Windows 7 BSOD :( help?

What is the HDD mode controller set in bios, AHCI, IDE, RAID? You can try switching modes, and, if it doesn't help, consider upgrading bios.
 
THERES THE BSOD!! got it, whats the cause now :(


091910-18798-01
BAD_POOL_HEADER (19)
FAILURE_BUCKET_ID: X64_0x19_20_nt!MmCleanProcessAddressSpace+244
Probably caused by : memory_corruption ( nt!MmCleanProcessAddressSpace+244 )

Means memory corruption because of bad drivers or an issue with RAM.

Your first dumps read:
7600.16617.x86fre.win7_gdr.100618-1621

Now it reads:
7600.16385.amd64fre.win7_rtm.090713-1255

Strange, is this crash from the same PC, did you reinstall(?) - then why did you install these old drivers:

nvlddmkm.sys Thu May 14 23:48:07 2009
NVIDIA driver, obsolete

Rt64win7 Rt64win7.sys Thu Feb 26 11:04:13 2009
Realtek Audio
 
forgot to mention, after i reformatted, changed to 64bit...
BSOD occurs before i can successfully download a GFX Driver...
 
Having to use safemode to do this...
And im sure this wont fix it, my computer is just dead....
heres my 3 most recent, not that it will help *sigh*
Slow connection.... so these drivers may take a while...
 

Attachments

  • 091910-17316-01.dmp
    274.8 KB · Views: 468
  • 091910-16208-01.dmp
    275.2 KB · Views: 427
  • 091910-25303-01.dmp
    275.2 KB · Views: 479
Two of your crash dumps (091910-25303-01 & 091910-17316-01) point to memory_corruption. If it's not the drivers, then it's RAM, hard drive, video card, or mobo - a faulty hardware component which is causing a driver to address wrong memory areas. Since so far none of your dumps has identified stop 0x124, then I would say it's RAM or other hardware, maybe the motherboard.

RAM - you know how to test it, memtest.org, overnight, you say it's good ...
HDD - you tested it, hddscan.com, if you say It's good then it's good ...

Changing modes AHCI, IDE would require reinstall, but you may want to try that. Better if you test with another hardd drive, there may be all kinds of issues. But again, it does point to memory.






8089d1284914485-bsod-help-091910-16208-01.dmp
BAD_POOL_HEADER (19)
BUGCHECK_STR: 0x19_20
PROCESS_NAME: svchost.exe
FAILURE_BUCKET_ID: X64_0x19_20_nt!RtlpNewSecurityObject+e66
Probably caused by : ntkrnlmp.exe ( nt!RtlpNewSecurityObject+e66 )

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\8089d1284914485-bsod-help-091910-16208-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02800000 PsLoadedModuleList = 0xfffff800`02a3de50
System Uptime: 0 days 0:26:15.790
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {20, fffff8a0009c86b0, fffff8a0009c95a0, 5ef010b}

GetPointerFromAddress: unable to read from fffff80002aa80e0
Probably caused by : ntkrnlmp.exe ( nt!RtlpNewSecurityObject+e66 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a0009c86b0, The pool entry we were looking for within the page.
Arg3: fffff8a0009c95a0, The next pool entry.
Arg4: 0000000005ef010b, (reserved)

Debugging Details:
------------------


BUGCHECK_STR:  0x19_20

POOL_ADDRESS:  fffff8a0009c86b0 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800029a36d3 to fffff80002871f00

STACK_TEXT:  
fffff880`0727a488 fffff800`029a36d3 : 00000000`00000019 00000000`00000020 fffff8a0`009c86b0 fffff8a0`009c95a0 : nt!KeBugCheckEx
fffff880`0727a490 fffff800`02b7f376 : fffff8a0`0251b060 00000000`00008814 fffff880`64536553 00000000`000007ff : nt!ExFreePool+0xda4
fffff880`0727a540 fffff800`02b371e6 : fffff880`0727a8b0 fffff880`0727aaf8 fffffa80`0183bca0 fffff800`02b600c5 : nt!RtlpNewSecurityObject+0xe66
fffff880`0727a7d0 fffff800`02b5fba1 : 00000000`00000000 fffffa80`03948c10 fffff880`0727aaf8 00000000`00000000 : nt!ObpAssignSecurity+0x82
fffff880`0727a840 fffff800`02b44b15 : 00000000`00000000 fffff8a0`01523f80 fffff8a0`015a7a50 fffffa80`03ab24a0 : nt!ObInsertObjectEx+0x1e1
fffff880`0727aa90 fffff800`02871153 : fffffa80`03ab24a0 00000000`00000008 fffffa80`03dbe801 00000000`01dce308 : nt!NtOpenThreadTokenEx+0x445
fffff880`0727abb0 00000000`771601aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01dce2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771601aa


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!RtlpNewSecurityObject+e66
fffff800`02b7f376 80bc24c200000000 cmp     byte ptr [rsp+0C2h],0

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!RtlpNewSecurityObject+e66

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x19_20_nt!RtlpNewSecurityObject+e66

BUCKET_ID:  X64_0x19_20_nt!RtlpNewSecurityObject+e66

Followup: MachineOwner
---------
8088d1284914485-bsod-help-091910-17316-01.dmp
UNEXPECTED_KERNEL_MODE_TRAP (7f)
PROCESS_NAME: explorer.exe
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Probably caused by : memory_corruption


Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\8088d1284914485-bsod-help-091910-17316-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02854000 PsLoadedModuleList = 0xfffff800`02a91e50
System Uptime: 0 days 0:02:21.878
Loading Kernel Symbols
...............................................................
................................................................
.......
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff800028c3e90}

Probably caused by : memory_corruption

Followup: memory_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800028c3e90

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88003a8ef30 -- (.trap 0xfffff88003a8ef30)
Unable to read trap frame at fffff880`03a8ef30

LAST_CONTROL_TRANSFER:  from fffff800028c5469 to fffff800028c5f00

STACK_TEXT:  
fffff880`02f69ce8 fffff800`028c5469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02f69cf0 fffff800`028c3932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f69e30 fffff800`028c3e90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`03a8ef30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
16 errors : !nt (fffff800028c5e82-fffff800028c5efa)
fffff800028c5e80  00  4c *cb  a8  20  01  00  00  4c  8b *4d  28  01  00  00  4c .L.. ...L.M(...L
fffff800028c5e90  8b  b8 *c7  01  00  00  48  8b  b8  08 *19  00  00  48  8b  b0 ......H......H..
fffff800028c5ea0  10  01 *c4  00  48  8b  98  00  01  00 *11  48  81  c4  a8  01 ....H......H....
fffff800028c5eb0  00  00 *9f  90  90  90  90  90  90  90 *9b  90  90  90  90  90 ................
fffff800028c5ec0  cc  cc *c8  cc  cc  cc  66  66  0f  1f *5f  00  00  00  00  00 ......ff.._.....
fffff800028c5ed0  48  83 *71  28  e8  27  00  00  00  90 *75  cc  cc  cc  cc  cc H.q(.'....u.....
fffff800028c5ee0  48  83 *c1  28  48  c7  44  24  20  00 *76  00  00  e8  0e  00 H..(H.D$ .v.....
fffff800028c5ef0  00  00 *d7  cc  cc  cc  cc  cc  cc  0f *5b  80  00  00  00  00 ..........[.....

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption
---------


start             end                 module name
fffff800`00ba7000 fffff800`00bb1000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`0280b000 fffff800`02854000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02854000 fffff800`02e31000   nt       ntkrnlmp.exe Tue Jul 14 02:40:48 2009 (4A5BC600)
fffff880`00c07000 fffff880`00c4b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00c4b000 fffff880`00c5f000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00c5f000 fffff880`00cbd000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00cbd000 fffff880`00d7d000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00d7d000 fffff880`00dd9000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00e25000 fffff880`00ec9000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00ec9000 fffff880`00ed8000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00ed8000 fffff880`00f2f000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00f2f000 fffff880`00f38000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f38000 fffff880`00f42000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00f42000 fffff880`00f75000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f75000 fffff880`00f82000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00f82000 fffff880`00f97000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00f97000 fffff880`00fac000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00fac000 fffff880`00fb3000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00fb3000 fffff880`00fc3000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00fc3000 fffff880`00fdd000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00fdd000 fffff880`00fe6000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`010a3000 fffff880`010cd000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`010cd000 fffff880`010d8000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`010d8000 fffff880`01124000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`01124000 fffff880`01138000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01138000 fffff880`01196000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01196000 fffff880`011e2000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01243000 fffff880`013e6000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013e6000 fffff880`01400000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Tue Jul 14 02:50:34 2009 (4A5BC84A)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`0148a000 fffff880`0157c000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0157c000 fffff880`015dc000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`015dc000 fffff880`015e4000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Tue Jul 14 02:25:34 2009 (4A5BC26E)
fffff880`01800000 fffff880`01809000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01809000 fffff880`01812000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01812000 fffff880`0181b000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`0181b000 fffff880`01826000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01826000 fffff880`01837000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01837000 fffff880`01855000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`01855000 fffff880`01862000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`01873000 fffff880`018ad000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`018ad000 fffff880`018bf000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`018bf000 fffff880`018c8000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`018c8000 fffff880`01902000   fvevol   fvevol.sys   Tue Jul 14 02:22:15 2009 (4A5BC1A7)
fffff880`01902000 fffff880`01918000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01918000 fffff880`01948000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`0197e000 fffff880`019a8000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`019a8000 fffff880`019b1000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`019b1000 fffff880`019b8000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`019b8000 fffff880`019c6000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`019c6000 fffff880`019eb000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`019eb000 fffff880`019fb000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02c00000 fffff880`02c56000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`02c56000 fffff880`02c67000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`02c67000 fffff880`02c8b000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`02c8b000 fffff880`02c9a000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`02ca1000 fffff880`02d95000   dxgkrnl  dxgkrnl.sys  Tue Jul 14 02:38:56 2009 (4A5BC590)
fffff880`02d95000 fffff880`02ddb000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`02ddb000 fffff880`02de8000   usbuhci  usbuhci.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`02de8000 fffff880`02df1000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`02df1000 fffff880`02dfd000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`02dfd000 fffff880`02dfe480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`03800000 fffff880`03823000   mrxsmb20 mrxsmb20.sys Tue Jul 14 02:24:05 2009 (4A5BC215)
fffff880`03889000 fffff880`03951000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`03951000 fffff880`0396f000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`0396f000 fffff880`03987000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`03987000 fffff880`039b3000   mrxsmb   mrxsmb.sys   Tue Jul 14 02:23:59 2009 (4A5BC20F)
fffff880`039b3000 fffff880`03a00000   mrxsmb10 mrxsmb10.sys Tue Jul 14 02:24:08 2009 (4A5BC218)
fffff880`03e00000 fffff880`03e51000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03e51000 fffff880`03e5d000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03e5d000 fffff880`03e68000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03e68000 fffff880`03e77000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03e9c000 fffff880`03f26000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`03f26000 fffff880`03f6b000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`03f6b000 fffff880`03f74000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03f74000 fffff880`03f9a000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`03f9a000 fffff880`03fa9000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03fa9000 fffff880`03fc4000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`03fc4000 fffff880`03fd8000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`04200000 fffff880`04243000   ks       ks.sys       Tue Jul 14 03:00:31 2009 (4A5BCA9F)
fffff880`04243000 fffff880`04255000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`04255000 fffff880`0426d000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0427c000 fffff880`042ff000   csc      csc.sys      Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`042ff000 fffff880`0431d000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`0431d000 fffff880`0432e000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`0432e000 fffff880`04354000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`04354000 fffff880`0436a000   intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`0436a000 fffff880`04399000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04399000 fffff880`043ba000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`043ba000 fffff880`043d4000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`043d4000 fffff880`043df000   rdpbus   rdpbus.sys   Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`043df000 fffff880`043ee000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04400000 fffff880`04405200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`04406000 fffff880`04412000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`04412000 fffff880`04420000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`04420000 fffff880`0442c000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`0442c000 fffff880`04435000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`04435000 fffff880`04448000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`04448000 fffff880`04456000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`04456000 fffff880`0446f000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`0446f000 fffff880`04477080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`04478000 fffff880`04479f00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`0447a000 fffff880`04487000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`04487000 fffff880`04495000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`04495000 fffff880`044b8000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`044b8000 fffff880`044cd000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`044d5000 fffff880`0452f000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`0452f000 fffff880`04544000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`04544000 fffff880`045a0000   HdAudio  HdAudio.sys  Tue Jul 14 03:06:59 2009 (4A5BCC23)
fffff880`045a0000 fffff880`045dd000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`045dd000 fffff880`045ff000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`0466e000 fffff880`04714000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`04714000 fffff880`0471f000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`0471f000 fffff880`0474c000   srvnet   srvnet.sys   Tue Jul 14 02:24:58 2009 (4A5BC24A)
fffff880`0474c000 fffff880`0475e000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`0475e000 fffff880`047c7000   srv2     srv2.sys     Tue Jul 14 02:25:02 2009 (4A5BC24E)
fffff880`04800000 fffff880`0481e000   i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`0481e000 fffff880`0482e000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0482e000 fffff880`04844000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`04844000 fffff880`04868000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04868000 fffff880`04883000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04885000 fffff880`0538cb00   nvlddmkm nvlddmkm.sys Thu May 14 23:48:07 2009 (4A0C8387)
fffff880`0538d000 fffff880`053bf000   Rt64win7 Rt64win7.sys Thu Feb 26 11:04:13 2009 (49A65B0D)
fffff880`053bf000 fffff880`053fd000   1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`06479000 fffff880`064ea000   spsys    spsys.sys    Mon May 11 20:20:58 2009 (4A085E7A)
fffff880`064ea000 fffff880`06582000   srv      srv.sys      Tue Jul 14 02:25:11 2009 (4A5BC257)
fffff960`00030000 fffff960`0033f000   win32k   win32k.sys   Tue Jul 14 02:40:16 2009 (4A5BC5E0)
fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00760000 fffff960`00787000   cdd      cdd.dll      Tue Jul 14 04:25:40 2009 (4A5BDE94)

Unloaded modules:
fffff880`01948000 fffff880`01956000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01956000 fffff880`01962000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01962000 fffff880`0196b000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0196b000 fffff880`0197e000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8090d1284914485-bsod-help-091910-25303-01.dmp
KMODE_EXCEPTION_NOT_HANDLED (1e)
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aba0e0
ffffffffffffffff
PROCESS_NAME: svchost.exe
FAILURE_BUCKET_ID: X64_0x1E_nt!MiReplenishPageSlist+100
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )


Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\8090d1284914485-bsod-help-091910-25303-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02812000 PsLoadedModuleList = 0xfffff800`02a4fe50
System Uptime: 0 days 0:12:28.825
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff800028a935f, 0, ffffffffffffffff}

Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800028a935f, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MiReplenishPageSlist+100
fffff800`028a935f f00fba6b1000    lock bts dword ptr [rbx+10h],0

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aba0e0
 ffffffffffffffff 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff800028c3a17 to fffff80002883f00

STACK_TEXT:  
fffff880`06eb8e38 fffff800`028c3a17 : 00000000`0000001e ffffffff`c0000005 fffff800`028a935f 00000000`00000000 : nt!KeBugCheckEx
fffff880`06eb8e40 fffff800`02883542 : fffff880`06eb9618 0005ca80`01562a30 fffff880`06eb96c0 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`06eb94e0 fffff800`02881e4a : 00000000`00000000 fffff880`0106b0a2 fffffa80`027d2de0 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`06eb96c0 fffff800`028a935f : fffff880`06eb99a0 fffff880`012d0e42 fffffa80`01d25660 fffff8a0`061987a0 : nt!KiGeneralProtectionFault+0x10a
fffff880`06eb9850 fffff800`028a988f : fffff800`02abc400 00000000`00000061 fffffa80`01565a30 fffffa80`01564230 : nt!MiReplenishPageSlist+0x100
fffff880`06eb98b0 fffff800`028a1a97 : 00000000`00000002 fffff880`00000002 fffffa80`03ed5508 00000000`00000002 : nt!MiRemoveAnyPage+0x24f
fffff880`06eb99d0 fffff800`0289e1a6 : 00000000`00000001 00000000`093dd000 fffff880`06eb9c20 fffff680`00049ee8 : nt!MiResolveDemandZeroFault+0x577
fffff880`06eb9ac0 fffff800`02881fee : 00000000`00000001 00000000`001e0000 00000000`0027cb01 fffffa80`01d8d690 : nt!MmAccessFault+0x5c6
fffff880`06eb9c20 00000000`77c91b45 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`08dacc08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c91b45


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiReplenishPageSlist+100
fffff800`028a935f f00fba6b1000    lock bts dword ptr [rbx+10h],0

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!MiReplenishPageSlist+100

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1E_nt!MiReplenishPageSlist+100

BUCKET_ID:  X64_0x1E_nt!MiReplenishPageSlist+100

Followup: MachineOwner
---------
 
Back
Top