IRQ_NOT_LESS_THAN on ntoskrnl.exe

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by jjphoto, May 11, 2011.

  1. jjphoto

    jjphoto New Member

    Joined:
    May 10, 2011
    Messages:
    4
    Likes Received:
    0
    Good evening,

    I have a custom-built PC that has been having BSOD problems since the start. I can't trigger them with any intentional, repetitive task, they just happen randomly. I'm afraid it's the RAM, but am hoping for some feedback.

    I am attaching 4 recent minidumps, and some screens from CPU-Z.

    Please let me know what else I can do to help.

    -jj
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    You may find helpful this blog:

    http://windows7forums.com/blogs/trouble/436-my-bsod-odyssey.html


    Your crashes:


    1. Attach Passmark RAMMon HTML.zip
    2. Uninstall Gigabyte Tools / Easy Saver /Afterburner
    gdrv.sys Thu Mar 12 23:22:29 2009

    3. Update drivers:

    NEC USB 3.0 Controller
    nusb3xhc.sys Mon Oct 26 10:19:48 2009
    FAQ/Support | Renesas Electronics
    GIGABYTE - Support & Downloads

    Virtual Clone
    ElbyCDIO.sys Thu Dec 17 17:25:16 2009
    SlySoft Virtual CloneDrive




    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051011-20748-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`03258000 PsLoadedModuleList = 0xfffff800`0349de90
    Debug session time: Mon May  9 04:06:36.660 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:40.581
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff8000368a3bf, 0, ffffffffffffffff}
    
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff8000368a3bf, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: ffffffffffffffff, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!WdipSemWriteEvent+4f
    fffff800`0368a3bf cb              retf
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035090e8
     ffffffffffffffff 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    PROCESS_NAME:  winlogon.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80003324028 to fffff800032d8640
    
    STACK_TEXT:  
    fffff880`061b63c8 fffff800`03324028 : 00000000`0000001e ffffffff`c0000005 fffff800`0368a3bf 00000000`00000000 : nt!KeBugCheckEx
    fffff880`061b63d0 fffff800`032d7cc2 : fffff880`061b6ba8 fffff8a0`002196f0 fffff880`061b6c50 00000000`00000005 : nt! ?? ::FNODOBFM::`string'+0x4987d
    fffff880`061b6a70 fffff800`032d65ca : 00000000`00000000 00000000`00000000 fffffa80`00000000 fffff880`061b6cc8 : nt!KiExceptionDispatch+0xc2
    fffff880`061b6c50 fffff800`0368a3bf : fffff800`0369d17d 00000000`0000000c 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
    fffff880`061b6de8 fffff8a0`002196c0 : 00000000`00000010 fffff8a0`002196d0 00000000`00000002 fffff880`061b7a40 : nt!WdipSemWriteEvent+0x4f
    fffff880`061b6e28 00000000`00000010 : fffff8a0`002196d0 00000000`00000002 fffff880`061b7a40 00000000`00000004 : 0xfffff8a0`002196c0
    fffff880`061b6e30 fffff8a0`002196d0 : 00000000`00000002 fffff880`061b7a40 00000000`00000004 fffff8a0`002196f0 : 0x10
    fffff880`061b6e38 00000000`00000002 : fffff880`061b7a40 00000000`00000004 fffff8a0`002196f0 00000000`00000004 : 0xfffff8a0`002196d0
    fffff880`061b6e40 fffff880`061b7a40 : 00000000`00000004 fffff8a0`002196f0 00000000`00000004 fffff8a0`0022ae70 : 0x2
    fffff880`061b6e48 00000000`00000004 : fffff8a0`002196f0 00000000`00000004 fffff8a0`0022ae70 00000000`00000028 : 0xfffff880`061b7a40
    fffff880`061b6e50 fffff8a0`002196f0 : 00000000`00000004 fffff8a0`0022ae70 00000000`00000028 fffff8a0`0022ae40 : 0x4
    fffff880`061b6e58 00000000`00000004 : fffff8a0`0022ae70 00000000`00000028 fffff8a0`0022ae40 00000000`00000028 : 0xfffff8a0`002196f0
    fffff880`061b6e60 fffff8a0`0022ae70 : 00000000`00000028 fffff8a0`0022ae40 00000000`00000028 fffff8a0`0022ae10 : 0x4
    fffff880`061b6e68 00000000`00000028 : fffff8a0`0022ae40 00000000`00000028 fffff8a0`0022ae10 00000000`00000028 : 0xfffff8a0`0022ae70
    fffff880`061b6e70 fffff8a0`0022ae40 : 00000000`00000028 fffff8a0`0022ae10 00000000`00000028 fffff8a0`0022ade0 : 0x28
    fffff880`061b6e78 00000000`00000028 : fffff8a0`0022ae10 00000000`00000028 fffff8a0`0022ade0 00000000`00000028 : 0xfffff8a0`0022ae40
    fffff880`061b6e80 fffff8a0`0022ae10 : 00000000`00000028 fffff8a0`0022ade0 00000000`00000028 fffff8a0`0022adb0 : 0x28
    fffff880`061b6e88 00000000`00000028 : fffff8a0`0022ade0 00000000`00000028 fffff8a0`0022adb0 00000000`00000028 : 0xfffff8a0`0022ae10
    fffff880`061b6e90 fffff8a0`0022ade0 : 00000000`00000028 fffff8a0`0022adb0 00000000`00000028 00000000`00000000 : 0x28
    fffff880`061b6e98 00000000`00000028 : fffff8a0`0022adb0 00000000`00000028 00000000`00000000 00000000`00000000 : 0xfffff8a0`0022ade0
    fffff880`061b6ea0 fffff8a0`0022adb0 : 00000000`00000028 00000000`00000000 00000000`00000000 00000000`00000000 : 0x28
    fffff880`061b6ea8 00000000`00000028 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff8a0`0022adb0
    fffff880`061b6eb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x28
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
        fffff8000368a3bf - nt!WdipSemWriteEvent+4f
    	[ c3:cb ]
    1 error : !nt (fffff8000368a3bf)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  ONE_BIT
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    Followup: memory_corruption
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051011-58359-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`03257000 PsLoadedModuleList = 0xfffff800`0349ce90
    Debug session time: Tue May 10 23:25:26.491 2011 (UTC - 4:00)
    System Uptime: 0 days 10:03:57.412
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................................
    Loading User Symbols
    Loading unloaded module list
    ...........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {fffff8a00fcde000, 2, 8, fffff8a00fcde000}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: fffff8a00fcde000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
    Arg4: fffff8a00fcde000, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035080e8
     fffff8a00fcde000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    +6266383862326566
    fffff8a0`0fcde000 0002            add     byte ptr [rdx],al
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff80004846bf0 -- (.trap 0xfffff80004846bf0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000609b00000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8a00fcde000 rsp=fffff80004846d80 rbp=fffff8a0224b7000
     r8=fffffa800c603850  r9=0000000000000000 r10=0000000000000000
    r11=fffff80003449e80 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    fffff8a0`0fcde000 0002            add     byte ptr [rdx],al ds:d000:0000609b`00000000=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032d6be9 to fffff800032d7640
    
    FAILED_INSTRUCTION_ADDRESS: 
    +6266383862326566
    fffff8a0`0fcde000 0002            add     byte ptr [rdx],al
    
    STACK_TEXT:  
    fffff800`04846aa8 fffff800`032d6be9 : 00000000`0000000a fffff8a0`0fcde000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
    fffff800`04846ab0 fffff800`032d5860 : 00000000`00000000 ffffffff`fffffffe fffff800`03449e80 fffff800`03449e80 : nt!KiBugCheckDispatch+0x69
    fffff800`04846bf0 fffff8a0`0fcde000 : fffff8a0`0fa8d000 fffff8a0`0f921000 fffff8a0`00003000 fffff8a0`1018a000 : nt!KiPageFault+0x260
    fffff800`04846d80 fffff8a0`0fa8d000 : fffff8a0`0f921000 fffff8a0`00003000 fffff8a0`1018a000 fffff8a0`0008e000 : 0xfffff8a0`0fcde000
    fffff800`04846d88 fffff8a0`0f921000 : fffff8a0`00003000 fffff8a0`1018a000 fffff8a0`0008e000 fffff8a0`20268000 : 0xfffff8a0`0fa8d000
    fffff800`04846d90 fffff8a0`00003000 : fffff8a0`1018a000 fffff8a0`0008e000 fffff8a0`20268000 fffff8a0`1297a000 : 0xfffff8a0`0f921000
    fffff800`04846d98 fffff8a0`1018a000 : fffff8a0`0008e000 fffff8a0`20268000 fffff8a0`1297a000 fffff800`04841000 : 0xfffff8a0`00003000
    fffff800`04846da0 fffff8a0`0008e000 : fffff8a0`20268000 fffff8a0`1297a000 fffff800`04841000 fffff800`04846d40 : 0xfffff8a0`1018a000
    fffff800`04846da8 fffff8a0`20268000 : fffff8a0`1297a000 fffff800`04841000 fffff800`04846d40 fffff800`048472b0 : 0xfffff8a0`0008e000
    fffff800`04846db0 fffff8a0`1297a000 : fffff800`04841000 fffff800`04846d40 fffff800`048472b0 fffff800`032e22a5 : 0xfffff8a0`20268000
    fffff800`04846db8 fffff800`04841000 : fffff800`04846d40 fffff800`048472b0 fffff800`032e22a5 fffff800`04846db8 : 0xfffff8a0`1297a000
    fffff800`04846dc0 fffff800`04846d40 : fffff800`048472b0 fffff800`032e22a5 fffff800`04846db8 fffffa80`113573c4 : 0xfffff800`04841000
    fffff800`04846dc8 fffff800`048472b0 : fffff800`032e22a5 fffff800`04846db8 fffffa80`113573c4 fffff800`04846e60 : 0xfffff800`04846d40
    fffff800`04846dd0 fffff800`032e22a5 : fffff800`04846db8 fffffa80`113573c4 fffff800`04846e60 00000000`00000000 : 0xfffff800`048472b0
    fffff800`04846dd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIpiInterrupt+0x135
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiPageFault+260
    fffff800`032d5860 440f20c0        mov     rax,cr8
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiPageFault+260
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    FAILURE_BUCKET_ID:  X64_0xD1_VRF_CODE_AV_BAD_IP_nt!KiPageFault+260
    
    BUCKET_ID:  X64_0xD1_VRF_CODE_AV_BAD_IP_nt!KiPageFault+260
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\050911-36753-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`03253000 PsLoadedModuleList = 0xfffff800`03498e90
    Debug session time: Mon May  9 04:04:29.406 2011 (UTC - 4:00)
    System Uptime: 1 days 16:39:03.327
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 109, {a3a039d8a6d65576, b3b7465ef95324cc, fffff8000368a2d0, 1}
    
    *** WARNING: Unable to verify timestamp for win32k.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    CRITICAL_STRUCTURE_CORRUPTION (109)
    This bugcheck is generated when the kernel detects that critical kernel code or
    data have been corrupted. There are generally three causes for a corruption:
    1) A driver has inadvertently or deliberately modified critical kernel code
     or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
    2) A developer attempted to set a normal kernel breakpoint using a kernel
     debugger that was not attached when the system was booted. Normal breakpoints,
     "bp", can only be set if the debugger is attached at boot time. Hardware
     breakpoints, "ba", can be set at any time.
    3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
    Arguments:
    Arg1: a3a039d8a6d65576, Reserved
    Arg2: b3b7465ef95324cc, Reserved
    Arg3: fffff8000368a2d0, Failure type dependent information
    Arg4: 0000000000000001, Type of corrupted region, can be
    	0 : A generic data region
    	1 : Modification of a function or .pdata
    	2 : A processor IDT
    	3 : A processor GDT
    	4 : Type 1 process list corruption
    	5 : Type 2 process list corruption
    	6 : Debug routine modification
    	7 : Critical MSR modification
    
    Debugging Details:
    ------------------
    
    
    OVERLAPPED_MODULE: Address regions for 'WUDFRd' and 'spsys.sys' overlap
    
    BUGCHECK_STR:  0x109
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800032d3640
    
    STACK_TEXT:  
    fffff880`0337e5d8 00000000`00000000 : 00000000`00000109 a3a039d8`a6d65576 b3b7465e`f95324cc fffff800`0368a2d0 : nt!KeBugCheckEx
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
        fffff8000368a3bf - nt!IopSetLegacyDeviceInstance+ef
    	[ 03:0b ]
    1 error : !nt (fffff8000368a3bf)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  ONE_BIT
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    Followup: memory_corruption
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051011-24866-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`03260000 PsLoadedModuleList = 0xfffff800`034a5e90
    Debug session time: Tue May 10 12:51:58.104 2011 (UTC - 4:00)
    System Uptime: 0 days 0:10:05.025
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................................
    Loading User Symbols
    Loading unloaded module list
    .......................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {0, 0, 0, 0}
    
    Probably caused by : rdyboost.sys ( rdyboost!SmdReadVolumeRangesDpc+47 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: 0000000000000000, The exception code that was not handled
    Arg2: 0000000000000000, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
    
    FAULTING_IP: 
    +6266383862326566
    00000000`00000000 ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
    
    BUGCHECK_STR:  0x1E_0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff800048412f8 -- (.exr 0xfffff800048412f8)
    ExceptionAddress: fffff800032ffbf4 (nt!ExfAcquireRundownProtection)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff800048413a0 -- (.trap 0xfffff800048413a0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=0800000000000028
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800032ffbf4 rsp=fffff80004841538 rbp=0000000000000002
     r8=fffffa800f4351b8  r9=0000000000000000 r10=fffff80003260000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!ExfAcquireRundownProtection:
    fffff800`032ffbf4 488b01          mov     rax,qword ptr [rcx] ds:4001:08000000`00000028=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032d7ffe to fffff800032e0610
    
    STACK_TEXT:  
    fffff800`048403d8 fffff800`032d7ffe : fffffa80`00000001 fffff880`0144fc82 fffff800`04840b50 fffff800`0330c2a0 : nt!KeBugCheck
    fffff800`048403e0 fffff800`0330bf6d : fffff800`034e7a10 fffff800`03423c78 fffff800`03260000 fffff800`048412f8 : nt!KiKernelCalloutExceptionHandler+0xe
    fffff800`04840410 fffff800`0330ad45 : fffff800`034270fc fffff800`04840488 fffff800`048412f8 fffff800`03260000 : nt!RtlpExecuteHandlerForException+0xd
    fffff800`04840440 fffff800`0331bdc1 : fffff800`048412f8 fffff800`04840b50 fffff800`00000000 08000000`00000000 : nt!RtlDispatchException+0x415
    fffff800`04840b20 fffff800`032dfcc2 : fffff800`048412f8 fffff880`019ba3b8 fffff800`048413a0 00000000`0000003a : nt!KiDispatchException+0x135
    fffff800`048411c0 fffff800`032de5ca : fffffa80`0c7f0050 fffff880`04bb0406 00000000`00000206 fffff800`03338c4f : nt!KiExceptionDispatch+0xc2
    fffff800`048413a0 fffff800`032ffbf4 : fffff880`019a28f7 00000000`0000003b fffffa80`0d5f4960 fffffa80`0f435190 : nt!KiGeneralProtectionFault+0x10a
    fffff800`04841538 fffff880`019a28f7 : 00000000`0000003b fffffa80`0d5f4960 fffffa80`0f435190 fffff880`019ba3b0 : nt!ExfAcquireRundownProtection
    fffff800`04841540 fffff800`032ec062 : fffff800`04841600 00000000`00000003 00000000`00000000 00000000`00000000 : rdyboost!SmdReadVolumeRangesDpc+0x47
    fffff800`04841570 fffff800`032ebf06 : fffffa80`0f2928e0 fffffa80`0f2928e0 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
    fffff800`048415e0 fffff800`032ebdee : 00000001`689f89f2 fffff800`04841c58 00000000`0000977f fffff800`03456268 : nt!KiProcessExpiredTimerList+0xc6
    fffff800`04841c30 fffff800`032ebbd7 : 00000000`67520dc4 00000000`0000977f 00000000`67520dbd 00000000`0000007f : nt!KiTimerExpiration+0x1be
    fffff800`04841cd0 fffff800`032d836a : fffff800`03452e80 fffff800`03460cc0 00000000`00000000 fffff800`033f7e00 : nt!KiRetireDpcList+0x277
    fffff800`04841d80 00000000`00000000 : fffff800`04842000 fffff800`0483c000 fffff800`04841d40 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    rdyboost!SmdReadVolumeRangesDpc+47
    fffff880`019a28f7 84c0            test    al,al
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  rdyboost!SmdReadVolumeRangesDpc+47
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: rdyboost
    
    IMAGE_NAME:  rdyboost.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7982e
    
    FAILURE_BUCKET_ID:  X64_0x1E_0_rdyboost!SmdReadVolumeRangesDpc+47
    
    BUCKET_ID:  X64_0x1E_0_rdyboost!SmdReadVolumeRangesDpc+47
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`00eba000 fffff880`00f11000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`03c13000 fffff880`03c9c000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`0f010000 fffff880`0f026000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`010dd000 fffff880`010e8000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`045eb000 fffff880`045f3000   AppleCharger AppleCharger.sys Mon Apr 26 23:54:05 2010 (4BD65FDD)
    fffff880`08a7e000 fffff880`08a89000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00ff1000 fffff880`00ffa000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`010b3000 fffff880`010dd000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff960`00820000 fffff960`00881000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`019f4000 fffff880`019fb000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`045da000 fffff880`045eb000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`08357000 fffff880`08375000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
    fffff960`00680000 fffff960`006a7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`016b6000 fffff880`016e0000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`01650000 fffff880`01680000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00d26000 fffff880`00d84000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01000000 fffff880`01072000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`0f000000 fffff880`0f010000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`066d8000 fffff880`066e6000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04539000 fffff880`045bc000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
    fffff880`045bc000 fffff880`045da000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`0452a000 fffff880`04539000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0163a000 fffff880`01650000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`08271000 fffff880`0828e000   dokan    dokan.sys    Mon Jul 05 08:38:43 2010 (4C31D253)
    fffff880`0667b000 fffff880`0669d000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`066f2000 fffff880`066fb000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`066e6000 fffff880`066f2000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`066fb000 fffff880`0670e000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`066cc000 fffff880`066d8000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`0fcb0000 fffff880`0fda4000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`0fda4000 fffff880`0fdea000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`0451f000 fffff880`0452a000   ElbyCDIO ElbyCDIO.sys Thu Dec 17 17:25:16 2009 (4B2AAFCC)
    fffff880`08a48000 fffff880`08a7e000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`01134000 fffff880`01148000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010e8000 fffff880`01134000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`013d3000 fffff880`013dd000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01600000 fffff880`0163a000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`018e8000 fffff880`01932000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff880`08b33000 fffff880`08b3c000   gdrv     gdrv.sys     Thu Mar 12 23:22:29 2009 (49B9D175)
    fffff880`0443c000 fffff880`04449000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`03217000 fffff800`03260000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`011dc000 fffff880`01200000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`08bd2000 fffff880`08beb000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`06743000 fffff880`0674b080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`08a3a000 fffff880`08a48000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`0828e000 fffff880`08357000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`019e2000 fffff880`019eb000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`04426000 fffff880`0443c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`04a32000 fffff880`04a41000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`08a89000 fffff880`08a97000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
    fffff800`00b9f000 fffff800`00ba9000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
    fffff880`04ab9000 fffff880`04afc000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`013a7000 fffff880`013c2000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`01578000 fffff880`015a3000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`0669d000 fffff880`066a2200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`067d8000 fffff880`067ed000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06794000 fffff880`067b7000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00cc3000 fffff880`00d12000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
    fffff880`0670e000 fffff880`0671c000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04a41000 fffff880`04a50000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`08a00000 fffff880`08a0d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00d94000 fffff880`00dae000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`015a3000 fffff880`015d4000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`08375000 fffff880`0838d000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0838d000 fffff880`083ba000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
    fffff880`08200000 fffff880`0824d000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
    fffff880`0824d000 fffff880`08271000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
    fffff880`013ef000 fffff880`013fa000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f1a000 fffff880`00f24000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0492b000 fffff880`04972000   msiscsi  msiscsi.sys  Sat Nov 20 05:35:14 2010 (4CE7A462)
    fffff880`01148000 fffff880`011a6000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`04514000 fffff880`0451f000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`019d0000 fffff880`019e2000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01425000 fffff880`01518000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`049d5000 fffff880`049e1000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`04800000 fffff880`0482f000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`04be7000 fffff880`04bfc000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`03d24000 fffff880`03d33000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03c9c000 fffff880`03ce1000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`01518000 fffff880`01578000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`08b3c000 fffff880`08b51000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`01072000 fffff880`01083000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`04508000 fffff880`04514000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`03260000 fffff800`0384a000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01204000 fffff880`013a7000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:39 2011 (4D79997B)
    fffff880`019eb000 fffff880`019f4000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`04bd0000 fffff880`04be7000   nusb3hub nusb3hub.sys Mon Oct 26 10:19:44 2009 (4AE5B000)
    fffff880`048fa000 fffff880`04929000   nusb3xhc nusb3xhc.sys Mon Oct 26 10:19:48 2009 (4AE5B004)
    fffff880`0fcae000 fffff880`0fcaf180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
    fffff880`066a3000 fffff880`066cc000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
    fffff880`0f053000 fffff880`0fcadd00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
    fffff880`03cea000 fffff880`03d10000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`00f64000 fffff880`00f79000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00f24000 fffff880`00f57000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`00fea000 fffff880`00ff1000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00d84000 fffff880`00d94000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013c2000 fffff880`013d3000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`0862e000 fffff880`086d4000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`08a0d000 fffff880`08a1d000   point64  point64.sys  Tue Dec 14 06:09:25 2010 (4D075065)
    fffff880`0663e000 fffff880`0667b000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d12000 fffff880`00d26000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`0f026000 fffff880`0f04a000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`0482f000 fffff880`0484a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0484a000 fffff880`0486b000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`0486b000 fffff880`04885000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`044b7000 fffff880`04508000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`04a27000 fffff880`04a32000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`015f2000 fffff880`015fb000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff960`00b00000 fffff960`00b48000   RDPDD    RDPDD.dll    unavailable (00000000)
    fffff880`08b51000 fffff880`08b7f000   rdpdr    rdpdr.sys    Sat Nov 20 06:06:41 2010 (4CE7ABC1)
    fffff880`013dd000 fffff880`013e6000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`013e6000 fffff880`013ef000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`08b99000 fffff880`08bd2000   RDPWD    RDPWD.SYS    Sat Nov 20 06:04:37 2010 (4CE7AB45)
    fffff880`01996000 fffff880`019d0000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`04885000 fffff880`0489d000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`048a3000 fffff880`048fa000   Rt64win7 Rt64win7.sys Thu Mar 04 08:42:52 2010 (4B8FB8DC)
    fffff880`0640c000 fffff880`0663dc00   RTKVHD64 RTKVHD64.sys Fri Mar 26 06:30:50 2010 (4BAC8CDA)
    fffff880`0fdea000 fffff880`0fdfc000   Rtnic64  Rtnic64.sys  Thu Jul 23 10:03:10 2009 (4A686D9E)
    fffff880`04a5f000 fffff880`04a8e000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
    fffff880`086d4000 fffff880`086df000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`0198e000 fffff880`01996000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`08a9b000 fffff880`08b33000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
    fffff880`08722000 fffff880`0878c000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
    fffff880`086df000 fffff880`08710000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
    fffff880`04972000 fffff880`049d5000   storport storport.sys Thu Mar 10 23:30:23 2011 (4D79A55F)
    fffff880`04ab7000 fffff880`04ab8480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`016e4000 fffff880`018e8000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`08710000 fffff880`08722000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
    fffff880`010a5000 fffff880`010b2000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`08b7f000 fffff880`08b8a000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
    fffff880`01083000 fffff880`010a5000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`03dce000 fffff880`03de2000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`08b8a000 fffff880`08b99000   tssecsrv tssecsrv.sys Sat Nov 20 06:04:09 2010 (4CE7AB29)
    fffff880`04400000 fffff880`04426000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`04afc000 fffff880`04b0e000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`08a1d000 fffff880`08a3a000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
    fffff880`04929000 fffff880`0492af00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03de2000 fffff880`03df3000   usbehci  usbehci.sys  Sat Nov 20 05:43:54 2010 (4CE7A66A)
    fffff880`04b76000 fffff880`04bd0000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`04456000 fffff880`044ac000   USBPORT  USBPORT.SYS  Sat Nov 20 05:44:00 2010 (4CE7A670)
    fffff880`04b2b000 fffff880`04b3a000   usbrpm   usbrpm.sys   Sat Nov 20 06:37:19 2010 (4CE7B2EF)
    fffff880`04449000 fffff880`04456000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`011a6000 fffff880`011dba80   VBoxDrv  VBoxDrv.sys  Thu Feb 17 11:21:07 2011 (4D5D4AF3)
    fffff880`04a02000 fffff880`04a26080   VBoxNetAdp VBoxNetAdp.sys Thu Feb 17 11:21:07 2011 (4D5D4AF3)
    fffff880`04a8e000 fffff880`04ab6d00   VBoxNetFlt VBoxNetFlt.sys Thu Feb 17 11:21:06 2011 (4D5D4AF2)
    fffff880`03dc2000 fffff880`03dcdc40   VBoxUSBMon VBoxUSBMon.sys Thu Feb 17 11:21:07 2011 (4D5D4AF3)
    fffff880`04a50000 fffff880`04a5f000   VClone   VClone.sys   Sun Aug 09 17:25:45 2009 (4A7F3ED9)
    fffff880`00f57000 fffff880`00f64000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`015d4000 fffff880`015e2000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01400000 fffff880`01425000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00dae000 fffff880`00dea000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
    fffff880`01932000 fffff880`01942000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
    fffff880`00f79000 fffff880`00f8e000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00f8e000 fffff880`00fea000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`01942000 fffff880`0198e000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`04b3a000 fffff880`04b76000   vpchbus  vpchbus.sys  Sat Nov 20 06:35:38 2010 (4CE7B28A)
    fffff880`03d10000 fffff880`03d24000   vpcnfltr vpcnfltr.sys Sat Nov 20 06:35:20 2010 (4CE7B278)
    fffff880`04b0e000 fffff880`04b2b000   vpcusb   vpcusb.sys   Sat Nov 20 06:35:31 2010 (4CE7B283)
    fffff880`03d6b000 fffff880`03dc1600   vpcvmm   vpcvmm.sys   Sat Nov 20 06:35:48 2010 (4CE7B294)
    fffff880`03d50000 fffff880`03d6b000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`015e2000 fffff880`015f2000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e07000 fffff880`00eab000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00eab000 fffff880`00eba000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03ce1000 fffff880`03cea000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00030000 fffff960`00342000   win32k   win32k.sys   unavailable (00000000)
    fffff880`00dea000 fffff880`00dfe000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
    fffff880`00f11000 fffff880`00f1a000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`067b7000 fffff880`067d8000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    
    Unloaded modules:
    fffff880`0878c000 fffff880`087fd000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`08beb000 fffff880`08bf9000   kbdhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`08be0000 fffff880`08bf9000   HIDCLASS.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00019000
    fffff880`08bd2000 fffff880`08be0000   hidusb.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`08a00000 fffff880`08a10000   point64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00010000
    fffff880`08a10000 fffff880`08a1d000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`08a3a000 fffff880`08a48000   kbdhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`08a89000 fffff880`08a96000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`08a0d000 fffff880`08a1d000   point64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00010000
    fffff880`08a00000 fffff880`08a0d000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`08a1d000 fffff880`08a3a000   usbccgp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001D000
    fffff880`08a3a000 fffff880`08a48000   kbdhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0672a000 fffff880`06743000   HIDCLASS.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00019000
    fffff880`0671c000 fffff880`0672a000   hidusb.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`06769000 fffff880`06786000   usbccgp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001D000
    fffff880`06759000 fffff880`06769000   point64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00010000
    fffff880`0674c000 fffff880`06759000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`06786000 fffff880`06794000   kbdhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01680000 fffff880`0168e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0168e000 fffff880`0169a000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`0169a000 fffff880`016a3000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`016a3000 fffff880`016b6000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`03d33000 fffff880`03d50000   serial.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001D000
    
    
     
  3. jjphoto

    jjphoto New Member

    Joined:
    May 10, 2011
    Messages:
    4
    Likes Received:
    0
    1) Rammon file attached.
    2) I uninstalled most of the Gigabyte software that was installed.
    3) Updated NEC and Virtual CloneDrive drivers

    Am I correct in assuming my next step should be doing memory checks with ram being swapped among slots?

    I've never messed with overclocking - can I be sure there are no frequency errors, etc. on my memory?
     

    Attached Files:

  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Yes, reduce the total amount of ram to 4gb and see how it goes. If still crashes, place this one stick in another slot.



    From what I see in your attachments, your CPU is not overclocked and the ram settings are right, 4 identical sticks 1333 9 9 9 24. You may want to verify these rates with the mamufacturer's since id tools in rare cases can be wrong. See if there are any special notes like the voltage needing to be set manually.

    Finally you may want to load bios defaults.
     

Share This Page

Loading...