nshady

New Member
Joined
Mar 11, 2011
Messages
6
Hi guys,

Our new machine starting BSODing every five minutes or so the day after I installed SP1. Here's all my info.

Windows 7 Professional SP1 64bit
Intel Core i5 760 @ 2.8GHz
4GB RAM G.Skill DDR3
NVIDIA GeForce GTX 460

I've run a memtest for about 8 cycles and didn't get any errors. I've updated all the drivers I can think of but I'm still getting tcpip.sys blue screens after the computer is on for five or ten minutes. Please help!
 


Attachments

  • RAMMon - SPD Info.txt
    RAMMon - SPD Info.txt
    29.3 KB · Views: 553
  • spd.webp
    spd.webp
    26.4 KB · Views: 506
  • Seven Forums.zip
    Seven Forums.zip
    2.6 MB · Views: 346
  • memory.webp
    memory.webp
    21.5 KB · Views: 472
Solution

BugCheck D1, {1c, 2, 1, fffff88001b2d87e}
Process: WD File Management Engine
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )



1. Uninstall PC Tools and for now install MSE:
Link Removed due to 404 Error


2. Update JMicron RAID driver
jraid.sys Thu Aug 13 04:10:27 2009


3. Update Marvell SATA Controller
mv91xx.sys Fri Oct 09 06:00:53 2009
mvxxmm.sys Thu Oct 08 04:36:51 2009


4. If crashes reoccur, set the memory according to the maker's specs 1600Mhz 9-9-9-24 1.5v with enabling the XMP profile in bios.

Your RAM is currently working 1333Mhz.














Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version...

BugCheck D1, {1c, 2, 1, fffff88001b2d87e}
Process: WD File Management Engine
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )



1. Uninstall PC Tools and for now install MSE:
Link Removed due to 404 Error


2. Update JMicron RAID driver
jraid.sys Thu Aug 13 04:10:27 2009


3. Update Marvell SATA Controller
mv91xx.sys Fri Oct 09 06:00:53 2009
mvxxmm.sys Thu Oct 08 04:36:51 2009


4. If crashes reoccur, set the memory according to the maker's specs 1600Mhz 9-9-9-24 1.5v with enabling the XMP profile in bios.

Your RAM is currently working 1333Mhz.














Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031211-20202-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0304b000 PsLoadedModuleList = 0xfffff800`03290e90
Debug session time: Fri Mar 11 19:44:53.181 2011 (UTC - 5:00)
System Uptime: 0 days 1:15:20.539
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {1c, 2, 1, fffff88001ad187e}

Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001ad187e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fc0e8
 000000000000001c 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip!TcpBeginTcbSend+33e
fffff880`01ad187e f083401c01      lock add dword ptr [rax+1Ch],1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8800674a460 -- (.trap 0xfffff8800674a460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80039f0ce0
rdx=fffffa80039f0d98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001ad187e rsp=fffff8800674a5f0 rbp=fffff8800674a700
 r8=fffffa80039f0cd0  r9=fffffa80039f0ce0 r10=fffffa80039f0c10
r11=fffff8800674a820 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x33e:
fffff880`01ad187e f083401c01      lock add dword ptr [rax+1Ch],1 ds:00000000`0000001c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030cabe9 to fffff800030cb640

STACK_TEXT:  
fffff880`0674a318 fffff800`030cabe9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0674a320 fffff800`030c9860 : 00000000`00000006 00000000`00000000 00000002`8b008df9 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`0674a460 fffff880`01ad187e : 00000000`00000001 fffffa80`037aa860 00000014`00000000 fffff880`01aecdbf : nt!KiPageFault+0x260
fffff880`0674a5f0 fffff880`01ad5b29 : 00000000`00000000 fffff880`0674abd8 fffffa80`04bf0000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e
fffff880`0674a870 fffff880`01af67e6 : 00000000`00000000 fffffa80`04a96f01 fffff880`01bd6128 00000000`00000000 : tcpip!TcpTcbSend+0x1d9
fffff880`0674aaf0 fffff880`01ad1325 : fffff880`0697e200 00000000`00000000 00000000`00000000 00000000`00005000 : tcpip!TcpFlushDelay+0x316
fffff880`0674abd0 fffff880`01ac8137 : fffffa80`04a87f00 fffffa80`04afaf30 fffffa80`00008b00 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x3e5
fffff880`0674aca0 fffff880`01ac7caa : 00000000`00000000 fffff880`01bdc9a0 fffff880`0674ae60 fffffa80`0655f460 : tcpip!IppDeliverListToProtocol+0x97
fffff880`0674ad60 fffff880`01ac72a9 : 00000000`00000000 00000000`00000000 fffff880`0674ad00 fffff880`0674ae50 : tcpip!IppProcessDeliverList+0x5a
fffff880`0674ae00 fffff880`01ac4fff : fffffa80`0653fae0 fffffa80`04bf0000 fffff880`01bdc9a0 00000000`061f8401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0674aee0 fffff880`01ac45f2 : fffffa80`065e0cd0 00000000`00000000 fffffa80`061f8401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`0674b0e0 fffff880`01ac3a8a : fffffa80`061f8490 fffff880`0674b210 fffffa80`061f8490 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0674b1c0 fffff800`030d8078 : fffffa80`06561b40 00000000`00004800 fffffa80`072a2060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0674b210 fffff880`01ac4152 : fffff880`01ac39b0 00000000`00000018 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0674b2f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tcpip!TcpBeginTcbSend+33e
fffff880`01ad187e f083401c01      lock add dword ptr [rax+1Ch],1

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  tcpip!TcpBeginTcbSend+33e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79420

FAILURE_BUCKET_ID:  X64_0xD1_tcpip!TcpBeginTcbSend+33e

BUCKET_ID:  X64_0xD1_tcpip!TcpBeginTcbSend+33e

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031211-20826-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0300a000 PsLoadedModuleList = 0xfffff800`0324fe90
Debug session time: Fri Mar 11 21:56:53.246 2011 (UTC - 5:00)
System Uptime: 0 days 0:05:17.604
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {1c, 2, 1, fffff88001a9787e}

Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001a9787e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bb0e8
 000000000000001c 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip!TcpBeginTcbSend+33e
fffff880`01a9787e f083401c01      lock add dword ptr [rax+1Ch],1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  SF Diagnostic 

TRAP_FRAME:  fffff80000ba17e0 -- (.trap 0xfffff80000ba17e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80048f49d0
rdx=fffffa80048f4a88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001a9787e rsp=fffff80000ba1970 rbp=fffff80000ba1a80
 r8=fffffa80048f49c0  r9=fffffa80048f49d0 r10=fffffa80048f4900
r11=fffff80000ba1b20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x33e:
fffff880`01a9787e f083401c01      lock add dword ptr [rax+1Ch],1 ds:00000000`0000001c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003089be9 to fffff8000308a640

STACK_TEXT:  
fffff800`00ba1698 fffff800`03089be9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba16a0 fffff800`03088860 : 00000000`00000006 00000000`00000000 00000002`8b006dfb 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff800`00ba17e0 fffff880`01a9787e : 00000000`00000001 fffffa80`0493b8b0 ffff0014`00000000 fffff880`01ab2dbf : nt!KiPageFault+0x260
fffff800`00ba1970 fffff880`01a9bb29 : 00000000`00000000 fffff800`00ba1f58 fffffa80`04312000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e
fffff800`00ba1bf0 fffff880`01abc7e6 : 00000000`00000000 00000001`041d4f01 fffff880`01b9c128 fffffa80`04185080 : tcpip!TcpTcbSend+0x1d9
fffff800`00ba1e70 fffff880`01a97325 : fffff880`0605fd00 00000000`00000000 00000000`00000000 fffff880`01174600 : tcpip!TcpFlushDelay+0x316
fffff800`00ba1f50 fffff880`01a8e137 : fffffa80`0432f400 fffffa80`041f4830 fffffa80`00008b00 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x3e5
fffff800`00ba2020 fffff880`01a8dcaa : 00000000`00000000 fffff880`01ba29a0 fffff800`00ba21e0 fffffa80`08365a02 : tcpip!IppDeliverListToProtocol+0x97
fffff800`00ba20e0 fffff880`01a8d2a9 : 0000057f`f7c9a758 fffff880`01602bee fffffa80`040e02d0 fffff800`00ba21d0 : tcpip!IppProcessDeliverList+0x5a
fffff800`00ba2180 fffff880`01a8afff : 00000000`74617402 fffffa80`04312000 fffff880`01ba29a0 00000000`06647001 : tcpip!IppReceiveHeaderBatch+0x23a
fffff800`00ba2260 fffff880`01a8a5f2 : fffffa80`06716730 00000000`00000000 fffffa80`06647001 fffff780`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff800`00ba2460 fffff880`01a89a8a : fffffa80`06647010 fffff800`00ba2590 fffffa80`06647010 fffff800`03090000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff800`00ba2540 fffff800`03097078 : fffffa80`063b7330 00000000`00004800 fffffa80`069da980 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff800`00ba2590 fffff880`01a8a152 : fffff880`01a899b0 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff800`00ba2670 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tcpip!TcpBeginTcbSend+33e
fffff880`01a9787e f083401c01      lock add dword ptr [rax+1Ch],1

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  tcpip!TcpBeginTcbSend+33e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79420

FAILURE_BUCKET_ID:  X64_0xD1_tcpip!TcpBeginTcbSend+33e

BUCKET_ID:  X64_0xD1_tcpip!TcpBeginTcbSend+33e

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031211-21262-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03067000 PsLoadedModuleList = 0xfffff800`032ace90
Debug session time: Fri Mar 11 21:44:53.645 2011 (UTC - 5:00)
System Uptime: 0 days 0:11:13.613
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {1c, 2, 1, fffff88001b2d87e}

Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001b2d87e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800033180e8
 000000000000001c 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip!TcpBeginTcbSend+33e
fffff880`01b2d87e f083401c01      lock add dword ptr [rax+1Ch],1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  WDFME.exe

TRAP_FRAME:  fffff88003391730 -- (.trap 0xfffff88003391730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8004940d10
rdx=fffffa8004940dc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001b2d87e rsp=fffff880033918c0 rbp=fffff880033919d0
 r8=fffffa8004940d00  r9=fffffa8004940d10 r10=fffffa8004940c40
r11=fffff88003391b20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x33e:
fffff880`01b2d87e f083401c01      lock add dword ptr [rax+1Ch],1 ds:00000000`0000001c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030e6be9 to fffff800030e7640

STACK_TEXT:  
fffff880`033915e8 fffff800`030e6be9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`033915f0 fffff800`030e5860 : fffffa80`041ee938 00000000`00000382 00000002`8b0043fb 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`03391730 fffff880`01b2d87e : 00000000`00000001 fffffa80`03e78860 fffffb43`06934101 fffff880`01b48dbf : nt!KiPageFault+0x260
fffff880`033918c0 fffff880`01b31b29 : 00000000`00000000 fffff880`03391ea8 fffffa80`0431e000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e
fffff880`03391b40 fffff880`01b527e6 : 00000000`00000000 fffffa80`03e74301 fffff880`01c32128 00000000`00008b00 : tcpip!TcpTcbSend+0x1d9
fffff880`03391dc0 fffff880`01b2d325 : fffff880`06975300 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpFlushDelay+0x316
fffff880`03391ea0 fffff880`01b24137 : fffffa80`041f3900 fffffa80`0432b3c0 fffffa80`00008b00 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x3e5
fffff880`03391f70 fffff880`01b23caa : 00000000`00000000 fffff880`01c389a0 fffff880`03392130 fffffa80`0646be20 : tcpip!IppDeliverListToProtocol+0x97
fffff880`03392030 fffff880`01b232a9 : fffff8a0`0ab8b000 fffff800`030f3900 fffff880`03392000 fffff880`03392120 : tcpip!IppProcessDeliverList+0x5a
fffff880`033920d0 fffff880`01b20fff : fffff880`03392340 fffffa80`0431e000 fffff880`01c389a0 00000000`061fc401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`033921b0 fffff880`01b205f2 : fffffa80`065a5cf0 00000000`00000000 fffffa80`061fc401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`033923b0 fffff880`01b1fa8a : fffffa80`061fc400 fffff880`033924e0 fffffa80`061fc400 fffffa80`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`03392490 fffff800`030f4078 : fffffa80`0646c3f0 00000000`00004800 fffffa80`07d0a060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`033924e0 fffff880`01b20152 : fffff880`01b1f9b0 fffff880`03392838 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`033925c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tcpip!TcpBeginTcbSend+33e
fffff880`01b2d87e f083401c01      lock add dword ptr [rax+1Ch],1

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  tcpip!TcpBeginTcbSend+33e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79420

FAILURE_BUCKET_ID:  X64_0xD1_tcpip!TcpBeginTcbSend+33e

BUCKET_ID:  X64_0xD1_tcpip!TcpBeginTcbSend+33e

Followup: MachineOwner
---------















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031211-21106-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03014000 PsLoadedModuleList = 0xfffff800`03259e90
Debug session time: Fri Mar 11 21:50:52.804 2011 (UTC - 5:00)
System Uptime: 0 days 0:05:15.162
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {1c, 2, 1, fffff88001af787e}

Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001af787e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c50e8
 000000000000001c 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip!TcpBeginTcbSend+33e
fffff880`01af787e f083401c01      lock add dword ptr [rax+1Ch],1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8800a904460 -- (.trap 0xfffff8800a904460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800883d690
rdx=fffffa800883d748 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001af787e rsp=fffff8800a9045f0 rbp=fffff8800a904700
 r8=fffffa800883d680  r9=fffffa800883d690 r10=fffffa800883d5c0
r11=fffff8800a904820 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x33e:
fffff880`01af787e f083401c01      lock add dword ptr [rax+1Ch],1 ds:00000000`0000001c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003093be9 to fffff80003094640

STACK_TEXT:  
fffff880`0a904318 fffff800`03093be9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0a904320 fffff800`03092860 : 00000000`00000006 00000000`00000000 00000002`8b0052fb 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`0a904460 fffff880`01af787e : 00000000`00000001 fffffa80`0887acf0 00000014`00000000 fffff880`01b12dbf : nt!KiPageFault+0x260
fffff880`0a9045f0 fffff880`01afbb29 : 00000000`00000000 fffff880`0a904bd8 fffffa80`04c13000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e
fffff880`0a904870 fffff880`01b1c7e6 : 00000000`00000000 fffffa80`0887ac01 fffff880`01bfc128 00000000`00000000 : tcpip!TcpTcbSend+0x1d9
fffff880`0a904af0 fffff880`01af7325 : fffff880`06927a00 00000000`00000000 00000000`00000000 00000000`00005000 : tcpip!TcpFlushDelay+0x316
fffff880`0a904bd0 fffff880`01aee137 : fffffa80`04c1a6f0 fffffa80`04adc820 fffffa80`00008b00 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x3e5
fffff880`0a904ca0 fffff880`01aedcaa : 00000000`00000000 fffff880`01c029a0 fffff880`0a904e60 fffffa80`066119b0 : tcpip!IppDeliverListToProtocol+0x97
fffff880`0a904d60 fffff880`01aed2a9 : 00000000`00000000 00000000`00000000 fffff880`0a904d00 fffff880`0a904e50 : tcpip!IppProcessDeliverList+0x5a
fffff880`0a904e00 fffff880`01aeafff : 00000000`0400a8c0 fffffa80`04c13000 fffff880`01c029a0 00000000`064a1001 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0a904ee0 fffff880`01aea5f2 : fffffa80`066e94f0 00000000`00000000 fffffa80`064a1001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`0a9050e0 fffff880`01ae9a8a : fffffa80`064a1010 fffff880`0a905210 fffffa80`064a1010 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0a9051c0 fffff800`030a1078 : fffffa80`06613e20 00000000`00004800 fffffa80`089c3060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0a905210 fffff880`01aea152 : fffff880`01ae99b0 00000000`00000018 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0a9052f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tcpip!TcpBeginTcbSend+33e
fffff880`01af787e f083401c01      lock add dword ptr [rax+1Ch],1

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  tcpip!TcpBeginTcbSend+33e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79420

FAILURE_BUCKET_ID:  X64_0xD1_tcpip!TcpBeginTcbSend+33e

BUCKET_ID:  X64_0xD1_tcpip!TcpBeginTcbSend+33e

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`00f53000 fffff880`00faa000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`03e9f000 fffff880`03f28000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`0497e000 fffff880`04994000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00e74000 fffff880`00e7f000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`0494d000 fffff880`04955000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`044ca000 fffff880`044d0000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`044c4000 fffff880`044ca000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`07f4d000 fffff880`07f58000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`011cd000 fffff880`011d6000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011d6000 fffff880`01200000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`101d5000 fffff880`101d8e80   BdaSup   BdaSup.SYS   Mon Jul 13 20:06:40 2009 (4A5BCC10)
fffff880`01df1000 fffff880`01df8000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`044b3000 fffff880`044c4000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0736e000 fffff880`0738c000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00780000 fffff960`007a7000   cdd      cdd.dll      unavailable (00000000)
fffff880`01a66000 fffff880`01a90000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00d0f000 fffff880`00dcf000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01a00000 fffff880`01a30000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00cb1000 fffff880`00d0f000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01648000 fffff880`016ba000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`0496e000 fffff880`0497e000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`06dee000 fffff880`06dfc000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04412000 fffff880`04495000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`04495000 fffff880`044b3000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`03e7c000 fffff880`03e8b000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01dd2000 fffff880`01de8000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`019da000 fffff880`019fc000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06c0c000 fffff880`06c15000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06c00000 fffff880`06c0c000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`03e8b000 fffff880`03e9e000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06de2000 fffff880`06dee000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10064000 fffff880`10158000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`10158000 fffff880`1019e000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`00e7f000 fffff880`00e93000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00fb3000 fffff880`00fff000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`016cb000 fffff880`016d5000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01d98000 fffff880`01dd2000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01c95000 fffff880`01cdf000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`04961000 fffff880`0496e000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`035fe000 fffff800`03647000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`1019e000 fffff880`101c2000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`01a4d000 fffff880`01a66000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`06c15000 fffff880`06c1d080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`045ee000 fffff880`045fc000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`072a5000 fffff880`0736e000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01d8f000 fffff880`01d98000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`044f6000 fffff880`0450c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`010cc000 fffff880`010ea000   jraid    jraid.sys    Thu Aug 13 04:10:27 2009 (4A83CA73)
fffff880`04861000 fffff880`04870000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04400000 fffff880`0440e000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bc3000 fffff800`00bcd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`01600000 fffff880`01643000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`015a3000 fffff880`015be000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01906000 fffff880`01931000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`101d9000 fffff880`101de200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`01890000 fffff880`018a5000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01273000 fffff880`01296000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c4e000 fffff880`00c9d000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`03fee000 fffff880`03ffc000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04870000 fffff880`0487f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`049f3000 fffff880`04a00000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`01163000 fffff880`0117d000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`0738c000 fffff880`073a4000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`073a4000 fffff880`073d1000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`07200000 fffff880`0724d000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`0724d000 fffff880`07271000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`01000000 fffff880`0100b000   msahci   msahci.sys   Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`0198f000 fffff880`0199a000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01215000 fffff880`01273000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`03e71000 fffff880`03e7c000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01d7d000 fffff880`01d8f000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0100b000 fffff880`01095000   mv91xx   mv91xx.sys   Fri Oct 09 06:00:53 2009 (4ACF09D5)
fffff880`010c4000 fffff880`010cc000   mvxxmm   mvxxmm.sys   Thu Oct 08 04:36:51 2009 (4ACDA4A3)
fffff880`016d5000 fffff880`017c8000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`049b8000 fffff880`049c4000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`06f13000 fffff880`06f26000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`049c4000 fffff880`049f3000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`0187b000 fffff880`01890000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`03fa7000 fffff880`03fb6000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03f28000 fffff880`03f6d000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`018a6000 fffff880`01906000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`0199a000 fffff880`019ab000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03e65000 fffff880`03e71000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03014000 fffff800`035fe000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01400000 fffff880`015a3000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`01de8000 fffff880`01df1000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`101df000 fffff880`101f6000   nusb3hub nusb3hub.sys Mon Oct 26 10:19:44 2009 (4AE5B000)
fffff880`04562000 fffff880`04591000   nusb3xhc nusb3xhc.sys Mon Oct 26 10:19:48 2009 (4AE5B004)
fffff880`10062000 fffff880`10063180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`017c8000 fffff880`017f1000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`0f407000 fffff880`10061d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`06ec0000 fffff880`06f13000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03f81000 fffff880`03fa7000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`0114c000 fffff880`01153000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`01153000 fffff880`01163000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`00c00000 fffff880`00c43000   PCTCore64 PCTCore64.sys Wed Nov 24 00:16:29 2010 (4CEC9FAD)
fffff880`012a0000 fffff880`01311000   pctDS64  pctDS64.sys  Thu Jun 03 22:06:38 2010 (4C085FAE)
fffff880`01311000 fffff880`013dd000   pctEFA64 pctEFA64.sys Fri Jul 16 00:45:25 2010 (4C3FE3E5)
fffff880`01800000 fffff880`01856000   pctgntdi64 pctgntdi64.sys Tue Nov 16 15:07:31 2010 (4CE2E483)
fffff880`07eac000 fffff880`07ec5000   pctplsg64 pctplsg64.sys Wed Nov 24 15:31:41 2010 (4CED762D)
fffff880`07e9f000 fffff880`07eab0e0   PCTSDInj64 PCTSDInj64.sys Tue Aug 31 20:31:02 2010 (4C7D9EC6)
fffff880`01856000 fffff880`0187b000   PctWfpFilter64 PctWfpFilter64.sys Tue Nov 16 15:17:57 2010 (4CE2E6F5)
fffff880`016ba000 fffff880`016cb000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06f3e000 fffff880`06fe4000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`015be000 fffff880`015fb000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c9d000 fffff880`00cb1000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04994000 fffff880`049b8000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`04800000 fffff880`0481b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0481b000 fffff880`0483c000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`0483c000 fffff880`04856000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03e14000 fffff880`03e65000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`04856000 fffff880`04861000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01974000 fffff880`0197d000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0197d000 fffff880`01986000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01986000 fffff880`0198f000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01d43000 fffff880`01d7d000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`06f26000 fffff880`06f3e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`048f6000 fffff880`0494d000   Rt64win7 Rt64win7.sys Mon Sep 20 03:38:09 2010 (4C970F61)
fffff880`01095000 fffff880`010c4000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
fffff880`07271000 fffff880`0727c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04955000 fffff880`04961000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03fb6000 fffff880`03fd3000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01d3b000 fffff880`01d43000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07edc000 fffff880`07f4d000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`07e06000 fffff880`07e9f000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`06e31000 fffff880`06e9c000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`06e00000 fffff880`06e31000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`0487f000 fffff880`04880480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01a91000 fffff880`01c95000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`0727c000 fffff880`0728e000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`019cd000 fffff880`019da000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`019ab000 fffff880`019cd000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`03e00000 fffff880`03e14000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff880`013dd000 fffff880`013f1000   TfFsMon  TfFsMon.sys  Wed Dec 01 18:00:02 2010 (4CF6D372)
fffff880`07ece000 fffff880`07edc000   TfNetMon TfNetMon.sys Wed Dec 01 18:00:08 2010 (4CF6D378)
fffff880`01200000 fffff880`01215000   TfSysMon TfSysMon.sys Wed Dec 01 18:00:05 2010 (4CF6D375)
fffff960`00550000 fffff960`0055a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`044d0000 fffff880`044f6000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`04881000 fffff880`04893000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`01a30000 fffff880`01a4d000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`101d3000 fffff880`101d4f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`101c2000 fffff880`101d3000   usbehci  usbehci.sys  Sat Nov 20 05:43:54 2010 (4CE7A66A)
fffff880`04893000 fffff880`048ed000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`0450c000 fffff880`04562000   USBPORT  USBPORT.SYS  Sat Nov 20 05:44:00 2010 (4CE7A670)
fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01931000 fffff880`0193f000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`06c21000 fffff880`06de2000   viahduaa viahduaa.sys Wed Aug 04 03:51:53 2010 (4C591C19)
fffff880`0193f000 fffff880`01964000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0117d000 fffff880`011b9000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`01cdf000 fffff880`01cef000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`010f0000 fffff880`0114c000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01cef000 fffff880`01d3b000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`03fd3000 fffff880`03fee000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01964000 fffff880`01974000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ea0000 fffff880`00f44000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f44000 fffff880`00f53000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03f78000 fffff880`03f81000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00050000 fffff960`00361000   win32k   win32k.sys   unavailable (00000000)
fffff880`011b9000 fffff880`011cd000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`00faa000 fffff880`00fb3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03f6d000 fffff880`03f78000   ws2ifsl  ws2ifsl.sys  Mon Jul 13 20:10:33 2009 (4A5BCCF9)
fffff880`00dcf000 fffff880`00df0000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
fffff880`04591000 fffff880`045ed780   zl885x64 zl885x64.sys Thu Jun 10 06:32:28 2010 (4C10BF3C)

Unloaded modules:
fffff880`07f61000 fffff880`07f6a000   DirectIo.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`07f58000 fffff880`07f61000   DirectIo.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`07ec5000 fffff880`07ece000   cpuz135_x64.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01a30000 fffff880`01a3e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01a3e000 fffff880`01a4a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01a4a000 fffff880`01a53000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01a53000 fffff880`01a66000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


Solution
Hi Cybercore,

Thanks for your response. In between my post and seeing your reply I had independently discovered that some people were having BSODs with Spyware Doctor and had got rid of it. That seemed to stabilise the system. I've put on MSE and will keep an eye on it.

In Device Manager I have found the JMicron and Marvell drivers but they claim to be up to date. I've found JMicron's website but I don't actually know what this is a driver for and hence which of these - Link Removed - I should download. Nor have I had much luck with Marvell.com. Could you please explain a bit more?

Thanks,

- nshady
 


Back
Top