  00  00  0f  0d  0f  8b  07 *00  44  24  40  88  4c  24  43  8b [email protected]$C.
...
fffff80002cd0650  41  08  48  89  0a  48  89 *ff  08  48  89  10  48  89  51  08 A.H..H...H..H.Q.
fffff80002cd0660  f0  81  27  7f  ff  ff  ff  c6  86  64  01  00  00  02  f0 *00 ..'......d......
...
fffff80002cd06a0  83  f8  03  7d  2c  48  8b *00  18  f0  0f  ba  2f  07  0f  82 ...},H....../...
...
fffff80002cd08d0  c1  24  07  3c  01  0f  85 *00  02  00  00  44  89  7b  04  49 .$.<.......D.{.I
...
fffff80002cd08f0  00  48  8d  4c  24  60  41 *00  d2  e8  b2  fd  fb  ff  48  8b .H.L$`A.......H.
...
fffff80002cd0930  8b  d6  49  8b  ce  e8  96 *03  04  00  8b  c3  e9  15  fc  ff ..I.............
fffff80002cd0940  ff  48  b8  08  00  00  00 *00  f7  ff  ff  48  8b  00  48  3b .H.........H..H;
fffff80002cd0950  86  d8  00  00  00  0f  82  bc  fb  ff  ff  f0  48  0f  ba *00 ............H...
...
fffff80002cd09d0  39  01  77  eb  44  8b  94  24  b0  02  00  00  8b  c2  41 *00 9.w.D..$......A.
fffff80002cd09e0  c1  4c  89  44  c4  60  45 *00  ca  72  b4  e9  8e  f9  ff *00 .L.D.`E..r......
...
fffff80002cd0a10  10  48  83  c1  08  48  89  42  08  48  89  0a  48  89  10 *00 .H...H.B.H..H...
...
fffff80002cd0a50  ff  41  0f  b6  86  da  21 *03  00  38  47  03  0f  84  73  fb .A....!..8G...s.
fffff80002cd0a60  ff  ff  e9  62  fa  ff  ff  48  8d  6c  24  68  45  8d  6a *00 ...b...H.l$hE.j.
...
fffff80002cd0a80  e0  0f  82  8b  6a  06  00 *00  83  c5  08  49  83  ed  01  75 ....j......I...u
...
fffff80002cd0aa0  00  4c  8b  74  24  58  4c  8b  ac  24  b8  02  00  00  4c *00 .L.t$XL..$....L.
...
fffff80002cd0cb0  ff  bf  c0  00  00  00  e9  6b  ff  ff  ff  41  8b  ff  ff *00 .......k...A....
...
fffff80002cd0ce0  00  00  00  00  72  d8  8a  8c  24  d8  02  00  00  8a  94 *00 ....r...$.......
fffff80002cd0cf0  d0  02  00  00  44  8d  40 *00  e9  fd  f6  ff  ff  66  44  39 [email protected]
fffff80002cd0d00  be  c6  01  00  00  0f  85  f9  f6  ff  ff  41  80  fe  01 *00 ...........A....
...
fffff80002cd0d20  c6  44  0f  22  c0  45  0f *00  c0  44  88  b6  66  01  00 *14 .D.".E...D..f...
fffff80002cd0d30  e9  9c  f6  ff  ff  ff  4b *00  e9  a2  fb  ff  ff  90  90  90 ......K.........
fffff80002cd0d40  90  90  90  90  90  90  90  90  90  90  90  90  90  90  90 *00 ................
fffff80002cd0d50  48  89  5c  24  08  48  89  6c  24  10  48  89  74  24  18 *00 H.\$.H.l$.H.t$..
fffff80002cd0d60  41  54  41  55  41  56  41 *00  48  83  ec  30  4d  63  d0 *00 ATAUAVA.H..0Mc..
...
fffff80002cd0da0  83  7d  50  00  74  25  4c  3b  c3  76  20  48  8d  05  8e *00 .}P.t%L;.v H....
fffff80002cd0db0  1a  00  49  8b  d2  48  6b  d2  38  48  03  d0  49  8b  c0 *00 ..I..Hk.8H..I...
fffff80002cd0dc0  8b  4a  08  48  2b  c3  49  3b  c1  77  68  48  8b  cf  4c *00 .J.H+.I;.whH..L.
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .cxr 0xfffff88009db98e0 ; kb

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption
---------




Drivers:

Code:
start             end                 module name
fffff880`13e6a000 fffff880`13ea8000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ed4000 fffff880`00f2b000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`04344000 fffff880`043ce000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04810000 fffff880`04826000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`02c00000 fffff880`02c15000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e00000 fffff880`00e0b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`049b0000 fffff880`049b8000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`00ff0000 fffff880`00ff9000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00db6000 fffff880`00de0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01986000 fffff880`0198d000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02dbd000 fffff880`02dce000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0295f000 fffff880`0297d000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006d0000 fffff960`006f7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`018f6000 fffff880`01920000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cf6000 fffff880`00db6000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01890000 fffff880`018c0000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c98000 fffff880`00cf6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04800000 fffff880`04810000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`043dd000 fffff880`043eb000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`00f7e000 fffff880`00f95000   CSCrySec CSCrySec.sys Mon Dec 07 03:34:23 2009 (4B1CBE0F)
fffff880`02daa000 fffff880`02dbd000   CSVirtualDiskDrv CSVirtualDiskDrv.sys Mon Dec 07 03:34:27 2009 (4B1CBE13)
fffff880`02d8c000 fffff880`02daa000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02d7d000 fffff880`02d8c000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0187a000 fffff880`01890000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04bb8000 fffff880`04bda000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`02df4000 fffff880`02dfd000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02c2f000 fffff880`02c3b000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`043eb000 fffff880`043fe000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04a5c000 fffff880`04a68000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`14b0c000 fffff880`14c00000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`13e00000 fffff880`13e46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`02929000 fffff880`0295f000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01135000 fffff880`01149000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010e9000 fffff880`01135000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013ce000 fffff880`013d8000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01840000 fffff880`0187a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01073000 fffff880`010bd000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02c18000 fffff800`02c61000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`13e46000 fffff880`13e6a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04a00000 fffff880`04a5c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04be0000 fffff880`04bf9000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04a84000 fffff880`04a8c080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04a76000 fffff880`04a84000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02800000 fffff880`028c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015e6000 fffff880`015ef000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`049b8000 fffff880`049d6000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`049d6000 fffff880`049e5000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`03e1b000 fffff880`04344000   kl1      kl1.sys      Tue Sep 01 07:29:21 2009 (4A9D0591)
fffff880`015d8000 fffff880`015e6000   klbg     klbg.sys     Wed Oct 14 13:18:13 2009 (4AD607D5)
fffff880`01920000 fffff880`0197d000   klif     klif.sys     Thu Nov 26 04:07:11 2009 (4B0E453F)
fffff880`02cb0000 fffff880`02cba000   klim6    klim6.sys    Mon Sep 14 06:46:26 2009 (4AAE1F02)
fffff880`018ea000 fffff880`018f4000   klmouflt klmouflt.sys Fri Oct 02 11:38:29 2009 (4AC61E75)
fffff880`04a8e000 fffff880`04ad1000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013a3000 fffff880`013bd000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04bda000 fffff880`04bdf200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`028fc000 fffff880`02911000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`010bd000 fffff880`010e0000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c77000 fffff880`00c84000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`04a68000 fffff880`04a76000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`043ce000 fffff880`043dd000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`018dd000 fffff880`018ea000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fd6000 fffff880`00ff0000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0297d000 fffff880`02995000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02995000 fffff880`029c2000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05eeb000 fffff880`05f39000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05f39000 fffff880`05f5c000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019eb000 fffff880`019f6000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f34000 fffff880`00f3e000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01149000 fffff880`011a7000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02d72000 fffff880`02d7d000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015c6000 fffff880`015d8000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014d4000 fffff880`015c6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0484a000 fffff880`04856000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04856000 fffff880`04885000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04b3d000 fffff880`04b52000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02cba000 fffff880`02cc9000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c3c000 fffff880`02c81000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01800000 fffff880`01811000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02d66000 fffff880`02d72000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c61000 fffff800`0323e000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01200000 fffff880`013a3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0197d000 fffff880`01986000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`14b0a000 fffff880`14b0b180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`04b52000 fffff880`04b7b000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`13eaf000 fffff880`14b09d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`02c8a000 fffff880`02cb0000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04993000 fffff880`049b0000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f95000 fffff880`00faa000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f3e000 fffff880`00f71000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fbf000 fffff880`00fc6000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fc6000 fffff880`00fd6000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013bd000 fffff880`013ce000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05e00000 fffff880`05ea6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04b7b000 fffff880`04bb8000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c84000 fffff880`00c98000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04826000 fffff880`0484a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04885000 fffff880`048a0000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`048a0000 fffff880`048c1000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02c15000 fffff880`02c2f000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d15000 fffff880`02d66000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`019d0000 fffff880`019d9000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019d9000 fffff880`019e2000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019e2000 fffff880`019eb000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01493000 fffff880`014cd000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02911000 fffff880`02929000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`048ca000 fffff880`04921000   Rt64win7 Rt64win7.sys Thu Mar 04 08:42:52 2010 (4B8FB8DC)
fffff880`05ea6000 fffff880`05eb1000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`049e5000 fffff880`049f1000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02cc9000 fffff880`02ce6000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0148b000 fffff880`01493000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06676000 fffff880`0670c000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`05f6e000 fffff880`05fd5000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`05eb1000 fffff880`05ede000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`048c1000 fffff880`048c2480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05f5c000 fffff880`05f6e000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0182f000 fffff880`0183c000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01811000 fffff880`0182f000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d01000 fffff880`02d15000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00500000 fffff960`0050a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02dce000 fffff880`02df4000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04ad1000 fffff880`04ae3000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`013d8000 fffff880`013f2c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`018c0000 fffff880`018dd000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04bf9000 fffff880`04bfaf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04982000 fffff880`04993000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04ae3000 fffff880`04b3d000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04921000 fffff880`0492c000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0492c000 fffff880`04982000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03e00000 fffff880`03e1b000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00f71000 fffff880`00f7e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0198d000 fffff880`0199b000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0199b000 fffff880`019c0000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00faa000 fffff880`00fbf000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011a7000 fffff880`011f3000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02ce6000 fffff880`02d01000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019c0000 fffff880`019d0000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e21000 fffff880`00ec5000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ec5000 fffff880`00ed4000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c81000 fffff880`02c8a000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00370000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`049f1000 fffff880`049fa000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f2b000 fffff880`00f34000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`028db000 fffff880`028fc000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`018c0000 fffff880`018ce000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018ce000 fffff880`018da000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018da000 fffff880`018e3000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018e3000 fffff880`018f6000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
@cybercore: Done that. Attached is the most recent one.
 

Attachments

  • 020111-15834-01 - Copy.rar
    28.4 KB · Views: 265
Last edited:
The Ram is set right and the sticks are identical.
Run Memtest86+ - Advanced Memory Diagnostic Tool 10 passes overnight.


The drivers are in excellent shape, and there's no particular offset to any 3rd party driver.

Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-15834-01 - Copy.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50
Debug session time: Tue Feb  1 09:23:01.688 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:10.436
Loading Kernel Symbols
...............................................................
..................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff800032253c0, 2, 0, fffff80002ea1f62}

Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+122 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff800032253c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ea1f62, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ab0e0
 fffff800032253c0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!RtlDispatchException+122
fffff800`02ea1f62 410fb60c24      movzx   ecx,byte ptr [r12]

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002faf090 -- (.trap 0xfffff88002faf090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a000493bd0 rbx=0000000000000000 rcx=0000000000000008
rdx=fffff88002faf2e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032253c0 rsp=fffff88002faf228 rbp=fffff88002faf4b0
 r8=fffff8a000003001  r9=0000000000000017 r10=fffffa8003b9b660
r11=0000000000020019 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!CmpCallCallBacks:
fffff800`032253c0 488bc4          mov     rax,rsp
Resetting default scope

EXCEPTION_RECORD:  fffff88002faeb18 -- (.exr 0xfffff88002faeb18)
ExceptionAddress: fffff80002e794d8 (nt!KiTryUnwaitThread+0x0000000000000028)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

LOCK_ADDRESS:  fffff80003077400 -- (!locks fffff80003077400)

Resource @ nt!PiEngineLock (0xfffff80003077400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
	Lock address  : 0xfffff80003077400
	Thread Count  : 0
	Thread address: 0x0000000000000000
	Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff80002e74469 to fffff80002e74f00

STACK_TEXT:  
fffff880`02fad988 fffff800`02e74469 : 00000000`0000000a fffff800`032253c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02fad990 fffff800`02e730e0 : fffff880`02fadbe0 00000000`00000000 00000000`00037464 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02fadad0 fffff800`02ea1f62 : fffff800`032253c0 fffff880`02fadca8 fffff880`02faeb18 fffff800`02e03000 : nt!KiPageFault+0x260
fffff880`02fadc60 fffff800`02eaf1b5 : fffff880`02faeb18 fffff880`02fae370 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`02fae340 fffff800`02e74542 : fffff880`02faeb18 ffff0800`00000011 fffff880`02faebc0 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`02fae9e0 fffff800`02e72e4a : 00000000`00000001 00000000`80000000 fffff880`02faed90 fffff800`02e4d6d6 : nt!KiExceptionDispatch+0xc2
fffff880`02faebc0 fffff800`02e794d8 : fffff6fc`00019128 fffff800`03000440 00000000`00000000 fffff800`032253c0 : nt!KiGeneralProtectionFault+0x10a
fffff880`02faed50 fffff800`02eef22d : fffff980`03182ee0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x28
fffff880`02faedb0 fffff800`02e5192f : fffff6fc`00018a68 00000000`00000002 fffff800`02fffb00 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x3cae9
fffff880`02faee80 fffff800`02e26ba9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02faef00 fffff800`02e90424 : 00000000`00000000 fffff800`02e8efa0 00b00000`0314d121 0000007f`ffffffff : nt!KiCheckForKernelApcDelivery+0x25
fffff880`02faef30 fffff800`02e72fee : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1844
fffff880`02faf090 fffff800`032253c0 : fffff800`03191315 00400000`0321e100 00000000`00000001 fffffa80`03b9b660 : nt!KiPageFault+0x16e
fffff880`02faf228 fffff800`03191315 : 00400000`0321e100 00000000`00000001 fffffa80`03b9b660 00001f80`01080000 : nt!CmpCallCallBacks
fffff880`02faf230 fffff800`02e74153 : fffffa80`03b86b60 fffff880`02faf5e8 fffffa80`00000001 fffff980`015d6fc0 : nt! ?? ::NNGAKEGL::`string'+0x2c83e
fffff880`02faf3c0 fffff800`02e706f0 : fffff800`030e52ab ffffffff`80000138 00000000`00000001 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02faf5c8 fffff800`030e52ab : ffffffff`80000138 00000000`00000001 00000000`00000000 ffffffff`8000014c : nt!KiServiceLinkage
fffff880`02faf5d0 fffff800`0321ee99 : 00000000`00000002 00000000`00000000 00000000`00000000 fffff880`02faf700 : nt!IopGetRegistryValue+0xab
fffff880`02faf630 fffff800`0325576e : fffff880`02faf708 00000000`00000002 00080dce`00000000 fffff880`02faf700 : nt!PipGetRegistryDwordWithFallback+0x99
fffff880`02faf6b0 fffff800`0325fa03 : fffffa80`0599e9b0 fffffa80`053f8480 fffff8a0`00469e20 fffffa80`053b86e0 : nt!PipChangeDeviceObjectFromRegistryProperties+0x8e
fffff880`02faf7a0 fffff800`03260ec2 : fffffa80`053aad90 fffffa80`053b86e0 00000000`00000002 fffffa80`053b9a20 : nt!PipCallDriverAddDevice+0x733
fffff880`02faf950 fffff800`0326135c : fffffa80`05d47400 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x2b2
fffff880`02fafbc0 fffff800`02f75322 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`02fafc10 fffff800`02e82161 : fffff800`02f75020 fffff800`0316e501 fffffa80`03b86b00 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`02fafcb0 fffff800`03118166 : 00000604`00000000 fffffa80`03b86b60 00000000`00000080 fffffa80`03b10b30 : nt!ExpWorkerThread+0x111
fffff880`02fafd40 fffff800`02e53486 : fffff880`02d64180 fffffa80`03b86b60 fffff880`02d6efc0 00000604`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fafd80 00000000`00000000 : fffff880`02fb0000 fffff880`02faa000 fffff880`02faf180 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!RtlDispatchException+122
fffff800`02ea1f62 410fb60c24      movzx   ecx,byte ptr [r12]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!RtlDispatchException+122

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0xA_nt!RtlDispatchException+122

BUCKET_ID:  X64_0xA_nt!RtlDispatchException+122

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`00ee4000 fffff880`00f3b000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02b3d000 fffff880`02bc7000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03c6f000 fffff880`03c84000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ff2000 fffff880`00ffd000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fe9000 fffff880`00ff2000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`02a91000 fffff880`02a98000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03c38000 fffff880`03c49000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02a2d000 fffff880`02a57000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ca4000 fffff880`00d64000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00dc0000 fffff880`00df0000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c46000 fffff880`00ca4000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01145000 fffff880`011b8000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`013f1000 fffff880`013ff000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c1a000 fffff880`03c38000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c0b000 fffff880`03c1a000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`013db000 fffff880`013f1000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`015f5000 fffff880`015fe000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011f2000 fffff880`011fe000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c13000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`1489e000 fffff880`14992000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`14992000 fffff880`149d8000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`010d3000 fffff880`010e7000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01087000 fffff880`010d3000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013d1000 fffff880`013db000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`011b8000 fffff880`011f2000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`033e0000 fffff800`03429000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`015ec000 fffff880`015f5000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff800`00b9f000 fffff800`00ba9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`013a6000 fffff880`013c0000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00c25000 fffff880`00c32000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`00fcf000 fffff880`00fe9000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a57000 fffff880`02a88000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`02af6000 fffff880`02b01000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f44000 fffff880`00f4e000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010e7000 fffff880`01145000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c00000 fffff880`03c0b000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015da000 fffff880`015ec000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01488000 fffff880`0157a000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03d46000 fffff880`03d55000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03cd2000 fffff880`03d17000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0157a000 fffff880`015da000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`02b01000 fffff880`02b12000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03df2000 fffff880`03dfe000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e03000 fffff800`033e0000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01203000 fffff880`013a6000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02a88000 fffff880`02a91000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`1489c000 fffff880`1489d180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`13c41000 fffff880`1489bd00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`03d20000 fffff880`03d46000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f8e000 fffff880`00fa3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f4e000 fffff880`00f81000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fb8000 fffff880`00fbf000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fbf000 fffff880`00fcf000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013c0000 fffff880`013d1000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00c32000 fffff880`00c46000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03da1000 fffff880`03df2000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02adb000 fffff880`02ae4000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02ae4000 fffff880`02aed000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02aed000 fffff880`02af6000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03d55000 fffff880`03d72000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01475000 fffff880`0147d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`02b30000 fffff880`02b3d000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b12000 fffff880`02b30000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03d8d000 fffff880`03da1000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03c49000 fffff880`03c6f000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`00f81000 fffff880`00f8e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02a98000 fffff880`02aa6000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02aa6000 fffff880`02acb000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fa3000 fffff880`00fb8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d64000 fffff880`00dc0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03d72000 fffff880`03d8d000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02acb000 fffff880`02adb000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e31000 fffff880`00ed5000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ed5000 fffff880`00ee4000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d17000 fffff880`03d20000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`00f3b000 fffff880`00f44000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
 
Okay, will report the results tomorrow.

edit: memtest found no errors but after the reboot, I had this (the latest one in the .rar)
 

Attachments

  • Minidump.rar
    36 KB · Views: 236
Last edited:
One of them was caused by NVIDIA driver, install an earlier version and with the use of the driver sweeper Guru3D - Driver Sweeper.


Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-28860-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e1f000 PsLoadedModuleList = 0xfffff800`0305ce50
Debug session time: Tue Feb  1 12:30:06.638 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:12.386
Loading Kernel Symbols
...............................................................
..................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff80002e87e44, fffff88002fae828, fffff88002fae080}

Unable to load image nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+92ad0 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002e87e44, The address that the exception occurred at
Arg3: fffff88002fae828, Exception Record Address
Arg4: fffff88002fae080, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!memcpy+204
fffff800`02e87e44 488b040a        mov     rax,qword ptr [rdx+rcx]

EXCEPTION_RECORD:  fffff88002fae828 -- (.exr 0xfffff88002fae828)
ExceptionAddress: fffff80002e87e44 (nt!memcpy+0x0000000000000204)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000000011449c258
Attempt to read from address 000000011449c258

CONTEXT:  fffff88002fae080 -- (.cxr 0xfffff88002fae080)
rax=fffff8a0004ebff0 rbx=0000000000000008 rcx=fffff8a0004ebff0
rdx=0000076113fb0268 rsi=fffff8a0004ebff0 rdi=0000000000000008
rip=fffff80002e87e44 rsp=fffff88002faea68 rbp=fffff88002faee30
 r8=0000000000000008  r9=0000000000000001 r10=fffffa8003afe148
r11=fffff8a0004ebff0 r12=000000000000000a r13=fffff88002faeba8
r14=000000011449c258 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!memcpy+0x204:
fffff800`02e87e44 488b040a        mov     rax,qword ptr [rdx+rcx] ds:002b:00000001`1449c258=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000000011449c258

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c70e0
 000000011449c258 

FOLLOWUP_IP: 
nvlddmkm+92ad0
fffff880`13d8bad0 ??              ???

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff80003186132 to fffff80002e87e44

STACK_TEXT:  
fffff880`02faea68 fffff800`03186132 : 00000000`00000001 00000000`00000008 00000000`00000000 00000000`000007ff : nt!memcpy+0x204
fffff880`02faea70 fffff800`03185feb : fffffa80`05e00500 fffff880`02faeee0 00000000`00000001 fffff880`02faee70 : nt!ObpCaptureObjectName+0x102
fffff880`02faeaf0 fffff800`03189e35 : fffffa80`03b0ade0 fffffa80`03bd3200 00000000`0000006c 00000000`00000000 : nt!ObpCaptureObjectCreateInformation+0x279
fffff880`02faeb70 fffff800`0312719e : fffffa80`03ba8b60 fffff880`02faecf0 fffff880`02faee70 00000000`00000000 : nt!ObCreateObject+0x75
fffff880`02faebe0 fffff800`02e90153 : fffffa80`03ba8b60 00000000`c000009a 00000000`00000000 fffffa80`05810000 : nt!NtCreateSymbolicLinkObject+0xbe
fffff880`02faec70 fffff800`02e8c6f0 : fffff800`032039b6 00000000`000090de fffffa80`05dc9080 fffff980`015d0fa0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02faee08 fffff800`032039b6 : 00000000`000090de fffffa80`05dc9080 fffff980`015d0fa0 00000000`00000008 : nt!KiServiceLinkage
fffff880`02faee10 fffff880`13d8bad0 : 00000000`00000000 fffffa80`05dc9080 00000000`c000009a 00000000`000007ff : nt!IoCreateSymbolicLink+0x46
fffff880`02faee70 00000000`00000000 : fffffa80`05dc9080 00000000`c000009a 00000000`000007ff 00000000`00000100 : nvlddmkm+0x92ad0


SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  nvlddmkm+92ad0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d27c6da

STACK_COMMAND:  .cxr 0xfffff88002fae080 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_nvlddmkm+92ad0

BUCKET_ID:  X64_0x7E_nvlddmkm+92ad0



    Loaded symbol image file: nvlddmkm.sys
    Image path: nvlddmkm.sys
    Image name: nvlddmkm.sys
    Timestamp:        Fri Jan 07 21:07:22 2011 (4D27C6DA)
    CheckSum:         00C5F2DA
    ImageSize:        00C5AD00
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-21122-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e07000 PsLoadedModuleList = 0xfffff800`03044e50
Debug session time: Tue Feb  1 16:31:57.688 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:10.436
Loading Kernel Symbols
...............................................................
...................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80002e98c06}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e98c06, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030af0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+c73
fffff800`02e98c06 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

IRP_ADDRESS:  ffffffffffffff88

TRAP_FRAME:  fffff88002fadeb0 -- (.trap 0xfffff88002fadeb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002faeef0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e98c06 rsp=fffff88002fae040 rbp=fffff88002fae190
 r8=fffff88002fae148  r9=fffff88002fae140 r10=0000000000000002
r11=fffff80002e97fa0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
nt!IopCompleteRequest+0xc73:
fffff800`02e98c06 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope

LOCK_ADDRESS:  fffff8000307b400 -- (!locks fffff8000307b400)

Resource @ nt!PiEngineLock (0xfffff8000307b400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
	Lock address  : 0xfffff8000307b400
	Thread Count  : 0
	Thread address: 0x0000000000000000
	Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff80002e78469 to fffff80002e78f00

STACK_TEXT:  
fffff880`02fadd68 fffff800`02e78469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02fadd70 fffff800`02e770e0 : 00000000`00000000 fffff980`028beee0 00000000`80000000 fffffa80`03ba7b60 : nt!KiBugCheckDispatch+0x69
fffff880`02fadeb0 fffff800`02e98c06 : 00000000`00000000 fffff880`02faf0e0 fffff800`00000000 fffffa80`00000000 : nt!KiPageFault+0x260
fffff880`02fae040 fffff800`02e5592f : 00000000`00000000 00000000`00000000 ffffffff`80000100 fffff880`00000000 : nt!IopCompleteRequest+0xc73
fffff880`02fae110 fffff800`02e55ce7 : fffff800`0307f000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02fae190 fffff800`02e5191f : 00000000`00000000 00001f80`00000000 00000000`00000043 00000000`0000fffe : nt!KiApcInterrupt+0xd7
fffff880`02fae320 fffff800`02e516d6 : fffff800`02e17a04 fffff880`02fae530 fffffa80`04a5db10 fffff880`02fae510 : nt!RtlLookupFunctionTable+0x12f
fffff880`02fae380 fffff800`02e17af2 : 00000000`0002f880 00000000`00000000 fffff880`02fae510 00000000`00000000 : nt!RtlpLookupFunctionEntryForStackWalks+0x32
fffff880`02fae3f0 fffff800`02e17943 : fffffa80`04a5db10 fffff880`00000011 00000000`00000000 fffff8a0`00000004 : nt!RtlpWalkFrameChain+0x18e
fffff880`02faea90 fffff800`0323521c : fffffa80`04800000 00000000`000001e8 fffffa80`03ba7b60 0053002b`002b0010 : nt!RtlWalkFrameChain+0x73
fffff880`02faeac0 fffff800`03198f75 : fffff8a0`00001ae0 fffffa80`03ba7b60 00000000`000001e8 fffff8a0`00000001 : nt!ExpUpdateDebugInfo+0x1ec
fffff880`02faeb30 fffff800`03174968 : fffffa80`00000000 fffff8a0`01708e60 00000000`00000000 fffffa80`03bbc600 : nt! ?? ::NNGAKEGL::`string'+0x309aa
fffff880`02faec40 fffff800`03116594 : 00000000`00000000 00000000`00000000 f88002fa`00000000 00000000`00000003 : nt!ObOpenObjectByName+0x3f8
fffff880`02faed10 fffff800`0311666e : fffff880`02faf128 fffff880`000f003f fffff880`02faf140 00000000`00000000 : nt!CmCreateKey+0x2e1
fffff880`02faee80 fffff800`02e78153 : 00000000`00000000 00000000`00000000 00000000`00000008 00000001`000000f0 : nt!NtCreateKey+0x2e
fffff880`02faeed0 fffff800`02e746f0 : fffff800`030e940a 00000000`00000003 00000000`00000000 fffff980`015bafd0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02faf0d8 fffff800`030e940a : 00000000`00000003 00000000`00000000 fffff980`015bafd0 00000000`0000002c : nt!KiServiceLinkage
fffff880`02faf0e0 fffff800`0325e8fb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000f003f : nt!IopCreateRegistryKeyEx+0x7e
fffff880`02faf1b0 fffff800`0325fa33 : 00000000`00000000 fffff980`015fcfd0 fffff880`02faf278 ffffffff`80000200 : nt!PnpIsAnyDeviceInstanceEnabled+0x1eb
fffff880`02faf250 fffff800`03260579 : fffffa80`05f2a300 fffffa80`05dee000 fffffa80`20206f49 00000000`00000000 : nt!PnpDriverStarted+0x33
fffff880`02faf280 fffff800`032f3780 : 00000000`00000001 00000000`00000000 fffff880`02faf828 ffffffff`8000013c : nt!IopLoadDriver+0xb09
fffff880`02faf550 fffff800`03131cdc : fffff880`02faf860 00000000`00000000 00000000`c0000023 00000000`00000000 : nt!PipCallDriverAddDeviceQueryRoutine+0x390
fffff880`02faf650 fffff800`03131fea : 00000000`00000000 00000000`00000000 fffff880`02faf860 fffff880`02faf828 : nt!RtlpCallQueryRegistryRoutine+0xf4
fffff880`02faf6d0 fffff800`0326372c : fffffa80`057847e0 00000000`00000000 00000000`c0000034 fffff880`02faf828 : nt!RtlQueryRegistryValues+0x17e
fffff880`02faf7a0 fffff800`03264ec2 : fffffa80`057836e0 fffffa80`057847e0 00000000`00000001 fffff980`0000004c : nt!PipCallDriverAddDevice+0x45c
fffff880`02faf950 fffff800`0326535c : fffffa80`05d3a2f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x2b2
fffff880`02fafbc0 fffff800`02f79322 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`02fafc10 fffff800`02e86161 : fffff800`02f79020 fffff800`032cf901 fffffa80`03ba7b00 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`02fafcb0 fffff800`0311c166 : 00000000`00000000 fffffa80`03ba7b60 00000000`00000080 fffffa80`03b10b30 : nt!ExpWorkerThread+0x111
fffff880`02fafd40 fffff800`02e57486 : fffff880`02d64180 fffffa80`03ba7b60 fffff880`02d6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fafd80 00000000`00000000 : fffff880`02fb0000 fffff880`02faa000 fffff880`02fae340 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02e770e0 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`00ee7000 fffff880`00f3e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02a00000 fffff880`02a8a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03ccc000 fffff880`03ce1000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ec0000 fffff880`00ecb000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e8d000 fffff880`00e96000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e96000 fffff880`00ec0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`02b1f000 fffff880`02b26000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03c95000 fffff880`03ca6000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02abb000 fffff880`02ae5000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d2c000 fffff880`00dec000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01086000 fffff880`010b6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cce000 fffff880`00d2c000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0117d000 fffff880`011f0000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`015f2000 fffff880`01600000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c77000 fffff880`03c95000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c68000 fffff880`03c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01235000 fffff880`0124b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010b6000 fffff880`010bf000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`013f3000 fffff880`013ff000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ecb000 fffff880`00ede000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`148cd000 fffff880`149c1000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`13c00000 fffff880`13c46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0110b000 fffff880`0111f000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010bf000 fffff880`0110b000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00fbb000 fffff880`00ff5000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`033e4000 fffff800`0342d000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`13c46000 fffff880`13c6a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`015e9000 fffff880`015f2000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff800`00b96000 fffff800`00ba0000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015ac000 fffff880`015d7000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00cad000 fffff880`00cba000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`00e73000 fffff880`00e8d000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02ae5000 fffff880`02b16000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`02b84000 fffff880`02b8f000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f47000 fffff880`00f51000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0111f000 fffff880`0117d000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c5d000 fffff880`03c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015d7000 fffff880`015e9000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0145a000 fffff880`0154c000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03d68000 fffff880`03d77000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03cf4000 fffff880`03d39000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0154c000 fffff880`015ac000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`02b8f000 fffff880`02ba0000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c51000 fffff880`03c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e07000 fffff800`033e4000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01250000 fffff880`013f3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02b16000 fffff880`02b1f000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`148cb000 fffff880`148cc180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`13c70000 fffff880`148cad00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`03d42000 fffff880`03d68000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f91000 fffff880`00fa6000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f51000 fffff880`00f84000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00cba000 fffff880`00cce000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03c00000 fffff880`03c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02b69000 fffff880`02b72000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b72000 fffff880`02b7b000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b7b000 fffff880`02b84000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03d77000 fffff880`03d94000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0144a000 fffff880`01452000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`02bbe000 fffff880`02bcb000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02ba0000 fffff880`02bbe000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03daf000 fffff880`03dc3000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03ca6000 fffff880`03ccc000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`00f84000 fffff880`00f91000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02b26000 fffff880`02b34000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02b34000 fffff880`02b59000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fa6000 fffff880`00fbb000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03d94000 fffff880`03daf000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02b59000 fffff880`02b69000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00dec000 fffff880`00dfb000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d39000 fffff880`03d42000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
 
Back
Top Bottom