BSOD

#1
Hi

I use Windows7 64bit.
I have received a blue screen many times over the past 3 days since installation
These are inconsistent, but can sometimes occur 5 or more times a day.
It is difficult to work as I am not sure when the next BSOD will happen - and there is no clear reason.
If anyone can help, I would greatly appreciate it. Please let me know what you need in order to help me resolve this issue.

Thanks!
Jared
 


Attachments

Last edited:
#2
Code:
[B]SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine
PROCESS_NAME:  WMIADAP.exe (MS WMI Reverse Performance Adapter Maintenance Utility)
BugCheck 3B, {c0000005, fffff80002f5648c, fffff8800758de10, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+78 )[/B]

Update or uninstall:

VMNetSrv.sys Wed Jan 16 06:52:01 2008
Microsoft Virtual Server 2005 R2 SP1


vmm.sys Tue Feb 12 06:38:20 2008
Microsoft Virtual PC 2004



Update:

Rt64win7.sys Wed Jun 23 05:10:45 2010
Realtek 8136/8168/8169 PCI/PCIe






Crash Dumps

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-13556-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
Debug session time: Tue Dec 28 15:59:31.987 2010 (UTC - 5:00)
System Uptime: 0 days 0:41:40.671
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002ca12b3, fffff88007b5ff50, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ca12b3, Address of the instruction which caused the bugcheck
Arg3: fffff88007b5ff50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`02ca12b3 488b09          mov     rcx,qword ptr [rcx]

CONTEXT:  fffff88007b5ff50 -- (.cxr 0xfffff88007b5ff50)
rax=0000000000010008 rbx=fffffa8013fa6010 rcx=0100612ecd1892f5
rdx=0100612ecd1892f5 rsi=0000000000000000 rdi=fffffa8017ddcd20
rip=fffff80002ca12b3 rsp=fffff88007b60920 rbp=fffff88007b60ca0
 r8=0000000000005320  r9=0000000000000070 r10=0000000000000002
r11=0000000000000214 r12=0000000000010000 r13=fffffa80163885f0
r14=fffffa8016364060 r15=fffff880031db180
iopl=0         nv up ei pl nz ac po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010216
nt!IopCompleteRequest+0xae3:
fffff800`02ca12b3 488b09          mov     rcx,qword ptr [rcx] ds:002b:0100612e`cd1892f5=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  sqlservr.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002ca12b3

STACK_TEXT:  
fffff880`07b5f688 fffff800`02c80ca9 : 00000000`0000003b 00000000`c0000005 fffff800`02ca12b3 fffff880`07b5ff50 : nt!KeBugCheckEx
fffff880`07b5f690 fffff800`02c805fc : fffff880`07b606e8 fffff880`07b5ff50 00000000`00000000 fffff800`02cafc90 : nt!KiBugCheckDispatch+0x69
fffff880`07b5f7d0 fffff800`02ca740d : fffff800`02ea211c 00000000`00000000 fffff800`02c11000 fffff880`07b606e8 : nt!KiSystemServiceHandler+0x7c
fffff880`07b5f810 fffff800`02caea90 : fffff800`02dd11a0 fffff880`07b5f888 fffff880`07b606e8 fffff800`02c11000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`07b5f840 fffff800`02cbb9ef : fffff880`07b606e8 fffff880`07b5ff50 fffff880`00000000 fffffa80`17ddcd20 : nt!RtlDispatchException+0x410
fffff880`07b5ff20 fffff800`02c80d82 : fffff880`07b606e8 fffffa80`13fa6010 fffff880`07b60790 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`07b605b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceHandler+7c
fffff800`02c805fc b801000000      mov     eax,1

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceHandler+7c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

Followup: MachineOwner
---------




























Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-12495-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e86e50
Debug session time: Tue Dec 28 19:13:47.579 2010 (UTC - 5:00)
System Uptime: 0 days 1:41:36.875
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 48, {fffffa8013e06010, fffff80002d02530, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+3c1f0 )

Followup: MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CANCEL_STATE_IN_COMPLETED_IRP (48)
This bugcheck indicates that an I/O Request Packet (IRP) that is to be
cancelled, has a cancel routine specified in it -- meaning that the packet
is in a state in which the packet can be cancelled -- however, the packet
no longer belongs to a driver, as it has entered I/O completion.  This is
either a driver bug, or more than one driver is accessing the same packet,
which is not likely and much more difficult to find. The cancel routine
parameter will provide a clue as to which driver or stack is the culprit.
Arguments:
Arg1: fffffa8013e06010, Pointer to the IRP
Arg2: fffff80002d02530, Cancel routine set by the driver.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x48

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002d3476e to fffff80002cb9740

STACK_TEXT:  
fffff880`080b6888 fffff800`02d3476e : 00000000`00000048 fffffa80`13e06010 fffff800`02d02530 00000000`00000000 : nt!KeBugCheckEx
fffff880`080b6890 fffff800`02f9f0b9 : fffff880`080b6c01 fffffa80`176e1f48 00000000`00000000 fffffa80`17625b30 : nt! ?? ::FNODOBFM::`string'+0x3c1f0
fffff880`080b68d0 fffff800`02f9ea2b : fffffa80`16306920 00000000`00000000 fffff880`080b6c20 00000000`00000000 : nt!IoCancelThreadIo+0x59
fffff880`080b6900 fffff800`02f77635 : 00000000`c0150014 00000000`00001700 00000000`78457300 00000000`00000000 : nt!PspExitThread+0x58b
fffff880`080b69c0 fffff800`02c961db : 00000000`00001660 00000000`000016a4 00000000`000016ac 00000000`000016b4 : nt!PsExitSpecialApc+0x1d
fffff880`080b69f0 fffff800`02c96620 : 00000000`0b745db0 fffff880`080b6a70 fffff800`02f7774c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`080b6a70 fffff800`02cb8a37 : fffffa80`176e1b60 00000000`031bf9c8 fffff880`080b6bc8 00000000`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`080b6bb0 00000000`7790030a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`031bf9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7790030a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+3c1f0
fffff800`02d3476e cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+3c1f0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x48_nt!_??_::FNODOBFM::_string_+3c1f0

BUCKET_ID:  X64_0x48_nt!_??_::FNODOBFM::_string_+3c1f0

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-13868-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e46e50
Debug session time: Tue Dec 28 17:30:43.500 2010 (UTC - 5:00)
System Uptime: 0 days 1:29:39.780
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {2b0, 2, 0, fffff80002d3198c}

Probably caused by : ntkrnlmp.exe ( nt!PsCheckThreadCpuQuota+8c )

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000002b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002d3198c, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb10e0
 00000000000002b0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!PsCheckThreadCpuQuota+8c
fffff800`02d3198c 394330          cmp     dword ptr [rbx+30h],eax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  sidebar.exe

TRAP_FRAME:  fffff88009025610 -- (.trap 0xfffff88009025610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=0000069600000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d3198c rsp=fffff880090257a0 rbp=fffff880031db180
 r8=fffffa80137c6060  r9=0000000000000000 r10=0000000000000080
r11=00000000000f00ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
nt!PsCheckThreadCpuQuota+0x8c:
fffff800`02d3198c 394330          cmp     dword ptr [rbx+30h],eax ds:58b8:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c78ca9 to fffff80002c79740

STACK_TEXT:  
fffff880`090254c8 fffff800`02c78ca9 : 00000000`0000000a 00000000`000002b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`090254d0 fffff800`02c77920 : 00000000`00000000 00000000`00000280 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`09025610 fffff800`02d3198c : fffffa80`13bdfc20 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
fffff880`090257a0 fffff800`02c7fad2 : 00000000`00000001 fffff880`031db180 fffffa80`173894b0 fffffa80`137c6060 : nt!PsCheckThreadCpuQuota+0x8c
fffff880`090257d0 fffff800`02c7f5da : fffffa80`746c6644 fffff880`09025850 00000000`00000000 fffff800`02c7f900 : nt!SwapContext_PatchXRstor+0xec
fffff880`09025810 fffff800`02c80992 : ffffffff`fffffffe fffffa80`173894b0 00000000`0716f580 00000000`0000000a : nt!KiSwapContext+0x7a
fffff880`09025950 fffff800`02c842a1 : fffff880`09025ca0 fffffa80`173894b0 00000000`00000000 fffffa80`173895b8 : nt!KiCommitThreadWait+0x1d2
fffff880`090259e0 fffff800`02f74df7 : 00000000`00000000 fffff880`09025bc8 fffffa80`00000008 ffffbc35`00000000 : nt!KeRemoveQueueEx+0x301
fffff880`09025a90 fffff800`02c89aa6 : 00000000`00000000 fffff880`09025ba8 fffff880`09025bc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`09025b20 fffff800`02c78993 : fffffa80`173894b0 00000000`77244270 00000000`06836360 fffffa80`13fdd230 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`09025c20 00000000`7719165a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0716f798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7719165a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!PsCheckThreadCpuQuota+8c
fffff800`02d3198c 394330          cmp     dword ptr [rbx+30h],eax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PsCheckThreadCpuQuota+8c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!PsCheckThreadCpuQuota+8c

BUCKET_ID:  X64_0xA_nt!PsCheckThreadCpuQuota+8c

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-13197-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e3de50
Debug session time: Tue Dec 28 19:23:49.858 2010 (UTC - 5:00)
System Uptime: 0 days 0:04:46.542
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002f5648c, fffff8800758de10, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+78 )

Followup: MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002f5648c, Address of the instruction which caused the bugcheck
Arg3: fffff8800758de10, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
nt!ObpQueryNameString+78
fffff800`02f5648c 4d8b92a0000000  mov     r10,qword ptr [r10+0A0h]

CONTEXT:  fffff8800758de10 -- (.cxr 0xfffff8800758de10)
rax=0000000000000040 rbx=fffffa8015652160 rcx=fffffa80156521d0
rdx=fffffa8013987000 rsi=0000000000000001 rdi=0000000000000000
rip=fffff80002f5648c rsp=fffff8800758e7e0 rbp=fffff8800758e940
 r8=0000000000002000  r9=fffff8800758e958 r10=0000000000000000
r11=fffffa8013471402 r12=fffffa8013987000 r13=fffff80002c00000
r14=fffffa8013987000 r15=fffffa80156521a0
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObpQueryNameString+0x78:
fffff800`02f5648c 4d8b92a0000000  mov     r10,qword ptr [r10+0A0h] ds:002b:00000000`000000a0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  WMIADAP.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002f5648c

STACK_TEXT:  
fffff880`0758e7e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpQueryNameString+0x78


FOLLOWUP_IP: 
nt!ObpQueryNameString+78
fffff800`02f5648c 4d8b92a0000000  mov     r10,qword ptr [r10+0A0h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpQueryNameString+78

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff8800758de10 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObpQueryNameString+78

BUCKET_ID:  X64_0x3B_nt!ObpQueryNameString+78

Followup: MachineOwner
---------


Drivers

Code:
start             end                 module name
fffff880`03fb1000 fffff880`03fef000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f49000 fffff880`00fa0000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c09000 fffff880`02c93000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`019e6000 fffff880`019fc000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ff3000 fffff880`00ffe000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e8d000 fffff880`00e96000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01906000 fffff880`0190d000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f64000 fffff880`03f75000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05f68000 fffff880`05f86000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      unavailable (00000000)
fffff880`018d3000 fffff880`018fd000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cfd000 fffff880`00dbd000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0186d000 fffff880`0189d000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c9f000 fffff880`00cfd000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0118b000 fffff880`011fe000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`019d6000 fffff880`019e6000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05cff000 fffff880`05d0d000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ec3000 fffff880`03f46000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f46000 fffff880`03f64000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`019b2000 fffff880`019c1000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01200000 fffff880`01216000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`043dd000 fffff880`043ff000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05d19000 fffff880`05d22000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05d0d000 fffff880`05d19000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05d22000 fffff880`05d35000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05cf3000 fffff880`05cff000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10aa2000 fffff880`10b96000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`10b96000 fffff880`10bdc000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01119000 fffff880`0112d000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010cd000 fffff880`01119000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013e9000 fffff880`013f3000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01086000 fffff880`010c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`015ab000 fffff880`015f5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`031dc000 fffff800`03225000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`10bdc000 fffff880`10c00000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04344000 fffff880`043a0000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05c3b000 fffff880`05c54000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05c54000 fffff880`05c5c080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05c2d000 fffff880`05c3b000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05ea0000 fffff880`05f68000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f5000 fffff880`015fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03f9b000 fffff880`03fb1000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04260000 fffff880`0426f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05c5d000 fffff880`05c6b000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc8000 fffff800`00bd2000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04280000 fffff880`042c3000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013be000 fffff880`013d8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04200000 fffff880`04205200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05d66000 fffff880`05d7b000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05d43000 fffff880`05d66000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c47000 fffff880`00c8b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`05d35000 fffff880`05d43000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0426f000 fffff880`0427e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05c77000 fffff880`05c84000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dcd000 fffff880`00de7000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05f86000 fffff880`05f9e000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05f9e000 fffff880`05fcb000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05e00000 fffff880`05e4e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05e4e000 fffff880`05e71000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0196b000 fffff880`01976000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fa9000 fffff880`00fb3000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0112d000 fffff880`0118b000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02def000 fffff880`02dfa000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`014a3000 fffff880`014b5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014b9000 fffff880`015ab000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01824000 fffff880`01830000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`01830000 fffff880`0185f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0432f000 fffff880`04344000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d07000 fffff880`02d16000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c93000 fffff880`02cd8000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01976000 fffff880`01987000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02de3000 fffff880`02def000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c00000 fffff800`031dc000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0121b000 fffff880`013be000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`05c6b000 fffff880`05c77000   NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
fffff880`018fd000 fffff880`01906000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10aa0000 fffff880`10aa1180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fe0e000 fffff880`10a9fe00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`02ce1000 fffff880`02d07000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fb3000 fffff880`00fe6000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e86000 fffff880`00e8d000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00dbd000 fffff880`00dcd000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d8000 fffff880`013e9000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06c9d000 fffff880`06d43000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`043a0000 fffff880`043dd000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c8b000 fffff880`00c9f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`01800000 fffff880`01824000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`00c2a000 fffff880`00c45000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0421a000 fffff880`0423b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0423b000 fffff880`04255000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d92000 fffff880`02de3000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04255000 fffff880`04260000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01950000 fffff880`01959000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`05e71000 fffff880`05e9f000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`01959000 fffff880`01962000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01962000 fffff880`0196b000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`05d93000 fffff880`05dcb000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05d7b000 fffff880`05d93000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e67000 fffff880`03ebd000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`06d43000 fffff880`06d4e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0149b000 fffff880`014a3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07cd5000 fffff880`07d46000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`06c00000 fffff880`06c96000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06d8d000 fffff880`06df4000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06d4e000 fffff880`06d7b000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`0427e000 fffff880`0427f480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06d7b000 fffff880`06d8d000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019a5000 fffff880`019b2000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`06df4000 fffff880`06dff000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`01987000 fffff880`019a5000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d7e000 fffff880`02d92000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00440000 fffff960`0044a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`05fcb000 fffff880`05fda000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`03f75000 fffff880`03f9b000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05c9f000 fffff880`05cf3000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`042c3000 fffff880`042d5000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05c0e000 fffff880`05c2b000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05c2b000 fffff880`05c2cf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03e56000 fffff880`03e67000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042d5000 fffff880`0432f000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03e00000 fffff880`03e56000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05c84000 fffff880`05c9f000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0fe00000 fffff880`0fe0d000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fe6000 fffff880`00ff3000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0190d000 fffff880`0191b000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0191b000 fffff880`01940000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`02d31000 fffff880`02d7e000   vmm      vmm.sys      Tue Feb 12 06:38:20 2008 (47B1852C)
fffff880`019c1000 fffff880`019d6000   VMNetSrv VMNetSrv.sys Wed Jan 16 06:52:01 2008 (478DEFE1)
fffff880`0148b000 fffff880`0149b000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d16000 fffff880`02d31000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01940000 fffff880`01950000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e96000 fffff880`00f3a000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f3a000 fffff880`00f49000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02cd8000 fffff880`02ce1000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`00390000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`03fef000 fffff880`03ff8000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fa0000 fffff880`00fa9000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`0189d000 fffff880`018ab000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018ab000 fffff880`018b7000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018b7000 fffff880`018c0000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018c0000 fffff880`018d3000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


#3
Thank you cybercore!

I did not install Virtual Server R2 2005 or Virtual PC 2004 on the machine, so I am not sure how to uninstall these.

I ran a Windows Update which contained several drivers including a Realtek device driver - hopefully that will resolve the issue.

I appreciate your time. Thank you,
Jared
 


#4
Thank you cybercore!

I did not install Virtual Server R2 2005 or Virtual PC 2004 on the machine, so I am not sure how to uninstall these.

I ran a Windows Update which contained several drivers including a Realtek device driver - hopefully that will resolve the issue.

I appreciate your time. Thank you,
Jared

I rely on what I see in your crash dumps, you do have these drivers as you can see in the crash dump code attached:


VMNetSrv.sys Wed Jan 16 06:52:01 2008
Microsoft Virtual Server 2005 R2 SP1


vmm.sys Tue Feb 12 06:38:20 2008
Microsoft Virtual PC 2004



Those drivers are old, check programs and components - if those virtual pc's are not there then go to C:\Windows\system32\drivers and delete those above mentioned files.


Regards.
 


#5
Thank you again

Those files did exist in C:\Windows\System32, and I have renamed them. I do hope this takes care of the problem and I truly appreciate your help.

Jared
 


#6
It looks like that did it. Up for over a week now without any issues. Thank you!

Jared
 


#7
Thank you for updating. Merry Christmas.


 


#8
Hi,

I am beginning to receive the BSOD within 4-6 hours of restart. I have attached the most recent files from the past few days. Please help if possible.

Thank you,
Jared
 


Attachments

#9

BugCheck 3B, {c0000005, fffff800031bad9b, fffff880083a1d70, 0}
PROCESS_NAME: sidebar.exe
Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+2b )

BugCheck A, {230, 2, 0, fffff80002f7498c}
PROCESS_NAME: sqlservr.exe
Probably caused by : ntkrnlmp.exe ( nt!PsCheckThreadCpuQuota+8c )


Old drivers to take care of:

Microsoft Virtual Machine Network Services/Microsoft Virtual Server 2005 R2 SP1
VMNetSrv.sys Wed Jan 16 06:52:01 2008

Microsoft Virtual PC 2004
vmm.sys Tue Apr 07 09:25:54 2009

NetGear Neutral Wireless Solution
scmndisp.sys Wed Jan 17 02:48:03 2007










Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031411-17487-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4e000 PsLoadedModuleList = 0xfffff800`0308be50
Debug session time: Fri Mar 11 22:56:53.604 2011 (UTC - 4:00)
System Uptime: 0 days 0:18:17.884
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800031bad9b, fffff880083a1d70, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+2b )

Followup: MachineOwner
---------

11: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031bad9b, Address of the instruction which caused the bugcheck
Arg3: fffff880083a1d70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObDereferenceSecurityDescriptor+2b
fffff800`031bad9b f00fb14e10      lock cmpxchg dword ptr [rsi+10h],ecx

CONTEXT:  fffff880083a1d70 -- (.cxr 0xfffff880083a1d70)
rax=00000000000b0000 rbx=0000000000000000 rcx=00000000000affff
rdx=0000000000000001 rsi=000000000007ffe0 rdi=0000000000000000
rip=fffff800031bad9b rsp=fffff880083a2740 rbp=fffffa8013706060
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff880083a2818 r12=0000000000000001 r13=fffffa80136b3a20
r14=fffffa80136b3b00 r15=fffff8a0030c5de0
iopl=0         nv up ei pl nz ac po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010216
nt!ObDereferenceSecurityDescriptor+0x2b:
fffff800`031bad9b f00fb14e10      lock cmpxchg dword ptr [rsi+10h],ecx ds:002b:00000000`0007fff0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  sidebar.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031bad9b

STACK_TEXT:  
fffff880`083a2740 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x2b


FOLLOWUP_IP: 
nt!ObDereferenceSecurityDescriptor+2b
fffff800`031bad9b f00fb14e10      lock cmpxchg dword ptr [rsi+10h],ecx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObDereferenceSecurityDescriptor+2b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff880083a1d70 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+2b

BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+2b

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031411-15787-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4c000 PsLoadedModuleList = 0xfffff800`03089e50
Debug session time: Mon Mar 14 16:08:46.248 2011 (UTC - 4:00)
System Uptime: 0 days 0:14:58.970
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {230, 2, 0, fffff80002f7498c}

Probably caused by : ntkrnlmp.exe ( nt!PsCheckThreadCpuQuota+8c )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000230, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f7498c, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f40e0
 0000000000000230 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!PsCheckThreadCpuQuota+8c
fffff800`02f7498c 394330          cmp     dword ptr [rbx+30h],eax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  sqlservr.exe

TRAP_FRAME:  fffff88003121b80 -- (.trap 0xfffff88003121b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000006
rdx=000002b600000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f7498c rsp=fffff88003121d10 rbp=fffff880030f9180
 r8=fffffa80176a6060  r9=0000000000000000 r10=00000000000109b5
r11=0000000000027897 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
nt!PsCheckThreadCpuQuota+0x8c:
fffff800`02f7498c 394330          cmp     dword ptr [rbx+30h],eax ds:41c0:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ebbca9 to fffff80002ebc740

STACK_TEXT:  
fffff880`03121a38 fffff800`02ebbca9 : 00000000`0000000a 00000000`00000230 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03121a40 fffff800`02eba920 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03121b80 fffff800`02f7498c : fffff880`030fe140 fffffa80`133f9040 00000000`00000000 000002af`8bde4ae4 : nt!KiPageFault+0x260
fffff880`03121d10 fffff800`02ec2ad2 : fffff880`030fe140 fffff880`030f9180 00000000`00000000 fffffa80`176a6060 : nt!PsCheckThreadCpuQuota+0x8c
fffff880`03121d40 fffff800`02ec4f9d : fffff880`030f9180 fffff880`00000000 00000000`00000000 fffff800`02f75230 : nt!SwapContext_PatchXRstor+0xec
fffff880`03121d80 00000000`00000000 : fffff880`03122000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x10d


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!PsCheckThreadCpuQuota+8c
fffff800`02f7498c 394330          cmp     dword ptr [rbx+30h],eax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PsCheckThreadCpuQuota+8c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!PsCheckThreadCpuQuota+8c

BUCKET_ID:  X64_0xA_nt!PsCheckThreadCpuQuota+8c

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`10bba000 fffff880`10bf8000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ed3000 fffff880`00f2a000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02ca2000 fffff880`02d2c000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fe10000 fffff880`0fe26000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`010dd000 fffff880`010e8000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`07400000 fffff880`0740b000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00fd8000 fffff880`00fe1000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`010b3000 fffff880`010dd000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`019cf000 fffff880`019d6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`043bf000 fffff880`043d0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06193000 fffff880`061b1000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      unavailable (00000000)
fffff880`0199c000 fffff880`019c6000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01936000 fffff880`01966000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d26000 fffff880`00d84000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0fe00000 fffff880`0fe10000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04c27000 fffff880`04c35000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0431e000 fffff880`043a1000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`043a1000 fffff880`043bf000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0430f000 fffff880`0431e000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01920000 fffff880`01936000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04d4d000 fffff880`04d6f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`043f6000 fffff880`043ff000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04c35000 fffff880`04c41000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02c61000 fffff880`02c74000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04d92000 fffff880`04d9e000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`044db000 fffff880`045cf000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04400000 fffff880`04446000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01134000 fffff880`01148000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010e8000 fffff880`01134000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018e6000 fffff880`01920000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02e03000 fffff800`02e4c000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04446000 fffff880`0446a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04cb4000 fffff880`04d10000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04dba000 fffff880`04dd3000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04dd3000 fffff880`04ddb080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04dac000 fffff880`04dba000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`060cb000 fffff880`06193000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01497000 fffff880`014a0000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04200000 fffff880`04216000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04230000 fffff880`0423f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04c0d000 fffff880`04c1b000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b99000 fffff800`00ba3000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0424e000 fffff880`04291000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04d6f000 fffff880`04d74200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02de0000 fffff880`02df5000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02c74000 fffff880`02c97000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cce000 fffff880`00d12000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04d9e000 fffff880`04dac000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0423f000 fffff880`0424e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04c00000 fffff880`04c0d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fbe000 fffff880`00fd8000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`061b1000 fffff880`061c9000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`061c9000 fffff880`061f6000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0645b000 fffff880`064a9000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`064a9000 fffff880`064cc000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01850000 fffff880`0185b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f33000 fffff880`00f3d000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01148000 fffff880`011a6000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`04304000 fffff880`0430f000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01235000 fffff880`01247000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014a5000 fffff880`01597000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`044cd000 fffff880`044d9000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`060a0000 fffff880`060b3000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0fe4a000 fffff880`0fe79000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04c9f000 fffff880`04cb4000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02db6000 fffff880`02dc5000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d2c000 fffff880`02d71000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01597000 fffff880`015f7000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0185b000 fffff880`0186c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`042f8000 fffff880`04304000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e4c000 fffff800`03428000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01258000 fffff880`013fb000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04c1b000 fffff880`04c27000   NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
fffff880`019c6000 fffff880`019cf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b52000 fffff880`10b53180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fec0000 fffff880`10b51e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`0604d000 fffff880`060a0000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d7a000 fffff880`02da0000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f7d000 fffff880`00f92000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f3d000 fffff880`00f70000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fa7000 fffff880`00fae000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fae000 fffff880`00fbe000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`064cc000 fffff880`06572000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04d10000 fffff880`04d4d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d12000 fffff880`00d26000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0fe26000 fffff880`0fe4a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0fe79000 fffff880`0fe94000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0fe94000 fffff880`0feb5000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04216000 fffff880`04230000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`042a7000 fffff880`042f8000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0feb5000 fffff880`0fec0000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01835000 fffff880`0183e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0750a000 fffff880`07538000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`0183e000 fffff880`01847000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01847000 fffff880`01850000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`07552000 fffff880`0758a000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`01073000 fffff880`010ad000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`060b3000 fffff880`060cb000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`10b54000 fffff880`10bba000   Rt64win7 Rt64win7.sys Tue Nov 30 01:01:28 2010 (4CF49338)
fffff880`01475000 fffff880`0147f000   scmndisp scmndisp.sys Wed Jan 17 02:48:03 2007 (45ADD4B3)
fffff880`06572000 fffff880`0657d000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0148f000 fffff880`01497000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07474000 fffff880`0750a000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0740d000 fffff880`07474000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0657d000 fffff880`065aa000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`044d9000 fffff880`044da480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`065aa000 fffff880`065bc000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0188a000 fffff880`01897000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`07538000 fffff880`07543000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`0186c000 fffff880`0188a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c4d000 fffff880`02c61000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004e0000 fffff960`004ea000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`07543000 fffff880`07552000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`043d0000 fffff880`043f6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04291000 fffff880`042a3000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04ddc000 fffff880`04df9000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04d90000 fffff880`04d91f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`045cf000 fffff880`045e0000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04c45000 fffff880`04c9f000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04477000 fffff880`044cd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04d75000 fffff880`04d90000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0446a000 fffff880`04477000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f70000 fffff880`00f7d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019d6000 fffff880`019e4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01800000 fffff880`01825000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`02c00000 fffff880`02c4d000   vmm      vmm.sys      Tue Apr 07 09:25:54 2009 (49DB5462)
fffff880`045e9000 fffff880`045fe000   VMNetSrv VMNetSrv.sys Wed Jan 16 06:52:01 2008 (478DEFE1)
fffff880`0147f000 fffff880`0148f000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f92000 fffff880`00fa7000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d84000 fffff880`00de0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011a6000 fffff880`011f2000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02da0000 fffff880`02db6000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02dc5000 fffff880`02de0000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01825000 fffff880`01835000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e20000 fffff880`00ec4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ec4000 fffff880`00ed3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d71000 fffff880`02d7a000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00380000   win32k   win32k.sys   unavailable (00000000)
fffff880`045e0000 fffff880`045e9000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f2a000 fffff880`00f33000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01897000 fffff880`018b8000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`0758a000 fffff880`075fb000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01966000 fffff880`01974000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01974000 fffff880`01980000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01980000 fffff880`01989000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01989000 fffff880`0199c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


#10
Thank you cybercore!

The VMNetSrv.sys was removed the last time I had this issue, and was re-installed during a recent auto-update. I have removed it again and have added measures to avoid this in the future. The others are not needed and have been un-installed.

Jared
 


#11
Thank you cybercore!

The VMNetSrv.sys was removed the last time I had this issue, and was re-installed during a recent auto-update. I have removed it again and have added measures to avoid this in the future.
It got auto-updated because you're using (or have remnants of) old version of virtual machine. You should switch to products compatible with Windows 7 -- XP Mode, Virtual Box, or VMWare.

Update the Netgear device before you get another crash. Or disable it in device manager if not using it.
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.