Two of your crash dumps (091910-25303-01 & 091910-17316-01) point to
memory_corruption. If it's not the drivers, then it's RAM, hard drive, video card, or mobo - a faulty hardware component which is causing a driver to address wrong memory areas. Since so far none of your dumps has identified stop 0x124, then I would say it's RAM or other hardware, maybe the motherboard.
RAM - you know how to test it,
memtest.org, overnight, you say it's good ...
HDD - you tested it,
hddscan.com, if you say It's good then it's good ...
Changing modes AHCI, IDE would require reinstall, but you may want to try that. Better if you test with another hardd drive, there may be all kinds of issues. But again, it does point to memory.
8089d1284914485-bsod-help-
091910-16208-01.dmp BAD_POOL_HEADER (19)
BUGCHECK_STR: 0x19_20
PROCESS_NAME: svchost.exe
FAILURE_BUCKET_ID: X64_0x19_20_nt!RtlpNewSecurityObject+e66
Probably caused by : ntkrnlmp.exe ( nt!RtlpNewSecurityObject+e66 )
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\8089d1284914485-bsod-help-091910-16208-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02800000 PsLoadedModuleList = 0xfffff800`02a3de50
System Uptime: 0 days 0:26:15.790
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffff8a0009c86b0, fffff8a0009c95a0, 5ef010b}
GetPointerFromAddress: unable to read from fffff80002aa80e0
Probably caused by : ntkrnlmp.exe ( nt!RtlpNewSecurityObject+e66 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a0009c86b0, The pool entry we were looking for within the page.
Arg3: fffff8a0009c95a0, The next pool entry.
Arg4: 0000000005ef010b, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: fffff8a0009c86b0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800029a36d3 to fffff80002871f00
STACK_TEXT:
fffff880`0727a488 fffff800`029a36d3 : 00000000`00000019 00000000`00000020 fffff8a0`009c86b0 fffff8a0`009c95a0 : nt!KeBugCheckEx
fffff880`0727a490 fffff800`02b7f376 : fffff8a0`0251b060 00000000`00008814 fffff880`64536553 00000000`000007ff : nt!ExFreePool+0xda4
fffff880`0727a540 fffff800`02b371e6 : fffff880`0727a8b0 fffff880`0727aaf8 fffffa80`0183bca0 fffff800`02b600c5 : nt!RtlpNewSecurityObject+0xe66
fffff880`0727a7d0 fffff800`02b5fba1 : 00000000`00000000 fffffa80`03948c10 fffff880`0727aaf8 00000000`00000000 : nt!ObpAssignSecurity+0x82
fffff880`0727a840 fffff800`02b44b15 : 00000000`00000000 fffff8a0`01523f80 fffff8a0`015a7a50 fffffa80`03ab24a0 : nt!ObInsertObjectEx+0x1e1
fffff880`0727aa90 fffff800`02871153 : fffffa80`03ab24a0 00000000`00000008 fffffa80`03dbe801 00000000`01dce308 : nt!NtOpenThreadTokenEx+0x445
fffff880`0727abb0 00000000`771601aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01dce2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771601aa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlpNewSecurityObject+e66
fffff800`02b7f376 80bc24c200000000 cmp byte ptr [rsp+0C2h],0
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!RtlpNewSecurityObject+e66
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x19_20_nt!RtlpNewSecurityObject+e66
BUCKET_ID: X64_0x19_20_nt!RtlpNewSecurityObject+e66
Followup: MachineOwner
---------
8088d1284914485-bsod-help-
091910-17316-01.dmp UNEXPECTED_KERNEL_MODE_TRAP (7f)
PROCESS_NAME: explorer.exe
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Probably caused by : memory_corruption
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\8088d1284914485-bsod-help-091910-17316-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02854000 PsLoadedModuleList = 0xfffff800`02a91e50
System Uptime: 0 days 0:02:21.878
Loading Kernel Symbols
...............................................................
................................................................
.......
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff800028c3e90}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800028c3e90
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003a8ef30 -- (.trap 0xfffff88003a8ef30)
Unable to read trap frame at fffff880`03a8ef30
LAST_CONTROL_TRANSFER: from fffff800028c5469 to fffff800028c5f00
STACK_TEXT:
fffff880`02f69ce8 fffff800`028c5469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02f69cf0 fffff800`028c3932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f69e30 fffff800`028c3e90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`03a8ef30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
16 errors : !nt (fffff800028c5e82-fffff800028c5efa)
fffff800028c5e80 00 4c *cb a8 20 01 00 00 4c 8b *4d 28 01 00 00 4c .L.. ...L.M(...L
fffff800028c5e90 8b b8 *c7 01 00 00 48 8b b8 08 *19 00 00 48 8b b0 ......H......H..
fffff800028c5ea0 10 01 *c4 00 48 8b 98 00 01 00 *11 48 81 c4 a8 01 ....H......H....
fffff800028c5eb0 00 00 *9f 90 90 90 90 90 90 90 *9b 90 90 90 90 90 ................
fffff800028c5ec0 cc cc *c8 cc cc cc 66 66 0f 1f *5f 00 00 00 00 00 ......ff.._.....
fffff800028c5ed0 48 83 *71 28 e8 27 00 00 00 90 *75 cc cc cc cc cc H.q(.'....u.....
fffff800028c5ee0 48 83 *c1 28 48 c7 44 24 20 00 *76 00 00 e8 0e 00 H..(H.D$ .v.....
fffff800028c5ef0 00 00 *d7 cc cc cc cc cc cc 0f *5b 80 00 00 00 00 ..........[.....
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
start end module name
fffff800`00ba7000 fffff800`00bb1000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`0280b000 fffff800`02854000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02854000 fffff800`02e31000 nt ntkrnlmp.exe Tue Jul 14 02:40:48 2009 (4A5BC600)
fffff880`00c07000 fffff880`00c4b000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00c4b000 fffff880`00c5f000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00c5f000 fffff880`00cbd000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00cbd000 fffff880`00d7d000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00d7d000 fffff880`00dd9000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00e25000 fffff880`00ec9000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00ec9000 fffff880`00ed8000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00ed8000 fffff880`00f2f000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00f2f000 fffff880`00f38000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f38000 fffff880`00f42000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00f42000 fffff880`00f75000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f75000 fffff880`00f82000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00f82000 fffff880`00f97000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00f97000 fffff880`00fac000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00fac000 fffff880`00fb3000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00fb3000 fffff880`00fc3000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00fc3000 fffff880`00fdd000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00fdd000 fffff880`00fe6000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`01073000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`010a3000 fffff880`010cd000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`010cd000 fffff880`010d8000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`010d8000 fffff880`01124000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`01124000 fffff880`01138000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01138000 fffff880`01196000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01196000 fffff880`011e2000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`01200000 fffff880`01211000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`01211000 fffff880`0121b000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01243000 fffff880`013e6000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013e6000 fffff880`01400000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Tue Jul 14 02:50:34 2009 (4A5BC84A)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`01475000 fffff880`01485000 vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`0148a000 fffff880`0157c000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0157c000 fffff880`015dc000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`015dc000 fffff880`015e4000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Tue Jul 14 02:25:34 2009 (4A5BC26E)
fffff880`01800000 fffff880`01809000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01809000 fffff880`01812000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01812000 fffff880`0181b000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`0181b000 fffff880`01826000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01826000 fffff880`01837000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01837000 fffff880`01855000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`01855000 fffff880`01862000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`01873000 fffff880`018ad000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`018ad000 fffff880`018bf000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`018bf000 fffff880`018c8000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`018c8000 fffff880`01902000 fvevol fvevol.sys Tue Jul 14 02:22:15 2009 (4A5BC1A7)
fffff880`01902000 fffff880`01918000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01918000 fffff880`01948000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`0197e000 fffff880`019a8000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`019a8000 fffff880`019b1000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`019b1000 fffff880`019b8000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`019b8000 fffff880`019c6000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`019c6000 fffff880`019eb000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`019eb000 fffff880`019fb000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02c00000 fffff880`02c56000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`02c56000 fffff880`02c67000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`02c67000 fffff880`02c8b000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`02c8b000 fffff880`02c9a000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`02ca1000 fffff880`02d95000 dxgkrnl dxgkrnl.sys Tue Jul 14 02:38:56 2009 (4A5BC590)
fffff880`02d95000 fffff880`02ddb000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`02ddb000 fffff880`02de8000 usbuhci usbuhci.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`02de8000 fffff880`02df1000 wmiacpi wmiacpi.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`02df1000 fffff880`02dfd000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`02dfd000 fffff880`02dfe480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`03800000 fffff880`03823000 mrxsmb20 mrxsmb20.sys Tue Jul 14 02:24:05 2009 (4A5BC215)
fffff880`03889000 fffff880`03951000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`03951000 fffff880`0396f000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`0396f000 fffff880`03987000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`03987000 fffff880`039b3000 mrxsmb mrxsmb.sys Tue Jul 14 02:23:59 2009 (4A5BC20F)
fffff880`039b3000 fffff880`03a00000 mrxsmb10 mrxsmb10.sys Tue Jul 14 02:24:08 2009 (4A5BC218)
fffff880`03e00000 fffff880`03e51000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03e51000 fffff880`03e5d000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03e5d000 fffff880`03e68000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03e68000 fffff880`03e77000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03e9c000 fffff880`03f26000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`03f26000 fffff880`03f6b000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`03f6b000 fffff880`03f74000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03f74000 fffff880`03f9a000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`03f9a000 fffff880`03fa9000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03fa9000 fffff880`03fc4000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`03fc4000 fffff880`03fd8000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`04200000 fffff880`04243000 ks ks.sys Tue Jul 14 03:00:31 2009 (4A5BCA9F)
fffff880`04243000 fffff880`04255000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`04255000 fffff880`0426d000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0427c000 fffff880`042ff000 csc csc.sys Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`042ff000 fffff880`0431d000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`0431d000 fffff880`0432e000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`0432e000 fffff880`04354000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`04354000 fffff880`0436a000 intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`0436a000 fffff880`04399000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04399000 fffff880`043ba000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`043ba000 fffff880`043d4000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`043d4000 fffff880`043df000 rdpbus rdpbus.sys Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`043df000 fffff880`043ee000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04400000 fffff880`04405200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`04406000 fffff880`04412000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`04412000 fffff880`04420000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`04420000 fffff880`0442c000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`0442c000 fffff880`04435000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`04435000 fffff880`04448000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`04448000 fffff880`04456000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`04456000 fffff880`0446f000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`0446f000 fffff880`04477080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`04478000 fffff880`04479f00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`0447a000 fffff880`04487000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`04487000 fffff880`04495000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`04495000 fffff880`044b8000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`044b8000 fffff880`044cd000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`044d5000 fffff880`0452f000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`0452f000 fffff880`04544000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`04544000 fffff880`045a0000 HdAudio HdAudio.sys Tue Jul 14 03:06:59 2009 (4A5BCC23)
fffff880`045a0000 fffff880`045dd000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`045dd000 fffff880`045ff000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`0466e000 fffff880`04714000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`04714000 fffff880`0471f000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`0471f000 fffff880`0474c000 srvnet srvnet.sys Tue Jul 14 02:24:58 2009 (4A5BC24A)
fffff880`0474c000 fffff880`0475e000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`0475e000 fffff880`047c7000 srv2 srv2.sys Tue Jul 14 02:25:02 2009 (4A5BC24E)
fffff880`04800000 fffff880`0481e000 i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`0481e000 fffff880`0482e000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0482e000 fffff880`04844000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`04844000 fffff880`04868000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04868000 fffff880`04883000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04885000 fffff880`0538cb00 nvlddmkm nvlddmkm.sys Thu May 14 23:48:07 2009 (4A0C8387)
fffff880`0538d000 fffff880`053bf000 Rt64win7 Rt64win7.sys Thu Feb 26 11:04:13 2009 (49A65B0D)
fffff880`053bf000 fffff880`053fd000 1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`06479000 fffff880`064ea000 spsys spsys.sys Mon May 11 20:20:58 2009 (4A085E7A)
fffff880`064ea000 fffff880`06582000 srv srv.sys Tue Jul 14 02:25:11 2009 (4A5BC257)
fffff960`00030000 fffff960`0033f000 win32k win32k.sys Tue Jul 14 02:40:16 2009 (4A5BC5E0)
fffff960`00480000 fffff960`0048a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00760000 fffff960`00787000 cdd cdd.dll Tue Jul 14 04:25:40 2009 (4A5BDE94)
Unloaded modules:
fffff880`01948000 fffff880`01956000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01956000 fffff880`01962000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01962000 fffff880`0196b000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0196b000 fffff880`0197e000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
8090d1284914485-bsod-help-
091910-25303-01.dmp KMODE_EXCEPTION_NOT_HANDLED (1e)
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aba0e0
ffffffffffffffff
PROCESS_NAME: svchost.exe
FAILURE_BUCKET_ID: X64_0x1E_nt!MiReplenishPageSlist+100
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\8090d1284914485-bsod-help-091910-25303-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02812000 PsLoadedModuleList = 0xfffff800`02a4fe50
System Uptime: 0 days 0:12:28.825
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800028a935f, 0, ffffffffffffffff}
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800028a935f, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiReplenishPageSlist+100
fffff800`028a935f f00fba6b1000 lock bts dword ptr [rbx+10h],0
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aba0e0
ffffffffffffffff
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800028c3a17 to fffff80002883f00
STACK_TEXT:
fffff880`06eb8e38 fffff800`028c3a17 : 00000000`0000001e ffffffff`c0000005 fffff800`028a935f 00000000`00000000 : nt!KeBugCheckEx
fffff880`06eb8e40 fffff800`02883542 : fffff880`06eb9618 0005ca80`01562a30 fffff880`06eb96c0 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`06eb94e0 fffff800`02881e4a : 00000000`00000000 fffff880`0106b0a2 fffffa80`027d2de0 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`06eb96c0 fffff800`028a935f : fffff880`06eb99a0 fffff880`012d0e42 fffffa80`01d25660 fffff8a0`061987a0 : nt!KiGeneralProtectionFault+0x10a
fffff880`06eb9850 fffff800`028a988f : fffff800`02abc400 00000000`00000061 fffffa80`01565a30 fffffa80`01564230 : nt!MiReplenishPageSlist+0x100
fffff880`06eb98b0 fffff800`028a1a97 : 00000000`00000002 fffff880`00000002 fffffa80`03ed5508 00000000`00000002 : nt!MiRemoveAnyPage+0x24f
fffff880`06eb99d0 fffff800`0289e1a6 : 00000000`00000001 00000000`093dd000 fffff880`06eb9c20 fffff680`00049ee8 : nt!MiResolveDemandZeroFault+0x577
fffff880`06eb9ac0 fffff800`02881fee : 00000000`00000001 00000000`001e0000 00000000`0027cb01 fffffa80`01d8d690 : nt!MmAccessFault+0x5c6
fffff880`06eb9c20 00000000`77c91b45 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`08dacc08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c91b45
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReplenishPageSlist+100
fffff800`028a935f f00fba6b1000 lock bts dword ptr [rbx+10h],0
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiReplenishPageSlist+100
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_nt!MiReplenishPageSlist+100
BUCKET_ID: X64_0x1E_nt!MiReplenishPageSlist+100
Followup: MachineOwner
---------