Windows 7 BSOD

Jared15

New Member
Hi

I use Windows7 64bit.
I have received a blue screen many times over the past 3 days since installation
These are inconsistent, but can sometimes occur 5 or more times a day.
It is difficult to work as I am not sure when the next BSOD will happen - and there is no clear reason.
If anyone can help, I would greatly appreciate it. Please let me know what you need in order to help me resolve this issue.

Thanks!
Jared
 

Attachments

  • minidumps.zip
    225.9 KB · Views: 353
Last edited:
Code:
[B]SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine
PROCESS_NAME:  WMIADAP.exe (MS WMI Reverse Performance Adapter Maintenance Utility)
BugCheck 3B, {c0000005, fffff80002f5648c, fffff8800758de10, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+78 )[/B]


Update or uninstall:

VMNetSrv.sys Wed Jan 16 06:52:01 2008
Microsoft Virtual Server 2005 R2 SP1


vmm.sys Tue Feb 12 06:38:20 2008
Microsoft Virtual PC 2004



Update:

Rt64win7.sys Wed Jun 23 05:10:45 2010
Realtek 8136/8168/8169 PCI/PCIe






Crash Dumps

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-13556-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
Debug session time: Tue Dec 28 15:59:31.987 2010 (UTC - 5:00)
System Uptime: 0 days 0:41:40.671
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002ca12b3, fffff88007b5ff50, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ca12b3, Address of the instruction which caused the bugcheck
Arg3: fffff88007b5ff50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`02ca12b3 488b09          mov     rcx,qword ptr [rcx]

CONTEXT:  fffff88007b5ff50 -- (.cxr 0xfffff88007b5ff50)
rax=0000000000010008 rbx=fffffa8013fa6010 rcx=0100612ecd1892f5
rdx=0100612ecd1892f5 rsi=0000000000000000 rdi=fffffa8017ddcd20
rip=fffff80002ca12b3 rsp=fffff88007b60920 rbp=fffff88007b60ca0
 r8=0000000000005320  r9=0000000000000070 r10=0000000000000002
r11=0000000000000214 r12=0000000000010000 r13=fffffa80163885f0
r14=fffffa8016364060 r15=fffff880031db180
iopl=0         nv up ei pl nz ac po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010216
nt!IopCompleteRequest+0xae3:
fffff800`02ca12b3 488b09          mov     rcx,qword ptr [rcx] ds:002b:0100612e`cd1892f5=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  sqlservr.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002ca12b3

STACK_TEXT:  
fffff880`07b5f688 fffff800`02c80ca9 : 00000000`0000003b 00000000`c0000005 fffff800`02ca12b3 fffff880`07b5ff50 : nt!KeBugCheckEx
fffff880`07b5f690 fffff800`02c805fc : fffff880`07b606e8 fffff880`07b5ff50 00000000`00000000 fffff800`02cafc90 : nt!KiBugCheckDispatch+0x69
fffff880`07b5f7d0 fffff800`02ca740d : fffff800`02ea211c 00000000`00000000 fffff800`02c11000 fffff880`07b606e8 : nt!KiSystemServiceHandler+0x7c
fffff880`07b5f810 fffff800`02caea90 : fffff800`02dd11a0 fffff880`07b5f888 fffff880`07b606e8 fffff800`02c11000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`07b5f840 fffff800`02cbb9ef : fffff880`07b606e8 fffff880`07b5ff50 fffff880`00000000 fffffa80`17ddcd20 : nt!RtlDispatchException+0x410
fffff880`07b5ff20 fffff800`02c80d82 : fffff880`07b606e8 fffffa80`13fa6010 fffff880`07b60790 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`07b605b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceHandler+7c
fffff800`02c805fc b801000000      mov     eax,1

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceHandler+7c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

Followup: MachineOwner
---------




























Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-12495-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e86e50
Debug session time: Tue Dec 28 19:13:47.579 2010 (UTC - 5:00)
System Uptime: 0 days 1:41:36.875
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 48, {fffffa8013e06010, fffff80002d02530, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+3c1f0 )

Followup: MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CANCEL_STATE_IN_COMPLETED_IRP (48)
This bugcheck indicates that an I/O Request Packet (IRP) that is to be
cancelled, has a cancel routine specified in it -- meaning that the packet
is in a state in which the packet can be cancelled -- however, the packet
no longer belongs to a driver, as it has entered I/O completion.  This is
either a driver bug, or more than one driver is accessing the same packet,
which is not likely and much more difficult to find. The cancel routine
parameter will provide a clue as to which driver or stack is the culprit.
Arguments:
Arg1: fffffa8013e06010, Pointer to the IRP
Arg2: fffff80002d02530, Cancel routine set by the driver.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x48

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002d3476e to fffff80002cb9740

STACK_TEXT:  
fffff880`080b6888 fffff800`02d3476e : 00000000`00000048 fffffa80`13e06010 fffff800`02d02530 00000000`00000000 : nt!KeBugCheckEx
fffff880`080b6890 fffff800`02f9f0b9 : fffff880`080b6c01 fffffa80`176e1f48 00000000`00000000 fffffa80`17625b30 : nt! ?? ::FNODOBFM::`string'+0x3c1f0
fffff880`080b68d0 fffff800`02f9ea2b : fffffa80`16306920 00000000`00000000 fffff880`080b6c20 00000000`00000000 : nt!IoCancelThreadIo+0x59
fffff880`080b6900 fffff800`02f77635 : 00000000`c0150014 00000000`00001700 00000000`78457300 00000000`00000000 : nt!PspExitThread+0x58b
fffff880`080b69c0 fffff800`02c961db : 00000000`00001660 00000000`000016a4 00000000`000016ac 00000000`000016b4 : nt!PsExitSpecialApc+0x1d
fffff880`080b69f0 fffff800`02c96620 : 00000000`0b745db0 fffff880`080b6a70 fffff800`02f7774c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`080b6a70 fffff800`02cb8a37 : fffffa80`176e1b60 00000000`031bf9c8 fffff880`080b6bc8 00000000`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`080b6bb0 00000000`7790030a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`031bf9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7790030a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+3c1f0
fffff800`02d3476e cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+3c1f0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x48_nt!_??_::FNODOBFM::_string_+3c1f0

BUCKET_ID:  X64_0x48_nt!_??_::FNODOBFM::_string_+3c1f0

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-13868-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e46e50
Debug session time: Tue Dec 28 17:30:43.500 2010 (UTC - 5:00)
System Uptime: 0 days 1:29:39.780
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {2b0, 2, 0, fffff80002d3198c}

Probably caused by : ntkrnlmp.exe ( nt!PsCheckThreadCpuQuota+8c )

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000002b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002d3198c, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb10e0
 00000000000002b0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!PsCheckThreadCpuQuota+8c
fffff800`02d3198c 394330          cmp     dword ptr [rbx+30h],eax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  sidebar.exe

TRAP_FRAME:  fffff88009025610 -- (.trap 0xfffff88009025610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=0000069600000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d3198c rsp=fffff880090257a0 rbp=fffff880031db180
 r8=fffffa80137c6060  r9=0000000000000000 r10=0000000000000080
r11=00000000000f00ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
nt!PsCheckThreadCpuQuota+0x8c:
fffff800`02d3198c 394330          cmp     dword ptr [rbx+30h],eax ds:58b8:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c78ca9 to fffff80002c79740

STACK_TEXT:  
fffff880`090254c8 fffff800`02c78ca9 : 00000000`0000000a 00000000`000002b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`090254d0 fffff800`02c77920 : 00000000`00000000 00000000`00000280 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`09025610 fffff800`02d3198c : fffffa80`13bdfc20 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
fffff880`090257a0 fffff800`02c7fad2 : 00000000`00000001 fffff880`031db180 fffffa80`173894b0 fffffa80`137c6060 : nt!PsCheckThreadCpuQuota+0x8c
fffff880`090257d0 fffff800`02c7f5da : fffffa80`746c6644 fffff880`09025850 00000000`00000000 fffff800`02c7f900 : nt!SwapContext_PatchXRstor+0xec
fffff880`09025810 fffff800`02c80992 : ffffffff`fffffffe fffffa80`173894b0 00000000`0716f580 00000000`0000000a : nt!KiSwapContext+0x7a
fffff880`09025950 fffff800`02c842a1 : fffff880`09025ca0 fffffa80`173894b0 00000000`00000000 fffffa80`173895b8 : nt!KiCommitThreadWait+0x1d2
fffff880`090259e0 fffff800`02f74df7 : 00000000`00000000 fffff880`09025bc8 fffffa80`00000008 ffffbc35`00000000 : nt!KeRemoveQueueEx+0x301
fffff880`09025a90 fffff800`02c89aa6 : 00000000`00000000 fffff880`09025ba8 fffff880`09025bc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`09025b20 fffff800`02c78993 : fffffa80`173894b0 00000000`77244270 00000000`06836360 fffffa80`13fdd230 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`09025c20 00000000`7719165a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0716f798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7719165a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!PsCheckThreadCpuQuota+8c
fffff800`02d3198c 394330          cmp     dword ptr [rbx+30h],eax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PsCheckThreadCpuQuota+8c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!PsCheckThreadCpuQuota+8c

BUCKET_ID:  X64_0xA_nt!PsCheckThreadCpuQuota+8c

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-13197-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e3de50
Debug session time: Tue Dec 28 19:23:49.858 2010 (UTC - 5:00)
System Uptime: 0 days 0:04:46.542
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002f5648c, fffff8800758de10, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+78 )

Followup: MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002f5648c, Address of the instruction which caused the bugcheck
Arg3: fffff8800758de10, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
nt!ObpQueryNameString+78
fffff800`02f5648c 4d8b92a0000000  mov     r10,qword ptr [r10+0A0h]

CONTEXT:  fffff8800758de10 -- (.cxr 0xfffff8800758de10)
rax=0000000000000040 rbx=fffffa8015652160 rcx=fffffa80156521d0
rdx=fffffa8013987000 rsi=0000000000000001 rdi=0000000000000000
rip=fffff80002f5648c rsp=fffff8800758e7e0 rbp=fffff8800758e940
 r8=0000000000002000  r9=fffff8800758e958 r10=0000000000000000
r11=fffffa8013471402 r12=fffffa8013987000 r13=fffff80002c00000
r14=fffffa8013987000 r15=fffffa80156521a0
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObpQueryNameString+0x78:
fffff800`02f5648c 4d8b92a0000000  mov     r10,qword ptr [r10+0A0h] ds:002b:00000000`000000a0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  WMIADAP.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002f5648c

STACK_TEXT:  
fffff880`0758e7e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpQueryNameString+0x78


FOLLOWUP_IP: 
nt!ObpQueryNameString+78
fffff800`02f5648c 4d8b92a0000000  mov     r10,qword ptr [r10+0A0h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpQueryNameString+78

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff8800758de10 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObpQueryNameString+78

BUCKET_ID:  X64_0x3B_nt!ObpQueryNameString+78

Followup: MachineOwner
---------



Drivers

Code:
start             end                 module name
fffff880`03fb1000 fffff880`03fef000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f49000 fffff880`00fa0000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c09000 fffff880`02c93000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`019e6000 fffff880`019fc000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ff3000 fffff880`00ffe000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e8d000 fffff880`00e96000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01906000 fffff880`0190d000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f64000 fffff880`03f75000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05f68000 fffff880`05f86000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      unavailable (00000000)
fffff880`018d3000 fffff880`018fd000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cfd000 fffff880`00dbd000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0186d000 fffff880`0189d000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c9f000 fffff880`00cfd000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0118b000 fffff880`011fe000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`019d6000 fffff880`019e6000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05cff000 fffff880`05d0d000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ec3000 fffff880`03f46000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f46000 fffff880`03f64000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`019b2000 fffff880`019c1000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01200000 fffff880`01216000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`043dd000 fffff880`043ff000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05d19000 fffff880`05d22000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05d0d000 fffff880`05d19000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05d22000 fffff880`05d35000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05cf3000 fffff880`05cff000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10aa2000 fffff880`10b96000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`10b96000 fffff880`10bdc000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01119000 fffff880`0112d000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010cd000 fffff880`01119000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013e9000 fffff880`013f3000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01086000 fffff880`010c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`015ab000 fffff880`015f5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`031dc000 fffff800`03225000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`10bdc000 fffff880`10c00000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04344000 fffff880`043a0000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05c3b000 fffff880`05c54000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05c54000 fffff880`05c5c080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05c2d000 fffff880`05c3b000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05ea0000 fffff880`05f68000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f5000 fffff880`015fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03f9b000 fffff880`03fb1000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04260000 fffff880`0426f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05c5d000 fffff880`05c6b000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc8000 fffff800`00bd2000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04280000 fffff880`042c3000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013be000 fffff880`013d8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04200000 fffff880`04205200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05d66000 fffff880`05d7b000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05d43000 fffff880`05d66000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c47000 fffff880`00c8b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`05d35000 fffff880`05d43000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0426f000 fffff880`0427e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05c77000 fffff880`05c84000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dcd000 fffff880`00de7000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05f86000 fffff880`05f9e000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05f9e000 fffff880`05fcb000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05e00000 fffff880`05e4e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05e4e000 fffff880`05e71000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0196b000 fffff880`01976000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fa9000 fffff880`00fb3000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0112d000 fffff880`0118b000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02def000 fffff880`02dfa000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`014a3000 fffff880`014b5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014b9000 fffff880`015ab000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01824000 fffff880`01830000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`01830000 fffff880`0185f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0432f000 fffff880`04344000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d07000 fffff880`02d16000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c93000 fffff880`02cd8000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01976000 fffff880`01987000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02de3000 fffff880`02def000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c00000 fffff800`031dc000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0121b000 fffff880`013be000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`05c6b000 fffff880`05c77000   NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
fffff880`018fd000 fffff880`01906000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10aa0000 fffff880`10aa1180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fe0e000 fffff880`10a9fe00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`02ce1000 fffff880`02d07000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fb3000 fffff880`00fe6000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e86000 fffff880`00e8d000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00dbd000 fffff880`00dcd000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d8000 fffff880`013e9000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06c9d000 fffff880`06d43000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`043a0000 fffff880`043dd000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c8b000 fffff880`00c9f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`01800000 fffff880`01824000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`00c2a000 fffff880`00c45000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0421a000 fffff880`0423b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0423b000 fffff880`04255000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d92000 fffff880`02de3000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04255000 fffff880`04260000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01950000 fffff880`01959000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`05e71000 fffff880`05e9f000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`01959000 fffff880`01962000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01962000 fffff880`0196b000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`05d93000 fffff880`05dcb000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05d7b000 fffff880`05d93000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e67000 fffff880`03ebd000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`06d43000 fffff880`06d4e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0149b000 fffff880`014a3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07cd5000 fffff880`07d46000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`06c00000 fffff880`06c96000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06d8d000 fffff880`06df4000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06d4e000 fffff880`06d7b000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`0427e000 fffff880`0427f480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06d7b000 fffff880`06d8d000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019a5000 fffff880`019b2000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`06df4000 fffff880`06dff000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`01987000 fffff880`019a5000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d7e000 fffff880`02d92000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00440000 fffff960`0044a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`05fcb000 fffff880`05fda000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`03f75000 fffff880`03f9b000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05c9f000 fffff880`05cf3000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`042c3000 fffff880`042d5000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05c0e000 fffff880`05c2b000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05c2b000 fffff880`05c2cf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03e56000 fffff880`03e67000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042d5000 fffff880`0432f000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03e00000 fffff880`03e56000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05c84000 fffff880`05c9f000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0fe00000 fffff880`0fe0d000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fe6000 fffff880`00ff3000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0190d000 fffff880`0191b000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0191b000 fffff880`01940000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`02d31000 fffff880`02d7e000   vmm      vmm.sys      Tue Feb 12 06:38:20 2008 (47B1852C)
fffff880`019c1000 fffff880`019d6000   VMNetSrv VMNetSrv.sys Wed Jan 16 06:52:01 2008 (478DEFE1)
fffff880`0148b000 fffff880`0149b000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d16000 fffff880`02d31000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01940000 fffff880`01950000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e96000 fffff880`00f3a000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f3a000 fffff880`00f49000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02cd8000 fffff880`02ce1000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`00390000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`03fef000 fffff880`03ff8000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fa0000 fffff880`00fa9000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`0189d000 fffff880`018ab000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018ab000 fffff880`018b7000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018b7000 fffff880`018c0000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018c0000 fffff880`018d3000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Thank you cybercore!

I did not install Virtual Server R2 2005 or Virtual PC 2004 on the machine, so I am not sure how to uninstall these.

I ran a Windows Update which contained several drivers including a Realtek device driver - hopefully that will resolve the issue.

I appreciate your time. Thank you,
Jared
 
Thank you cybercore!

I did not install Virtual Server R2 2005 or Virtual PC 2004 on the machine, so I am not sure how to uninstall these.

I ran a Windows Update which contained several drivers including a Realtek device driver - hopefully that will resolve the issue.

I appreciate your time. Thank you,
Jared


I rely on what I see in your crash dumps, you do have these drivers as you can see in the crash dump code attached:


VMNetSrv.sys Wed Jan 16 06:52:01 2008
Microsoft Virtual Server 2005 R2 SP1


vmm.sys Tue Feb 12 06:38:20 2008
Microsoft Virtual PC 2004



Those drivers are old, check programs and components - if those virtual pc's are not there then go to C:\Windows\system32\drivers and delete those above mentioned files.


Regards.
 
Thank you again

Those files did exist in C:\Windows\System32, and I have renamed them. I do hope this takes care of the problem and I truly appreciate your help.

Jared
 
Thank you for updating. Merry Christmas.


5325632953_7465142bed_t.jpg
 
Hi,

I am beginning to receive the BSOD within 4-6 hours of restart. I have attached the most recent files from the past few days. Please help if possible.

Thank you,
Jared
 

Attachments

  • minidumps_.zip
    170.2 KB · Views: 356

BugCheck 3B, {c0000005, fffff800031bad9b, fffff880083a1d70, 0}
PROCESS_NAME: sidebar.exe
Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+2b )

BugCheck A, {230, 2, 0, fffff80002f7498c}
PROCESS_NAME: sqlservr.exe
Probably caused by : ntkrnlmp.exe ( nt!PsCheckThreadCpuQuota+8c )



Old drivers to take care of:

Microsoft Virtual Machine Network Services/Microsoft Virtual Server 2005 R2 SP1
VMNetSrv.sys Wed Jan 16 06:52:01 2008

Microsoft Virtual PC 2004
vmm.sys Tue Apr 07 09:25:54 2009

NetGear Neutral Wireless Solution
scmndisp.sys Wed Jan 17 02:48:03 2007










Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031411-17487-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4e000 PsLoadedModuleList = 0xfffff800`0308be50
Debug session time: Fri Mar 11 22:56:53.604 2011 (UTC - 4:00)
System Uptime: 0 days 0:18:17.884
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800031bad9b, fffff880083a1d70, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+2b )

Followup: MachineOwner
---------

11: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031bad9b, Address of the instruction which caused the bugcheck
Arg3: fffff880083a1d70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObDereferenceSecurityDescriptor+2b
fffff800`031bad9b f00fb14e10      lock cmpxchg dword ptr [rsi+10h],ecx

CONTEXT:  fffff880083a1d70 -- (.cxr 0xfffff880083a1d70)
rax=00000000000b0000 rbx=0000000000000000 rcx=00000000000affff
rdx=0000000000000001 rsi=000000000007ffe0 rdi=0000000000000000
rip=fffff800031bad9b rsp=fffff880083a2740 rbp=fffffa8013706060
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff880083a2818 r12=0000000000000001 r13=fffffa80136b3a20
r14=fffffa80136b3b00 r15=fffff8a0030c5de0
iopl=0         nv up ei pl nz ac po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010216
nt!ObDereferenceSecurityDescriptor+0x2b:
fffff800`031bad9b f00fb14e10      lock cmpxchg dword ptr [rsi+10h],ecx ds:002b:00000000`0007fff0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  sidebar.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031bad9b

STACK_TEXT:  
fffff880`083a2740 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x2b


FOLLOWUP_IP: 
nt!ObDereferenceSecurityDescriptor+2b
fffff800`031bad9b f00fb14e10      lock cmpxchg dword ptr [rsi+10h],ecx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObDereferenceSecurityDescriptor+2b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff880083a1d70 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+2b

BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+2b

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031411-15787-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4c000 PsLoadedModuleList = 0xfffff800`03089e50
Debug session time: Mon Mar 14 16:08:46.248 2011 (UTC - 4:00)
System Uptime: 0 days 0:14:58.970
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {230, 2, 0, fffff80002f7498c}

Probably caused by : ntkrnlmp.exe ( nt!PsCheckThreadCpuQuota+8c )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000230, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f7498c, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f40e0
 0000000000000230 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!PsCheckThreadCpuQuota+8c
fffff800`02f7498c 394330          cmp     dword ptr [rbx+30h],eax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  sqlservr.exe

TRAP_FRAME:  fffff88003121b80 -- (.trap 0xfffff88003121b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000006
rdx=000002b600000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f7498c rsp=fffff88003121d10 rbp=fffff880030f9180
 r8=fffffa80176a6060  r9=0000000000000000 r10=00000000000109b5
r11=0000000000027897 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
nt!PsCheckThreadCpuQuota+0x8c:
fffff800`02f7498c 394330          cmp     dword ptr [rbx+30h],eax ds:41c0:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ebbca9 to fffff80002ebc740

STACK_TEXT:  
fffff880`03121a38 fffff800`02ebbca9 : 00000000`0000000a 00000000`00000230 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03121a40 fffff800`02eba920 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03121b80 fffff800`02f7498c : fffff880`030fe140 fffffa80`133f9040 00000000`00000000 000002af`8bde4ae4 : nt!KiPageFault+0x260
fffff880`03121d10 fffff800`02ec2ad2 : fffff880`030fe140 fffff880`030f9180 00000000`00000000 fffffa80`176a6060 : nt!PsCheckThreadCpuQuota+0x8c
fffff880`03121d40 fffff800`02ec4f9d : fffff880`030f9180 fffff880`00000000 00000000`00000000 fffff800`02f75230 : nt!SwapContext_PatchXRstor+0xec
fffff880`03121d80 00000000`00000000 : fffff880`03122000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x10d


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!PsCheckThreadCpuQuota+8c
fffff800`02f7498c 394330          cmp     dword ptr [rbx+30h],eax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PsCheckThreadCpuQuota+8c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!PsCheckThreadCpuQuota+8c

BUCKET_ID:  X64_0xA_nt!PsCheckThreadCpuQuota+8c

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`10bba000 fffff880`10bf8000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ed3000 fffff880`00f2a000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02ca2000 fffff880`02d2c000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fe10000 fffff880`0fe26000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`010dd000 fffff880`010e8000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`07400000 fffff880`0740b000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00fd8000 fffff880`00fe1000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`010b3000 fffff880`010dd000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`019cf000 fffff880`019d6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`043bf000 fffff880`043d0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06193000 fffff880`061b1000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      unavailable (00000000)
fffff880`0199c000 fffff880`019c6000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01936000 fffff880`01966000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d26000 fffff880`00d84000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0fe00000 fffff880`0fe10000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04c27000 fffff880`04c35000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0431e000 fffff880`043a1000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`043a1000 fffff880`043bf000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0430f000 fffff880`0431e000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01920000 fffff880`01936000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04d4d000 fffff880`04d6f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`043f6000 fffff880`043ff000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04c35000 fffff880`04c41000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02c61000 fffff880`02c74000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04d92000 fffff880`04d9e000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`044db000 fffff880`045cf000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04400000 fffff880`04446000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01134000 fffff880`01148000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010e8000 fffff880`01134000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018e6000 fffff880`01920000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02e03000 fffff800`02e4c000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04446000 fffff880`0446a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04cb4000 fffff880`04d10000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04dba000 fffff880`04dd3000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04dd3000 fffff880`04ddb080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04dac000 fffff880`04dba000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`060cb000 fffff880`06193000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01497000 fffff880`014a0000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04200000 fffff880`04216000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04230000 fffff880`0423f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04c0d000 fffff880`04c1b000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b99000 fffff800`00ba3000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0424e000 fffff880`04291000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04d6f000 fffff880`04d74200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02de0000 fffff880`02df5000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02c74000 fffff880`02c97000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cce000 fffff880`00d12000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04d9e000 fffff880`04dac000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0423f000 fffff880`0424e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04c00000 fffff880`04c0d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fbe000 fffff880`00fd8000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`061b1000 fffff880`061c9000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`061c9000 fffff880`061f6000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0645b000 fffff880`064a9000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`064a9000 fffff880`064cc000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01850000 fffff880`0185b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f33000 fffff880`00f3d000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01148000 fffff880`011a6000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`04304000 fffff880`0430f000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01235000 fffff880`01247000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014a5000 fffff880`01597000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`044cd000 fffff880`044d9000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`060a0000 fffff880`060b3000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0fe4a000 fffff880`0fe79000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04c9f000 fffff880`04cb4000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02db6000 fffff880`02dc5000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d2c000 fffff880`02d71000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01597000 fffff880`015f7000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0185b000 fffff880`0186c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`042f8000 fffff880`04304000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e4c000 fffff800`03428000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01258000 fffff880`013fb000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04c1b000 fffff880`04c27000   NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
fffff880`019c6000 fffff880`019cf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b52000 fffff880`10b53180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fec0000 fffff880`10b51e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`0604d000 fffff880`060a0000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d7a000 fffff880`02da0000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f7d000 fffff880`00f92000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f3d000 fffff880`00f70000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fa7000 fffff880`00fae000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fae000 fffff880`00fbe000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`064cc000 fffff880`06572000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04d10000 fffff880`04d4d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d12000 fffff880`00d26000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0fe26000 fffff880`0fe4a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0fe79000 fffff880`0fe94000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0fe94000 fffff880`0feb5000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04216000 fffff880`04230000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`042a7000 fffff880`042f8000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0feb5000 fffff880`0fec0000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01835000 fffff880`0183e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0750a000 fffff880`07538000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`0183e000 fffff880`01847000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01847000 fffff880`01850000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`07552000 fffff880`0758a000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`01073000 fffff880`010ad000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`060b3000 fffff880`060cb000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`10b54000 fffff880`10bba000   Rt64win7 Rt64win7.sys Tue Nov 30 01:01:28 2010 (4CF49338)
fffff880`01475000 fffff880`0147f000   scmndisp scmndisp.sys Wed Jan 17 02:48:03 2007 (45ADD4B3)
fffff880`06572000 fffff880`0657d000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0148f000 fffff880`01497000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07474000 fffff880`0750a000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0740d000 fffff880`07474000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0657d000 fffff880`065aa000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`044d9000 fffff880`044da480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`065aa000 fffff880`065bc000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0188a000 fffff880`01897000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`07538000 fffff880`07543000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`0186c000 fffff880`0188a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c4d000 fffff880`02c61000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004e0000 fffff960`004ea000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`07543000 fffff880`07552000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`043d0000 fffff880`043f6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04291000 fffff880`042a3000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04ddc000 fffff880`04df9000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04d90000 fffff880`04d91f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`045cf000 fffff880`045e0000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04c45000 fffff880`04c9f000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04477000 fffff880`044cd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04d75000 fffff880`04d90000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0446a000 fffff880`04477000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f70000 fffff880`00f7d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019d6000 fffff880`019e4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01800000 fffff880`01825000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`02c00000 fffff880`02c4d000   vmm      vmm.sys      Tue Apr 07 09:25:54 2009 (49DB5462)
fffff880`045e9000 fffff880`045fe000   VMNetSrv VMNetSrv.sys Wed Jan 16 06:52:01 2008 (478DEFE1)
fffff880`0147f000 fffff880`0148f000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f92000 fffff880`00fa7000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d84000 fffff880`00de0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011a6000 fffff880`011f2000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02da0000 fffff880`02db6000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02dc5000 fffff880`02de0000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01825000 fffff880`01835000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e20000 fffff880`00ec4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ec4000 fffff880`00ed3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d71000 fffff880`02d7a000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00380000   win32k   win32k.sys   unavailable (00000000)
fffff880`045e0000 fffff880`045e9000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f2a000 fffff880`00f33000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01897000 fffff880`018b8000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`0758a000 fffff880`075fb000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01966000 fffff880`01974000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01974000 fffff880`01980000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01980000 fffff880`01989000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01989000 fffff880`0199c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Thank you cybercore!

The VMNetSrv.sys was removed the last time I had this issue, and was re-installed during a recent auto-update. I have removed it again and have added measures to avoid this in the future. The others are not needed and have been un-installed.

Jared
 
Thank you cybercore!

The VMNetSrv.sys was removed the last time I had this issue, and was re-installed during a recent auto-update. I have removed it again and have added measures to avoid this in the future.

It got auto-updated because you're using (or have remnants of) old version of virtual machine. You should switch to products compatible with Windows 7 -- XP Mode, Virtual Box, or VMWare.

Update the Netgear device before you get another crash. Or disable it in device manager if not using it.
 
Back
Top