Couple of BSODS - Alot of info attached.

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by TazZy, Mar 19, 2011.

  1. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    Hello, my name is Adam. First off, im really happy to have found these forums and I actually see people getting help here, because im in need of some. :(

    DxDiag, Systeminfo, DriverList, WindowsUpdate & dumps attached in Seven Forums.zip

    Specs;
    MSI 890FXA-GD70 AM3
    AMD Phenom II X4 965 3,4GHz Black Edition (OC'd to 4.2GHz)
    Corsair Cooling Hydro H70 CPU-Cooler
    Gigabyte GeForce GTX 460 1GB OC
    x2 Corsair 4GB (2x2048MB) 1600MHz XMS3

    Running Avira AntiVir Personal (Free verision). Can also point out that nothing in my comp has gone over 50 degrees in days. CPU/GPU/Mobo stays ~20-40 degrees 24/7.

    My first 2 BSODS (031911-26083-01 & 031911-23743-01) - SYSTEM_SERVICE_EXCEPTION came randomly when browsing/listening to spotify and the other came after like 40mins of Heroes of Newerth. Note; Gotten another 4gb RAM the day earlier.

    The 031911-25942-01 - IRQL_NOT_LESS_OR_EQUAL I cant recall what I did when it appeared.

    And the 031911-24788-01 / 031911-25272-01 - SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION came when I tried to update my BIOS (tried 2 times). Weird thing about these 2 though is that the actual blue screen popped up for about a split second, not like the others that has their memory getting dumped or w/e.

    During the past month I've been trying everything in order to make em go away, but it seems its impossible these days.. I sent in my motherboard and the current 4GB of ram (same brand as I got atm) a few weeks ago when I had enough and it turned out that it I had gotten corrupt memories from the beginning and I remember I had gotten similiar BSODS back then. They sent me a new pair that had been tested and they worked without giving me anymore blue screens, till now.

    Can it be so fcked up/bad luck, that I have gotten 2/3 broken pairs of RAM from the start? That the new 2x2gb I just bought is corrupt aswell? I mean I guess that can happen if someone is really unlucky, but I would HIGHLY appreciate (maybe even donate) to whoever takes a look at my dumps and finds me a possible solution.

    ANYTHING is hiiiiiiighly appreciated. Thanks in advance, much love. Adam
     

    Attached Files:

    #1 TazZy, Mar 19, 2011
    Last edited: Mar 19, 2011
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Update AS Rock Flash Memory Writer
    UCOREW64.SYS Tue Apr 22 07:01:50 2008




    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031911-25272-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
    Debug session time: Sat Mar 19 14:10:13.873 2011 (UTC - 4:00)
    System Uptime: 0 days 0:49:50.481
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C1, {fffff980236e8fe0, fffff980236e8ff4, d10014, 24}
    
    Unable to load image UCOREW64.SYS, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for UCOREW64.SYS
    *** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
    Probably caused by : UCOREW64.SYS ( UCOREW64+152b )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
    Special pool has detected memory corruption.  Typically the current thread's
    stack backtrace will reveal the guilty party.
    Arguments:
    Arg1: fffff980236e8fe0, address trying to free
    Arg2: fffff980236e8ff4, address where bits are corrupted
    Arg3: 0000000000d10014, (reserved)
    Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xC1_24
    
    SPECIAL_POOL_CORRUPTION_TYPE:  24
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  AFUWIN.EXE
    
    CURRENT_IRQL:  1
    
    IRP_ADDRESS:  fffff9802377ef3b
    
    LAST_CONTROL_TRANSFER:  from fffff80002f9ae14 to fffff80002e9c640
    
    STACK_TEXT:  
    fffff880`0bad24b8 fffff800`02f9ae14 : 00000000`000000c1 fffff980`236e8fe0 fffff980`236e8ff4 00000000`00d10014 : nt!KeBugCheckEx
    fffff880`0bad24c0 fffff800`02fc693b : fffff800`02e1c000 00000000`20206f49 00000000`0009ca09 fffffa80`08f30e00 : nt!MmFreeSpecialPool+0x374
    fffff880`0bad2600 fffff800`02eb1afe : 00000000`00000000 fffff980`2377efb0 fffff980`0327ee50 fffff980`2597efb0 : nt!ExDeferredFreePool+0xf33
    fffff880`0bad26b0 fffff800`02e9fdbf : fffff980`2377efb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
    fffff880`0bad2780 fffff800`0333919f : fffff980`2377eee0 fffffa80`08436d00 fffff980`2377ef00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
    fffff880`0bad2860 fffff880`0979052b : fffff880`0978f8f0 fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 : nt!IovCompleteRequest+0x19f
    fffff880`0bad2930 fffff880`0978f8f0 : fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 : UCOREW64+0x152b
    fffff880`0bad2938 fffff980`2377eee0 : fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 : UCOREW64+0x8f0
    fffff880`0bad2940 fffff980`2377eee0 : fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 : 0xfffff980`2377eee0
    fffff880`0bad2948 fffff980`2377efb0 : 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 : 0xfffff980`2377eee0
    fffff880`0bad2950 00000000`00000014 : fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 : 0xfffff980`2377efb0
    fffff880`0bad2958 fffff880`0bad2970 : fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 : 0x14
    fffff880`0bad2960 fffffa80`08436d10 : fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 00000000`00000001 : 0xfffff880`0bad2970
    fffff880`0bad2968 fffff800`031b6f97 : fffff880`00000018 fffff800`0332c2a7 00000000`00000001 fffffa80`08df6560 : 0xfffffa80`08436d10
    fffff880`0bad2970 fffffa80`08f30e50 : 00000000`00000000 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 : nt!IopXxxControlFile+0x607
    fffff880`0bad2aa0 00000000`00000000 : 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 00000000`00000000 : 0xfffffa80`08f30e50
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    UCOREW64+152b
    fffff880`0979052b ??              ???
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  UCOREW64+152b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: UCOREW64
    
    IMAGE_NAME:  UCOREW64.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  480dc59e
    
    FAILURE_BUCKET_ID:  X64_0xC1_24_UCOREW64+152b
    
    BUCKET_ID:  X64_0xC1_24_UCOREW64+152b
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`06c00000 fffff880`06c3e000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
    fffff880`00ee5000 fffff880`00f3c000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`0407d000 fffff880`04106000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`06ed9000 fffff880`06eef000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`06dc4000 fffff880`06dd9000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`0105e000 fffff880`01069000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01034000 fffff880`0105e000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff880`09364000 fffff880`09381000   avgntflt avgntflt.sys Thu Nov 11 10:59:48 2010 (4CDC12F4)
    fffff880`06d7c000 fffff880`06d9e000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
    fffff880`019e0000 fffff880`019e7000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`06d6b000 fffff880`06d7c000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`07fc7000 fffff880`07fe5000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`006f0000 fffff960`00717000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
    fffff880`0148b000 fffff880`014b5000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00c9d000 fffff880`00d5d000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`01971000 fffff880`019a1000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00c3f000 fffff880`00c9d000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01127000 fffff880`01199000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`06ec9000 fffff880`06ed9000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`09287000 fffff880`09295000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`06cca000 fffff880`06d4d000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
    fffff880`06d4d000 fffff880`06d6b000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`04046000 fffff880`04055000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0195b000 fffff880`01971000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`07399000 fffff880`073bb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`041a6000 fffff880`041e9000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
    fffff880`092a1000 fffff880`092aa000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`09295000 fffff880`092a1000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`092aa000 fffff880`092bd000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`0927b000 fffff880`09287000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`13cb4000 fffff880`13da8000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`13da8000 fffff880`13dee000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`010b5000 fffff880`010c9000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01069000 fffff880`010b5000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`0122c000 fffff880`01236000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01921000 fffff880`0195b000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`0181e000 fffff880`01868000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff800`03406000 fffff800`0344f000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`13000000 fffff880`13024000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`0921f000 fffff880`0927b000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
    fffff880`092db000 fffff880`092f4000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`092f4000 fffff880`092fc080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`092cd000 fffff880`092db000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`07efe000 fffff880`07fc7000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`01918000 fffff880`01921000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`06e87000 fffff880`06ea5000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`093a2000 fffff880`093c5000   irda     irda.sys     Mon Jul 13 20:09:01 2009 (4A5BCC9D)
    fffff880`06ea5000 fffff880`06eb4000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00bd3000 fffff800`00bdd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`07257000 fffff880`0729a000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`01200000 fffff880`0121b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`073bb000 fffff880`073c0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`092fd000 fffff880`09312000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
    fffff880`093c5000 fffff880`093da000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0931f000 fffff880`09333000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
    fffff880`09341000 fffff880`09364000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`092bd000 fffff880`092cd000   LUsbFilt LUsbFilt.Sys Tue Aug 24 13:21:47 2010 (4C73FFAB)
    fffff880`00c1e000 fffff880`00c2b000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`09333000 fffff880`09341000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`06faf000 fffff880`06fbe000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`09312000 fffff880`0931f000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fd0000 fffff880`00fea000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`07fe5000 fffff880`07ffd000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`07e00000 fffff880`07e2d000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
    fffff880`07e2d000 fffff880`07e7a000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
    fffff880`07e7a000 fffff880`07e9e000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
    fffff880`015e0000 fffff880`015eb000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`09782000 fffff880`0978f000   msibios64_100507 msibios64_100507.sys Fri May 07 05:17:12 2010 (4BE3DA98)
    fffff880`00f45000 fffff880`00f4f000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010c9000 fffff880`01127000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`0403b000 fffff880`04046000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01906000 fffff880`01918000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014bf000 fffff880`015b2000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`06f13000 fffff880`06f1f000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`06f1f000 fffff880`06f4e000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`0731e000 fffff880`07333000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`0417a000 fffff880`04189000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`04106000 fffff880`0414b000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`015eb000 fffff880`015fc000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0402f000 fffff880`0403b000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02e1c000 fffff800`03406000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01259000 fffff880`013fc000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
    fffff880`0977b000 fffff880`09782000   NTIOLib_X64 NTIOLib_X64.sys Wed Oct 20 02:45:49 2010 (4CBE901D)
    fffff880`019d7000 fffff880`019e0000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`072ac000 fffff880`072c4000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
    fffff880`13024000 fffff880`13054000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
    fffff880`13cb2000 fffff880`13cb3180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
    fffff880`07333000 fffff880`0735c000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
    fffff880`13057000 fffff880`13cb1d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
    fffff880`04154000 fffff880`0417a000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`00f8f000 fffff880`00fa4000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00f4f000 fffff880`00f82000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`00fb9000 fffff880`00fc0000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fc0000 fffff880`00fd0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121b000 fffff880`0122c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`090a8000 fffff880`0914e000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`0735c000 fffff880`07399000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c2b000 fffff880`00c3f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`06eef000 fffff880`06f13000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`06f4e000 fffff880`06f69000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`06f69000 fffff880`06f8a000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`06f8a000 fffff880`06fa4000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`011a6000 fffff880`011f7000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`06fa4000 fffff880`06faf000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01610000 fffff880`01619000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019f5000 fffff880`019fe000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`015d7000 fffff880`015e0000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`018cc000 fffff880`01906000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`093da000 fffff880`093f2000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06c3e000 fffff880`06c94000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`0914e000 fffff880`09159000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`06eb4000 fffff880`06ec0000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04189000 fffff880`041a6000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`018c4000 fffff880`018cc000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`09671000 fffff880`0970a000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
    fffff880`09000000 fffff880`0906b000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
    fffff880`09159000 fffff880`0918a000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
    fffff880`06fbe000 fffff880`06fbf480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`0161a000 fffff880`0181e000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`0918a000 fffff880`0919c000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
    fffff880`01199000 fffff880`011a6000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`01236000 fffff880`01258000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`0401b000 fffff880`0402f000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`06d9e000 fffff880`06dc4000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`0978f000 fffff880`09790f00   UCOREW64 UCOREW64.SYS Tue Apr 22 07:01:50 2008 (480DC59E)
    fffff880`0729a000 fffff880`072ac000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`13054000 fffff880`13055f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`06e76000 fffff880`06e87000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`072c4000 fffff880`0731e000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`13dee000 fffff880`13df9000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`06e20000 fffff880`06e76000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00f82000 fffff880`00f8f000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019e7000 fffff880`019f5000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`015b2000 fffff880`015d7000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00db9000 fffff880`00df5000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
    fffff880`01868000 fffff880`01878000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
    fffff880`00fa4000 fffff880`00fb9000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00d5d000 fffff880`00db9000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`01878000 fffff880`018c4000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`04000000 fffff880`0401b000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`01600000 fffff880`01610000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e32000 fffff880`00ed6000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ed6000 fffff880`00ee5000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`0414b000 fffff880`04154000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00080000 fffff960`00391000   win32k   win32k.sys   Wed Jan 05 01:55:38 2011 (4D2415EA)
    fffff880`00fea000 fffff880`00ffe000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
    fffff880`06ec0000 fffff880`06ec9000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f3c000 fffff880`00f45000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`09381000 fffff880`093a2000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    
    Unloaded modules:
    fffff880`0970a000 fffff880`0977b000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`019a1000 fffff880`019af000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`019af000 fffff880`019bb000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`019bb000 fffff880`019c4000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`019c4000 fffff880`019d7000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    Thanks for the fast answer :eek: So basicly I have to update my bios? But isnt Asrock a certain mobo-manufacturer? Ive got msi on mine ._. Dont really get it.
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Ok, this driver causes your blue screens:

    UCOREW64.SYS Tue Apr 22 07:01:50 2008




    Which is your bios updater tool. The utility is old, causes ble screens, and therefore must be updated (before updating bios).
     
  5. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    ASRock - BIOS Upgrade Instruction

    This is all I can find, cant find any updater for Win7.. Could you help me find it? Sorry for being so lame, I just cant find it on google. :(
     
  6. Trouble

    Trouble Noob Whisperer

    Joined:
    Nov 30, 2009
    Messages:
    13,845
    Likes Received:
    833
    It seems that MSI uses something similar as part of it's live update utility. The ucorew64.sys is actually part of a bios update package for AMI BIOSs, which you can obtain from here as part of the AFUWIN v4.xx package. The Ucorew64.sys included in that package reflects a date modified of 12/14/2010. Hope this helps and welcome to the forums.
    Randy
     
  7. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    Thanks Trouble.. But I dl'd that AFUWIN v4.xx package and all I get when trying to launch any updater is a blue screen.. so what I stupidly did was to put the latest bios from msi on a usb and I flashed it in bios :( Have a feeling I made things worse now though.

    edit; ran the SF giagnostic tool, did the driverlist and now it seems the UCOREW64 isnt in the list anymore. Should I be happy?
     
    #7 TazZy, Mar 19, 2011
    Last edited: Mar 19, 2011
  8. Trouble

    Trouble Noob Whisperer

    Joined:
    Nov 30, 2009
    Messages:
    13,845
    Likes Received:
    833
    Adam, sorry that didn't work for you, but I don't see how updating the BIOS to the latest version provided by the MotherBoard manufacturer could make things worse. When I provided the link above it was not intended to encourage a BIOS update but rather to provide a source for the latest version of the ucorew64.sys (that I could find) file which would allow you to find the old version (probably in the system32 folder) rename it and copy the newer version into the same folder, there by hopefully eliminating one possible cause of your blue screens.
     
  9. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    Im just afraid ill mess anything up.. :/ But thats just the thing, I cant find the old one and I cant run the new one :(

    attached 3 diff. blue screens I get when I try to launch that afuwinx64
     

    Attached Files:

    #9 TazZy, Mar 19, 2011
    Last edited: Mar 19, 2011
  10. Trouble

    Trouble Noob Whisperer

    Joined:
    Nov 30, 2009
    Messages:
    13,845
    Likes Received:
    833
    I am not sure why you are launching afuwinx64, (which I believe stands for American MegaTrends Inc. Flash Update Utility for Windows 64bit version) when you have said that you have already flashed you MoBo Bios with the latest from MSI. Secondly did you read the readme files and PDFs that came with that link, especially how to identify your BIOS (AMI vs. Aptio same vendor slightly different requiring a different flash update utility) there are explanations as to how to make the uitility work included in the text files and userguides in the form of PDFs and they tell you what files need to be where. But Again if your BIOS is the most current version then why are you even trying to run either or both. And third, you don't actually run a .sys file, do a search for ucorew64.sys, identify where it is located (in what folder) rename it to ucorew64.OLD and then replace it with the ucorew64.sys with the newer date included in the link I sent you.
    And as always, especially since you seemed concerned about "I'll mess anything up", protect your critical data with a full backup to a second internal or external hard drive.
     
  11. Trouble

    Trouble Noob Whisperer

    Joined:
    Nov 30, 2009
    Messages:
    13,845
    Likes Received:
    833
    Additionally rechecking your OP, it looks like your memory is a little out of whack, although cybercore didn't mention anything about it so I'm not sure that I'm interpretting the CPU-Z screens correctly but, go back and read this thread and include the CPU-Z screen shots for the memory tab as well as all SPD tab /slots that actually contain a stick of memory and the RamMon html report, you'll need to zip it even though it's tiny since the site doesn't support uploading html files.
    And go back to the SF Diagnotic Tool (right click it and choose run as administrator) run every button and zip up the folder on your desktop and include everything don't edit or remove any of the files, there may be additional information in there that may shed some additional light on the subject.
     
  12. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    Oh god lol, I am truly terrible at this.. >< sry for being such a noob, and thanks for explaining it to me. Read from google 150 times and apparently I misunderstood stuff, by a mile..

    Thats also weird, as I couldnt find it with search before or after.

    Edit; attached the things you asked for. But a big note; after I updated my BIOS my whole comp is back to default settings. Meaning my CPU is running at 3,4ghz and my RAM is at stock 1333mhz(?) Dont know, might fix some stuff.. and if it did, Ill never OC anything ever again :( It blows knowing your comp can BSOD any second, doesnt matter what you're doing..

    edit2; I use all 4 memory slots (4x2gb), and they are identical in SPD. Reason why I only posted 1 picture.
     

    Attached Files:

    #12 TazZy, Mar 19, 2011
    Last edited: Mar 19, 2011
  13. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    1.
    That's not at stock! According to Corsair, CMX4GX3M2A1600C9 is rated 1600MHz, 9-9-9-24, 1.65V. Enable XMP in bios, and set the frequency, latency, and the voltage manually.




    2. Update the driver for the bios updater since it's old and is cited as the causer in most of your crash dumps:

    UCOREW64.SYS Tue Apr 22 07:01:50 2008




    Or uninstall it and use a different method to flash bios.





    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031911-25272-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
    Debug session time: Sat Mar 19 14:10:13.873 2011 (UTC - 4:00)
    System Uptime: 0 days 0:49:50.481
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C1, {fffff980236e8fe0, fffff980236e8ff4, d10014, 24}
    
    Unable to load image UCOREW64.SYS, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for UCOREW64.SYS
    *** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
    Probably caused by : UCOREW64.SYS ( UCOREW64+152b )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
    Special pool has detected memory corruption.  Typically the current thread's
    stack backtrace will reveal the guilty party.
    Arguments:
    Arg1: fffff980236e8fe0, address trying to free
    Arg2: fffff980236e8ff4, address where bits are corrupted
    Arg3: 0000000000d10014, (reserved)
    Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xC1_24
    
    SPECIAL_POOL_CORRUPTION_TYPE:  24
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  AFUWIN.EXE
    
    CURRENT_IRQL:  1
    
    IRP_ADDRESS:  fffff9802377ef3b
    
    LAST_CONTROL_TRANSFER:  from fffff80002f9ae14 to fffff80002e9c640
    
    STACK_TEXT:  
    fffff880`0bad24b8 fffff800`02f9ae14 : 00000000`000000c1 fffff980`236e8fe0 fffff980`236e8ff4 00000000`00d10014 : nt!KeBugCheckEx
    fffff880`0bad24c0 fffff800`02fc693b : fffff800`02e1c000 00000000`20206f49 00000000`0009ca09 fffffa80`08f30e00 : nt!MmFreeSpecialPool+0x374
    fffff880`0bad2600 fffff800`02eb1afe : 00000000`00000000 fffff980`2377efb0 fffff980`0327ee50 fffff980`2597efb0 : nt!ExDeferredFreePool+0xf33
    fffff880`0bad26b0 fffff800`02e9fdbf : fffff980`2377efb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
    fffff880`0bad2780 fffff800`0333919f : fffff980`2377eee0 fffffa80`08436d00 fffff980`2377ef00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
    fffff880`0bad2860 fffff880`0979052b : fffff880`0978f8f0 fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 : nt!IovCompleteRequest+0x19f
    fffff880`0bad2930 fffff880`0978f8f0 : fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 : UCOREW64+0x152b
    fffff880`0bad2938 fffff980`2377eee0 : fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 : UCOREW64+0x8f0
    fffff880`0bad2940 fffff980`2377eee0 : fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 : 0xfffff980`2377eee0
    fffff880`0bad2948 fffff980`2377efb0 : 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 : 0xfffff980`2377eee0
    fffff880`0bad2950 00000000`00000014 : fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 : 0xfffff980`2377efb0
    fffff880`0bad2958 fffff880`0bad2970 : fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 : 0x14
    fffff880`0bad2960 fffffa80`08436d10 : fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 00000000`00000001 : 0xfffff880`0bad2970
    fffff880`0bad2968 fffff800`031b6f97 : fffff880`00000018 fffff800`0332c2a7 00000000`00000001 fffffa80`08df6560 : 0xfffffa80`08436d10
    fffff880`0bad2970 fffffa80`08f30e50 : 00000000`00000000 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 : nt!IopXxxControlFile+0x607
    fffff880`0bad2aa0 00000000`00000000 : 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 00000000`00000000 : 0xfffffa80`08f30e50
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    UCOREW64+152b
    fffff880`0979052b ??              ???
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  UCOREW64+152b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: UCOREW64
    
    IMAGE_NAME:  UCOREW64.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  480dc59e
    
    FAILURE_BUCKET_ID:  X64_0xC1_24_UCOREW64+152b
    
    BUCKET_ID:  X64_0xC1_24_UCOREW64+152b
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031911-26083-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e00000 PsLoadedModuleList = 0xfffff800`03045e90
    Debug session time: Sat Mar 19 11:25:22.285 2011 (UTC - 4:00)
    System Uptime: 0 days 21:43:46.892
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ...........................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c000001d, fffff80002e87c7d, fffff88008d15210, 0}
    
    Probably caused by : hardware ( nt!KiSearchForNewThread+6d )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c000001d, Exception code that caused the bugcheck
    Arg2: fffff80002e87c7d, Address of the instruction which caused the bugcheck
    Arg3: fffff88008d15210, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION}  Illegal Instruction  An attempt was made to execute an illegal instruction.
    
    FAULTING_IP: 
    nt!KiSearchForNewThread+6d
    fffff800`02e87c7d 58              pop     rax
    
    CONTEXT:  fffff88008d15210 -- (.cxr 0xfffff88008d15210)
    rax=0000000000000002 rbx=0000000000000000 rcx=0000000000004180
    rdx=0000000000000004 rsi=fffff80002e00000 rdi=fffff88002f64180
    rip=fffff80002e87c7d rsp=fffff88008d15bf0 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=fffff88002f64180 r12=0000000000000000 r13=00012ad616ff09c0
    r14=0000000000000000 r15=fffffa80091d2168
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    nt!KiSearchForNewThread+0x6d:
    fffff800`02e87c7d 58              pop     rax
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  2
    
    MISALIGNED_IP: 
    nt!KiSearchForNewThread+6d
    fffff800`02e87c7d 58              pop     rax
    
    TRAP_FRAME:  fffff88008d15a60 -- (.trap 0xfffff88008d15a60)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=0000000000004180
    rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002e87c7d rsp=fffff88008d15bf0 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=fffff88002f64180 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiSearchForNewThread+0x6d:
    fffff800`02e87c7d 58              pop     rax
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff88008d159b8 -- (.exr 0xfffff88008d159b8)
    ExceptionAddress: fffff80002e87c7d (nt!KiSearchForNewThread+0x000000000000006d)
       ExceptionCode: c000001d (Illegal instruction)
      ExceptionFlags: 00000000
    NumberParameters: 0
    
    LAST_CONTROL_TRANSFER:  from fffff80002e8593c to fffff80002e87c7d
    
    STACK_TEXT:  
    fffff880`08d15bf0 fffff800`02e8593c : 00000000`00000000 fffffa80`091d2060 80000001`728a4963 fffff6fc`50010008 : nt!KiSearchForNewThread+0x6d
    fffff880`08d15c60 fffff800`02e881af : fffff6fc`50010008 fffff800`02e9e25f 00000000`00000000 86c00001`728a4882 : nt!KiCommitThreadWait+0x17c
    fffff880`08d15cf0 fffff800`02e72443 : fffffa80`091d2000 fffff880`0000001c 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x19f
    fffff880`08d15d90 fffff800`02e8f08a : 00000202`0018002b fffff880`00000000 89b00001`7e857882 00000000`00000002 : nt!ExfAcquirePushLockExclusive+0x188
    fffff880`08d15e10 fffff800`02e7e76e : 00000000`00000000 fffff8a0`0a7fa18e 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1a6a
    fffff880`08d15f70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    
    
    FOLLOWUP_IP: 
    nt!KiSearchForNewThread+6d
    fffff800`02e87c7d 58              pop     rax
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiSearchForNewThread+6d
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    STACK_COMMAND:  .cxr 0xfffff88008d15210 ; kb
    
    MODULE_NAME: hardware
    
    FAILURE_BUCKET_ID:  X64_IP_MISALIGNED
    
    BUCKET_ID:  X64_IP_MISALIGNED
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031911-25942-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e68000 PsLoadedModuleList = 0xfffff800`030ade90
    Debug session time: Sat Mar 19 13:14:34.487 2011 (UTC - 4:00)
    System Uptime: 0 days 1:17:45.704
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ..................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffff80003202f97, 0, 0, fffff80002f12a52}
    
    Probably caused by : NETIO.SYS ( NETIO!NsiGetAllParametersEx+258 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffff80003202f97, memory referenced
    Arg2: 0000000000000000, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002f12a52, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031190e8
     fffff80003202f97 
    
    CURRENT_IRQL:  0
    
    FAULTING_IP: 
    nt!RtlDispatchException+122
    fffff800`02f12a52 410fb60c24      movzx   ecx,byte ptr [r12]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff8800a08fca0 -- (.trap 0xfffff8800a08fca0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000058000000000 rbx=0000000000000000 rcx=007ffffc00018e90
    rdx=fffff6fc00018e90 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002fe68f4 rsp=fffff8800a08fe30 rbp=0000000000000001
     r8=00008a8000095760  r9=0000000000000001 r10=000000000a0c8a40
    r11=fffff8800a08ff40 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!MiEmptyWorkingSet+0x1e4:
    fffff800`02fe68f4 6645394818      cmp     word ptr [r8+18h],r9w ds:bd00:00008a80`00095778=????
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff8800a08fbf8 -- (.exr 0xfffff8800a08fbf8)
    ExceptionAddress: fffff80002fe68f4 (nt!MiEmptyWorkingSet+0x00000000000001e4)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    LAST_CONTROL_TRANSFER:  from fffff80002ee7be9 to fffff80002ee8640
    
    STACK_TEXT:  
    fffff880`0a08ea68 fffff800`02ee7be9 : 00000000`0000000a fffff800`03202f97 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0a08ea70 fffff800`02ee6860 : 00000000`00000000 fffff800`03202f97 e5e5e5e5`e5e5e500 00000000`00000607 : nt!KiBugCheckDispatch+0x69
    fffff880`0a08ebb0 fffff800`02f12a52 : fffff800`03202f97 fffff880`0a08ed88 fffff880`0a08fbf8 fffff800`02e68000 : nt!KiPageFault+0x260
    fffff880`0a08ed40 fffff800`02f23dc1 : fffff880`0a08fbf8 fffff880`0a08f450 fffff880`00000000 00000000`00000007 : nt!RtlDispatchException+0x122
    fffff880`0a08f420 fffff800`02ee7cc2 : fffff880`0a08fbf8 ffffffff`ffffffff fffff880`0a08fca0 fffff800`0306cec0 : nt!KiDispatchException+0x135
    fffff880`0a08fac0 fffff800`02ee65ca : fffff8a0`0140f000 fffff8a0`00f50000 fffff8a0`01a8f000 fffff8a0`1c4fa000 : nt!KiExceptionDispatch+0xc2
    fffff880`0a08fca0 fffff800`02fe68f4 : 00000003`00000000 ffffffff`ffffffff 00000000`00000000 fffff800`0306cec0 : nt!KiGeneralProtectionFault+0x10a
    fffff880`0a08fe30 fffff800`02fe7f57 : fffffa80`0a0c8a40 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!MiEmptyWorkingSet+0x1e4
    fffff880`0a08fee0 fffff800`03386261 : 00000000`00000000 fffffa80`07554202 00000000`00000000 fffff880`0a090210 : nt!MiTrimAllSystemPagableMemory+0x218
    fffff880`0a08ff40 fffff800`033863bf : fffffa80`07554202 fffffa80`0699b298 fffffa80`0699b298 00000000`00000000 : nt!MmVerifierTrimMemory+0xf1
    fffff880`0a08ff70 fffff800`03386b14 : fffffa80`07554200 fffffa80`075541a0 00000000`00000000 00000000`00000000 : nt!ViKeRaiseIrqlSanityChecks+0xcf
    fffff880`0a08ffb0 fffff880`0145525e : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!VerifierKeAcquireSpinLockRaiseToDpc+0x54
    fffff880`0a090010 fffff880`014587f3 : fffffa80`07554100 fffff880`0a090210 fffff980`05d10c90 fffffa80`08e4ccd0 : ndis!ndisQueueRequestOnTop+0x7e
    fffff880`0a0900b0 fffff880`01458a63 : fffff980`062ac800 fffffa80`075541a0 fffff980`05d10c90 fffff980`062ac8c8 : ndis!ndisQuerySetMiniportEx+0x143
    fffff880`0a090120 fffff880`01457409 : 00000000`00000005 00001f80`00f102a0 00000000`00001f80 fffff880`0a090598 : ndis!ndisIfGetMiniportStatistics+0x163
    fffff880`0a090350 fffff880`01457807 : 00000000`00000000 fffff800`02fa1ac3 fffffa80`0699afd0 fffff880`00000008 : ndis!ndisIfQueryObject+0x389
    fffff880`0a0904e0 fffff880`01456cad : fffff980`01394870 fffff980`05790870 fffff880`0a0905c0 00060000`00000000 : ndis!ndisNsiGetInterfaceRodInformation+0x207
    fffff880`0a090580 fffff880`0154bc18 : 00000000`00000000 fffff880`01593301 00000000`00000001 fffff980`062ac800 : ndis!ndisNsiGetAllInterfaceInformation+0x42e
    fffff880`0a090640 fffff880`040749d6 : 00000000`01b6eba0 fffffa80`081e29c0 fffff980`062ac800 00000000`01b6eba0 : NETIO!NsiGetAllParametersEx+0x258
    fffff880`0a090750 fffff880`04076902 : fffff980`0635efb0 fffff980`0635efb0 fffff980`00000001 fffff980`0635ef18 : nsiproxy!NsippGetAllParameters+0x2b2
    fffff880`0a090940 fffff880`040769db : 00000000`00000000 00000000`00000001 fffff980`0635eff8 fffffa80`0791a6e0 : nsiproxy!NsippDispatchDeviceControl+0x8a
    fffff880`0a090980 fffff800`0338bc16 : fffff980`0635eee0 fffffa80`08b52060 fffffa80`09bcf8d0 fffffa80`06ae5f98 : nsiproxy!NsippDispatch+0x4b
    fffff880`0a0909b0 fffff800`03202f97 : fffffa80`09bcf8d0 fffff880`0a090ca0 fffffa80`09bcf8d0 fffffa80`0791a6e0 : nt!IovCallDriver+0x566
    fffff880`0a090a10 fffff800`032037f6 : 00000000`01b6ea20 00000000`00000838 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
    fffff880`0a090b40 fffff800`02ee78d3 : fffffa80`0a0c8a40 00000000`01b6ea08 fffff880`0a090bc8 00000000`00000001 : nt!NtDeviceIoControlFile+0x56
    fffff880`0a090bb0 00000000`777f138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`01b6ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777f138a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NsiGetAllParametersEx+258
    fffff880`0154bc18 8bf8            mov     edi,eax
    
    SYMBOL_STACK_INDEX:  12
    
    SYMBOL_NAME:  NETIO!NsiGetAllParametersEx+258
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xA_NETIO!NsiGetAllParametersEx+258
    
    BUCKET_ID:  X64_0xA_NETIO!NsiGetAllParametersEx+258
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031911-24788-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e15000 PsLoadedModuleList = 0xfffff800`0305ae90
    Debug session time: Sat Mar 19 13:19:15.455 2011 (UTC - 4:00)
    System Uptime: 0 days 0:04:10.062
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C1, {fffff9801a224fe0, fffff9801a224ff4, 9d0014, 24}
    
    Unable to load image UCOREW64.SYS, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for UCOREW64.SYS
    *** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
    Probably caused by : UCOREW64.SYS ( UCOREW64+152b )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
    Special pool has detected memory corruption.  Typically the current thread's
    stack backtrace will reveal the guilty party.
    Arguments:
    Arg1: fffff9801a224fe0, address trying to free
    Arg2: fffff9801a224ff4, address where bits are corrupted
    Arg3: 00000000009d0014, (reserved)
    Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xC1_24
    
    SPECIAL_POOL_CORRUPTION_TYPE:  24
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  AFUWIN.EXE
    
    CURRENT_IRQL:  1
    
    IRP_ADDRESS:  fffff9801715cf3b
    
    LAST_CONTROL_TRANSFER:  from fffff80002f93e14 to fffff80002e95640
    
    STACK_TEXT:  
    fffff880`0b4aa4b8 fffff800`02f93e14 : 00000000`000000c1 fffff980`1a224fe0 fffff980`1a224ff4 00000000`009d0014 : nt!KeBugCheckEx
    fffff880`0b4aa4c0 fffff800`02fbf93b : fffff800`02e15000 00000000`20206f49 00000000`0001d483 fffffa80`0a26e690 : nt!MmFreeSpecialPool+0x374
    fffff880`0b4aa600 fffff800`02eaaafe : 00000000`00000000 fffff980`1715cfb0 fffff980`02e5cce0 fffff980`1a35ce50 : nt!ExDeferredFreePool+0xf33
    fffff880`0b4aa6b0 fffff800`02e98dbf : fffff980`1715cfb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
    fffff880`0b4aa780 fffff800`0333219f : fffff980`1715cee0 fffffa80`09c13900 fffff980`1715cf00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
    fffff880`0b4aa860 fffff880`0d4f352b : fffff880`0d4f28f0 fffff980`1715cee0 fffff980`1715cee0 fffff980`1715cfb0 : nt!IovCompleteRequest+0x19f
    fffff880`0b4aa930 fffff880`0d4f28f0 : fffff980`1715cee0 fffff980`1715cee0 fffff980`1715cfb0 00000000`00000014 : UCOREW64+0x152b
    fffff880`0b4aa938 fffff980`1715cee0 : fffff980`1715cee0 fffff980`1715cfb0 00000000`00000014 fffff880`0b4aa970 : UCOREW64+0x8f0
    fffff880`0b4aa940 fffff980`1715cee0 : fffff980`1715cfb0 00000000`00000014 fffff880`0b4aa970 fffffa80`09c13990 : 0xfffff980`1715cee0
    fffff880`0b4aa948 fffff980`1715cfb0 : 00000000`00000014 fffff880`0b4aa970 fffffa80`09c13990 fffff800`031aff97 : 0xfffff980`1715cee0
    fffff880`0b4aa950 00000000`00000014 : fffff880`0b4aa970 fffffa80`09c13990 fffff800`031aff97 fffff880`00000018 : 0xfffff980`1715cfb0
    fffff880`0b4aa958 fffff880`0b4aa970 : fffffa80`09c13990 fffff800`031aff97 fffff880`00000018 fffff800`033252a7 : 0x14
    fffff880`0b4aa960 fffffa80`09c13990 : fffff800`031aff97 fffff880`00000018 fffff800`033252a7 00000000`00000001 : 0xfffff880`0b4aa970
    fffff880`0b4aa968 fffff800`031aff97 : fffff880`00000018 fffff800`033252a7 00000000`00000001 fffffa80`09960bb0 : 0xfffffa80`09c13990
    fffff880`0b4aa970 fffffa80`0a26e6e0 : 00000000`00000000 0012019f`00000000 fffffa80`0a26e740 fffff980`1a224fe0 : nt!IopXxxControlFile+0x607
    fffff880`0b4aaaa0 00000000`00000000 : 0012019f`00000000 fffffa80`0a26e740 fffff980`1a224fe0 00000000`00000000 : 0xfffffa80`0a26e6e0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    UCOREW64+152b
    fffff880`0d4f352b ??              ???
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  UCOREW64+152b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: UCOREW64
    
    IMAGE_NAME:  UCOREW64.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  480dc59e
    
    FAILURE_BUCKET_ID:  X64_0xC1_24_UCOREW64+152b
    
    BUCKET_ID:  X64_0xC1_24_UCOREW64+152b
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031911-23743-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
    Debug session time: Sat Mar 19 11:44:50.165 2011 (UTC - 4:00)
    System Uptime: 0 days 0:03:12.773
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c000001d, fffff80002e9eafd, fffff8800a054130, 0}
    
    Probably caused by : win32k.sys ( win32k!NtUserDispatchMessage+72 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c000001d, Exception code that caused the bugcheck
    Arg2: fffff80002e9eafd, Address of the instruction which caused the bugcheck
    Arg3: fffff8800a054130, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION}  Illegal Instruction  An attempt was made to execute an illegal instruction.
    
    FAULTING_IP: 
    nt!ExpReleaseResourceForThreadLite+17d
    fffff800`02e9eafd 85c0            test    eax,eax
    
    CONTEXT:  fffff8800a054130 -- (.cxr 0xfffff8800a054130)
    rax=00000000000a0000 rbx=fffffa800982c520 rcx=0000000000000000
    rdx=fffffa800a2d66b0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002e9eafd rsp=fffff8800a054b10 rbp=fffffa800a2d66b0
     r8=0000000000000000  r9=0000000000000000 r10=fffff8800a054880
    r11=fffff8800a054b80 r12=fffff88002fd5180 r13=fffffa800a2d66b0
    r14=00000000001ce700 r15=00000000739a2450
    iopl=0         nv up di pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010046
    nt!ExpReleaseResourceForThreadLite+0x17d:
    fffff800`02e9eafd 85c0            test    eax,eax
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  msnmsgr.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002ea635a to fffff80002e9eafd
    
    STACK_TEXT:  
    fffff880`0a054b10 fffff800`02ea635a : 00000000`00000020 00000000`739a2450 00000000`00000000 00000000`001cfd20 : nt!ExpReleaseResourceForThreadLite+0x17d
    fffff880`0a054b70 fffff960`00139922 : 00000000`001cde80 fffff880`0a054ca0 00000000`00000000 fffff800`02ea635a : nt!ExReleaseResourceAndLeavePriorityRegion+0x12
    fffff880`0a054ba0 fffff800`02e9b8d3 : fffffa80`0a2d66b0 fffff880`0a054ca0 00000000`00000000 fffffa80`08224be0 : win32k!NtUserDispatchMessage+0x72
    fffff880`0a054c20 00000000`739eff2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`001cde08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739eff2a
    
    
    FOLLOWUP_IP: 
    win32k!NtUserDispatchMessage+72
    fffff960`00139922 488bc3          mov     rax,rbx
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  win32k!NtUserDispatchMessage+72
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d2415ea
    
    STACK_COMMAND:  .cxr 0xfffff8800a054130 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_VRF_win32k!NtUserDispatchMessage+72
    
    BUCKET_ID:  X64_0x3B_VRF_win32k!NtUserDispatchMessage+72
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031911-22963-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e0b000 PsLoadedModuleList = 0xfffff800`03050e90
    Debug session time: Sat Mar 19 16:56:47.643 2011 (UTC - 4:00)
    System Uptime: 0 days 0:11:05.297
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C1, {fffff98021834fe0, fffff98021834ff4, 970014, 24}
    
    Unable to load image UCOREW64.SYS, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for UCOREW64.SYS
    *** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
    Probably caused by : UCOREW64.SYS ( UCOREW64+152b )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
    Special pool has detected memory corruption.  Typically the current thread's
    stack backtrace will reveal the guilty party.
    Arguments:
    Arg1: fffff98021834fe0, address trying to free
    Arg2: fffff98021834ff4, address where bits are corrupted
    Arg3: 0000000000970014, (reserved)
    Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xC1_24
    
    SPECIAL_POOL_CORRUPTION_TYPE:  24
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  AFUWINx64.exe
    
    CURRENT_IRQL:  1
    
    IRP_ADDRESS:  fffff98021050f3b
    
    LAST_CONTROL_TRANSFER:  from fffff80002f89e14 to fffff80002e8b640
    
    STACK_TEXT:  
    fffff880`08c254b8 fffff800`02f89e14 : 00000000`000000c1 fffff980`21834fe0 fffff980`21834ff4 00000000`00970014 : nt!KeBugCheckEx
    fffff880`08c254c0 fffff800`02fb593b : fffff800`02e0b000 00000000`20206f49 00000000`0002d07a fffffa80`0889d300 : nt!MmFreeSpecialPool+0x374
    fffff880`08c25600 fffff800`02ea0afe : 00000000`00000000 fffff980`21050fb0 fffff980`02a50ce0 fffff980`22150ee0 : nt!ExDeferredFreePool+0xf33
    fffff880`08c256b0 fffff800`02e8edbf : fffff980`21050fb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
    fffff880`08c25780 fffff800`0332819f : fffff980`21050ee0 fffffa80`08857300 fffff980`21050f00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
    fffff880`08c25860 fffff880`0944952b : fffff880`094488f0 fffff980`21050ee0 fffff980`21050ee0 fffff980`21050fb0 : nt!IovCompleteRequest+0x19f
    fffff880`08c25930 fffff880`094488f0 : fffff980`21050ee0 fffff980`21050ee0 fffff980`21050fb0 00000000`00000014 : UCOREW64+0x152b
    fffff880`08c25938 fffff980`21050ee0 : fffff980`21050ee0 fffff980`21050fb0 00000000`00000014 fffff880`08c25970 : UCOREW64+0x8f0
    fffff880`08c25940 fffff980`21050ee0 : fffff980`21050fb0 00000000`00000014 fffff880`08c25970 fffffa80`08857320 : 0xfffff980`21050ee0
    fffff880`08c25948 fffff980`21050fb0 : 00000000`00000014 fffff880`08c25970 fffffa80`08857320 fffff800`031a5f97 : 0xfffff980`21050ee0
    fffff880`08c25950 00000000`00000014 : fffff880`08c25970 fffffa80`08857320 fffff800`031a5f97 fffff880`00000018 : 0xfffff980`21050fb0
    fffff880`08c25958 fffff880`08c25970 : fffffa80`08857320 fffff800`031a5f97 fffff880`00000018 fffff800`0331b2a7 : 0x14
    fffff880`08c25960 fffffa80`08857320 : fffff800`031a5f97 fffff880`00000018 fffff800`0331b2a7 00000000`00000001 : 0xfffff880`08c25970
    fffff880`08c25968 fffff800`031a5f97 : fffff880`00000018 fffff800`0331b2a7 00000000`00000001 fffffa80`099cb5c0 : 0xfffffa80`08857320
    fffff880`08c25970 fffffa80`0889d350 : 00000000`00000000 0012019f`00000000 fffffa80`0889d3b0 fffff980`21834fe0 : nt!IopXxxControlFile+0x607
    fffff880`08c25aa0 00000000`00000000 : 0012019f`00000000 fffffa80`0889d3b0 fffff980`21834fe0 00000000`00000000 : 0xfffffa80`0889d350
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    UCOREW64+152b
    fffff880`0944952b ??              ???
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  UCOREW64+152b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: UCOREW64
    
    IMAGE_NAME:  UCOREW64.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  480dc59e
    
    FAILURE_BUCKET_ID:  X64_0xC1_24_UCOREW64+152b
    
    BUCKET_ID:  X64_0xC1_24_UCOREW64+152b
    
    Followup: MachineOwner
    ---------
    
    
    
    


    DRIVERS

    Code:
    start             end                 module name
    fffff880`09567000 fffff880`095a5000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
    fffff880`00f8d000 fffff880`00fe4000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`04025000 fffff880`040ae000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`13d7e000 fffff880`13d94000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`06b13000 fffff880`06b28000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00c3e000 fffff880`00c49000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`00ecd000 fffff880`00ed6000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00c14000 fffff880`00c3e000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff880`07852000 fffff880`0786f000   avgntflt avgntflt.sys Thu Nov 11 10:59:48 2010 (4CDC12F4)
    fffff880`06acb000 fffff880`06aed000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
    fffff880`019e5000 fffff880`019ec000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`06aba000 fffff880`06acb000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`08ef2000 fffff880`08f10000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00670000 fffff960`00697000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
    fffff880`0142b000 fffff880`01455000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00cda000 fffff880`00d9a000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`01976000 fffff880`019a6000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00c7c000 fffff880`00cda000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01000000 fffff880`01072000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`13d6e000 fffff880`13d7e000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`08fc6000 fffff880`08fcf000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
    fffff880`07946000 fffff880`07954000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`06a19000 fffff880`06a9c000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
    fffff880`06a9c000 fffff880`06aba000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`041d7000 fffff880`041e6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01960000 fffff880`01976000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`06bd2000 fffff880`06bf4000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`0414e000 fffff880`04191000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
    fffff880`07960000 fffff880`07969000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`07954000 fffff880`07960000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`07969000 fffff880`0797c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`07999000 fffff880`079a5000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`02cca000 fffff880`02dbe000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`02c00000 fffff880`02c46000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`019a6000 fffff880`019dc000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`01133000 fffff880`01147000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010e7000 fffff880`01133000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`0122c000 fffff880`01236000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01926000 fffff880`01960000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`01823000 fffff880`0186d000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff800`033f5000 fffff800`0343e000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`02c46000 fffff880`02c6a000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`078ea000 fffff880`07946000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
    fffff880`079c3000 fffff880`079dc000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`079dc000 fffff880`079e4080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`079b5000 fffff880`079c3000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`08e29000 fffff880`08ef2000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`0191d000 fffff880`01926000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`02dbe000 fffff880`02ddc000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`07890000 fffff880`078b3000   irda     irda.sys     Mon Jul 13 20:09:01 2009 (4A5BCC9D)
    fffff880`02ddc000 fffff880`02deb000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00bad000 fffff800`00bb7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`13070000 fffff880`130b3000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`01200000 fffff880`0121b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`130b3000 fffff880`130b8200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`079e5000 fffff880`079fa000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
    fffff880`078b3000 fffff880`078c8000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0780d000 fffff880`07821000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
    fffff880`0782f000 fffff880`07852000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`079a5000 fffff880`079b5000   LUsbFilt LUsbFilt.Sys Tue Aug 24 13:21:47 2010 (4C73FFAB)
    fffff880`00c5b000 fffff880`00c68000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`07821000 fffff880`0782f000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`13061000 fffff880`13070000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`07800000 fffff880`0780d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00daa000 fffff880`00dc4000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`08f10000 fffff880`08f28000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`08f28000 fffff880`08f55000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
    fffff880`08f55000 fffff880`08fa2000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
    fffff880`08fa2000 fffff880`08fc6000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
    fffff880`0148c000 fffff880`01497000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0955a000 fffff880`09567000   msibios64_100507 msibios64_100507.sys Fri May 07 05:17:12 2010 (4BE3DA98)
    fffff880`00fed000 fffff880`00ff7000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01147000 fffff880`011a5000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`041cc000 fffff880`041d7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`0190b000 fffff880`0191d000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01498000 fffff880`0158b000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`13db8000 fffff880`13dc4000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`13dc4000 fffff880`13df3000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`06b94000 fffff880`06ba9000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`04122000 fffff880`04131000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`040ae000 fffff880`040f3000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`0158b000 fffff880`015eb000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`015eb000 fffff880`015fc000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`041c0000 fffff880`041cc000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02e0b000 fffff800`033f5000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01245000 fffff880`013e8000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
    fffff880`09553000 fffff880`0955a000   NTIOLib_X64 NTIOLib_X64.sys Wed Oct 20 02:45:49 2010 (4CBE901D)
    fffff880`019dc000 fffff880`019e5000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`09430000 fffff880`09448000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
    fffff880`09400000 fffff880`09430000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
    fffff880`13d16000 fffff880`13d17180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
    fffff880`06ba9000 fffff880`06bd2000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
    fffff880`130bb000 fffff880`13d15d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
    fffff880`040fc000 fffff880`04122000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`00ec6000 fffff880`00ecd000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00d9a000 fffff880`00daa000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121b000 fffff880`0122c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`09009000 fffff880`090af000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`011a5000 fffff880`011e2000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c68000 fffff880`00c7c000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`13d94000 fffff880`13db8000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`13000000 fffff880`1301b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`1301b000 fffff880`1303c000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`1303c000 fffff880`13056000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`01094000 fffff880`010e5000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`13056000 fffff880`13061000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01610000 fffff880`01619000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0147a000 fffff880`01483000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01483000 fffff880`0148c000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`018d1000 fffff880`0190b000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`078c8000 fffff880`078e0000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`095a5000 fffff880`095fb000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`090af000 fffff880`090ba000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`02deb000 fffff880`02df7000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04131000 fffff880`0414e000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`018c9000 fffff880`018d1000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`09168000 fffff880`091d9000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`09489000 fffff880`09522000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
    fffff880`090fd000 fffff880`09168000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
    fffff880`090ba000 fffff880`090eb000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
    fffff880`02cc4000 fffff880`02cc5480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`0161f000 fffff880`01823000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`090eb000 fffff880`090fd000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
    fffff880`01236000 fffff880`01243000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`01072000 fffff880`01094000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`041ac000 fffff880`041c0000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00520000 fffff960`0052a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`06aed000 fffff880`06b13000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`09448000 fffff880`09449f00   UCOREW64 UCOREW64.SYS Tue Apr 22 07:01:50 2008 (480DC59E)
    fffff880`06b28000 fffff880`06b3a000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`07997000 fffff880`07998f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`02cb3000 fffff880`02cc4000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`06b3a000 fffff880`06b94000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`02ca8000 fffff880`02cb3000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`13d18000 fffff880`13d6e000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`0797c000 fffff880`07997000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
    fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019ec000 fffff880`019fa000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01455000 fffff880`0147a000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00dc4000 fffff880`00e00000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
    fffff880`0186d000 fffff880`0187d000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
    fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00e6a000 fffff880`00ec6000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`0187d000 fffff880`018c9000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`04191000 fffff880`041ac000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`01600000 fffff880`01610000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00eda000 fffff880`00f7e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f7e000 fffff880`00f8d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`040f3000 fffff880`040fc000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00070000 fffff960`00381000   win32k   win32k.sys   Wed Jan 05 01:55:38 2011 (4D2415EA)
    fffff880`00c00000 fffff880`00c14000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
    fffff880`02df7000 fffff880`02e00000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00fe4000 fffff880`00fed000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0786f000 fffff880`07890000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    fffff880`09522000 fffff880`09553000   WUDFRd   WUDFRd.sys   Sat Nov 20 05:43:32 2010 (4CE7A654)
    
    Unloaded modules:
    fffff880`09168000 fffff880`091d9000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`02c6a000 fffff880`02ca8000   1394ohci.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0003E000
    fffff880`019a6000 fffff880`019b4000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`019b4000 fffff880`019c0000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`019c0000 fffff880`019c9000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`019c9000 fffff880`019dc000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  14. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    Did what trouble said "search for ucorew64.sys, identify where it is located (in what folder) rename it to ucorew64.OLD and then replace it with the ucorew64.sys with the newer date". Found the ucorew64.sys in C:/Program/MSI/Live Update/Flash Uty/AMI/AFUWIN.

    Thats it I hope?

    and this;
    "Enable XMP in bios, and set the frequency, latency, and the voltage manually.". Found in memory settings that XMP is supported, couldnt find where to enable it though. The frequency is at 1600mhz now, latency is auto at 9 (correct, right?) and the voltage according to bios is 1.65V.. But when I got into CPU-Z my stuff isnt that at all.. But when you say 9-9-9-24, should I manually set latency, delay, prechange to 9 and cycle time to 24 in bios?
     
  15. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    See my previous post:


    ---> Uninstall it:
    C:/Program/MSI/Live Update/Flash Uty/AMI/AFUWIN




    --> Set your memory frequency 1600 Mhz, timing 9-9-9-24, voltage 1.65, and leave other options on [Auto]. Save the new settings and reboot. Attach CPU-Z memory snap.
     
  16. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    Uninstalled MSI's live update, went into bios and set freq to 1600, though when it came to timings I could to 9-9-9 but not 24, the only option I had there was "auto".

    Saved and heres the CPU-Z Memory snap.
     

    Attached Files:

  17. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Now is 1600 9-9-9-29 --> should be -24. If your system crashes again, you need to revise your bios settings.
     
  18. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    Yeah I noticed.. :/ Weird thing though because I cannot change that one, just says auto.. The other settings I can change just fine thought :/
     
  19. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

    I sure saw you point in the previous post, and by "revise your bios settings" I mean look up the manual, take your time, because no one can know your bios better than yourself. It could be worth loading optimized defaults, but mind this will reset the entire bios.
     
  20. TazZy

    TazZy New Member

    Joined:
    Mar 19, 2011
    Messages:
    24
    Likes Received:
    0
    Set em to 9-9-9-24 and DRAM Voltage to 1.651 and I got a bsod, changed the voltage back to Auto and ima check now.
     

Share This Page

Loading...