Windows 7 Couple of BSODS - Alot of info attached.

TazZy

New Member
Hello, my name is Adam. First off, im really happy to have found these forums and I actually see people getting help here, because im in need of some. :(

DxDiag, Systeminfo, DriverList, WindowsUpdate & dumps attached in Seven Forums.zip

Specs;
MSI 890FXA-GD70 AM3
AMD Phenom II X4 965 3,4GHz Black Edition (OC'd to 4.2GHz)
Corsair Cooling Hydro H70 CPU-Cooler
Gigabyte GeForce GTX 460 1GB OC
x2 Corsair 4GB (2x2048MB) 1600MHz XMS3

Running Avira AntiVir Personal (Free verision). Can also point out that nothing in my comp has gone over 50 degrees in days. CPU/GPU/Mobo stays ~20-40 degrees 24/7.

My first 2 BSODS (031911-26083-01 & 031911-23743-01) - SYSTEM_SERVICE_EXCEPTION came randomly when browsing/listening to spotify and the other came after like 40mins of Heroes of Newerth. Note; Gotten another 4gb RAM the day earlier.

The 031911-25942-01 - IRQL_NOT_LESS_OR_EQUAL I cant recall what I did when it appeared.

And the 031911-24788-01 / 031911-25272-01 - SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION came when I tried to update my BIOS (tried 2 times). Weird thing about these 2 though is that the actual blue screen popped up for about a split second, not like the others that has their memory getting dumped or w/e.

During the past month I've been trying everything in order to make em go away, but it seems its impossible these days.. I sent in my motherboard and the current 4GB of ram (same brand as I got atm) a few weeks ago when I had enough and it turned out that it I had gotten corrupt memories from the beginning and I remember I had gotten similiar BSODS back then. They sent me a new pair that had been tested and they worked without giving me anymore blue screens, till now.

Can it be so fcked up/bad luck, that I have gotten 2/3 broken pairs of RAM from the start? That the new 2x2gb I just bought is corrupt aswell? I mean I guess that can happen if someone is really unlucky, but I would HIGHLY appreciate (maybe even donate) to whoever takes a look at my dumps and finds me a possible solution.

ANYTHING is hiiiiiiighly appreciated. Thanks in advance, much love. Adam
 

Attachments

  • Seven Forums.zip
    392.2 KB · Views: 694
  • Memory.png
    Memory.png
    27 KB · Views: 452
  • SPD.png
    SPD.png
    29.7 KB · Views: 496
Last edited:
Update AS Rock Flash Memory Writer
UCOREW64.SYS Tue Apr 22 07:01:50 2008




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-25272-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
Debug session time: Sat Mar 19 14:10:13.873 2011 (UTC - 4:00)
System Uptime: 0 days 0:49:50.481
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C1, {fffff980236e8fe0, fffff980236e8ff4, d10014, 24}

Unable to load image UCOREW64.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for UCOREW64.SYS
*** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
Probably caused by : UCOREW64.SYS ( UCOREW64+152b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption.  Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff980236e8fe0, address trying to free
Arg2: fffff980236e8ff4, address where bits are corrupted
Arg3: 0000000000d10014, (reserved)
Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten

Debugging Details:
------------------


BUGCHECK_STR:  0xC1_24

SPECIAL_POOL_CORRUPTION_TYPE:  24

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  AFUWIN.EXE

CURRENT_IRQL:  1

IRP_ADDRESS:  fffff9802377ef3b

LAST_CONTROL_TRANSFER:  from fffff80002f9ae14 to fffff80002e9c640

STACK_TEXT:  
fffff880`0bad24b8 fffff800`02f9ae14 : 00000000`000000c1 fffff980`236e8fe0 fffff980`236e8ff4 00000000`00d10014 : nt!KeBugCheckEx
fffff880`0bad24c0 fffff800`02fc693b : fffff800`02e1c000 00000000`20206f49 00000000`0009ca09 fffffa80`08f30e00 : nt!MmFreeSpecialPool+0x374
fffff880`0bad2600 fffff800`02eb1afe : 00000000`00000000 fffff980`2377efb0 fffff980`0327ee50 fffff980`2597efb0 : nt!ExDeferredFreePool+0xf33
fffff880`0bad26b0 fffff800`02e9fdbf : fffff980`2377efb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
fffff880`0bad2780 fffff800`0333919f : fffff980`2377eee0 fffffa80`08436d00 fffff980`2377ef00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
fffff880`0bad2860 fffff880`0979052b : fffff880`0978f8f0 fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 : nt!IovCompleteRequest+0x19f
fffff880`0bad2930 fffff880`0978f8f0 : fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 : UCOREW64+0x152b
fffff880`0bad2938 fffff980`2377eee0 : fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 : UCOREW64+0x8f0
fffff880`0bad2940 fffff980`2377eee0 : fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 : 0xfffff980`2377eee0
fffff880`0bad2948 fffff980`2377efb0 : 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 : 0xfffff980`2377eee0
fffff880`0bad2950 00000000`00000014 : fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 : 0xfffff980`2377efb0
fffff880`0bad2958 fffff880`0bad2970 : fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 : 0x14
fffff880`0bad2960 fffffa80`08436d10 : fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 00000000`00000001 : 0xfffff880`0bad2970
fffff880`0bad2968 fffff800`031b6f97 : fffff880`00000018 fffff800`0332c2a7 00000000`00000001 fffffa80`08df6560 : 0xfffffa80`08436d10
fffff880`0bad2970 fffffa80`08f30e50 : 00000000`00000000 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 : nt!IopXxxControlFile+0x607
fffff880`0bad2aa0 00000000`00000000 : 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 00000000`00000000 : 0xfffffa80`08f30e50


STACK_COMMAND:  kb

FOLLOWUP_IP: 
UCOREW64+152b
fffff880`0979052b ??              ???

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  UCOREW64+152b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: UCOREW64

IMAGE_NAME:  UCOREW64.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  480dc59e

FAILURE_BUCKET_ID:  X64_0xC1_24_UCOREW64+152b

BUCKET_ID:  X64_0xC1_24_UCOREW64+152b

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`06c00000 fffff880`06c3e000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`00ee5000 fffff880`00f3c000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`0407d000 fffff880`04106000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`06ed9000 fffff880`06eef000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`06dc4000 fffff880`06dd9000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0105e000 fffff880`01069000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01034000 fffff880`0105e000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`09364000 fffff880`09381000   avgntflt avgntflt.sys Thu Nov 11 10:59:48 2010 (4CDC12F4)
fffff880`06d7c000 fffff880`06d9e000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
fffff880`019e0000 fffff880`019e7000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`06d6b000 fffff880`06d7c000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07fc7000 fffff880`07fe5000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006f0000 fffff960`00717000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`0148b000 fffff880`014b5000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00c9d000 fffff880`00d5d000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01971000 fffff880`019a1000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c3f000 fffff880`00c9d000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01127000 fffff880`01199000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`06ec9000 fffff880`06ed9000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`09287000 fffff880`09295000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`06cca000 fffff880`06d4d000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`06d4d000 fffff880`06d6b000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`04046000 fffff880`04055000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0195b000 fffff880`01971000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`07399000 fffff880`073bb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`041a6000 fffff880`041e9000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
fffff880`092a1000 fffff880`092aa000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`09295000 fffff880`092a1000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`092aa000 fffff880`092bd000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0927b000 fffff880`09287000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`13cb4000 fffff880`13da8000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`13da8000 fffff880`13dee000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`010b5000 fffff880`010c9000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01069000 fffff880`010b5000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`0122c000 fffff880`01236000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01921000 fffff880`0195b000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`0181e000 fffff880`01868000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`03406000 fffff800`0344f000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`13000000 fffff880`13024000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`0921f000 fffff880`0927b000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`092db000 fffff880`092f4000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`092f4000 fffff880`092fc080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`092cd000 fffff880`092db000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`07efe000 fffff880`07fc7000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01918000 fffff880`01921000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`06e87000 fffff880`06ea5000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`093a2000 fffff880`093c5000   irda     irda.sys     Mon Jul 13 20:09:01 2009 (4A5BCC9D)
fffff880`06ea5000 fffff880`06eb4000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bd3000 fffff800`00bdd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`07257000 fffff880`0729a000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`01200000 fffff880`0121b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`073bb000 fffff880`073c0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`092fd000 fffff880`09312000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`093c5000 fffff880`093da000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0931f000 fffff880`09333000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`09341000 fffff880`09364000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`092bd000 fffff880`092cd000   LUsbFilt LUsbFilt.Sys Tue Aug 24 13:21:47 2010 (4C73FFAB)
fffff880`00c1e000 fffff880`00c2b000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`09333000 fffff880`09341000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`06faf000 fffff880`06fbe000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`09312000 fffff880`0931f000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fd0000 fffff880`00fea000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`07fe5000 fffff880`07ffd000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07e00000 fffff880`07e2d000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`07e2d000 fffff880`07e7a000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`07e7a000 fffff880`07e9e000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`015e0000 fffff880`015eb000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`09782000 fffff880`0978f000   msibios64_100507 msibios64_100507.sys Fri May 07 05:17:12 2010 (4BE3DA98)
fffff880`00f45000 fffff880`00f4f000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010c9000 fffff880`01127000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`0403b000 fffff880`04046000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01906000 fffff880`01918000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014bf000 fffff880`015b2000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`06f13000 fffff880`06f1f000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`06f1f000 fffff880`06f4e000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`0731e000 fffff880`07333000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`0417a000 fffff880`04189000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04106000 fffff880`0414b000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`015eb000 fffff880`015fc000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0402f000 fffff880`0403b000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e1c000 fffff800`03406000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01259000 fffff880`013fc000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`0977b000 fffff880`09782000   NTIOLib_X64 NTIOLib_X64.sys Wed Oct 20 02:45:49 2010 (4CBE901D)
fffff880`019d7000 fffff880`019e0000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`072ac000 fffff880`072c4000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
fffff880`13024000 fffff880`13054000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
fffff880`13cb2000 fffff880`13cb3180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`07333000 fffff880`0735c000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`13057000 fffff880`13cb1d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`04154000 fffff880`0417a000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00f8f000 fffff880`00fa4000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f4f000 fffff880`00f82000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00fb9000 fffff880`00fc0000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fc0000 fffff880`00fd0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121b000 fffff880`0122c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`090a8000 fffff880`0914e000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0735c000 fffff880`07399000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c2b000 fffff880`00c3f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`06eef000 fffff880`06f13000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`06f4e000 fffff880`06f69000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`06f69000 fffff880`06f8a000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`06f8a000 fffff880`06fa4000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`011a6000 fffff880`011f7000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`06fa4000 fffff880`06faf000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01610000 fffff880`01619000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019f5000 fffff880`019fe000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015d7000 fffff880`015e0000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018cc000 fffff880`01906000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`093da000 fffff880`093f2000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06c3e000 fffff880`06c94000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`0914e000 fffff880`09159000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`06eb4000 fffff880`06ec0000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04189000 fffff880`041a6000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`018c4000 fffff880`018cc000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`09671000 fffff880`0970a000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`09000000 fffff880`0906b000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`09159000 fffff880`0918a000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`06fbe000 fffff880`06fbf480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`0161a000 fffff880`0181e000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`0918a000 fffff880`0919c000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`01199000 fffff880`011a6000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`01236000 fffff880`01258000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`0401b000 fffff880`0402f000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`06d9e000 fffff880`06dc4000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`0978f000 fffff880`09790f00   UCOREW64 UCOREW64.SYS Tue Apr 22 07:01:50 2008 (480DC59E)
fffff880`0729a000 fffff880`072ac000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`13054000 fffff880`13055f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`06e76000 fffff880`06e87000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`072c4000 fffff880`0731e000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`13dee000 fffff880`13df9000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`06e20000 fffff880`06e76000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f82000 fffff880`00f8f000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019e7000 fffff880`019f5000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`015b2000 fffff880`015d7000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00db9000 fffff880`00df5000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`01868000 fffff880`01878000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00fa4000 fffff880`00fb9000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00d5d000 fffff880`00db9000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01878000 fffff880`018c4000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`04000000 fffff880`0401b000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01600000 fffff880`01610000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e32000 fffff880`00ed6000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ed6000 fffff880`00ee5000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0414b000 fffff880`04154000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`00391000   win32k   win32k.sys   Wed Jan 05 01:55:38 2011 (4D2415EA)
fffff880`00fea000 fffff880`00ffe000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`06ec0000 fffff880`06ec9000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f3c000 fffff880`00f45000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`09381000 fffff880`093a2000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`0970a000 fffff880`0977b000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`019a1000 fffff880`019af000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019af000 fffff880`019bb000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`019bb000 fffff880`019c4000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`019c4000 fffff880`019d7000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Thanks for the fast answer :eek: So basicly I have to update my bios? But isnt Asrock a certain mobo-manufacturer? Ive got msi on mine ._. Dont really get it.
 
Ok, this driver causes your blue screens:

UCOREW64.SYS Tue Apr 22 07:01:50 2008




Which is your bios updater tool. The utility is old, causes ble screens, and therefore must be updated (before updating bios).
 
It seems that MSI uses something similar as part of it's live update utility. The ucorew64.sys is actually part of a bios update package for AMI BIOSs, which you can obtain from Link Removed - Invalid URL as part of the AFUWIN v4.xx package. The Ucorew64.sys included in that package reflects a date modified of 12/14/2010. Hope this helps and welcome to the forums.
Randy
 
Thanks Trouble.. But I dl'd that AFUWIN v4.xx package and all I get when trying to launch any updater is a blue screen.. so what I stupidly did was to put the latest bios from msi on a usb and I flashed it in bios :( Have a feeling I made things worse now though.

edit; ran the SF giagnostic tool, did the driverlist and now it seems the UCOREW64 isnt in the list anymore. Should I be happy?
 
Last edited:
Adam, sorry that didn't work for you, but I don't see how updating the BIOS to the latest version provided by the MotherBoard manufacturer could make things worse. When I provided the link above it was not intended to encourage a BIOS update but rather to provide a source for the latest version of the ucorew64.sys (that I could find) file which would allow you to find the old version (probably in the system32 folder) rename it and copy the newer version into the same folder, there by hopefully eliminating one possible cause of your blue screens.
 
Adam, sorry that didn't work for you, but I don't see how updating the BIOS to the latest version provided by the MotherBoard manufacturer could make things worse. When I provided the link above it was not intended to encourage a BIOS update but rather to provide a source for the latest version of the ucorew64.sys (that I could find) file which would allow you to find the old version (probably in the system32 folder) rename it and copy the newer version into the same folder, there by hopefully eliminating one possible cause of your blue screens.
Im just afraid ill mess anything up.. :/ But thats just the thing, I cant find the old one and I cant run the new one :(

attached 3 diff. blue screens I get when I try to launch that afuwinx64
 

Attachments

  • 031911-22744-01.zip
    85 KB · Views: 255
Last edited:
I am not sure why you are launching afuwinx64, (which I believe stands for American MegaTrends Inc. Flash Update Utility for Windows 64bit version) when you have said that you have already flashed you MoBo Bios with the latest from MSI. Secondly did you read the readme files and PDFs that came with that link, especially how to identify your BIOS (AMI vs. Aptio same vendor slightly different requiring a different flash update utility) there are explanations as to how to make the uitility work included in the text files and userguides in the form of PDFs and they tell you what files need to be where. But Again if your BIOS is the most current version then why are you even trying to run either or both. And third, you don't actually run a .sys file, do a search for ucorew64.sys, identify where it is located (in what folder) rename it to ucorew64.OLD and then replace it with the ucorew64.sys with the newer date included in the link I sent you.
And as always, especially since you seemed concerned about "I'll mess anything up", protect your critical data with a full backup to a second internal or external hard drive.
 
Additionally rechecking your OP, it looks like your memory is a little out of whack, although cybercore didn't mention anything about it so I'm not sure that I'm interpretting the CPU-Z screens correctly but, go back and read this thread and include the CPU-Z screen shots for the memory tab as well as all SPD tab /slots that actually contain a stick of memory and the RamMon html report, you'll need to zip it even though it's tiny since the site doesn't support uploading html files.
And go back to the SF Diagnotic Tool (right click it and choose run as administrator) run every button and zip up the folder on your desktop and include everything don't edit or remove any of the files, there may be additional information in there that may shed some additional light on the subject.
 
Oh god lol, I am truly terrible at this.. >< sry for being such a noob, and thanks for explaining it to me. Read from google 150 times and apparently I misunderstood stuff, by a mile..

And third, you don't actually run a .sys file, do a search for ucorew64.sys, identify where it is located (in what folder) rename it to ucorew64.OLD and then replace it with the ucorew64.sys with the newer date included in the link I sent you.
Thats also weird, as I couldnt find it with search before or after.

Edit; attached the things you asked for. But a big note; after I updated my BIOS my whole comp is back to default settings. Meaning my CPU is running at 3,4ghz and my RAM is at stock 1333mhz(?) Dont know, might fix some stuff.. and if it did, Ill never OC anything ever again :( It blows knowing your comp can BSOD any second, doesnt matter what you're doing..

edit2; I use all 4 memory slots (4x2gb), and they are identical in SPD. Reason why I only posted 1 picture.
 

Attachments

  • Seven Forums.zip
    1.3 MB · Views: 825
  • SPD.png
    SPD.png
    34.6 KB · Views: 449
  • Memory.png
    Memory.png
    37.9 KB · Views: 397
  • RAMMon - SPD Info.zip
    3.2 KB · Views: 216
Last edited:
031911-26083-01.dmp
BugCheck 3B, {c000001d, fffff80002e87c7d, fffff88008d15210, 0}

Probably caused by : hardware ( nt!KiSearchForNewThread+6d )

031911-25272-01.dmp
BugCheck C1, {fffff980236e8fe0, fffff980236e8ff4, d10014, 24}
Probably caused by : UCOREW64.SYS ( UCOREW64+152b )

031911-26083-01.dmp
BugCheck 3B, {c000001d, fffff80002e87c7d, fffff88008d15210, 0}
Probably caused by : hardware ( nt!KiSearchForNewThread+6d )

031911-25942-01.dmp
BugCheck A, {fffff80003202f97, 0, 0, fffff80002f12a52}Probably caused by : NETIO.SYS ( NETIO!NsiGetAllParametersEx+258 )

031911-24788-01.dmp
BugCheck C1, {fffff9801a224fe0, fffff9801a224ff4, 9d0014, 24}
Probably caused by : UCOREW64.SYS ( UCOREW64+152b )

031911-23743-01.dmp
BugCheck 3B, {c000001d, fffff80002e9eafd, fffff8800a054130, 0}
Probably caused by : win32k.sys ( win32k!NtUserDispatchMessage+72 )


031911-22963-01.dmp
BugCheck C1, {fffff98021834fe0, fffff98021834ff4, 970014, 24}Probably caused by : UCOREW64.SYS ( UCOREW64+152b )
1.
my RAM is at stock 1333mhz
That's not at stock! According to Corsair, Link Removed due to 404 Error is rated 1600MHz, 9-9-9-24, 1.65V. Enable XMP in bios, and set the frequency, latency, and the voltage manually.




2. Update the driver for the bios updater since it's old and is cited as the causer in most of your crash dumps:

UCOREW64.SYS Tue Apr 22 07:01:50 2008




Or uninstall it and use a different method to flash bios.





CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-25272-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
Debug session time: Sat Mar 19 14:10:13.873 2011 (UTC - 4:00)
System Uptime: 0 days 0:49:50.481
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C1, {fffff980236e8fe0, fffff980236e8ff4, d10014, 24}

Unable to load image UCOREW64.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for UCOREW64.SYS
*** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
Probably caused by : UCOREW64.SYS ( UCOREW64+152b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption.  Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff980236e8fe0, address trying to free
Arg2: fffff980236e8ff4, address where bits are corrupted
Arg3: 0000000000d10014, (reserved)
Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten

Debugging Details:
------------------


BUGCHECK_STR:  0xC1_24

SPECIAL_POOL_CORRUPTION_TYPE:  24

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  AFUWIN.EXE

CURRENT_IRQL:  1

IRP_ADDRESS:  fffff9802377ef3b

LAST_CONTROL_TRANSFER:  from fffff80002f9ae14 to fffff80002e9c640

STACK_TEXT:  
fffff880`0bad24b8 fffff800`02f9ae14 : 00000000`000000c1 fffff980`236e8fe0 fffff980`236e8ff4 00000000`00d10014 : nt!KeBugCheckEx
fffff880`0bad24c0 fffff800`02fc693b : fffff800`02e1c000 00000000`20206f49 00000000`0009ca09 fffffa80`08f30e00 : nt!MmFreeSpecialPool+0x374
fffff880`0bad2600 fffff800`02eb1afe : 00000000`00000000 fffff980`2377efb0 fffff980`0327ee50 fffff980`2597efb0 : nt!ExDeferredFreePool+0xf33
fffff880`0bad26b0 fffff800`02e9fdbf : fffff980`2377efb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
fffff880`0bad2780 fffff800`0333919f : fffff980`2377eee0 fffffa80`08436d00 fffff980`2377ef00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
fffff880`0bad2860 fffff880`0979052b : fffff880`0978f8f0 fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 : nt!IovCompleteRequest+0x19f
fffff880`0bad2930 fffff880`0978f8f0 : fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 : UCOREW64+0x152b
fffff880`0bad2938 fffff980`2377eee0 : fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 : UCOREW64+0x8f0
fffff880`0bad2940 fffff980`2377eee0 : fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 : 0xfffff980`2377eee0
fffff880`0bad2948 fffff980`2377efb0 : 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 : 0xfffff980`2377eee0
fffff880`0bad2950 00000000`00000014 : fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 : 0xfffff980`2377efb0
fffff880`0bad2958 fffff880`0bad2970 : fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 : 0x14
fffff880`0bad2960 fffffa80`08436d10 : fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 00000000`00000001 : 0xfffff880`0bad2970
fffff880`0bad2968 fffff800`031b6f97 : fffff880`00000018 fffff800`0332c2a7 00000000`00000001 fffffa80`08df6560 : 0xfffffa80`08436d10
fffff880`0bad2970 fffffa80`08f30e50 : 00000000`00000000 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 : nt!IopXxxControlFile+0x607
fffff880`0bad2aa0 00000000`00000000 : 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 00000000`00000000 : 0xfffffa80`08f30e50


STACK_COMMAND:  kb

FOLLOWUP_IP: 
UCOREW64+152b
fffff880`0979052b ??              ???

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  UCOREW64+152b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: UCOREW64

IMAGE_NAME:  UCOREW64.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  480dc59e

FAILURE_BUCKET_ID:  X64_0xC1_24_UCOREW64+152b

BUCKET_ID:  X64_0xC1_24_UCOREW64+152b

Followup: MachineOwner
---------

































Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-26083-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e00000 PsLoadedModuleList = 0xfffff800`03045e90
Debug session time: Sat Mar 19 11:25:22.285 2011 (UTC - 4:00)
System Uptime: 0 days 21:43:46.892
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...........................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c000001d, fffff80002e87c7d, fffff88008d15210, 0}

Probably caused by : hardware ( nt!KiSearchForNewThread+6d )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80002e87c7d, Address of the instruction which caused the bugcheck
Arg3: fffff88008d15210, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION}  Illegal Instruction  An attempt was made to execute an illegal instruction.

FAULTING_IP: 
nt!KiSearchForNewThread+6d
fffff800`02e87c7d 58              pop     rax

CONTEXT:  fffff88008d15210 -- (.cxr 0xfffff88008d15210)
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000004180
rdx=0000000000000004 rsi=fffff80002e00000 rdi=fffff88002f64180
rip=fffff80002e87c7d rsp=fffff88008d15bf0 rbp=0000000000000001
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff88002f64180 r12=0000000000000000 r13=00012ad616ff09c0
r14=0000000000000000 r15=fffffa80091d2168
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!KiSearchForNewThread+0x6d:
fffff800`02e87c7d 58              pop     rax
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

MISALIGNED_IP: 
nt!KiSearchForNewThread+6d
fffff800`02e87c7d 58              pop     rax

TRAP_FRAME:  fffff88008d15a60 -- (.trap 0xfffff88008d15a60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000004180
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e87c7d rsp=fffff88008d15bf0 rbp=0000000000000001
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff88002f64180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiSearchForNewThread+0x6d:
fffff800`02e87c7d 58              pop     rax
Resetting default scope

EXCEPTION_RECORD:  fffff88008d159b8 -- (.exr 0xfffff88008d159b8)
ExceptionAddress: fffff80002e87c7d (nt!KiSearchForNewThread+0x000000000000006d)
   ExceptionCode: c000001d (Illegal instruction)
  ExceptionFlags: 00000000
NumberParameters: 0

LAST_CONTROL_TRANSFER:  from fffff80002e8593c to fffff80002e87c7d

STACK_TEXT:  
fffff880`08d15bf0 fffff800`02e8593c : 00000000`00000000 fffffa80`091d2060 80000001`728a4963 fffff6fc`50010008 : nt!KiSearchForNewThread+0x6d
fffff880`08d15c60 fffff800`02e881af : fffff6fc`50010008 fffff800`02e9e25f 00000000`00000000 86c00001`728a4882 : nt!KiCommitThreadWait+0x17c
fffff880`08d15cf0 fffff800`02e72443 : fffffa80`091d2000 fffff880`0000001c 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x19f
fffff880`08d15d90 fffff800`02e8f08a : 00000202`0018002b fffff880`00000000 89b00001`7e857882 00000000`00000002 : nt!ExfAcquirePushLockExclusive+0x188
fffff880`08d15e10 fffff800`02e7e76e : 00000000`00000000 fffff8a0`0a7fa18e 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1a6a
fffff880`08d15f70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e


FOLLOWUP_IP: 
nt!KiSearchForNewThread+6d
fffff800`02e87c7d 58              pop     rax

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiSearchForNewThread+6d

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .cxr 0xfffff88008d15210 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  X64_IP_MISALIGNED

BUCKET_ID:  X64_IP_MISALIGNED

Followup: MachineOwner
---------

























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-25942-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e68000 PsLoadedModuleList = 0xfffff800`030ade90
Debug session time: Sat Mar 19 13:14:34.487 2011 (UTC - 4:00)
System Uptime: 0 days 1:17:45.704
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80003202f97, 0, 0, fffff80002f12a52}

Probably caused by : NETIO.SYS ( NETIO!NsiGetAllParametersEx+258 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80003202f97, memory referenced
Arg2: 0000000000000000, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f12a52, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031190e8
 fffff80003202f97 

CURRENT_IRQL:  0

FAULTING_IP: 
nt!RtlDispatchException+122
fffff800`02f12a52 410fb60c24      movzx   ecx,byte ptr [r12]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff8800a08fca0 -- (.trap 0xfffff8800a08fca0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000058000000000 rbx=0000000000000000 rcx=007ffffc00018e90
rdx=fffff6fc00018e90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002fe68f4 rsp=fffff8800a08fe30 rbp=0000000000000001
 r8=00008a8000095760  r9=0000000000000001 r10=000000000a0c8a40
r11=fffff8800a08ff40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiEmptyWorkingSet+0x1e4:
fffff800`02fe68f4 6645394818      cmp     word ptr [r8+18h],r9w ds:bd00:00008a80`00095778=????
Resetting default scope

EXCEPTION_RECORD:  fffff8800a08fbf8 -- (.exr 0xfffff8800a08fbf8)
ExceptionAddress: fffff80002fe68f4 (nt!MiEmptyWorkingSet+0x00000000000001e4)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

LAST_CONTROL_TRANSFER:  from fffff80002ee7be9 to fffff80002ee8640

STACK_TEXT:  
fffff880`0a08ea68 fffff800`02ee7be9 : 00000000`0000000a fffff800`03202f97 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a08ea70 fffff800`02ee6860 : 00000000`00000000 fffff800`03202f97 e5e5e5e5`e5e5e500 00000000`00000607 : nt!KiBugCheckDispatch+0x69
fffff880`0a08ebb0 fffff800`02f12a52 : fffff800`03202f97 fffff880`0a08ed88 fffff880`0a08fbf8 fffff800`02e68000 : nt!KiPageFault+0x260
fffff880`0a08ed40 fffff800`02f23dc1 : fffff880`0a08fbf8 fffff880`0a08f450 fffff880`00000000 00000000`00000007 : nt!RtlDispatchException+0x122
fffff880`0a08f420 fffff800`02ee7cc2 : fffff880`0a08fbf8 ffffffff`ffffffff fffff880`0a08fca0 fffff800`0306cec0 : nt!KiDispatchException+0x135
fffff880`0a08fac0 fffff800`02ee65ca : fffff8a0`0140f000 fffff8a0`00f50000 fffff8a0`01a8f000 fffff8a0`1c4fa000 : nt!KiExceptionDispatch+0xc2
fffff880`0a08fca0 fffff800`02fe68f4 : 00000003`00000000 ffffffff`ffffffff 00000000`00000000 fffff800`0306cec0 : nt!KiGeneralProtectionFault+0x10a
fffff880`0a08fe30 fffff800`02fe7f57 : fffffa80`0a0c8a40 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!MiEmptyWorkingSet+0x1e4
fffff880`0a08fee0 fffff800`03386261 : 00000000`00000000 fffffa80`07554202 00000000`00000000 fffff880`0a090210 : nt!MiTrimAllSystemPagableMemory+0x218
fffff880`0a08ff40 fffff800`033863bf : fffffa80`07554202 fffffa80`0699b298 fffffa80`0699b298 00000000`00000000 : nt!MmVerifierTrimMemory+0xf1
fffff880`0a08ff70 fffff800`03386b14 : fffffa80`07554200 fffffa80`075541a0 00000000`00000000 00000000`00000000 : nt!ViKeRaiseIrqlSanityChecks+0xcf
fffff880`0a08ffb0 fffff880`0145525e : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!VerifierKeAcquireSpinLockRaiseToDpc+0x54
fffff880`0a090010 fffff880`014587f3 : fffffa80`07554100 fffff880`0a090210 fffff980`05d10c90 fffffa80`08e4ccd0 : ndis!ndisQueueRequestOnTop+0x7e
fffff880`0a0900b0 fffff880`01458a63 : fffff980`062ac800 fffffa80`075541a0 fffff980`05d10c90 fffff980`062ac8c8 : ndis!ndisQuerySetMiniportEx+0x143
fffff880`0a090120 fffff880`01457409 : 00000000`00000005 00001f80`00f102a0 00000000`00001f80 fffff880`0a090598 : ndis!ndisIfGetMiniportStatistics+0x163
fffff880`0a090350 fffff880`01457807 : 00000000`00000000 fffff800`02fa1ac3 fffffa80`0699afd0 fffff880`00000008 : ndis!ndisIfQueryObject+0x389
fffff880`0a0904e0 fffff880`01456cad : fffff980`01394870 fffff980`05790870 fffff880`0a0905c0 00060000`00000000 : ndis!ndisNsiGetInterfaceRodInformation+0x207
fffff880`0a090580 fffff880`0154bc18 : 00000000`00000000 fffff880`01593301 00000000`00000001 fffff980`062ac800 : ndis!ndisNsiGetAllInterfaceInformation+0x42e
fffff880`0a090640 fffff880`040749d6 : 00000000`01b6eba0 fffffa80`081e29c0 fffff980`062ac800 00000000`01b6eba0 : NETIO!NsiGetAllParametersEx+0x258
fffff880`0a090750 fffff880`04076902 : fffff980`0635efb0 fffff980`0635efb0 fffff980`00000001 fffff980`0635ef18 : nsiproxy!NsippGetAllParameters+0x2b2
fffff880`0a090940 fffff880`040769db : 00000000`00000000 00000000`00000001 fffff980`0635eff8 fffffa80`0791a6e0 : nsiproxy!NsippDispatchDeviceControl+0x8a
fffff880`0a090980 fffff800`0338bc16 : fffff980`0635eee0 fffffa80`08b52060 fffffa80`09bcf8d0 fffffa80`06ae5f98 : nsiproxy!NsippDispatch+0x4b
fffff880`0a0909b0 fffff800`03202f97 : fffffa80`09bcf8d0 fffff880`0a090ca0 fffffa80`09bcf8d0 fffffa80`0791a6e0 : nt!IovCallDriver+0x566
fffff880`0a090a10 fffff800`032037f6 : 00000000`01b6ea20 00000000`00000838 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`0a090b40 fffff800`02ee78d3 : fffffa80`0a0c8a40 00000000`01b6ea08 fffff880`0a090bc8 00000000`00000001 : nt!NtDeviceIoControlFile+0x56
fffff880`0a090bb0 00000000`777f138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01b6ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777f138a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!NsiGetAllParametersEx+258
fffff880`0154bc18 8bf8            mov     edi,eax

SYMBOL_STACK_INDEX:  12

SYMBOL_NAME:  NETIO!NsiGetAllParametersEx+258

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381

FAILURE_BUCKET_ID:  X64_0xA_NETIO!NsiGetAllParametersEx+258

BUCKET_ID:  X64_0xA_NETIO!NsiGetAllParametersEx+258

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-24788-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e15000 PsLoadedModuleList = 0xfffff800`0305ae90
Debug session time: Sat Mar 19 13:19:15.455 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:10.062
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C1, {fffff9801a224fe0, fffff9801a224ff4, 9d0014, 24}

Unable to load image UCOREW64.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for UCOREW64.SYS
*** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
Probably caused by : UCOREW64.SYS ( UCOREW64+152b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption.  Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff9801a224fe0, address trying to free
Arg2: fffff9801a224ff4, address where bits are corrupted
Arg3: 00000000009d0014, (reserved)
Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten

Debugging Details:
------------------


BUGCHECK_STR:  0xC1_24

SPECIAL_POOL_CORRUPTION_TYPE:  24

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  AFUWIN.EXE

CURRENT_IRQL:  1

IRP_ADDRESS:  fffff9801715cf3b

LAST_CONTROL_TRANSFER:  from fffff80002f93e14 to fffff80002e95640

STACK_TEXT:  
fffff880`0b4aa4b8 fffff800`02f93e14 : 00000000`000000c1 fffff980`1a224fe0 fffff980`1a224ff4 00000000`009d0014 : nt!KeBugCheckEx
fffff880`0b4aa4c0 fffff800`02fbf93b : fffff800`02e15000 00000000`20206f49 00000000`0001d483 fffffa80`0a26e690 : nt!MmFreeSpecialPool+0x374
fffff880`0b4aa600 fffff800`02eaaafe : 00000000`00000000 fffff980`1715cfb0 fffff980`02e5cce0 fffff980`1a35ce50 : nt!ExDeferredFreePool+0xf33
fffff880`0b4aa6b0 fffff800`02e98dbf : fffff980`1715cfb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
fffff880`0b4aa780 fffff800`0333219f : fffff980`1715cee0 fffffa80`09c13900 fffff980`1715cf00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
fffff880`0b4aa860 fffff880`0d4f352b : fffff880`0d4f28f0 fffff980`1715cee0 fffff980`1715cee0 fffff980`1715cfb0 : nt!IovCompleteRequest+0x19f
fffff880`0b4aa930 fffff880`0d4f28f0 : fffff980`1715cee0 fffff980`1715cee0 fffff980`1715cfb0 00000000`00000014 : UCOREW64+0x152b
fffff880`0b4aa938 fffff980`1715cee0 : fffff980`1715cee0 fffff980`1715cfb0 00000000`00000014 fffff880`0b4aa970 : UCOREW64+0x8f0
fffff880`0b4aa940 fffff980`1715cee0 : fffff980`1715cfb0 00000000`00000014 fffff880`0b4aa970 fffffa80`09c13990 : 0xfffff980`1715cee0
fffff880`0b4aa948 fffff980`1715cfb0 : 00000000`00000014 fffff880`0b4aa970 fffffa80`09c13990 fffff800`031aff97 : 0xfffff980`1715cee0
fffff880`0b4aa950 00000000`00000014 : fffff880`0b4aa970 fffffa80`09c13990 fffff800`031aff97 fffff880`00000018 : 0xfffff980`1715cfb0
fffff880`0b4aa958 fffff880`0b4aa970 : fffffa80`09c13990 fffff800`031aff97 fffff880`00000018 fffff800`033252a7 : 0x14
fffff880`0b4aa960 fffffa80`09c13990 : fffff800`031aff97 fffff880`00000018 fffff800`033252a7 00000000`00000001 : 0xfffff880`0b4aa970
fffff880`0b4aa968 fffff800`031aff97 : fffff880`00000018 fffff800`033252a7 00000000`00000001 fffffa80`09960bb0 : 0xfffffa80`09c13990
fffff880`0b4aa970 fffffa80`0a26e6e0 : 00000000`00000000 0012019f`00000000 fffffa80`0a26e740 fffff980`1a224fe0 : nt!IopXxxControlFile+0x607
fffff880`0b4aaaa0 00000000`00000000 : 0012019f`00000000 fffffa80`0a26e740 fffff980`1a224fe0 00000000`00000000 : 0xfffffa80`0a26e6e0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
UCOREW64+152b
fffff880`0d4f352b ??              ???

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  UCOREW64+152b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: UCOREW64

IMAGE_NAME:  UCOREW64.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  480dc59e

FAILURE_BUCKET_ID:  X64_0xC1_24_UCOREW64+152b

BUCKET_ID:  X64_0xC1_24_UCOREW64+152b

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-23743-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
Debug session time: Sat Mar 19 11:44:50.165 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:12.773
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c000001d, fffff80002e9eafd, fffff8800a054130, 0}

Probably caused by : win32k.sys ( win32k!NtUserDispatchMessage+72 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80002e9eafd, Address of the instruction which caused the bugcheck
Arg3: fffff8800a054130, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION}  Illegal Instruction  An attempt was made to execute an illegal instruction.

FAULTING_IP: 
nt!ExpReleaseResourceForThreadLite+17d
fffff800`02e9eafd 85c0            test    eax,eax

CONTEXT:  fffff8800a054130 -- (.cxr 0xfffff8800a054130)
rax=00000000000a0000 rbx=fffffa800982c520 rcx=0000000000000000
rdx=fffffa800a2d66b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e9eafd rsp=fffff8800a054b10 rbp=fffffa800a2d66b0
 r8=0000000000000000  r9=0000000000000000 r10=fffff8800a054880
r11=fffff8800a054b80 r12=fffff88002fd5180 r13=fffffa800a2d66b0
r14=00000000001ce700 r15=00000000739a2450
iopl=0         nv up di pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010046
nt!ExpReleaseResourceForThreadLite+0x17d:
fffff800`02e9eafd 85c0            test    eax,eax
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  msnmsgr.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002ea635a to fffff80002e9eafd

STACK_TEXT:  
fffff880`0a054b10 fffff800`02ea635a : 00000000`00000020 00000000`739a2450 00000000`00000000 00000000`001cfd20 : nt!ExpReleaseResourceForThreadLite+0x17d
fffff880`0a054b70 fffff960`00139922 : 00000000`001cde80 fffff880`0a054ca0 00000000`00000000 fffff800`02ea635a : nt!ExReleaseResourceAndLeavePriorityRegion+0x12
fffff880`0a054ba0 fffff800`02e9b8d3 : fffffa80`0a2d66b0 fffff880`0a054ca0 00000000`00000000 fffffa80`08224be0 : win32k!NtUserDispatchMessage+0x72
fffff880`0a054c20 00000000`739eff2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001cde08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739eff2a


FOLLOWUP_IP: 
win32k!NtUserDispatchMessage+72
fffff960`00139922 488bc3          mov     rax,rbx

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  win32k!NtUserDispatchMessage+72

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d2415ea

STACK_COMMAND:  .cxr 0xfffff8800a054130 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRF_win32k!NtUserDispatchMessage+72

BUCKET_ID:  X64_0x3B_VRF_win32k!NtUserDispatchMessage+72

Followup: MachineOwner
---------

























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-22963-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e0b000 PsLoadedModuleList = 0xfffff800`03050e90
Debug session time: Sat Mar 19 16:56:47.643 2011 (UTC - 4:00)
System Uptime: 0 days 0:11:05.297
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C1, {fffff98021834fe0, fffff98021834ff4, 970014, 24}

Unable to load image UCOREW64.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for UCOREW64.SYS
*** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
Probably caused by : UCOREW64.SYS ( UCOREW64+152b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption.  Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff98021834fe0, address trying to free
Arg2: fffff98021834ff4, address where bits are corrupted
Arg3: 0000000000970014, (reserved)
Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten

Debugging Details:
------------------


BUGCHECK_STR:  0xC1_24

SPECIAL_POOL_CORRUPTION_TYPE:  24

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  AFUWINx64.exe

CURRENT_IRQL:  1

IRP_ADDRESS:  fffff98021050f3b

LAST_CONTROL_TRANSFER:  from fffff80002f89e14 to fffff80002e8b640

STACK_TEXT:  
fffff880`08c254b8 fffff800`02f89e14 : 00000000`000000c1 fffff980`21834fe0 fffff980`21834ff4 00000000`00970014 : nt!KeBugCheckEx
fffff880`08c254c0 fffff800`02fb593b : fffff800`02e0b000 00000000`20206f49 00000000`0002d07a fffffa80`0889d300 : nt!MmFreeSpecialPool+0x374
fffff880`08c25600 fffff800`02ea0afe : 00000000`00000000 fffff980`21050fb0 fffff980`02a50ce0 fffff980`22150ee0 : nt!ExDeferredFreePool+0xf33
fffff880`08c256b0 fffff800`02e8edbf : fffff980`21050fb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
fffff880`08c25780 fffff800`0332819f : fffff980`21050ee0 fffffa80`08857300 fffff980`21050f00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
fffff880`08c25860 fffff880`0944952b : fffff880`094488f0 fffff980`21050ee0 fffff980`21050ee0 fffff980`21050fb0 : nt!IovCompleteRequest+0x19f
fffff880`08c25930 fffff880`094488f0 : fffff980`21050ee0 fffff980`21050ee0 fffff980`21050fb0 00000000`00000014 : UCOREW64+0x152b
fffff880`08c25938 fffff980`21050ee0 : fffff980`21050ee0 fffff980`21050fb0 00000000`00000014 fffff880`08c25970 : UCOREW64+0x8f0
fffff880`08c25940 fffff980`21050ee0 : fffff980`21050fb0 00000000`00000014 fffff880`08c25970 fffffa80`08857320 : 0xfffff980`21050ee0
fffff880`08c25948 fffff980`21050fb0 : 00000000`00000014 fffff880`08c25970 fffffa80`08857320 fffff800`031a5f97 : 0xfffff980`21050ee0
fffff880`08c25950 00000000`00000014 : fffff880`08c25970 fffffa80`08857320 fffff800`031a5f97 fffff880`00000018 : 0xfffff980`21050fb0
fffff880`08c25958 fffff880`08c25970 : fffffa80`08857320 fffff800`031a5f97 fffff880`00000018 fffff800`0331b2a7 : 0x14
fffff880`08c25960 fffffa80`08857320 : fffff800`031a5f97 fffff880`00000018 fffff800`0331b2a7 00000000`00000001 : 0xfffff880`08c25970
fffff880`08c25968 fffff800`031a5f97 : fffff880`00000018 fffff800`0331b2a7 00000000`00000001 fffffa80`099cb5c0 : 0xfffffa80`08857320
fffff880`08c25970 fffffa80`0889d350 : 00000000`00000000 0012019f`00000000 fffffa80`0889d3b0 fffff980`21834fe0 : nt!IopXxxControlFile+0x607
fffff880`08c25aa0 00000000`00000000 : 0012019f`00000000 fffffa80`0889d3b0 fffff980`21834fe0 00000000`00000000 : 0xfffffa80`0889d350


STACK_COMMAND:  kb

FOLLOWUP_IP: 
UCOREW64+152b
fffff880`0944952b ??              ???

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  UCOREW64+152b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: UCOREW64

IMAGE_NAME:  UCOREW64.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  480dc59e

FAILURE_BUCKET_ID:  X64_0xC1_24_UCOREW64+152b

BUCKET_ID:  X64_0xC1_24_UCOREW64+152b

Followup: MachineOwner
---------



DRIVERS

Code:
start             end                 module name
fffff880`09567000 fffff880`095a5000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`00f8d000 fffff880`00fe4000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`04025000 fffff880`040ae000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`13d7e000 fffff880`13d94000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`06b13000 fffff880`06b28000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c3e000 fffff880`00c49000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`00ecd000 fffff880`00ed6000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c14000 fffff880`00c3e000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`07852000 fffff880`0786f000   avgntflt avgntflt.sys Thu Nov 11 10:59:48 2010 (4CDC12F4)
fffff880`06acb000 fffff880`06aed000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
fffff880`019e5000 fffff880`019ec000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`06aba000 fffff880`06acb000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`08ef2000 fffff880`08f10000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00670000 fffff960`00697000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`0142b000 fffff880`01455000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cda000 fffff880`00d9a000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01976000 fffff880`019a6000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c7c000 fffff880`00cda000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01072000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`13d6e000 fffff880`13d7e000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`08fc6000 fffff880`08fcf000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
fffff880`07946000 fffff880`07954000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`06a19000 fffff880`06a9c000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`06a9c000 fffff880`06aba000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`041d7000 fffff880`041e6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01960000 fffff880`01976000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`06bd2000 fffff880`06bf4000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0414e000 fffff880`04191000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
fffff880`07960000 fffff880`07969000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`07954000 fffff880`07960000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`07969000 fffff880`0797c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`07999000 fffff880`079a5000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`02cca000 fffff880`02dbe000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`02c00000 fffff880`02c46000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`019a6000 fffff880`019dc000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01133000 fffff880`01147000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010e7000 fffff880`01133000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`0122c000 fffff880`01236000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01926000 fffff880`01960000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01823000 fffff880`0186d000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`033f5000 fffff800`0343e000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`02c46000 fffff880`02c6a000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`078ea000 fffff880`07946000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`079c3000 fffff880`079dc000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`079dc000 fffff880`079e4080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`079b5000 fffff880`079c3000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`08e29000 fffff880`08ef2000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`0191d000 fffff880`01926000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`02dbe000 fffff880`02ddc000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`07890000 fffff880`078b3000   irda     irda.sys     Mon Jul 13 20:09:01 2009 (4A5BCC9D)
fffff880`02ddc000 fffff880`02deb000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bad000 fffff800`00bb7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`13070000 fffff880`130b3000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`01200000 fffff880`0121b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`130b3000 fffff880`130b8200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`079e5000 fffff880`079fa000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`078b3000 fffff880`078c8000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0780d000 fffff880`07821000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`0782f000 fffff880`07852000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`079a5000 fffff880`079b5000   LUsbFilt LUsbFilt.Sys Tue Aug 24 13:21:47 2010 (4C73FFAB)
fffff880`00c5b000 fffff880`00c68000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`07821000 fffff880`0782f000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`13061000 fffff880`13070000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`07800000 fffff880`0780d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00daa000 fffff880`00dc4000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`08f10000 fffff880`08f28000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`08f28000 fffff880`08f55000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`08f55000 fffff880`08fa2000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`08fa2000 fffff880`08fc6000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`0148c000 fffff880`01497000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0955a000 fffff880`09567000   msibios64_100507 msibios64_100507.sys Fri May 07 05:17:12 2010 (4BE3DA98)
fffff880`00fed000 fffff880`00ff7000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01147000 fffff880`011a5000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`041cc000 fffff880`041d7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0190b000 fffff880`0191d000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01498000 fffff880`0158b000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`13db8000 fffff880`13dc4000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`13dc4000 fffff880`13df3000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`06b94000 fffff880`06ba9000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`04122000 fffff880`04131000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`040ae000 fffff880`040f3000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`0158b000 fffff880`015eb000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`015eb000 fffff880`015fc000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`041c0000 fffff880`041cc000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e0b000 fffff800`033f5000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01245000 fffff880`013e8000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`09553000 fffff880`0955a000   NTIOLib_X64 NTIOLib_X64.sys Wed Oct 20 02:45:49 2010 (4CBE901D)
fffff880`019dc000 fffff880`019e5000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`09430000 fffff880`09448000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
fffff880`09400000 fffff880`09430000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
fffff880`13d16000 fffff880`13d17180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`06ba9000 fffff880`06bd2000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`130bb000 fffff880`13d15d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`040fc000 fffff880`04122000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00ec6000 fffff880`00ecd000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00d9a000 fffff880`00daa000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121b000 fffff880`0122c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`09009000 fffff880`090af000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`011a5000 fffff880`011e2000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c68000 fffff880`00c7c000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`13d94000 fffff880`13db8000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`13000000 fffff880`1301b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`1301b000 fffff880`1303c000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`1303c000 fffff880`13056000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`01094000 fffff880`010e5000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`13056000 fffff880`13061000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01610000 fffff880`01619000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0147a000 fffff880`01483000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01483000 fffff880`0148c000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018d1000 fffff880`0190b000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`078c8000 fffff880`078e0000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`095a5000 fffff880`095fb000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`090af000 fffff880`090ba000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`02deb000 fffff880`02df7000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04131000 fffff880`0414e000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`018c9000 fffff880`018d1000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`09168000 fffff880`091d9000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`09489000 fffff880`09522000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`090fd000 fffff880`09168000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`090ba000 fffff880`090eb000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`02cc4000 fffff880`02cc5480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`0161f000 fffff880`01823000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`090eb000 fffff880`090fd000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`01236000 fffff880`01243000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`01072000 fffff880`01094000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`041ac000 fffff880`041c0000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00520000 fffff960`0052a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`06aed000 fffff880`06b13000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`09448000 fffff880`09449f00   UCOREW64 UCOREW64.SYS Tue Apr 22 07:01:50 2008 (480DC59E)
fffff880`06b28000 fffff880`06b3a000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`07997000 fffff880`07998f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`02cb3000 fffff880`02cc4000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`06b3a000 fffff880`06b94000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`02ca8000 fffff880`02cb3000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`13d18000 fffff880`13d6e000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0797c000 fffff880`07997000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019ec000 fffff880`019fa000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01455000 fffff880`0147a000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00dc4000 fffff880`00e00000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`0186d000 fffff880`0187d000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e6a000 fffff880`00ec6000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`0187d000 fffff880`018c9000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`04191000 fffff880`041ac000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01600000 fffff880`01610000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eda000 fffff880`00f7e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f7e000 fffff880`00f8d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`040f3000 fffff880`040fc000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00381000   win32k   win32k.sys   Wed Jan 05 01:55:38 2011 (4D2415EA)
fffff880`00c00000 fffff880`00c14000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`02df7000 fffff880`02e00000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fe4000 fffff880`00fed000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0786f000 fffff880`07890000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
fffff880`09522000 fffff880`09553000   WUDFRd   WUDFRd.sys   Sat Nov 20 05:43:32 2010 (4CE7A654)

Unloaded modules:
fffff880`09168000 fffff880`091d9000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`02c6a000 fffff880`02ca8000   1394ohci.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0003E000
fffff880`019a6000 fffff880`019b4000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019b4000 fffff880`019c0000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`019c0000 fffff880`019c9000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`019c9000 fffff880`019dc000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Did what trouble said "search for ucorew64.sys, identify where it is located (in what folder) rename it to ucorew64.OLD and then replace it with the ucorew64.sys with the newer date". Found the ucorew64.sys in C:/Program/MSI/Live Update/Flash Uty/AMI/AFUWIN.

Thats it I hope?

and this;
"Enable XMP in bios, and set the frequency, latency, and the voltage manually.". Found in memory settings that XMP is supported, couldnt find where to enable it though. The frequency is at 1600mhz now, latency is auto at 9 (correct, right?) and the voltage according to bios is 1.65V.. But when I got into CPU-Z my stuff isnt that at all.. But when you say 9-9-9-24, should I manually set latency, delay, prechange to 9 and cycle time to 24 in bios?
 
See my previous post:


---> Uninstall it:
C:/Program/MSI/Live Update/Flash Uty/AMI/AFUWIN




--> Set your memory frequency 1600 Mhz, timing 9-9-9-24, voltage 1.65, and leave other options on [Auto]. Save the new settings and reboot. Attach CPU-Z memory snap.
 
See my previous post:


---> Uninstall it:
C:/Program/MSI/Live Update/Flash Uty/AMI/AFUWIN




--> Set your memory frequency 1600 Mhz, timing 9-9-9-24, voltage 1.65, and leave other options on [Auto]. Save the new settings and reboot. Attach CPU-Z memory snap.

Uninstalled MSI's live update, went into bios and set freq to 1600, though when it came to timings I could to 9-9-9 but not 24, the only option I had there was "auto".

Saved and heres the CPU-Z Memory snap.
 

Attachments

  • Namnlös.png
    Namnlös.png
    27.3 KB · Views: 403
Now is 1600 9-9-9-29 --> should be -24. If your system crashes again, you need to revise your bios settings.
 
Yeah I noticed.. :/ Weird thing though because I cannot change that one, just says auto.. The other settings I can change just fine thought :/
 
Yeah I noticed.. :/ Weird thing though because I cannot change that one, just says auto.. The other settings I can change just fine thought :/


I sure saw you point in the previous post, and by "revise your bios settings" I mean look up the manual, take your time, because no one can know your bios better than yourself. It could be worth loading optimized defaults, but mind this will reset the entire bios.
 
Set em to 9-9-9-24 and DRAM Voltage to 1.651 and I got a bsod, changed the voltage back to Auto and ima check now.
 
Back
Top