Thứ Ba, 28 tháng 6, 2016

CompositeBus.sys BSOD part 1


gtgt

Hi,

I've had regular BSODs and have reinstalled my video and WiFi drivers a few times, when those specific drivers have been listed in BlueScreenView as the cause.

Most recent BSODs allegedly caused by CompositeBus.sys and ntoskrnl.exe.

Have attached the dump and perfmon .zip file.

Thanks for your help.

Cheers,
George



CarlTR6

That is a lot of dumps. The most recent dump in this upload is dated 12/29/2009. Have you had any crashes more recently?

gtgt

Yeah, had a crash today:


Code:
ADDITIONAL_DEBUG_TEXT:   Use '!findthebuild' command to search for the target build information. If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols. MODULE_NAME: nt FAULTING_MODULE: fffff80002e5f000 nt DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9 EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully. FAULTING_IP:  +65fc2faf0509dc68 00000000`00000000 ??              ??? EXCEPTION_PARAMETER1:  0000000000000000 EXCEPTION_PARAMETER2:  0000000000000000 ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0 BUGCHECK_STR:  0x1E_0 CUSTOMER_CRASH_COUNT:  1 DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT CURRENT_IRQL:  0 LAST_CONTROL_TRANSFER:  from fffff80002ec746e to fffff80002ecf710 STACK_TEXT:   fffff880`097a6bd8 fffff800`02ec746e : 80000000`7a805867 fffff880`097a6c40 fffff880`097a7350 fffff800`02efc668 : nt+0x70710 fffff880`097a6be0 80000000`7a805867 : fffff880`097a6c40 fffff880`097a7350 fffff800`02efc668 00000000`00000000 : nt+0x6846e fffff880`097a6be8 fffff880`097a6c40 : fffff880`097a7350 fffff800`02efc668 00000000`00000000 fffff800`02ef540d : 0x80000000`7a805867 fffff880`097a6bf0 fffff880`097a7350 : fffff800`02efc668 00000000`00000000 fffff800`02ef540d fffff800`030dbcf8 : 0xfffff880`097a6c40 fffff880`097a6bf8 fffff800`02efc668 : 00000000`00000000 fffff800`02ef540d fffff800`030dbcf8 fffff800`0301eaf0 : 0xfffff880`097a7350 fffff880`097a6c00 00000000`00000000 : fffff800`02ef540d fffff800`030dbcf8 fffff800`0301eaf0 fffff800`02e5f000 : nt+0x9d668  STACK_COMMAND:  kb FOLLOWUP_IP:  nt+70710 fffff800`02ecf710 4883ec28        sub     rsp,28h SYMBOL_STACK_INDEX:  0 SYMBOL_NAME:  nt+70710 FOLLOWUP_NAME:  MachineOwner IMAGE_NAME:  ntoskrnl.exe BUCKET_ID:  WRONG_SYMBOLS Followup: MachineOwner --------- 0: kd> lmvm nt start             end                 module name fffff800`02e5f000 fffff800`0343b000   nt         (no symbols)                Loaded symbol image file: ntoskrnl.exe     Image path: ntoskrnl.exe     Image name: ntoskrnl.exe     Timestamp:        Fri Jun 18 21:16:41 2010 (4C1C44A9)     CheckSum:         005489D7     ImageSize:        005DC000     Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4 0: kd> lmvm nt start             end                 module name fffff800`02e5f000 fffff800`0343b000   nt         (no symbols)                Loaded symbol image file: ntoskrnl.exe     Image path: ntoskrnl.exe     Image name: ntoskrnl.exe     Timestamp:        Fri Jun 18 21:16:41 2010 (4C1C44A9)     CheckSum:         005489D7     ImageSize:        005DC000     Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4

CarlTR6

Upload the dump file to us.

http://www.sevenforums.com/tutorials...en-forums.html

gtgt

Hi Carl,

I zipped the last 5 crashes, which occurred in the past 3 weeks, and attached to this reply.

Thanks!

CarlTR6

I looked at the three most recent dumps. This is a hardware/hardware related issue.

Error code 1E, KMODE_EXCEPTION_NOT_HANDLED - usual causes are Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS


Error code 7E, SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M - usual causes are Insufficient disk space, Device driver, Video card, BIOS, Breakpoint with no debugger attached, Hardware incompatibility, Faulty system service, Memory, 3rd party remote control.

The dumps give us a specific cause but they point to memory corruption and possibly a video card or driver problem.
Code:
******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 1E, {0, 0, 0, 0}  Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )  Followup: MachineOwner ---------  0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception  Debugging Details: ------------------   EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.  FAULTING_IP:  +5dd3952f01f0d8e8 00000000`00000000 ??              ???  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  0000000000000000  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  BUGCHECK_STR:  0x1E  PROCESS_NAME:  System  CURRENT_IRQL:  0  EXCEPTION_RECORD:  fffff880097a7ae8 -- (.exr 0xfffff880097a7ae8) ExceptionAddress: fffff80002ec75ce (nt!KySwitchKernelStackCallout+0x000000000000002e)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  TRAP_FRAME:  fffff880097a7b90 -- (.trap 0xfffff880097a7b90) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fefff880097a7d70 rdx=fffff8800336c138 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002ec75ce rsp=fffff880097a7d20 rbp=fffff88002fcafa0  r8=0000000000000004  r9=0000000000020000 r10=fffffa800b037000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0         nv up di pl zr na po nc nt!KySwitchKernelStackCallout+0x2e: fffff800`02ec75ce 4c8b5128        mov     r10,qword ptr [rcx+28h] ds:f000:fefff880`097a7d98=???????????????? Resetting default scope  LAST_CONTROL_TRANSFER:  from fffff80002ec746e to fffff80002ecf710  STACK_TEXT:   fffff880`097a6bd8 fffff800`02ec746e : 80000000`7a805867 fffff880`097a6c40 fffff880`097a7350 fffff800`02efc668 : nt!KeBugCheck fffff880`097a6be0 fffff800`02ef540d : fffff800`030dbcf8 fffff800`0301eaf0 fffff800`02e5f000 fffff880`097a7ae8 : nt!KiKernelCalloutExceptionHandler+0xe fffff880`097a6c10 fffff800`02efca90 : fffff800`0301eae8 fffff880`097a6c88 fffff880`097a7ae8 fffff800`02e5f000 : nt!RtlpExecuteHandlerForException+0xd fffff880`097a6c40 fffff800`02f099ef : fffff880`097a7ae8 fffff880`097a7350 fffff880`00000000 fffff880`02fcad90 : nt!RtlDispatchException+0x410 fffff880`097a7320 fffff800`02eced82 : fffff880`097a7ae8 00000000`00000000 fffff880`097a7b90 fffffa80`03ce3040 : nt!KiDispatchException+0x16f fffff880`097a79b0 fffff800`02ecd68a : 00000000`00000000 fffffa80`04a82f20 fffffa80`04df7b60 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff880`097a7b90 fffff800`02ec75ce : 00000000`00000000 00000000`0014eaa0 00000000`77d64270 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a fffff880`097a7d20 fffff800`02ec7581 : 00000000`00000000 fffffa80`03ce3040 fffff880`097a8000 fffff800`02edf01a : nt!KySwitchKernelStackCallout+0x2e fffff880`02fcad90 fffff800`02edf01a : fffff880`02fcaf50 fffffa80`03ce3040 fffff880`02fcb350 fffff8a0`02b33140 : nt!KiSwitchKernelStackContinue fffff880`02fcadb0 fffff880`0123fb69 : fffff880`01241534 fffff880`02fcaec8 fffff6fc`00001000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x29a fffff880`02fcae90 fffff880`0123f036 : fffffa80`048c8d80 00000000`00000000 fffff8a0`02b33140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xa9 fffff880`02fcaf00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x216   STACK_COMMAND:  kb  FOLLOWUP_IP:  nt!KiKernelCalloutExceptionHandler+e fffff800`02ec746e 90              nop  SYMBOL_STACK_INDEX:  1  SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: nt  IMAGE_NAME:  ntkrnlmp.exe  DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9  FAILURE_BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e  BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e  Followup: MachineOwner ---------  ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 1000007E, {ffffffffc0000005, fffff8800fe2105b, fffff8800408d658, fffff8800408cec0}  Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+10b )  Followup: MachineOwner ---------  1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003.  This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG.  This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG.  This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8800fe2105b, The address that the exception occurred at Arg3: fffff8800408d658, Exception Record Address Arg4: fffff8800408cec0, Context Record Address  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+10b fffff880`0fe2105b 48392cf0        cmp     qword ptr [rax+rsi*8],rbp  EXCEPTION_RECORD:  fffff8800408d658 -- (.exr 0xfffff8800408d658) ExceptionAddress: fffff8800fe2105b (dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0x000000000000010b)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  CONTEXT:  fffff8800408cec0 -- (.cxr 0xfffff8800408cec0) rax=fefff8a00d93eb00 rbx=fffff8a00dd248c0 rcx=fffff8a00d93eb30 rdx=0000000000000005 rsi=0000000000000004 rdi=fffffa8006613000 rip=fffff8800fe2105b rsp=fffff8800408d890 rbp=0000000000001a01  r8=0000000000000006  r9=0000000000000006 r10=0000000000000030 r11=fffffa80066143d8 r12=0000000000000003 r13=0000000000000004 r14=fffffa8005cbc840 r15=0000000000000007 iopl=0         nv up ei pl zr na po nc cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246 dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0x10b: fffff880`0fe2105b 48392cf0        cmp     qword ptr [rax+rsi*8],rbp ds:002b:fefff8a0`0d93eb20=???????????????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  PROCESS_NAME:  System  CURRENT_IRQL:  0  ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  ffffffffffffffff  READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b90e0  ffffffffffffffff   FOLLOWUP_IP:  dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+10b fffff880`0fe2105b 48392cf0        cmp     qword ptr [rax+rsi*8],rbp  BUGCHECK_STR:  0x7E  LAST_CONTROL_TRANSFER:  from fffff8800fe1e8af to fffff8800fe2105b  STACK_TEXT:   fffff880`0408d890 fffff880`0fe1e8af : 00000000`00000000 fffffa80`04f67028 00000000`00000007 fffffa80`04f68050 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0x10b fffff880`0408d8d0 fffff880`0fe3865d : 00000000`00000000 fffff8a0`0c2aa950 fffffa80`00000004 fffffa80`05cbc840 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0xe1b fffff880`0408daa0 fffff880`0fe38398 : fffff880`009edec0 fffff880`0fe37d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241 fffff880`0408dc90 fffff880`0fe37e96 : 00000000`00000000 fffffa80`05cdb330 00000000`00000080 fffffa80`065f4150 : dxgmms1!VidSchiSubmitQueueCommand+0x50 fffff880`0408dcc0 fffff800`03125c06 : 00000000`0380cecc fffffa80`065808c0 fffffa80`03ccfb30 fffffa80`065808c0 : dxgmms1!VidSchiWorkerThread+0xd6 fffff880`0408dd00 fffff800`02e5fc26 : fffff880`009e9180 fffffa80`065808c0 fffff880`009f3f40 fffff880`01247534 : nt!PspSystemThreadStartup+0x5a fffff880`0408dd40 00000000`00000000 : fffff880`0408e000 fffff880`04088000 fffff880`0408d650 00000000`00000000 : nt!KxStartSystemThread+0x16   SYMBOL_STACK_INDEX:  0  SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+10b  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: dxgmms1  IMAGE_NAME:  dxgmms1.sys  DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578  STACK_COMMAND:  .cxr 0xfffff8800408cec0 ; kb  FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+10b  BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+10b  Followup: MachineOwner ---------  ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 1E, {0, 0, 0, 0}  *** WARNING: Unable to verify timestamp for nvstor64.sys *** ERROR: Module load completed but symbols could not be loaded for nvstor64.sys Probably caused by : storport.sys ( storport!StorPortNotification+46 )  Followup: MachineOwner ---------  0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception  Debugging Details: ------------------   EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.  FAULTING_IP:  +5dd3952f01f4df14 00000000`00000000 ??              ???  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  0000000000000000  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  BUGCHECK_STR:  0x1E  PROCESS_NAME:  System  CURRENT_IRQL:  2  EXCEPTION_RECORD:  fffff80000b9c828 -- (.exr 0xfffff80000b9c828) ExceptionAddress: fffff880010830f6 (storport!StorPortNotification+0x0000000000000046)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  TRAP_FRAME:  fffff80000b9c8d0 -- (.trap 0xfffff80000b9c8d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fefffa8005105a90 rbx=0000000000000000 rcx=0000000000000000 rdx=fffff8800378a010 rsi=0000000000000000 rdi=0000000000000000 rip=fffff880010830f6 rsp=fffff80000b9ca60 rbp=fffffa80046ca990  r8=fffffa8005c9e448  r9=fffff80000b9caf0 r10=fffffa80046c5008 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0         nv up ei ng nz na po nc storport!StorPortNotification+0x46: fffff880`010830f6 c6808d000000ab  mov     byte ptr [rax+8Dh],0ABh ds:0001:fefffa80`05105b1d=?? Resetting default scope  LAST_CONTROL_TRANSFER:  from fffff80002e6f46e to fffff80002e77710  STACK_TEXT:   fffff800`00b9b918 fffff800`02e6f46e : fffff800`02ec1f5d fffff800`02ec1f5e fffff800`00b9c090 fffff800`02ea4668 : nt!KeBugCheck fffff800`00b9b920 fffff800`02e9d40d : fffff800`03085b7c fffff800`02fbfe84 fffff800`02e07000 fffff800`00b9c828 : nt!KiKernelCalloutExceptionHandler+0xe fffff800`00b9b950 fffff800`02ea4a90 : fffff800`02fc6b14 fffff800`00b9b9c8 fffff800`00b9c828 fffff800`02e07000 : nt!RtlpExecuteHandlerForException+0xd fffff800`00b9b980 fffff800`02eb19ef : fffff800`00b9c828 fffff800`00b9c090 fffff800`00000000 fffffa80`05c9e448 : nt!RtlDispatchException+0x410 fffff800`00b9c060 fffff800`02e76d82 : fffff800`00b9c828 fffffa80`046c41b0 fffff800`00b9c8d0 fffffa80`046c5008 : nt!KiDispatchException+0x16f fffff800`00b9c6f0 fffff800`02e7568a : fffffa80`048ad1b0 fffffa80`03ec1c10 fffffa80`048b1030 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff800`00b9c8d0 fffff880`010830f6 : 00000000`00000004 fffffa80`046c9f68 fffff880`0378a380 00000000`00000004 : nt!KiGeneralProtectionFault+0x10a fffff800`00b9ca60 fffff880`01048453 : 00000000`00000000 fffffa80`046c5008 fffffa80`05c9e448 00000000`00000000 : storport!StorPortNotification+0x46 fffff800`00b9cae0 00000000`00000000 : fffffa80`046c5008 fffffa80`05c9e448 00000000`00000000 00000000`00000210 : nvstor64+0x5453   STACK_COMMAND:  kb  FOLLOWUP_IP:  storport!StorPortNotification+46 fffff880`010830f6 c6808d000000ab  mov     byte ptr [rax+8Dh],0ABh  SYMBOL_STACK_INDEX:  7  SYMBOL_NAME:  storport!StorPortNotification+46  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: storport  IMAGE_NAME:  storport.sys  DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcace  FAILURE_BUCKET_ID:  X64_0x1E_storport!StorPortNotification+46  BUCKET_ID:  X64_0x1E_storport!StorPortNotification+46  Followup: MachineOwner ---------
Two of the dumps show error c0000005 which is memory corruption. One blames Direct X which indicates your graphics adapter and keynoter blames storport.sys which is a Microsoft program very likely not the real cause.

I find some out of date drivers on your system. Win 7 does not like older drivers; they can and do cause memory corruption and crashes. I suggest you start with updating these drivers -
Quote:
BCM42RLY.sys Tue Jul 07 20:34:55 2009
bcmwl664.sys Tue Jul 07 20:45:04 2009
itecir.sys Mon Mar 09 04:58:47 2009
nvmf6264.sys Wed Jul 01 14:55:18 2009
nvsmu.sys Mon Jun 29 03:36:37 2009
OA001Ufd.sys Tue Jun 03 05:30:37 2008
OA001Vid.sys Mon Aug 25 09:07:17 2008
rimmpx64.sys Thu Jun 25 04:04:18 2009
rimspx64.sys Thu Jun 25 03:13:43 2009
rixdpx64.sys Thu Jun 25 03:38:50 2009
stwrt64.sys Mon Jun 29 13:52:05 2009


How To Find Drivers:

Quote:
- I have listed links to most of the drivers in the code box below. Please use the links there to see what info I've found about those drivers.
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
Quote:


- - The most common drivers are listed on this page: Driver Reference

- - Driver manufacturer links are on this page: Drivers and Downloads
Once you update these drivers, let us know and run your system. If you get another BSOD, please upload it and we will take the next step which will be to test your RAM.

CarlTR6

One other thing I noticed is some old drivers that need to be updated.

They include your network driver from 2009 that is mentioned in a few of the crashes

Code:
OA001Ufd.sys        fffff880`0914e000    fffff880`091773a0    0x000293a0    0x48450f3d    6/3/2008 05:30:37                         OA001Vid.sys        fffff880`09100000    fffff880`0914d1c0    0x0004d1c0    0x48b2ae85    8/25/2008 09:07:17                         tap0901.sys        fffff880`048cb000    fffff880`048d8000    0x0000d000    0x48ec41de    10/8/2008 01:15:10                         nvm62x64.sys        fffff880`042af000    fffff880`04312d80    0x00063d80    0x48f8fd12    10/17/2008 17:01:06                         itecir.sys        fffff880`04b94000    fffff300`04bf0000    0xfffffa800005c000    0x49b4da47    3/9/2009 04:58:47                         spldr.sys        fffff880`0169b000    fffff880`016a3000    0x00008000    0x4a0858bb    5/11/2009 12:56:27                         amdxata.sys        fffff880`010eb000    fffff880`010f6000    0x0000b000    0x4a12f2eb    5/19/2009 13:56:59                         rimspx64.sys        fffff880`03db8000    fffff300`03dcf000    0xfffffa8000017000    0x4a4323a7    6/25/2009 03:13:43                         rixdpx64.sys        fffff880`03c00000    fffff300`03c57000    0xfffffa8000057000    0x4a43298a    6/25/2009 03:38:50                         rimmpx64.sys        fffff880`03da2000    fffff880`03db8000    0x00016000    0x4a432f82    6/25/2009 04:04:18                         nvsmu.sys        fffff880`03bc6000    fffff880`03bd1000    0x0000b000    0x4a486f05    6/29/2009 03:36:37                         stwrt64.sys        fffff880`04215000    fffff300`04290000    0xfffffa800007b000    0x4a48ff45    6/29/2009 13:52:05                         BCM42RLY.sys        fffff880`0addf000    70626bf5`0ade8000    0x7062737500009000    0x4a53e9af    7/7/2009 20:34:55                         bcmwl664.sys    bcmwl664.sys+650af7c    fffff880`048df000    fffff881`04b87000    0x00000001002a8000    0x4a53ec10    7/7/2009 20:45:04 


gtgt

Thank you, Ken.

@gtgt - Ken is right on target.

CarlTR6

Thanks much! I'll update the drivers and provide an update.

Cheers,
George

Guest

Very good. We will be waiting for your update.

gtgt

Well the first driver I updated was nVidia SATA and networking, but upon restart:

1. Microsoft Forefront Endpoint Protection no longer detects if Firewall is enabled, which it is,
2. I get the 80244024c error trying to get to Windows Update (even clicking Check online for updates doesn't work).
3 Internet Explorer won't connect to the Internet, even though obviously I'm connected with firefox.
4. Also, Outlook no longer connects to my mail servers!

Any thoughts?



gtgt

OK, nevermind. It was a " netsh winsock reset" issue, which resolved connectivity upon restart. Continuing with the other drivers.

Cheers,
George

gtgt

Hi,

Still updating drivers but had a crash today that, according to BlueScreenView, was caused by mssmbios.sys+def52f (crash dump attached).

According to Dell support, I have the latest WiFi driver (1510 mini card with Broadcom chip, version 5.30.21.0), but not finding anything newer on the Broadcom site.

It seems most of these crashes occur when I'm not even doing anything. This a.m. I stepped away from the laptop for a minute and returned to the blue screen. Not sure if that helps you.

Thanks,
George

CarlTR6

Quote�� Quote: Originally Posted by gtgt View Post
Hi,

Still updating drivers but had a crash today that, according to BlueScreenView, was caused by mssmbios.sys+def52f (crash dump attached).

According to Dell support, I have the latest WiFi driver (1510 mini card with Broadcom chip, version 5.30.21.0), but not finding anything newer on the Broadcom site.

It seems most of these crashes occur when I'm not even doing anything. This a.m. I stepped away from the laptop for a minute and returned to the blue screen. Not sure if that helps you.

Thanks,
George
George

I checked Blue screen view and it does say mssmbios.sys wich is an OS file and not likely, but in case it is you should run a system file check

Run a system file check to verify and repair your system files.
To do this type cmd in search, then right click to run as administrator, then
SFC /SCANNOW

read here for more information SFC /SCANNOW Command - System File Checker

Let us know the results from the report at the end.

Also you still have old drivers.
Code:
OA001Ufd.sys        fffff880`04322000    fffff880`0434b3a0    0x000293a0    0x48450f3d    6/3/2008 05:30:37                         OA001Vid.sys        fffff880`0426f000    fffff880`042bc1c0    0x0004d1c0    0x48b2ae85    8/25/2008 09:07:17                         tap0901.sys        fffff880`048db000    fffff300`048e8000    0xfffffa800000d000    0x48ec41de    10/8/2008 01:15:10                         itecir.sys        fffff880`04b9d000    fffff880`04bf9000    0x0005c000    0x49b4da47    3/9/2009 04:58:47                         spldr.sys        fffff880`01685000    fffff880`0168d000    0x00008000    0x4a0858bb    5/11/2009 12:56:27                         amdxata.sys        fffff880`010d4000    fffff880`010df000    0x0000b000    0x4a12f2eb    5/19/2009 13:56:59                         rimspx64.sys        fffff880`03d82000    fffff100`03d99000    0xfffff88000017000    0x4a4323a7    6/25/2009 03:13:43                         rixdpx64.sys        fffff880`03d99000    fffff880`03df0000    0x00057000    0x4a43298a    6/25/2009 03:38:50                         rimmpx64.sys        fffff880`03d6c000    fffff100`03d82000    0xfffff88000016000    0x4a432f82    6/25/2009 04:04:18
How To Find Drivers:
Quote:
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads

Let us know if you need further assistance

Ken

gtgt

George, it is crucial to update those drivers. Do you need help with this?

CarlTR6

Hi, I could not find downloads of:

OA001Ufd.sys
OA001Vid.sys
itecir.sys
spldr.sys


And from Dell support I download their latest Ricoh card reader drivers:

rimspx64.sys
rixdpx64.sys
rimmpx64.sys

..but they are from 2009, and I had no luck searching the Ricoh support site for more recent versions.

gtgt

Quote�� Quote: Originally Posted by gtgt View Post
Hi, I could not find downloads of:

OA001Ufd.sys
OA001Vid.sys
itecir.sys
spldr.sys


And from Dell support I download their latest Ricoh card reader drivers:

rimspx64.sys
rixdpx64.sys
rimmpx64.sys

..but they are from 2009, and I had no luck searching the Ricoh support site for more recent versions.
OA001Ufd.sys and OA001Vid.sys - Upper Filter Drivers are driver files from Creative Technology Ltd. These must be for your web cam. If you cannot update these drivers, the hardware is obsolete and not compatible with Win 7. Check here: Windows 7 Compatibility: Software Programs & Hardware Devices: Find Updates, Drivers, & Downloads If there is no update, I recommend that you install this hardware and up grade to a camera compatible with Win 7.

itecir.sys - Integrated Technologies Express Ltdhttp://www.liutilities.com/device-driver/ite-cir-driver/ This is an input driver and, according to the link, it is not compatible with Win 7. Uninstall the program associated with this driver. If you do not know which program it is, nanvigate to C;\Windows\System32\Drivers. Find the file and rename it it from itecir.sys to itecir.bak. Reboot. This will most likely break the program associated with this driver.

spldr.sys - ignore this one. This is a Windows system driver and it is fine despite the old date.

What are the dates of the Ricoh drivers you downloaded? The "magic" date for Win 7 is July 13, 2009 or later. It may be that the card reader is obsolete hardware and you may need to upgrade to a card reader that is Win 7 compatible. You can check it out at Windows 7 Compatibility: Software Programs & Hardware Devices: Find Updates, Drivers, & Downloads



CarlTR6

The Ricoh drivers are from June 25, 2009, and are the "latest" available from Dell's support site for my laptop (Studio XPS m1340).

I renamed the itecir.sys driver to .bak. Not sure what it was associated with.

I just opened a support ticket with Dell regarding updated versions of the Ricoh and Creative drivers.

Anything else I can do on my end?

Thanks!
George

gtgt

Good job, George. Maybe those drivers will work for the card reader. They are late Vista drivers. You could always try to run the card reader in the compatibility mode. Your only other option will be to upgrade the card reader to one that is Win 7 compatible. But lets try it first.

You will know what that itecir.sys goes to when you try to run a a program or device and it won't work.

For now, run your system and let's see what happens. Upload any new BSOD's and we will go from there. Hopefully, you won't have any.

Guest

Hi,

I've had 2 more BSODs (see attached dumps), and according to BlueScreenView both were caused by bcmwl664.sys, which is Dell's 1510 WiFi card driver. Over the months I've repeatedly uninstalled and reinstalled the WiFi card drivers. Current version available from Dell is 5.30.21.0.

Do the minidumps suggest anything else at fault?

Earlier today I installed Ricoh drivers provided from Dell tech support. Still waiting for them to provide the integrated web cam drivers.

Thanks!
George

gtgt

I've attached the last BSOD dump. It happened on startup, before I even logged in!

This past week I have reinstalled Dell's webcam software--which I'm guessing installs the driver, which I otherwise wasn't able to find from Creative--as well as nVidia and WiFi driver updates.

Any help is appreciated.

Thanks,
George



CarlTR6

George, I am sorry to learn you are still having problems. Anytime you get a crash on startup, you can pretty well figure it is a hardware or driver related.

Error code 3B, SYSTEM_SERVICE_EXCEPTION- usually caused by System service, Device driver, graphics driver, ?memory.

The dump blamed a Windows system driver (very unlikely) and indicated memory corruption. I also looked at the two previous dumps. Both are error code 3B. One directly point s to memory corruption and the other points to a Windows system driver and indicates memory corruption.

Code:
Kernel base = 0xfffff800`02e4b000 PsLoadedModuleList = 0xfffff800`03088e50 Debug session time: Fri Sep 10 19:54:37.299 2010 (GMT-4) System Uptime: 0 days 0:01:14.437 Loading Kernel Symbols ............................................................... ................................................................ ............................................ Loading User Symbols Loading unloaded module list ..... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 3B, {c0000005, fffff80002edb436, fffff8800b12ed00, 0}  Probably caused by : ntkrnlmp.exe ( nt!WmipIoControl+d6 )  Followup: MachineOwner ---------  1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80002edb436, Address of the exception record for the exception that caused the bugcheck Arg3: fffff8800b12ed00, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero.  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  nt!IopCompleteRequest+c73 fffff800`02edb436 488b09          mov     rcx,qword ptr [rcx]  CONTEXT:  fffff8800b12ed00 -- (.cxr 0xfffff8800b12ed00) rax=fffffa800b173978 rbx=fffffa800b285010 rcx=fefffa800b173978 rdx=fefffa800b173978 rsi=0000000000000000 rdi=fffffa800b301520 rip=fffff80002edb436 rsp=fffff8800b12f6d0 rbp=00000000a000000c  r8=0000000fffffffff  r9=fffffa8000000008 r10=0000000000000002 r11=0000007ffffffff8 r12=fffffa800b173970 r13=0000000000000000 r14=fffffa800b32a930 r15=fffff880009e9180 iopl=0         nv up ei ng nz na po cy cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287 nt!IopCompleteRequest+0xc73: fffff800`02edb436 488b09          mov     rcx,qword ptr [rcx] ds:002b:fefffa80`0b173978=???????????????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  BUGCHECK_STR:  0x3B  PROCESS_NAME:  WmiPrvSE.exe  CURRENT_IRQL:  2  IRP_ADDRESS:  ffffffffffffff88  LAST_CONTROL_TRANSFER:  from fffff80002ebe0dd to fffff80002edb436  STACK_TEXT:   fffff880`0b12f6d0 fffff800`02ebe0dd : 00000000`00000000 fffff800`20206f49 00000000`00010001 fffffa80`00000000 : nt!IopCompleteRequest+0xc73 fffff880`0b12f7a0 fffff800`0314d2f6 : 00000000`0000000c fffff800`02fefb00 fffffa80`0b301520 00000000`00000000 : nt!IopfCompleteRequest+0x75d fffff880`0b12f880 fffff800`031d6707 : fffffa80`0b301520 fffff880`0b12fc60 fffff880`0b12fc60 fffffa80`0b285010 : nt!WmipIoControl+0xd6 fffff880`0b12f9d0 fffff800`031d6f66 : fffff880`0b12fbb8 00000000`00000454 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x607 fffff880`0b12fb00 fffff800`02eba993 : 00000000`00000d41 00000000`0062e638 00000000`00000000 0000007f`ffffffff : nt!NtDeviceIoControlFile+0x56 fffff880`0b12fb70 00000000`73f02dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0062ef38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73f02dd9   FOLLOWUP_IP:  nt!WmipIoControl+d6 fffff800`0314d2f6 8bc3            mov     eax,ebx  SYMBOL_STACK_INDEX:  2  SYMBOL_NAME:  nt!WmipIoControl+d6  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: nt  IMAGE_NAME:  ntkrnlmp.exe  DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9  STACK_COMMAND:  .cxr 0xfffff8800b12ed00 ; kb  FAILURE_BUCKET_ID:  X64_0x3B_nt!WmipIoControl+d6  BUCKET_ID:  X64_0x3B_nt!WmipIoControl+d6  Followup: MachineOwner ---------  Kernel base = 0xfffff800`02e61000 PsLoadedModuleList = 0xfffff800`0309ee50 Debug session time: Wed Sep  1 14:17:12.782 2010 (GMT-4) System Uptime: 0 days 0:31:59.592 Loading Kernel Symbols ............................................................... ................................................................ ............................................ Loading User Symbols Loading unloaded module list ...... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 3B, {c0000005, fffff800031787eb, fffff8800ab35e10, 0}  Probably caused by : memory_corruption ( nt!MiUnsecureVirtualMemory+6b )  Followup: MachineOwner ---------  1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff800031787eb, Address of the exception record for the exception that caused the bugcheck Arg3: fffff8800ab35e10, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero.  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  nt!MiUnsecureVirtualMemory+6b fffff800`031787eb 8b4540          mov     eax,dword ptr [rbp+40h]  CONTEXT:  fffff8800ab35e10 -- (.cxr 0xfffff8800ab35e10) rax=000000000000000a rbx=fffffa800af13060 rcx=fefffa800b5da951 rdx=0000000000000000 rsi=fffffa8006970b30 rdi=fefffa800b5da950 rip=fffff800031787eb rsp=fffff8800ab367e0 rbp=fefffa800b5da910  r8=0000000000000001  r9=0000000000000002 r10=fffffa8006970b30 r11=fffff800030d1b60 r12=fffffa8006970d48 r13=fffffa800a8eb520 r14=fffffa8006970b30 r15=fffff8800ab36930 iopl=0         nv up ei ng nz na po nc cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286 nt!MiUnsecureVirtualMemory+0x6b: fffff800`031787eb 8b4540          mov     eax,dword ptr [rbp+40h] ss:0018:fefffa80`0b5da950=???????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  BUGCHECK_STR:  0x3B  PROCESS_NAME:  svchost.exe  CURRENT_IRQL:  0  LAST_CONTROL_TRANSFER:  from fffff80003179b1b to fffff800031787eb  STACK_TEXT:   fffff880`0ab367e0 fffff800`03179b1b : fffff800`03049e30 00000000`00000000 fffff8a0`0c2c3490 fffff8a0`0c2c34b0 : nt!MiUnsecureVirtualMemory+0x6b fffff880`0ab36810 fffff800`0316a596 : 00000000`00000000 fffff800`03049e30 fffff8a0`0c2c34b0 fffff8a0`0c282d00 : nt!AlpcpViewDestroyProcedure+0x1fb fffff880`0ab368b0 fffff800`0316b167 : 00000000`00000000 00000000`01b2e3c0 00000000`40000000 fffff880`0ab36a40 : nt!AlpcpCaptureViewAttributeInternal+0x196 fffff880`0ab36910 fffff800`031a0413 : fffff8a0`0bdd27e8 00000000`00000000 fffffa80`0af13060 fffff800`031eb56f : nt!AlpcpCaptureViewAttribute+0x47 fffff880`0ab36960 fffff800`031d11f9 : fffffa80`0a8eb520 00000000`00000000 fffff8a0`0c282d00 fffff8a0`0c282d00 : nt!AlpcpCaptureAttributes+0x320 fffff880`0ab369c0 fffff800`031d2ed9 : fffffa80`00000000 fffff8a0`00000001 00000000`014ff420 00000000`00000701 : nt!AlpcpSendMessage+0x3c7 fffff880`0ab36ac0 fffff800`02ed0993 : fffffa80`0af13060 fffff880`0ab36c60 00000000`014ff3a8 0000007f`ffffffff : nt!NtAlpcSendWaitReceivePort+0xb9 fffff880`0ab36b70 00000000`773a05aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`014ff388 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773a05aa   FOLLOWUP_IP:  nt!MiUnsecureVirtualMemory+6b fffff800`031787eb 8b4540          mov     eax,dword ptr [rbp+40h]  SYMBOL_STACK_INDEX:  0  SYMBOL_NAME:  nt!MiUnsecureVirtualMemory+6b  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: nt  DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9  STACK_COMMAND:  .cxr 0xfffff8800ab35e10 ; kb  IMAGE_NAME:  memory_corruption  FAILURE_BUCKET_ID:  X64_0x3B_nt!MiUnsecureVirtualMemory+6b  BUCKET_ID:  X64_0x3B_nt!MiUnsecureVirtualMemory+6b  Followup: MachineOwner ---------  Kernel base = 0xfffff800`02e67000 PsLoadedModuleList = 0xfffff800`030a4e50 Debug session time: Mon Aug 30 17:19:33.405 2010 (GMT-4) System Uptime: 0 days 1:15:03.434 Loading Kernel Symbols ............................................................... ................................................................ .............................................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 3B, {c0000005, fffff800031b374d, fffff8800b599730, 0}  Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1dd )  Followup: MachineOwner ---------  0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff800031b374d, Address of the exception record for the exception that caused the bugcheck Arg3: fffff8800b599730, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero.  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  nt!CmpKcbCacheLookup+1dd fffff800`031b374d 418b45f4        mov     eax,dword ptr [r13-0Ch]  CONTEXT:  fffff8800b599730 -- (.cxr 0xfffff8800b599730) rax=fffff8a005065000 rbx=0000000000000000 rcx=0000000000000bd9 rdx=00000000073d1409 rsi=fffff8a0007eea18 rdi=fffff8800b59a340 rip=fffff800031b374d rsp=fffff8800b59a100 rbp=fffff8a0007ee420  r8=000000000000000b  r9=0000000000000000 r10=0000000000000016 r11=fffff8800b59a298 r12=0000000000000007 r13=fefff8a0000e8268 r14=0000000000000007 r15=0000000000000001 iopl=0         nv up ei ng nz na pe nc cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282 nt!CmpKcbCacheLookup+0x1dd: fffff800`031b374d 418b45f4        mov     eax,dword ptr [r13-0Ch] ds:002b:fefff8a0`000e825c=???????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  BUGCHECK_STR:  0x3B  PROCESS_NAME:  explorer.exe  CURRENT_IRQL:  0  LAST_CONTROL_TRANSFER:  from fffff800031b2d08 to fffff800031b374d  STACK_TEXT:   fffff880`0b59a100 fffff800`031b2d08 : fffff880`0b59a298 fffff880`00000008 fffff880`0b59a688 fffff880`0b59a6a0 : nt!CmpKcbCacheLookup+0x1dd fffff880`0b59a1f0 fffff800`031b0f61 : fffff8a0`02efe960 fffff880`0b59a6a0 fffff880`0b59a6d8 fffff880`0b59a6c0 : nt!CmpBuildHashStackAndLookupCache+0x328 fffff880`0b59a5d0 fffff800`031d0e84 : fffff800`031b0cc0 00000000`00000000 fffffa80`045b6010 fffff880`011dd901 : nt!CmpParseKey+0x2a1 fffff880`0b59a8a0 fffff800`031d5e4d : fffffa80`045b6010 fffff880`0b59aa00 00000000`00000040 fffffa80`03cf7080 : nt!ObpLookupObjectName+0x585 fffff880`0b59a9a0 fffff800`031b4dcc : 00000000`03c67000 00000000`00000000 fffff8a0`02efe901 fffff880`0b59aa68 : nt!ObOpenObjectByName+0x1cd fffff880`0b59aa50 fffff800`031b6f0f : 00000000`1ff8d340 00000000`00020019 00000000`1ff8d3c8 00000000`00000000 : nt!CmOpenKey+0x28a fffff880`0b59aba0 fffff800`02ed6993 : fffffa80`04192b60 fffff880`0b59ac60 00000000`00000000 fffffa80`0aa2bd60 : nt!NtOpenKeyEx+0xf fffff880`0b59abe0 00000000`76d40caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`1ff8d2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d40caa   FOLLOWUP_IP:  nt!CmpKcbCacheLookup+1dd fffff800`031b374d 418b45f4        mov     eax,dword ptr [r13-0Ch]  SYMBOL_STACK_INDEX:  0  SYMBOL_NAME:  nt!CmpKcbCacheLookup+1dd  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: nt  IMAGE_NAME:  ntkrnlmp.exe  DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9  STACK_COMMAND:  .cxr 0xfffff8800b599730 ; kb  FAILURE_BUCKET_ID:  X64_0x3B_nt!CmpKcbCacheLookup+1dd  BUCKET_ID:  X64_0x3B_nt!CmpKcbCacheLookup+1dd  Followup: MachineOwner ---------
Let's test your RAM. Follow the instructions in this excellent tutorial by Johnathan King.

RAM - Test with Memtest86+


This will take some time. Please post the results.

You still have out of date drivers; though I can see that you have updated some of them. You have a few really old drivers that definitely are not helping your system's stability.
Quote:
BCM42RLY.sys Tue Jul 07 20:34:55 2009 - Broadcom iLine10(tm) PCI Network Adapter Broadcom.com - Downloads & Support. I know that you have tried to update this driver. It is slightly out of date; but it may work.

nvsmu.sys Mon Jun 29 03:36:37 2009 - nVidia nForce System Management Controller (nVidia nForce chipset driver) Drivers - Download NVIDIA Drivers. This is a chipset driver and slightly out of date. See if you can update this one.

OA001Ufd.sys Tue Jun 03 05:30:37 2008 - Upper Filter Drivers are driver files from Creative Technology Ltd. These must be for your web cam. If you cannot update these drivers, the hardware is obsolete and not compatible with Win 7. Check here: Windows 7 Compatibility: Software Programs & Hardware Devices: Find Updates, Drivers, & Downloads If there is no update, I recommend that you uninstall this hardware and upgrade to a camera compatible with Win 7.

OA001Vid.sys Mon Aug 25 09:07:17 2008 - see above

rimmpx64.sys Thu Jun 25 04:04:18 2009 - Ricoh Card Reader driver.

rimspx64.sys Thu Jun 25 03:13:43 2009 - Ricoh Card Reader driver.

rixdpx64.sys Thu Jun 25 03:38:50 2009 - Ricoh Card Reader driver.
Let's try something. This is going break your webcam; but let's see if those drivers are the problem. Navigate to C:\Windows\System32\Drivers and rename the two camera drivers from .sys to .bak. Reboot and lets see what your system does. You can rename to .sys later if this proves not to be the problem.

Post back and let us know. And don't forget to run Memtest.

gtgt

I let the RAM test run overnight, 8 hrs, a lot of passes with 0 errors.

Dell said if I install the Webcam software, the appropriate drivers will be installed, so I did that and updated the software.

Also, it appears the driver install packages do not automatically update the drivers, as was the case with one of those Broadcom drivers, so I renamed the old driver to .bak and copied the newer .sys into the system folder.

I think the Ricoh install package also failed to load the new drivers, so I'll have to go dig around and check those.

-George

CarlTR6

Good job of digging, George. A big plus on working around the Broadcom driver issue. Thanks for the update.

gtgt

Hi, had another crash on startup (dump attached), even before reaching the login screen.

gtgt

Quote�� Quote: Originally Posted by gtgt View Post
Hi, had another crash on startup (dump attached), even before reaching the login screen.
This crash was probably caused by your usbhub.sys driver. You may need to reinstall the USB driver..Check device and see if it is without a yellow exclamation mark for "universal serial bus controllers", then see generic usb hub, properties,drive, driver details, this should show usbhub.sys. If all seems well you may need to uninstall and then scan for hardware changes, this can be done from the properties.

I would also run a system file check to verify and repair system files

Let us know if you need help with this

Ken J


Code:
 Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved.   Loading Dump File [C:\Users\K\Desktop\092010-25568-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available  WARNING: Whitespace at end of path element Symbol search path is: SRV*C:\symbols;*http://msdl.microsoft.com/download/symbols ;srv*e:\symbols *http://msdl.microsoft.com/download/symbols Executable search path is:  Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e53000 PsLoadedModuleList = 0xfffff800`03090e50 Debug session time: Mon Sep 20 12:37:22.833 2010 (GMT-4) System Uptime: 0 days 0:00:36.643 Loading Kernel Symbols ............................................................... ................................................................ ..................................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 1000007E, {ffffffffc0000005, fffff80002ee1c11, fffff88002fbd528, fffff88002fbcd90}  Unable to load image usbhub.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for usbhub.sys *** ERROR: Module load completed but symbols could not be loaded for usbhub.sys Probably caused by : usbhub.sys ( usbhub+2618 )  Followup: MachineOwner ---------  1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003.  This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG.  This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG.  This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002ee1c11, The address that the exception occurred at Arg3: fffff88002fbd528, Exception Record Address Arg4: fffff88002fbcd90, Context Record Address  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  nt!IopQueueThreadIrp+b1 fffff800`02ee1c11 48897808        mov     qword ptr [rax+8],rdi  EXCEPTION_RECORD:  fffff88002fbd528 -- (.exr 0xfffff88002fbd528) ExceptionAddress: fffff80002ee1c11 (nt!IopQueueThreadIrp+0x00000000000000b1)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  CONTEXT:  fffff88002fbcd90 -- (.cxr 0xfffff88002fbcd90) rax=fefffa8003ce6a68 rbx=fffffa8003ce6680 rcx=0000000002fbda38 rdx=0000000000000000 rsi=0000000000000000 rdi=fffffa800528eb40 rip=fffff80002ee1c11 rsp=fffff88002fbd760 rbp=fffffa8003ce6a68  r8=0000000000000000  r9=0000000000000000 r10=fffffa8003d009e0 r11=0000000000000006 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000003 iopl=0         nv up ei pl zr na po nc cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246 nt!IopQueueThreadIrp+0xb1: fffff800`02ee1c11 48897808        mov     qword ptr [rax+8],rdi ds:002b:fefffa80`03ce6a70=???????????????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  PROCESS_NAME:  System  CURRENT_IRQL:  2  ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  ffffffffffffffff  READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fb0e0  ffffffffffffffff   FOLLOWUP_IP:  usbhub+2618 fffff880`04c80618 ??              ???  BUGCHECK_STR:  0x7E  LAST_CONTROL_TRANSFER:  from fffff800031af084 to fffff80002ee1c11  STACK_TEXT:   fffff880`02fbd760 fffff800`031af084 : fffff880`02fbda38 fffff880`02fbd970 00000000`00000000 fffffa80`06dba1a0 : nt!IopQueueThreadIrp+0xb1 fffff880`02fbd7c0 fffff880`04c80618 : 00000000`00220013 fffffa80`06d1b060 00000000`00000000 fffffa80`06013870 : nt!IoBuildDeviceIoControlRequest+0x114 fffff880`02fbd830 00000000`00220013 : fffffa80`06d1b060 00000000`00000000 fffffa80`06013870 00000000`00000000 : usbhub+0x2618 fffff880`02fbd838 fffffa80`06d1b060 : 00000000`00000000 fffffa80`06013870 00000000`00000000 fffffa80`00000000 : 0x220013 fffff880`02fbd840 00000000`00000000 : fffffa80`06013870 00000000`00000000 fffffa80`00000000 ffff7412`0d7e1d01 : 0xfffffa80`06d1b060   SYMBOL_STACK_INDEX:  2  SYMBOL_NAME:  usbhub+2618  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: usbhub  IMAGE_NAME:  usbhub.sys  DEBUG_FLR_IMAGE_TIMESTAMP:  4b18b9af  STACK_COMMAND:  .cxr 0xfffff88002fbcd90 ; kb  FAILURE_BUCKET_ID:  X64_0x7E_usbhub+2618  BUCKET_ID:  X64_0x7E_usbhub+2618  Followup: MachineOwner ---------  1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003.  This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG.  This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG.  This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002ee1c11, The address that the exception occurred at Arg3: fffff88002fbd528, Exception Record Address Arg4: fffff88002fbcd90, Context Record Address  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  nt!IopQueueThreadIrp+b1 fffff800`02ee1c11 48897808        mov     qword ptr [rax+8],rdi  EXCEPTION_RECORD:  fffff88002fbd528 -- (.exr 0xfffff88002fbd528) ExceptionAddress: fffff80002ee1c11 (nt!IopQueueThreadIrp+0x00000000000000b1)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  CONTEXT:  fffff88002fbcd90 -- (.cxr 0xfffff88002fbcd90) rax=fefffa8003ce6a68 rbx=fffffa8003ce6680 rcx=0000000002fbda38 rdx=0000000000000000 rsi=0000000000000000 rdi=fffffa800528eb40 rip=fffff80002ee1c11 rsp=fffff88002fbd760 rbp=fffffa8003ce6a68  r8=0000000000000000  r9=0000000000000000 r10=fffffa8003d009e0 r11=0000000000000006 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000003 iopl=0         nv up ei pl zr na po nc cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246 nt!IopQueueThreadIrp+0xb1: fffff800`02ee1c11 48897808        mov     qword ptr [rax+8],rdi ds:002b:fefffa80`03ce6a70=???????????????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  PROCESS_NAME:  System  CURRENT_IRQL:  2  ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  ffffffffffffffff  READ_ADDRESS:  ffffffffffffffff   FOLLOWUP_IP:  usbhub+2618 fffff880`04c80618 ??              ???  BUGCHECK_STR:  0x7E  LAST_CONTROL_TRANSFER:  from fffff800031af084 to fffff80002ee1c11  STACK_TEXT:   fffff880`02fbd760 fffff800`031af084 : fffff880`02fbda38 fffff880`02fbd970 00000000`00000000 fffffa80`06dba1a0 : nt!IopQueueThreadIrp+0xb1 fffff880`02fbd7c0 fffff880`04c80618 : 00000000`00220013 fffffa80`06d1b060 00000000`00000000 fffffa80`06013870 : nt!IoBuildDeviceIoControlRequest+0x114 fffff880`02fbd830 00000000`00220013 : fffffa80`06d1b060 00000000`00000000 fffffa80`06013870 00000000`00000000 : usbhub+0x2618 fffff880`02fbd838 fffffa80`06d1b060 : 00000000`00000000 fffffa80`06013870 00000000`00000000 fffffa80`00000000 : 0x220013 fffff880`02fbd840 00000000`00000000 : fffffa80`06013870 00000000`00000000 fffffa80`00000000 ffff7412`0d7e1d01 : 0xfffffa80`06d1b060   SYMBOL_STACK_INDEX:  2  SYMBOL_NAME:  usbhub+2618  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: usbhub  IMAGE_NAME:  usbhub.sys  DEBUG_FLR_IMAGE_TIMESTAMP:  4b18b9af  STACK_COMMAND:  .cxr 0xfffff88002fbcd90 ; kb  FAILURE_BUCKET_ID:  X64_0x7E_usbhub+2618  BUCKET_ID:  X64_0x7E_usbhub+2618  Followup: MachineOwner ---------

CarlTR6

Thanks, Ken. I reinstalled the usbhub.sys driver. I'll run the system file check.

Cheers,
George

gtgt

George, in addition to Ken's solid recommendation, I still find some out of date drivers; some are badly out of date. Out of date third party drivers just do not work well with Win 7. They can cause memory corruption and crashes. Your dump indicates memory corruption.

Quote:
facap.sys Wed Sep 24 22:34:31 2008
nvsmu.sys Mon Jun 29 03:36:37 2009
OA001Ufd.sys Tue Jun 03 05:30:37 2008
OA001Vid.sys Mon Aug 25 09:07:17 2008
rimmpx64.sys Thu Jun 25 04:04:18 2009
rimspx64.sys Thu Jun 25 03:13:43 2009
rixdpx64.sys Thu Jun 25 03:38:50 2009
I know that you tried to update the Ricoh card reader drivers and no updates are available. You may have to ditch this card reader and upgrade to one certified to be compatible with Windows 7. However, concentrate on the 2008 drivers first and lets see if that helps your system's stability.

facap.sys - aCap WebCam Capture is a driver file from company Sensible Vision belonging to product faCap WebCam Capture. This software is obsolete. You can try to upgrade it. If there is not an upgrade available, completely uninstall the software. It is not written for Windows 7.

OA001Ufd.sys and OA001Vid.sys - Upper Filter Drivers are driver files from Creative Technology Ltd. These must be for your web cam. If you cannot update these drivers, the hardware is obsolete and not compatible with Win 7. Check here: Windows 7 Compatibility: Software Programs & Hardware Devices: Find Updates, Drivers, & Downloads. I know that you could not find updates for these drivers. This webcam is obsolete and not design for Windows 7. Uninstall the hardware and software completely and upgrade to a camera compatible with Win 7. If it is any consolation, I had to do the same thing. These obsolete webcam drivers could be causing the problem with your USB.

Once you uninstall the webcam, if you still have BSOD's, uninstall the card reader and upload the dump files.

nvsmu.sys - nVidia nForce System Management Controller (nVidia nForce chipset driver) Drivers - Download NVIDIA Drivers. See if you can update this chipset driver.

CarlTR6

Hi, Dell support suggest I try Vista drivers for my Webcam. I'm wondering if my recent BSOD was related to that particular driver?

Also, if I do disable my Webcam, won't Windows automatically detect it next time I boot, and reinstall drivers? How do I override that?

Thanks!
George

Guest

George, you can try the Vista drivers; that does sometimes work. You can disable the webcam permanently by navigating to C:\Windows\System32\Drivers. Locate those two drivers and rename from .sys to .bak. Reboot and these drivers will not load. Of course, you webcam will not work either.

You also need to uninstall Sensible Vision belonging to product faCap WebCam Capture. This software is obsolete. You can try to upgrade it. If there is not an upgrade available, completely uninstall the software. It is not written for Windows 7.

Error code 7E, SYSTEM_THREAD_EXCEPTION_NOT_HANDLED - usually caused by Insufficient disk space, Device driver, Video card, BIOS, Breakpoint with no debugger attached, Hardware incompatibility, Faulty system service, Memory, 3rd party remote control.

The dump points out memory corruption, 0xc0000005, and blames a Windows system driver, which is highly unlikely to be the real cause.
Code:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50 Debug session time: Mon Sep 27 14:43:23.877 2010 (GMT-4) System Uptime: 0 days 0:11:27.562 Loading Kernel Symbols ............................................................... ................................................................ .................................................. Loading User Symbols Loading unloaded module list ..... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 1000007E, {ffffffffc0000005, fffff80002e8014b, fffff88004059608, fffff88004058e70}  Probably caused by : cdd.dll ( cdd!PresentWorkerThread+4b8 )  Followup: MachineOwner ---------  1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003.  This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG.  This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG.  This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002e8014b, The address that the exception occurred at Arg3: fffff88004059608, Exception Record Address Arg4: fffff88004058e70, Context Record Address  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  nt!KiInsertTimerTable+13b fffff800`02e8014b 488b42f8        mov     rax,qword ptr [rdx-8]  EXCEPTION_RECORD:  fffff88004059608 -- (.exr 0xfffff88004059608) ExceptionAddress: fffff80002e8014b (nt!KiInsertTimerTable+0x000000000000013b)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  CONTEXT:  fffff88004058e70 -- (.cxr 0xfffff88004058e70) rax=0000000000000001 rbx=fffff88004059a10 rcx=0000000000000001 rdx=fefff880009ebae8 rsi=0000000000000760 rdi=fffff880009e9180 rip=fffff80002e8014b rsp=fffff88004059840 rbp=fffff880009ebae8  r8=ffffffffffffffff  r9=000000000000002b r10=fffff880009e9180 r11=fffffa80046a4000 r12=fffff880009ebae8 r13=0000000000000001 r14=0000000000000000 r15=0000000199d44cdf iopl=0         nv up ei ng nz na po cy cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287 nt!KiInsertTimerTable+0x13b: fffff800`02e8014b 488b42f8        mov     rax,qword ptr [rdx-8] ds:002b:fefff880`009ebae0=???????????????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  PROCESS_NAME:  csrss.exe  CURRENT_IRQL:  2  ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  ffffffffffffffff  READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ab0e0  ffffffffffffffff   FOLLOWUP_IP:  cdd!PresentWorkerThread+4b8 fffff960`00745824 488d842420010000 lea     rax,[rsp+120h]  BUGCHECK_STR:  0x7E  LAST_CONTROL_TRANSFER:  from fffff80002e7fde0 to fffff80002e8014b  STACK_TEXT:   fffff880`04059840 fffff800`02e7fde0 : ffffffff`fffd7501 fffff880`009e9180 fffff880`04059a10 00000000`00000001 : nt!KiInsertTimerTable+0x13b fffff880`040598a0 fffff800`02e7fce4 : ffffffff`fffd7501 ffffffff`fffd7501 00000000`00000000 ffffffff`fffd7501 : nt!KiSetTimerEx+0xf0 fffff880`04059930 fffff960`00745824 : ffffffff`00000004 fffff880`040599b8 00000000`00000001 00000000`00000000 : nt!KeSetTimer+0x14 fffff880`04059970 fffff800`03117c06 : 00000000`02fc864a fffffa80`06f0bb60 00000000`00000080 fffffa80`06f02060 : cdd!PresentWorkerThread+0x4b8 fffff880`04059d00 fffff800`02e51c26 : fffff880`009e9180 fffffa80`06f0bb60 fffffa80`058fe660 00000000`00000283 : nt!PspSystemThreadStartup+0x5a fffff880`04059d40 00000000`00000000 : fffff880`0405a000 fffff880`04054000 fffff880`040594b0 00000000`00000000 : nt!KxStartSystemThread+0x16   SYMBOL_STACK_INDEX:  3  SYMBOL_NAME:  cdd!PresentWorkerThread+4b8  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: cdd  IMAGE_NAME:  cdd.dll  DEBUG_FLR_IMAGE_TIMESTAMP:  4bf4408a  STACK_COMMAND:  .cxr 0xfffff88004058e70 ; kb  FAILURE_BUCKET_ID:  X64_0x7E_cdd!PresentWorkerThread+4b8  BUCKET_ID:  X64_0x7E_cdd!PresentWorkerThread+4b8  Followup: MachineOwner ---------  1: kd> lmtsmn start             end                 module name fffff880`03c8c000 fffff880`03cca000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00f0e000 fffff880`00f65000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`02cf7000 fffff880`02d81000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`04be2000 fffff880`04bf8000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`01187000 fffff880`01192000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`0b949000 fffff880`0b954000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5) fffff880`00e1a000 fffff880`00e23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00e23000 fffff880`00e4d000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118) fffff960`00810000 fffff960`00871000   ATMFD    ATMFD.DLL    Thu May 27 00:11:31 2010 (4BFDF0F3) fffff880`00fd6000 fffff880`00fe2000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5) fffff880`0482a000 fffff880`04b19000   bcmwl664 bcmwl664.sys Thu Jan 21 22:30:58 2010 (4B591BF2) fffff880`01873000 fffff880`0187a000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`03b3e000 fffff880`03b4f000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`098c8000 fffff880`098e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00740000 fffff960`00767000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A) fffff880`01813000 fffff880`0183d000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00cc7000 fffff880`00d87000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`10ba4000 fffff880`10bb6000   circlass circlass.sys Mon Jul 13 20:06:34 2009 (4A5BCC0A) fffff880`01977000 fffff880`019a7000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00c69000 fffff880`00cc7000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03a5c000 fffff880`03a60500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7) fffff880`0105e000 fffff880`010d1000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`00fcd000 fffff880`00fd6000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`04b82000 fffff880`04b92000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`0500c000 fffff880`0501a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`03a9d000 fffff880`03b20000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`043b0000 fffff880`043da3a0   CtClsFlt CtClsFlt.sys Wed Sep 16 04:08:47 2009 (4AB09D0F) fffff880`03b20000 fffff880`03b3e000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`02cbc000 fffff880`02ccb000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`01961000 fffff880`01977000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`05168000 fffff880`0518a000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`05063000 fffff880`05076000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`05024000 fffff880`05063000   dump_nvstor64 dump_nvstor64.sys Mon Mar 08 19:14:12 2010 (4B9592D4) fffff880`0501a000 fffff880`05024000   dump_storport dump_storport.sys Mon Jul 13 20:01:00 2009 (4A5BCABC) fffff880`05000000 fffff880`0500c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`04233000 fffff880`04327000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`04327000 fffff880`0436d000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`04b92000 fffff880`04bcb000   facap    facap.sys    Wed Sep 24 22:34:31 2008 (48DAF8B7) fffff880`09eb1000 fffff880`09ee7000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0) fffff880`011de000 fffff880`011f2000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`01192000 fffff880`011de000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`013f4000 fffff880`013fe000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01927000 fffff880`01961000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`033df000 fffff800`03428000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`03c68000 fffff880`03c8c000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`051be000 fffff880`051d7000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`051ad000 fffff880`051be000   hidir    hidir.sys    Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`051d7000 fffff880`051df080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`10be9000 fffff880`10bf7000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`09800000 fffff880`098c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`0191e000 fffff880`01927000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`03b94000 fffff880`03bb2000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03b75000 fffff880`03b8b000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`04b26000 fffff880`04b82000   itecir   itecir.sys   Wed Feb 24 03:59:35 2010 (4B84EA77) fffff880`03bb2000 fffff880`03bc1000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`051e0000 fffff880`051ee000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00bc2000 fffff800`00bcc000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`0436d000 fffff880`043b0000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F) fffff880`013c9000 fffff880`013e3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`04bdc000 fffff880`04be1200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`0fe6f000 fffff880`0fe84000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`10b73000 fffff880`10b96000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00c11000 fffff880`00c55000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`05076000 fffff880`05084000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`03a4d000 fffff880`03a5c000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`051ee000 fffff880`051fb000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`0183d000 fffff880`0186a000   MpFilter MpFilter.sys Thu Oct 01 22:36:31 2009 (4AC5672F) fffff880`0b954000 fffff880`0b964000   MpNWMon  MpNWMon.sys  Thu Oct 01 22:36:22 2009 (4AC56726) fffff880`09986000 fffff880`0999e000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`0999e000 fffff880`099cb000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`09eec000 fffff880`09f3a000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`09f3a000 fffff880`09f5d000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`00e4d000 fffff880`00e58000   msahci   msahci.sys   Fri Nov 13 23:36:50 2009 (4AFE33E2) fffff880`00df3000 fffff880`00dfe000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00f6e000 fffff880`00f78000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`09f5d000 fffff880`09f5ec00   MSPCLOCK MSPCLOCK.sys Mon Jul 13 20:00:17 2009 (4A5BCA91) fffff880`0997a000 fffff880`0997ba80   MSPQM    MSPQM.sys    Mon Jul 13 20:00:17 2009 (4A5BCA91) fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`02cb1000 fffff880`02cbc000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`0190c000 fffff880`0191e000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`014aa000 fffff880`0159c000   ndis     ndis.sys     Thu Nov 19 22:45:55 2009 (4B0610F3) fffff880`043db000 fffff880`043e7000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`0994f000 fffff880`09962000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5) fffff880`04200000 fffff880`0422f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`0fe5a000 fffff880`0fe6f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`02c16000 fffff880`02c25000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02d81000 fffff880`02dc6000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`0159c000 fffff880`015fc000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`00c00000 fffff880`00c11000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`02ca5000 fffff880`02cb1000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02e03000 fffff800`033df000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`01226000 fffff880`013c9000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`0186a000 fffff880`01873000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`10b1b000 fffff880`10b1c180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA) fffff880`0518a000 fffff880`051ad000   nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D) fffff880`0fe89000 fffff880`10b1ae00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E) fffff880`03d6e000 fffff880`03dc1a80   nvmf6264 nvmf6264.sys Thu Mar 04 20:04:39 2010 (4B9058A7) fffff880`03a61000 fffff880`03a6c000   nvsmu    nvsmu.sys    Mon Jun 29 03:36:37 2009 (4A486F05) fffff880`010e6000 fffff880`01125000   nvstor64 nvstor64.sys Mon Mar 08 19:14:12 2010 (4B9592D4) fffff880`098fc000 fffff880`0994f000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B) fffff880`03dc2000 fffff880`03de9060   OA001Ufd OA001Ufd.sys Fri Mar 06 02:33:57 2009 (49B0D1E5) fffff880`019a7000 fffff880`019f5160   OA001Vid OA001Vid.sys Sun Mar 08 20:56:25 2009 (49B46939) fffff880`02dcf000 fffff880`02df5000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00fb8000 fffff880`00fcd000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f78000 fffff880`00fab000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00de3000 fffff880`00df3000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`013e3000 fffff880`013f4000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`09e00000 fffff880`09ea6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`0512b000 fffff880`05168000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00c55000 fffff880`00c69000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`04800000 fffff880`04824000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`10b1d000 fffff880`10b38000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`10b38000 fffff880`10b59000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`10b59000 fffff880`10b73000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`02c54000 fffff880`02ca5000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`043f4000 fffff880`043ff000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`010d1000 fffff880`010da000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`010da000 fffff880`010e3000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`011f2000 fffff880`011fb000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`018d2000 fffff880`0190c000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`03cea000 fffff880`03d00000   rimmpx64 rimmpx64.sys Thu Jun 25 04:04:18 2009 (4A432F82) fffff880`03d00000 fffff880`03d17000   rimspx64 rimspx64.sys Thu Jun 25 03:13:43 2009 (4A4323A7) fffff880`03d17000 fffff880`03d6e000   rixdpx64 rixdpx64.sys Thu Jun 25 03:38:50 2009 (4A43298A) fffff880`09962000 fffff880`0997a000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`03cca000 fffff880`03cea000   sdbus    sdbus.sys    Fri Oct 09 22:41:20 2009 (4ACFF450) fffff880`09ea6000 fffff880`09eb1000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E) fffff880`0a6da000 fffff880`0a791000   Sftfslh  Sftfslh.sys  Wed Dec 02 19:55:48 2009 (4B170C94) fffff880`0a791000 fffff880`0a7de000   Sftplaylh Sftplaylh.sys Wed Dec 02 19:55:40 2009 (4B170C8C) fffff880`0a6a7000 fffff880`0a6b2000   Sftredirlh Sftredirlh.sys Wed Dec 02 19:55:52 2009 (4B170C98) fffff880`050a1000 fffff880`050ac000   Sftvollh Sftvollh.sys Wed Dec 02 19:55:23 2009 (4B170C7B) fffff880`018ca000 fffff880`018d2000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB) fffff880`0b8d8000 fffff880`0b949000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A) fffff880`09f5f000 fffff880`09ff5000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27) fffff880`0a63f000 fffff880`0a6a7000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F) fffff880`0a600000 fffff880`0a62d000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00) fffff880`01125000 fffff880`01187000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE) fffff880`04bcb000 fffff880`04bdbd00   STREAM   STREAM.SYS   Mon Jul 13 20:06:18 2009 (4A5BCBFA) fffff880`050ac000 fffff880`0512b000   stwrt64  stwrt64.sys  Fri Feb 26 03:07:58 2010 (4B87815E) fffff880`04824000 fffff880`04825480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`03a00000 fffff880`03a4b000   SynTP    SynTP.sys    Mon Aug 24 13:37:05 2009 (4A92CFC1) fffff880`043e7000 fffff880`043f4000   tap0901  tap0901.sys  Thu Aug 19 18:07:59 2010 (4C6DAB3F) fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`0a62d000 fffff880`0a63f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`02cea000 fffff880`02cf7000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`02ccc000 fffff880`02cea000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`02c40000 fffff880`02c54000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`005a0000 fffff960`005aa000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`03b4f000 fffff880`03b75000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`10bb6000 fffff880`10bc8000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`05084000 fffff880`050a1000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`03a4b000 fffff880`03a4cf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`03c57000 fffff880`03c68000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A) fffff880`0fe00000 fffff880`0fe5a000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF) fffff880`03a6c000 fffff880`03a77000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`03c01000 fffff880`03c57000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`00fab000 fffff880`00fb8000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`01485000 fffff880`01493000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`01200000 fffff880`01225000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`00fe2000 fffff880`00ff7000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00d87000 fffff880`00de3000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`0187e000 fffff880`018ca000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`04b19000 fffff880`04b26000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39) fffff880`02c00000 fffff880`02c16000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A) fffff880`0997c000 fffff880`09986000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40) fffff880`02c25000 fffff880`02c40000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`01493000 fffff880`014a3000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e5b000 fffff880`00eff000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00eff000 fffff880`00f0e000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02dc6000 fffff880`02dcf000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`000a0000 fffff960`003af000   win32k   win32k.sys   Sat Jun 19 00:31:59 2010 (4C1C483F) fffff880`03b8b000 fffff880`03b94000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00f65000 fffff880`00f6e000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`10bc8000 fffff880`10be9000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1) fffff880`03bc1000 fffff880`03bf2000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)  Unloaded modules: fffff880`019a7000 fffff880`019b5000   crashdmp.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`019b5000 fffff880`019bf000   dump_storpor     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`019bf000 fffff880`019fe000   dump_nvstor6     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`01800000 fffff880`01813000   dump_dumpfve     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`10b73000 fffff880`10ba4000   WUDFRd.sys     Timestamp: unavailable (00000000)     Checksum:  00000000

gtgt

Hi,

Disabled the webcam drivers and got a BSOD today. Is it related to my Ricoh card reader?

Thanks!
George



CarlTR6

Hi George. The dump blames netio.sys which is a Microsoft driver and not likely the cause. Something interfered with netio.sys and caused memory corruption.

Error code: 7E, SYSTEM_THREAD_EXCEPTION_NOT_HANDLED. Usual causes: Insufficient disk space, Device driver, Video card, BIOS, Breakpoint with no debugger attached, Hardware incompatibility, Faulty system service, Memory, 3rd party remote control.

Code:
Kernel base = 0xfffff800`02e5f000 PsLoadedModuleList = 0xfffff800`0309ce50 Debug session time: Mon Oct  4 18:57:47.234 2010 (GMT-4) System Uptime: 0 days 0:10:29.028 Loading Kernel Symbols ............................................................... ................................................................ .......................................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 1000007E, {ffffffffc0000005, fffff88001795998, fffff88002ffc9b8, fffff88002ffc220}  Probably caused by : NETIO.SYS ( NETIO!NetiopIoWorkItemRoutine+38 )  Followup: MachineOwner ---------  1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003.  This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG.  This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG.  This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff88001795998, The address that the exception occurred at Arg3: fffff88002ffc9b8, Exception Record Address Arg4: fffff88002ffc220, Context Record Address  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  NETIO!NetiopIoWorkItemRoutine+38 fffff880`01795998 ff5308          call    qword ptr [rbx+8]  EXCEPTION_RECORD:  fffff88002ffc9b8 -- (.exr 0xfffff88002ffc9b8) ExceptionAddress: fffff88001795998 (NETIO!NetiopIoWorkItemRoutine+0x0000000000000038)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  CONTEXT:  fffff88002ffc220 -- (.cxr 0xfffff88002ffc220) rax=fffff88002ffcc10 rbx=fffffa800476b370 rcx=fffffa80070dd270 rdx=0000000000000000 rsi=0000000000000000 rdi=fffffa80070dd270 rip=fffff88001795998 rsp=fffff88002ffcbf0 rbp=fffff800030745f8  r8=fffff88002ffcc10  r9=0000000000007e00 r10=000000000000000c r11=0000000000000000 r12=fffffa800476b1d0 r13=0000000000000001 r14=0000000000000000 r15=0000000000000001 iopl=0         nv up ei ng nz na pe nc cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282 NETIO!NetiopIoWorkItemRoutine+0x38: fffff880`01795998 ff5308          call    qword ptr [rbx+8] ds:002b:fffffa80`0476b378=fefff88001824460 Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  PROCESS_NAME:  System  CURRENT_IRQL:  0  ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  ffffffffffffffff  READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031070e0  ffffffffffffffff   FOLLOWUP_IP:  NETIO!NetiopIoWorkItemRoutine+38 fffff880`01795998 ff5308          call    qword ptr [rbx+8]  BUGCHECK_STR:  0x7E  LAST_CONTROL_TRANSFER:  from fffff800031cbc5d to fffff88001795998  STACK_TEXT:   fffff880`02ffcbf0 fffff800`031cbc5d : fffffa80`0470b9f0 fffffa80`03ce0b60 fffffa80`0747be40 fffffa80`03ce0b60 : NETIO!NetiopIoWorkItemRoutine+0x38 fffff880`02ffcc40 fffff800`02edc961 : fffff800`03074500 fffff800`031cbc20 fffffa80`03ce0b60 fffff800`00000299 : nt!IopProcessWorkItem+0x3d fffff880`02ffcc70 fffff800`03173c06 : ffbfffff`fefdfff7 fffffa80`03ce0b60 00000000`00000080 fffffa80`03ccfb30 : nt!ExpWorkerThread+0x111 fffff880`02ffcd00 fffff800`02eadc26 : fffff880`009e9180 fffffa80`03ce0b60 fffff880`009f3f40 a8ffef7f`fffdffff : nt!PspSystemThreadStartup+0x5a fffff880`02ffcd40 00000000`00000000 : fffff880`02ffd000 fffff880`02ff7000 fffff880`02ffc9b0 00000000`00000000 : nt!KxStartSystemThread+0x16   SYMBOL_STACK_INDEX:  0  SYMBOL_NAME:  NETIO!NetiopIoWorkItemRoutine+38  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: NETIO  IMAGE_NAME:  NETIO.SYS  DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a  STACK_COMMAND:  .cxr 0xfffff88002ffc220 ; kb  FAILURE_BUCKET_ID:  X64_0x7E_NETIO!NetiopIoWorkItemRoutine+38  BUCKET_ID:  X64_0x7E_NETIO!NetiopIoWorkItemRoutine+38  Followup: MachineOwner ---------  1: kd> lmtsmn start             end                 module name fffff880`03d38000 fffff880`03d76000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00f73000 fffff880`00fca000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`02c00000 fffff880`02c8a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`04272000 fffff880`04288000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`010e7000 fffff880`010f2000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`0ae71000 fffff880`0ae7c000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5) fffff880`00c76000 fffff880`00c7f000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00c7f000 fffff880`00ca9000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118) fffff960`00900000 fffff960`00961000   ATMFD    ATMFD.DLL    Thu May 27 00:11:31 2010 (4BFDF0F3) fffff880`00da2000 fffff880`00dae000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5) fffff880`042f5000 fffff880`045e4000   bcmwl664 bcmwl664.sys Thu Jan 21 22:30:58 2010 (4B591BF2) fffff880`01696000 fffff880`0169d000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`03a00000 fffff880`03a11000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`0a17f000 fffff880`0a19d000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00780000 fffff960`007a7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A) fffff880`013c9000 fffff880`013f3000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00e00000 fffff880`00ec0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`04854000 fffff880`04866000   circlass circlass.sys Mon Jul 13 20:06:34 2009 (4A5BCC0A) fffff880`01416000 fffff880`01446000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00d08000 fffff880`00d66000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03bf7000 fffff880`03bfb500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7) fffff880`0148c000 fffff880`014ff000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`00d99000 fffff880`00da2000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`04262000 fffff880`04272000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`015ec000 fffff880`015fa000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`03b56000 fffff880`03bd9000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`03bd9000 fffff880`03bf7000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`03b47000 fffff880`03b56000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`01400000 fffff880`01416000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`049a3000 fffff880`049c5000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`00dde000 fffff880`00df1000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`011b0000 fffff880`011ef000   dump_nvstor64 dump_nvstor64.sys Mon Mar 08 19:14:12 2010 (4B9592D4) fffff880`10bf6000 fffff880`10c00000   dump_storport dump_storport.sys Mon Jul 13 20:01:00 2009 (4A5BCABC) fffff880`013f3000 fffff880`013ff000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`10ae7000 fffff880`10bdb000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`0fe00000 fffff880`0fe46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`0af8f000 fffff880`0afc5000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0) fffff880`0113e000 fffff880`01152000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`010f2000 fffff880`0113e000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`01510000 fffff880`0151a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`015b2000 fffff880`015ec000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`0162b000 fffff880`01675000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`02e16000 fffff800`02e5f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`03d14000 fffff880`03d38000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`0102d000 fffff880`01046000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`049ee000 fffff880`049ff000   hidir    hidir.sys    Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`04800000 fffff880`04808080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`017f0000 fffff880`017fe000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`0a0b7000 fffff880`0a17f000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`0168d000 fffff880`01696000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`03a56000 fffff880`03a74000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03a37000 fffff880`03a4d000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`04200000 fffff880`04262000   itecir   itecir.sys   Tue Jul 13 05:50:47 2010 (4C3C36F7) fffff880`03a74000 fffff880`03a83000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`0147a000 fffff880`01488000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00ba1000 fffff800`00bab000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`04811000 fffff880`04854000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`013af000 fffff880`013c9000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01600000 fffff880`0162b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`049c5000 fffff880`049ca200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`094a7000 fffff880`094bc000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`09427000 fffff880`0944a000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00cb0000 fffff880`00cf4000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`011ef000 fffff880`011fd000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`03ad0000 fffff880`03adf000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`0fe46000 fffff880`0fe53000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00c5c000 fffff880`00c76000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`01000000 fffff880`0102d000   MpFilter MpFilter.sys Thu Oct 01 22:36:31 2009 (4AC5672F) fffff880`0a19d000 fffff880`0a1b5000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`0a1b5000 fffff880`0a1e2000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`0a000000 fffff880`0a04e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`0a04e000 fffff880`0a071000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`00dc3000 fffff880`00dce000   msahci   msahci.sys   Fri Nov 13 23:36:50 2009 (4AFE33E2) fffff880`02d3e000 fffff880`02d49000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00fd3000 fffff880`00fdd000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`01152000 fffff880`011b0000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`03b3c000 fffff880`03b47000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`015a0000 fffff880`015b2000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`0169e000 fffff880`01790000   ndis     ndis.sys     Thu Nov 19 22:45:55 2009 (4B0610F3) fffff880`042ac000 fffff880`042b8000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`0950f000 fffff880`09522000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5) fffff880`042b8000 fffff880`042e7000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`048d2000 fffff880`048e7000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`02dc1000 fffff880`02dd0000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02c8a000 fffff880`02ccf000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01790000 fffff880`017f0000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`02d49000 fffff880`02d5a000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`03b30000 fffff880`03b3c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02e5f000 fffff800`0343b000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`0120c000 fffff880`013af000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`01463000 fffff880`0146c000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`10ae5000 fffff880`10ae6180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA) fffff880`049cb000 fffff880`049ee000   nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D) fffff880`0fe53000 fffff880`10ae4e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E) fffff880`03c57000 fffff880`03caaa80   nvmf6264 nvmf6264.sys Thu Mar 04 20:04:39 2010 (4B9058A7) fffff880`02cd8000 fffff880`02ce3000   nvsmu    nvsmu.sys    Mon Jun 29 03:36:37 2009 (4A486F05) fffff880`01046000 fffff880`01085000   nvstor64 nvstor64.sys Mon Mar 08 19:14:12 2010 (4B9592D4) fffff880`094bc000 fffff880`0950f000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B) fffff880`02d85000 fffff880`02dab000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00fea000 fffff880`00fff000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00d66000 fffff880`00d99000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00dce000 fffff880`00dde000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`014ff000 fffff880`01510000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`09544000 fffff880`095ea000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`04966000 fffff880`049a3000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00cf4000 fffff880`00d08000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`04288000 fffff880`042ac000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`10bdb000 fffff880`10bf6000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`03dc3000 fffff880`03de4000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`03de4000 fffff880`03dfe000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`03adf000 fffff880`03b30000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`045f1000 fffff880`045fc000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`02d23000 fffff880`02d2c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02d2c000 fffff880`02d35000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02d35000 fffff880`02d3e000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`01566000 fffff880`015a0000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`03d96000 fffff880`03dac000   rimmpx64 rimmpx64.sys Thu Jun 25 04:04:18 2009 (4A432F82) fffff880`03dac000 fffff880`03dc3000   rimspx64 rimspx64.sys Thu Jun 25 03:13:43 2009 (4A4323A7) fffff880`03c00000 fffff880`03c57000   rixdpx64 rixdpx64.sys Thu Jun 25 03:38:50 2009 (4A43298A) fffff880`09522000 fffff880`0953a000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`03d76000 fffff880`03d96000   sdbus    sdbus.sys    Fri Oct 09 22:41:20 2009 (4ACFF450) fffff880`0a071000 fffff880`0a07c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E) fffff880`0a8ca000 fffff880`0a981000   Sftfslh  Sftfslh.sys  Wed Dec 02 19:55:48 2009 (4B170C94) fffff880`0a981000 fffff880`0a9ce000   Sftplaylh Sftplaylh.sys Wed Dec 02 19:55:40 2009 (4B170C8C) fffff880`0af84000 fffff880`0af8f000   Sftredirlh Sftredirlh.sys Wed Dec 02 19:55:52 2009 (4B170C98) fffff880`0944a000 fffff880`09455000   Sftvollh Sftvollh.sys Wed Dec 02 19:55:23 2009 (4B170C7B) fffff880`01685000 fffff880`0168d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB) fffff880`0ae00000 fffff880`0ae71000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A) fffff880`0aeee000 fffff880`0af84000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27) fffff880`0a812000 fffff880`0a87a000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F) fffff880`0a9ce000 fffff880`0a9fb000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00) fffff880`01085000 fffff880`010e7000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE) fffff880`048e7000 fffff880`04966000   stwrt64  stwrt64.sys  Fri Feb 26 03:07:58 2010 (4B87815E) fffff880`045fc000 fffff880`045fd480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`03a83000 fffff880`03ace000   SynTP    SynTP.sys    Mon Aug 24 13:37:05 2009 (4A92CFC1) fffff880`042e7000 fffff880`042f4000   tap0901  tap0901.sys  Thu Aug 19 18:07:59 2010 (4C6DAB3F) fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`0a800000 fffff880`0a812000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`02d78000 fffff880`02d85000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`02d5a000 fffff880`02d78000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`02deb000 fffff880`02dff000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`03a11000 fffff880`03a37000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`04866000 fffff880`04878000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`01446000 fffff880`01463000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`03ace000 fffff880`03acff00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`03d03000 fffff880`03d14000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A) fffff880`04878000 fffff880`048d2000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF) fffff880`02ce3000 fffff880`02cee000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`03cad000 fffff880`03d03000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`00fdd000 fffff880`00fea000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`0146c000 fffff880`0147a000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`02cee000 fffff880`02d13000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`01675000 fffff880`01685000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`00dae000 fffff880`00dc3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`0151a000 fffff880`01566000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`045e4000 fffff880`045f1000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39) fffff880`02dab000 fffff880`02dc1000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A) fffff880`0953a000 fffff880`09544000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40) fffff880`02dd0000 fffff880`02deb000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`02d13000 fffff880`02d23000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00ec0000 fffff880`00f64000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00f64000 fffff880`00f73000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02ccf000 fffff880`02cd8000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`00060000 fffff960`0036f000   win32k   win32k.sys   Sat Jun 19 00:31:59 2010 (4C1C483F) fffff880`03a4d000 fffff880`03a56000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00fca000 fffff880`00fd3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`09455000 fffff880`09476000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1) fffff880`09476000 fffff880`094a7000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)  Unloaded modules: fffff880`017f0000 fffff880`017fe000   crashdmp.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`01446000 fffff880`01450000   dump_storpor     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`011b0000 fffff880`011ef000   dump_nvstor6     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`01450000 fffff880`01463000   dump_dumpfve     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`048aa000 fffff880`048db000   WUDFRd.sys     Timestamp: unavailable (00000000)     Checksum:  00000000
It could well be the card rider drivers causing this. Let's try this. Rather than uninstall your card reader, navigate to C:\Windows\System32\Drivers and locate those three drivers. Rename them from .sys to .bak. If that does not prove to be the cause of your BSOD's you can rename them again.

Let us know if this resolves the problem. All of your other drivers look good.

gtgt

Hi,

With webcam and card reader drivers set to .bak, had a blue screen today. The minidump is attached.

Thanks!

CarlTR6

Error code 24, NTFS_FILE_SYSTEM. Usual causes: Disk corruption, insufficient physical memory, Device driver, Indexing, Resident antivirus, backup, defrag programs, Disk/Drive failing/failure.

Code:
Kernel base = 0xfffff800`02e53000 PsLoadedModuleList = 0xfffff800`03090e50 Debug session time: Thu Oct  7 18:38:36.669 2010 (GMT-4) System Uptime: 0 days 2:05:47.354 Loading Kernel Symbols ............................................................... ................................................................ ....................................... Loading User Symbols Loading unloaded module list ......... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 24, {1904fb, fffff8800bdb4548, fffff8800bdb3db0, fffff80002ef3d4e}  Probably caused by : fileinfo.sys ( fileinfo!FIStreamCleanup+4a )  Followup: MachineOwner ---------  0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  NTFS_FILE_SYSTEM (24)     If you see NtfsExceptionFilter on the stack then the 2nd and 3rd     parameters are the exception record and context record. Do a .cxr     on the 3rd parameter and then kb to obtain a more informative stack     trace. Arguments: Arg1: 00000000001904fb Arg2: fffff8800bdb4548 Arg3: fffff8800bdb3db0 Arg4: fffff80002ef3d4e  Debugging Details: ------------------   EXCEPTION_RECORD:  fffff8800bdb4548 -- (.exr 0xfffff8800bdb4548) ExceptionAddress: fffff80002ef3d4e (nt!ExfAcquirePushLockExclusive+0x000000000000001e)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  CONTEXT:  fffff8800bdb3db0 -- (.cxr 0xfffff8800bdb3db0) rax=fffffa80049a3040 rbx=fffff8a00194d9b0 rcx=fefffa800512a5b8 rdx=0000000000000008 rsi=0000000000000000 rdi=fefffa800512a5b8 rip=fffff80002ef3d4e rsp=fffff8800bdb4780 rbp=0000000000000000  r8=ffffffffffffffff  r9=ffffffffffffffff r10=fffff8a0054d14f0 r11=fffff8800bdb47e0 r12=0000000000000705 r13=0000000000000000 r14=fffffa8006ef5d68 r15=fffff8a0054d1888 iopl=0         nv up ei pl zr na po nc cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246 nt!ExfAcquirePushLockExclusive+0x1e: fffff800`02ef3d4e 488b19          mov     rbx,qword ptr [rcx] ds:002b:fefffa80`0512a5b8=???????????????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  PROCESS_NAME:  System  CURRENT_IRQL:  0  ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  ffffffffffffffff  READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fb0e0  ffffffffffffffff   FOLLOWUP_IP:  fileinfo!FIStreamCleanup+4a fffff880`0118a6fa 488b4308        mov     rax,qword ptr [rbx+8]  FAULTING_IP:  nt!ExfAcquirePushLockExclusive+1e fffff800`02ef3d4e 488b19          mov     rbx,qword ptr [rcx]  BUGCHECK_STR:  0x24  LAST_CONTROL_TRANSFER:  from fffff8800118a6fa to fffff80002ef3d4e  STACK_TEXT:   fffff880`0bdb4780 fffff880`0118a6fa : fffff8a0`0194d9b0 00000000`00000000 fffff8a0`0194d9b0 00000000`00000000 : nt!ExfAcquirePushLockExclusive+0x1e fffff880`0bdb4800 fffff880`0114365e : fffffa80`06eab7b8 00000000`00000000 ffffffff`ffffffff fffffa80`06ef5db0 : fileinfo!FIStreamCleanup+0x4a fffff880`0bdb4850 fffff880`0115f22d : fffff8a0`0194d968 fffff880`01135000 00000000`00000000 00000000`00000040 : fltmgr!DoFreeContext+0x7e fffff880`0bdb4880 fffff880`0115abc1 : fffffa80`04ace010 00000000`00000130 fffff8a0`054d1620 fffff8a0`054d1620 : fltmgr! ?? ::NNGAKEGL::`string'+0x1196 fffff880`0bdb48b0 fffff880`0115ab7b : fffffa80`04ace010 fffff8a0`054d1888 fffffa80`04ace010 fffff8a0`0ee32b40 : fltmgr!CleanupStreamListCtrl+0x21 fffff880`0bdb48e0 fffff800`031b2896 : 00000000`00000001 fffff880`012e11a7 fffff8a0`0ee32b40 00000000`00000000 : fltmgr!DeleteStreamListCtrlCallback+0x6b fffff880`0bdb4910 fffff880`012e0bcc : fffff8a0`054d1620 fffffa80`049a3040 fffff880`0bdb49e8 00000000`00000706 : nt!FsRtlTeardownPerStreamContexts+0xe2 fffff880`0bdb4960 fffff880`012e08d5 : 00000000`01010000 00000000`00000000 fffff800`03068500 00000000`00000001 : Ntfs!NtfsDeleteScb+0x108 fffff880`0bdb49a0 fffff880`01253cb4 : fffff8a0`054d1520 fffff8a0`054d1620 fffff800`03068500 fffff880`0bdb4b12 : Ntfs!NtfsRemoveScb+0x61 fffff880`0bdb49e0 fffff880`012de2dc : fffff8a0`054d14f0 fffff800`030685a0 fffff880`0bdb4b12 fffffa80`056ada50 : Ntfs!NtfsPrepareFcbForRemoval+0x50 fffff880`0bdb4a10 fffff880`0125c882 : fffffa80`056ada50 fffffa80`056ada50 fffff8a0`054d14f0 00000000`00000000 : Ntfs!NtfsTeardownStructures+0xdc fffff880`0bdb4a90 fffff880`012f5813 : fffffa80`056ada50 fffff800`030685a0 fffff8a0`054d14f0 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0xa2 fffff880`0bdb4ad0 fffff880`012cf38f : fffffa80`056ada50 fffff8a0`054d1620 fffff8a0`054d14f0 fffffa80`048fb180 : Ntfs!NtfsCommonClose+0x353 fffff880`0bdb4ba0 fffff800`02ed0961 : 00000000`00000000 fffff880`012cf200 fffffa80`049a3001 fffffa80`00000002 : Ntfs!NtfsFspClose+0x15f fffff880`0bdb4c70 fffff800`03167c06 : fffff880`0a3f1650 fffffa80`049a3040 00000000`00000080 fffffa80`03ccfb30 : nt!ExpWorkerThread+0x111 fffff880`0bdb4d00 fffff800`02ea1c26 : fffff800`0303de80 fffffa80`049a3040 fffffa80`03cdf040 fffff880`0125ca90 : nt!PspSystemThreadStartup+0x5a fffff880`0bdb4d40 00000000`00000000 : fffff880`0bdb5000 fffff880`0bdaf000 fffff880`0bdb49b0 00000000`00000000 : nt!KxStartSystemThread+0x16   SYMBOL_STACK_INDEX:  1  SYMBOL_NAME:  fileinfo!FIStreamCleanup+4a  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: fileinfo  IMAGE_NAME:  fileinfo.sys  DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc481  STACK_COMMAND:  .cxr 0xfffff8800bdb3db0 ; kb  FAILURE_BUCKET_ID:  X64_0x24_fileinfo!FIStreamCleanup+4a  BUCKET_ID:  X64_0x24_fileinfo!FIStreamCleanup+4a  Followup: MachineOwner ---------  0: kd> lmtsmn start             end                 module name fffff880`03cb6000 fffff880`03cf4000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00ecf000 fffff880`00f26000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`02c00000 fffff880`02c8a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`04872000 fffff880`04888000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`0112a000 fffff880`01135000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`0a871000 fffff880`0a87c000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5) fffff880`00fd2000 fffff880`00fdb000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`01044000 fffff880`0106e000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118) fffff960`00900000 fffff960`00961000   ATMFD    ATMFD.DLL    Thu May 27 00:11:31 2010 (4BFDF0F3) fffff880`00f97000 fffff880`00fa3000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5) fffff880`048a4000 fffff880`04b93000   bcmwl664 bcmwl664.sys Thu Jan 21 22:30:58 2010 (4B591BF2) fffff880`02cf0000 fffff880`02cf7000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`03bec000 fffff880`03bfd000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`096f7000 fffff880`09715000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A) fffff880`01000000 fffff880`0102a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00cd7000 fffff880`00d97000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`04286000 fffff880`04298000   circlass circlass.sys Mon Jul 13 20:06:34 2009 (4A5BCC0A) fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00c79000 fffff880`00cd7000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03ace000 fffff880`03ad2500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7) fffff880`014dd000 fffff880`01550000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`00f8e000 fffff880`00f97000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`04862000 fffff880`04872000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`03dc3000 fffff880`03dd1000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`03b4b000 fffff880`03bce000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`03bce000 fffff880`03bec000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`03b3c000 fffff880`03b4b000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`04253000 fffff880`04275000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`03ddb000 fffff880`03dee000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`01480000 fffff880`014bf000   dump_nvstor64 dump_nvstor64.sys Mon Mar 08 19:14:12 2010 (4B9592D4) fffff880`03dd1000 fffff880`03ddb000   dump_storport dump_storport.sys Mon Jul 13 20:01:00 2009 (4A5BCABC) fffff880`03dee000 fffff880`03dfa000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`042c4000 fffff880`043b8000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`043b8000 fffff880`043fe000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`0a98c000 fffff880`0a9c2000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0) fffff880`01181000 fffff880`01195000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`01135000 fffff880`01181000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`01561000 fffff880`0156b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`02e0a000 fffff800`02e53000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`03c92000 fffff880`03cb6000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`03d9c000 fffff880`03db5000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`03d8b000 fffff880`03d9c000   hidir    hidir.sys    Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`0427b000 fffff880`04283080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`0a87c000 fffff880`0a88a000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`0962f000 fffff880`096f7000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`015f1000 fffff880`015fa000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`03a45000 fffff880`03a63000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03a26000 fffff880`03a3c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`04800000 fffff880`04862000   itecir   itecir.sys   Tue Jul 13 05:50:47 2010 (4C3C36F7) fffff880`03a63000 fffff880`03a72000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`03db5000 fffff880`03dc3000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00bb8000 fffff800`00bc2000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`10b73000 fffff880`10bb6000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`04275000 fffff880`0427a200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`08cc0000 fffff880`08cd5000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`08c40000 fffff880`08c63000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00c21000 fffff880`00c65000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`014bf000 fffff880`014cd000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`03abf000 fffff880`03ace000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`10bf3000 fffff880`10c00000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00fb8000 fffff880`00fd2000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02cba000 fffff880`02ce7000   MpFilter MpFilter.sys Thu Oct 01 22:36:31 2009 (4AC5672F) fffff880`097cb000 fffff880`097db000   MpNWMon  MpNWMon.sys  Thu Oct 01 22:36:22 2009 (4AC56726) fffff880`09715000 fffff880`0972d000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`0972d000 fffff880`0975a000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`0975a000 fffff880`097a8000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`097a8000 fffff880`097cb000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`0106e000 fffff880`01079000   msahci   msahci.sys   Fri Nov 13 23:36:50 2009 (4AFE33E2) fffff880`02d55000 fffff880`02d60000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00f2f000 fffff880`00f39000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`01195000 fffff880`011f3000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`03b31000 fffff880`03b3c000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`017e7000 fffff880`017f9000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`016dd000 fffff880`017cf000   ndis     ndis.sys     Thu Nov 19 22:45:55 2009 (4B0610F3) fffff880`04bc4000 fffff880`04bd0000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`08d28000 fffff880`08d3b000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5) fffff880`04bd0000 fffff880`04bff000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`042aa000 fffff880`042bf000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`0122d000 fffff880`0123c000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02d9c000 fffff880`02de1000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`02d60000 fffff880`02d71000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`03b25000 fffff880`03b31000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02e53000 fffff800`0342f000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`0124b000 fffff880`013ee000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`02ce7000 fffff880`02cf0000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`10b71000 fffff880`10b72180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA) fffff880`03d68000 fffff880`03d8b000   nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D) fffff880`0fedf000 fffff880`10b70e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E) fffff880`03d14000 fffff880`03d67a80   nvmf6264 nvmf6264.sys Thu Mar 04 20:04:39 2010 (4B9058A7) fffff880`0123c000 fffff880`01247000   nvsmu    nvsmu.sys    Mon Jun 29 03:36:37 2009 (4A486F05) fffff880`01089000 fffff880`010c8000   nvstor64 nvstor64.sys Mon Mar 08 19:14:12 2010 (4B9592D4) fffff880`08cd5000 fffff880`08d28000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B) fffff880`02c8a000 fffff880`02cb0000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00f79000 fffff880`00f8e000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f39000 fffff880`00f6c000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`01079000 fffff880`01089000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`01550000 fffff880`01561000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`09cf2000 fffff880`09d98000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`10bb6000 fffff880`10bf3000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00c65000 fffff880`00c79000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`04ba0000 fffff880`04bc4000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`04888000 fffff880`048a3000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`04200000 fffff880`04221000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`04221000 fffff880`0423b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`03ad4000 fffff880`03b25000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`04248000 fffff880`04253000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`02d3a000 fffff880`02d43000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02d43000 fffff880`02d4c000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02d4c000 fffff880`02d55000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`015b7000 fffff880`015f1000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`08d3b000 fffff880`08d53000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`03cf4000 fffff880`03d14000   sdbus    sdbus.sys    Fri Oct 09 22:41:20 2009 (4ACFF450) fffff880`09d98000 fffff880`09da3000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E) fffff880`09c00000 fffff880`09cb7000   Sftfslh  Sftfslh.sys  Wed Dec 02 19:55:48 2009 (4B170C94) fffff880`09da3000 fffff880`09df0000   Sftplaylh Sftplaylh.sys Wed Dec 02 19:55:40 2009 (4B170C8C) fffff880`0a981000 fffff880`0a98c000   Sftredirlh Sftredirlh.sys Wed Dec 02 19:55:52 2009 (4B170C98) fffff880`08c63000 fffff880`08c6e000   Sftvollh Sftvollh.sys Wed Dec 02 19:55:23 2009 (4B170C7B) fffff880`017df000 fffff880`017e7000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB) fffff880`0a8eb000 fffff880`0a981000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27) fffff880`08d5d000 fffff880`08dc5000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F) fffff880`09cb7000 fffff880`09ce4000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00) fffff880`010c8000 fffff880`0112a000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE) fffff880`0fe5a000 fffff880`0fed9000   stwrt64  stwrt64.sys  Fri Feb 26 03:07:58 2010 (4B87815E) fffff880`04284000 fffff880`04285480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`03a72000 fffff880`03abd000   SynTP    SynTP.sys    Mon Aug 24 13:37:05 2009 (4A92CFC1) fffff880`0423b000 fffff880`04248000   tap0901  tap0901.sys  Thu Aug 19 18:07:59 2010 (4C6DAB3F) fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`097db000 fffff880`097ed000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`02d8f000 fffff880`02d9c000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`02d71000 fffff880`02d8f000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`0102a000 fffff880`0103e000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`03a00000 fffff880`03a26000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`04298000 fffff880`042aa000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`03c00000 fffff880`03c1d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`03abd000 fffff880`03abef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`03c81000 fffff880`03c92000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A) fffff880`0fe00000 fffff880`0fe5a000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF) fffff880`013ee000 fffff880`013f9000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`03c2b000 fffff880`03c81000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`00f6c000 fffff880`00f79000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`02cf7000 fffff880`02d05000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`02d05000 fffff880`02d2a000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`017cf000 fffff880`017df000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`00fa3000 fffff880`00fb8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00d97000 fffff880`00df3000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`0156b000 fffff880`015b7000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`04b93000 fffff880`04ba0000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39) fffff880`02dea000 fffff880`02e00000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A) fffff880`08d53000 fffff880`08d5d000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40) fffff880`00fdb000 fffff880`00ff6000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`02d2a000 fffff880`02d3a000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e1c000 fffff880`00ec0000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00ec0000 fffff880`00ecf000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02de1000 fffff880`02dea000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`000b0000 fffff960`003bf000   win32k   win32k.sys   Sat Jun 19 00:31:59 2010 (4C1C483F) fffff880`03a3c000 fffff880`03a45000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00f26000 fffff880`00f2f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`08c6e000 fffff880`08c8f000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1) fffff880`08c8f000 fffff880`08cc0000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)  Unloaded modules: fffff880`0a800000 fffff880`0a871000   spsys.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`0a800000 fffff880`0a871000   spsys.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`03c1d000 fffff880`03c2b000   hidusb.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`0a800000 fffff880`0a871000   spsys.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`01480000 fffff880`0148e000   crashdmp.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`0148e000 fffff880`01498000   dump_storpor     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`01498000 fffff880`014d7000   dump_nvstor6     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`0121a000 fffff880`0122d000   dump_dumpfve     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`04253000 fffff880`04284000   WUDFRd.sys     Timestamp: unavailable (00000000)     Checksum:  00000000
I still see one outdated driver; the rest look good.
Quote:
nvsmu.sys Mon Jun 29 03:36:37 2009 - nVidia nForce System Management Controller (nVidia nForce chipset driver) Drivers - Download NVIDIA Drivers
Update the above driver.

Test your hard drive with Disk Check.
Quote:
Run CHKDSK /R /F from an elevated (Run as adminstrator) Command Prompt. Please do this for each hard drive on your system.
When it tells you it can't do it right now - and asks you if you'd like to do it at the next reboot - answer Y (for Yes) and press Enter. Then reboot and let the test run. It may take a while for it to run, but keep an occasional eye on it to see if it generates any errors. See "CHKDSK LogFile" below in order to check the results of the test.

Elevated Command Prompt:
Go to Start and type in "cmd.exe" (without the quotes)
At the top of the Search Box, right click on Cmd.exe and select "Run as administrator"

CHKDSK LogFile:
Go to Start and type in "eventvwr.msc" (without the quotes) and press Enter
Expand the Windows logs heading, then select the Application log file entry.
Double click on the Source column header.
Scroll down the list until you find the Chkdsk entry (wininit for Windows 7) (winlogon for XP).

Copy/paste the results into your next post.

Further test your hard drive with a test from your hard drive manufacturer:
HD Diagnostic. Report back with the results.

Run a system files check scan:
http://www.sevenforums.com/tutorials/1538-sfc-scannow-command-system-file-checker.html. Report the results.

gtgt

Here's the CHKDSK result:


Log Name: Application
Source: Microsoft-Windows-Wininit
Date: 11/21/2010 7:34:14 PM
Event ID: 1001
Task Category: None
Level: Information
Keywords: Classic
User: N/A
Computer: GTJR
Description:

Checking file system on C:
The type of the file system is NTFS.
A disk check has been scheduled.
Windows will now check the disk.
CHKDSK is verifying files (stage 1 of 5)...
276224 file records processed.
File verification completed.
419 large file records processed.
0 bad file records processed.
2 EA records processed.
60 reparse records processed.
CHKDSK is verifying indexes (stage 2 of 5)...
334122 index entries processed.
Index verification completed.
0 unindexed files scanned.
0 unindexed files recovered.
CHKDSK is verifying security descriptors (stage 3 of 5)...
276224 file SDs/SIDs processed.
Cleaning up 114 unused index entries from index $SII of file 0x9.
Cleaning up 114 unused index entries from index $SDH of file 0x9.
Cleaning up 114 unused security descriptors.
Security descriptor verification completed.
28950 data files processed.
CHKDSK is verifying Usn Journal...
36088984 USN bytes processed.
Usn Journal verification completed.
CHKDSK is verifying file data (stage 4 of 5)...
276208 files processed.
File data verification completed.
CHKDSK is verifying free space (stage 5 of 5)...
94974665 free clusters processed.
Free space verification is complete.
Windows has checked the file system and found no problems.
472984575 KB total disk space.
92597084 KB in 181144 files.
95284 KB in 28951 indexes.
0 KB in bad sectors.
393547 KB in use by the system.
65536 KB occupied by the log file.
379898660 KB available on disk.
4096 bytes in each allocation unit.
118246143 total allocation units on disk.
94974665 allocation units available on disk.
Internal Info:
00 37 04 00 b3 34 03 00 9e a7 05 00 00 00 00 00 .7...4..........
69 0c 00 00 3c 00 00 00 00 00 00 00 00 00 00 00 i...<...........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Windows has finished checking your disk.
Please wait while your computer restarts.
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-Wininit" Guid="{206f6dea-d3c5-4d10-bc72-989f03c8b84b}" EventSourceName="Wininit" />
<EventID Qualifiers="16384">1001</EventID>
<Version>0</Version>
<Level>4</Level>
<Task>0</Task>
<Opcode>0</Opcode>
<Keywords>0x80000000000000</Keywords>
<TimeCreated SystemTime="2010-11-22T03:34:14.000000000Z" />
<EventRecordID>99007</EventRecordID>
<Correlation />
<Execution ProcessID="0" ThreadID="0" />
<Channel>Application</Channel>
<Computer>GTJR</Computer>
<Security />
</System>
<EventData>
<Data>
Checking file system on C:
The type of the file system is NTFS.
A disk check has been scheduled.
Windows will now check the disk.
CHKDSK is verifying files (stage 1 of 5)...
276224 file records processed.
File verification completed.
419 large file records processed.
0 bad file records processed.
2 EA records processed.
60 reparse records processed.
CHKDSK is verifying indexes (stage 2 of 5)...
334122 index entries processed.
Index verification completed.
0 unindexed files scanned.
0 unindexed files recovered.
CHKDSK is verifying security descriptors (stage 3 of 5)...
276224 file SDs/SIDs processed.
Cleaning up 114 unused index entries from index $SII of file 0x9.
Cleaning up 114 unused index entries from index $SDH of file 0x9.
Cleaning up 114 unused security descriptors.
Security descriptor verification completed.
28950 data files processed.
CHKDSK is verifying Usn Journal...
36088984 USN bytes processed.
Usn Journal verification completed.
CHKDSK is verifying file data (stage 4 of 5)...
276208 files processed.
File data verification completed.
CHKDSK is verifying free space (stage 5 of 5)...
94974665 free clusters processed.
Free space verification is complete.
Windows has checked the file system and found no problems.
472984575 KB total disk space.
92597084 KB in 181144 files.
95284 KB in 28951 indexes.
0 KB in bad sectors.
393547 KB in use by the system.
65536 KB occupied by the log file.
379898660 KB available on disk.
4096 bytes in each allocation unit.
118246143 total allocation units on disk.
94974665 allocation units available on disk.
Internal Info:
00 37 04 00 b3 34 03 00 9e a7 05 00 00 00 00 00 .7...4..........
69 0c 00 00 3c 00 00 00 00 00 00 00 00 00 00 00 i...&lt;...........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Windows has finished checking your disk.
Please wait while your computer restarts.
</Data>
</EventData>
</Event>

CarlTR6

That is a good report. Check Disk did some cleaning of your hard drive; but found no errors or bad sectors. It is a good idea to run Check Disk now and then to maintain your files system and to alert you of disk problems. Now to be doubly sure, run a disk utility from your hard drive manufacturer: HD Diagnostic.

Run a system files check scan: http://www.sevenforums.com/tutorials/1538-sfc-scannow-command-system-file-checker.html. Report the results.

gtgt

Hi,

Ran sfc /scannow and "Windows Resource Protection did not find any integrity violations."

Had another crash today, just after I logged in. See attached.

Thanks!

CarlTR6

This dump directly blames bcmwl664.sys, a driver that you updated. Of the off chance that your driver is corrupted, download it, uninstall the current driver, and install the new download. It is a long shot, but certainly worth a try.

You have apparently deleted your attachments; I can't go back at look at your uploads. The reason is that I wanted to review your uptimes before the crashes. Short uptimes can indicate a power problem. You have a laptop, correct? Do you get the same BSOD's on battery and plugged in?
Code:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e1f000 PsLoadedModuleList = 0xfffff800`0305ce50 Debug session time: Fri Dec 24 14:17:43.660 2010 (GMT-5) System Uptime: 0 days 0:16:16.346 Loading Kernel Symbols ............................................................... ................................................................ ....................................... Loading User Symbols Loading unloaded module list ...... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 1E, {0, 0, 0, 0}  Unable to load image bcmwl664.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for bcmwl664.sys *** ERROR: Module load completed but symbols could not be loaded for bcmwl664.sys Probably caused by : bcmwl664.sys ( bcmwl664+26bb9 )  Followup: MachineOwner ---------  0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception  Debugging Details: ------------------   EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.  FAULTING_IP:  +5d09952f0160d9b4 00000000`00000000 ??              ???  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  0000000000000000  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  BUGCHECK_STR:  0x1E  PROCESS_NAME:  System  CURRENT_IRQL:  2  EXCEPTION_RECORD:  fffff80000b9c968 -- (.exr 0xfffff80000b9c968) ExceptionAddress: fffff88004836bb9 (bcmwl664+0x0000000000026bb9)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  TRAP_FRAME:  fffff80000b9ca10 -- (.trap 0xfffff80000b9ca10) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff80000b9cbc8 rbx=0000000000000000 rcx=fefffa80059ad560 rdx=fffff880048230f4 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88004836bb9 rsp=fffff80000b9cba0 rbp=0000000000000000  r8=fffffa8005f76000  r9=0000000000000000 r10=00000000017d7840 r11=fffff80003009e00 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0         nv up ei ng nz na po nc bcmwl664+0x26bb9: fffff880`04836bb9 ??              ??? Resetting default scope  LAST_CONTROL_TRANSFER:  from fffff80002e8746e to fffff80002e8f710  STACK_TEXT:   fffff800`00b9ba58 fffff800`02e8746e : fffff800`00b9bb00 fffff800`02ebca90 fffff800`00b9c1d0 fffff800`02ebc668 : nt!KeBugCheck fffff800`00b9ba60 fffff800`02eb540d : fffff800`0309db7c fffff800`02fd7e84 fffff800`02e1f000 fffff800`00b9c968 : nt!KiKernelCalloutExceptionHandler+0xe fffff800`00b9ba90 fffff800`02ebca90 : fffff800`02fdeb14 fffff800`00b9bb08 fffff800`00b9c968 fffff800`02e1f000 : nt!RtlpExecuteHandlerForException+0xd fffff800`00b9bac0 fffff800`02ec99ef : fffff800`00b9c968 fffff800`00b9c1d0 fffff800`00000000 fffffa80`0564f1a0 : nt!RtlDispatchException+0x410 fffff800`00b9c1a0 fffff800`02e8ed82 : fffff800`00b9c968 fffffa80`03c9d850 fffff800`00b9ca10 fffffa80`0564f1a0 : nt!KiDispatchException+0x16f fffff800`00b9c830 fffff800`02e8d68a : 00000000`00000001 00000000`00000002 00000000`ffffffff 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff800`00b9ca10 fffff880`04836bb9 : fffff800`02e8b123 00000000`00000008 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a fffff800`00b9cba0 fffff800`02e8b123 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : bcmwl664+0x26bb9 fffff800`00b9cba8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0x133   STACK_COMMAND:  kb  FOLLOWUP_IP:  bcmwl664+26bb9 fffff880`04836bb9 ??              ???  SYMBOL_STACK_INDEX:  7  SYMBOL_NAME:  bcmwl664+26bb9  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: bcmwl664  IMAGE_NAME:  bcmwl664.sys  DEBUG_FLR_IMAGE_TIMESTAMP:  4b591bf2  FAILURE_BUCKET_ID:  X64_0x1E_bcmwl664+26bb9  BUCKET_ID:  X64_0x1E_bcmwl664+26bb9  Followup: MachineOwner ---------

gtgt

Hi, new minidump attached. I'm wondering if my Dell 1510 wifi card is the issue, since I'm pretty good about updating the drivers. My Webcam and Ricoh card reader are still disabled, fyi.

Thanks for your help,
George

CarlTR6

Hi George; I was hoping not to hear from you. At least it appears that your system is running better. This dump is bugcheck 3B, SYSTEM_SERVICE_EXCEPTION. It blames a Windows system core file, which is highly unlikely to be the real cause. In indicates memory corruption.

If you suspect your Dell Wi-Fi card is causing the trouble, purchase a new USB Wi-Fi adapter and install it. Disable your current Adapter through Device Manager. See if this solves the problem.

You have tested your RAM and no errors were reported. Try enabling Driver Verifier. Closely follow the instructions in this tutorial: Driver Verifier - Enable and Disable. If Driver Verifier finds a Faulty Driver, it will trigger a BSOD. Upload any and all Driver Verifier enabled dumps.
Code:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e11000 PsLoadedModuleList = 0xfffff800`0304ee50 Debug session time: Sun Jan  2 17:54:16.112 2011 (GMT-5) System Uptime: 0 days 0:34:54.200 Loading Kernel Symbols ............................................................... ................................................................ ......................................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 3B, {c0000005, fffff80002e90d33, fffff8800a60bff0, 0}  Probably caused by : ntkrnlmp.exe ( nt!IopXxxControlFile+2ca )  Followup: MachineOwner ---------  0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80002e90d33, Address of the exception record for the exception that caused the bugcheck Arg3: fffff8800a60bff0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero.  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  nt!IoGetRelatedDeviceObject+43 fffff800`02e90d33 488b4038        mov     rax,qword ptr [rax+38h]  CONTEXT:  fffff8800a60bff0 -- (.cxr 0xfffff8800a60bff0) rax=fefffa800519ee40 rbx=fffffa80040e6070 rcx=fffffa80040e6070 rdx=fffffa80040e6070 rsi=000000000037f38c rdi=fffffa80040e60c0 rip=fffff80002e90d33 rsp=fffff8800a60c9c8 rbp=fffff8800a60cc60  r8=fffff8a00d28d000  r9=0000000000000000 r10=fffffa8003cfd080 r11=00000000001f0003 r12=0000000000000003 r13=0000000000000001 r14=000000000001201f r15=0000000000000010 iopl=0         nv up ei pl zr na po nc cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246 nt!IoGetRelatedDeviceObject+0x43: fffff800`02e90d33 488b4038        mov     rax,qword ptr [rax+38h] ds:002b:fefffa80`0519ee78=???????????????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  BUGCHECK_STR:  0x3B  PROCESS_NAME:  firefox.exe  CURRENT_IRQL:  0  LAST_CONTROL_TRANSFER:  from fffff8000319c3ca to fffff80002e90d33  STACK_TEXT:   fffff880`0a60c9c8 fffff800`0319c3ca : fffff880`0a60cc00 00000129`00000002 fffffa80`03cfd080 00000000`00000001 : nt!IoGetRelatedDeviceObject+0x43 fffff880`0a60c9d0 fffff800`0319cf66 : fffff800`00000001 00000000`000001e0 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x2ca fffff880`0a60cb00 fffff800`02e80993 : fffffa80`04922060 00000000`0020e008 fffff880`0a60cb88 00000000`72312450 : nt!NtDeviceIoControlFile+0x56 fffff880`0a60cb70 00000000`72312dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0020e918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x72312dd9   FOLLOWUP_IP:  nt!IopXxxControlFile+2ca fffff800`0319c3ca 4889442470      mov     qword ptr [rsp+70h],rax  SYMBOL_STACK_INDEX:  1  SYMBOL_NAME:  nt!IopXxxControlFile+2ca  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: nt  IMAGE_NAME:  ntkrnlmp.exe  DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9  STACK_COMMAND:  .cxr 0xfffff8800a60bff0 ; kb  FAILURE_BUCKET_ID:  X64_0x3B_nt!IopXxxControlFile+2ca  BUCKET_ID:  X64_0x3B_nt!IopXxxControlFile+2ca  Followup: MachineOwner ---------  0: kd> lmtsmn start             end                 module name fffff880`03d4a000 fffff880`03d88000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00f44000 fffff880`00f9b000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`02d22000 fffff880`02dac000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`04d20000 fffff880`04d36000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`010b3000 fffff880`010be000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`0a95c000 fffff880`0a967000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5) fffff880`00e59000 fffff880`00e62000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00e62000 fffff880`00e8c000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118) fffff960`00850000 fffff960`008b1000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89) fffff880`00e1e000 fffff880`00e2a000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5) fffff880`0a8ac000 fffff880`0a8b5000   BCM42RLY BCM42RLY.sys Fri Oct 29 16:45:27 2010 (4CCB3267) fffff880`0481e000 fffff880`04ca1000   bcmwl664 bcmwl664.sys Tue Oct 12 13:22:59 2010 (4CB49973) fffff880`019f3000 fffff880`019fa000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`03bcf000 fffff880`03be0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`09990000 fffff880`099ae000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00750000 fffff960`00777000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A) fffff880`0189a000 fffff880`018c4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00cc8000 fffff880`00d88000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`10bd1000 fffff880`10be3000   circlass circlass.sys Mon Jul 13 20:06:34 2009 (4A5BCC0A) fffff880`01800000 fffff880`01830000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00c6a000 fffff880`00cc8000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03ca4000 fffff880`03ca8500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7) fffff880`0117c000 fffff880`011ef000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`00e15000 fffff880`00e1e000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`04d10000 fffff880`04d20000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`0440c000 fffff880`0441a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`03b2e000 fffff880`03bb1000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`03bb1000 fffff880`03bcf000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`03b1f000 fffff880`03b2e000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`019d4000 fffff880`019ea000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`0455d000 fffff880`0457f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`03be0000 fffff880`03bf3000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`03a72000 fffff880`03ab1000   dump_nvstor64 dump_nvstor64.sys Fri Apr 09 05:22:41 2010 (4BBEF1E1) fffff880`0441a000 fffff880`04424000   dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35) fffff880`04400000 fffff880`0440c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`0fe00000 fffff880`0fef4000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`10b8b000 fffff880`10bd1000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`0a8b5000 fffff880`0a8eb000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0) fffff880`0110a000 fffff880`0111e000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`010be000 fffff880`0110a000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`013d9000 fffff880`013e3000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`0199a000 fffff880`019d4000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`033ed000 fffff800`03436000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`03d26000 fffff880`03d4a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`045b9000 fffff880`045d2000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`045a8000 fffff880`045b9000   hidir    hidir.sys    Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`045d2000 fffff880`045da080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`0480d000 fffff880`0481b000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`098c8000 fffff880`09990000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`01991000 fffff880`0199a000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`03a45000 fffff880`03a63000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03a26000 fffff880`03a3c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`04cae000 fffff880`04d10000   itecir   itecir.sys   Tue Jul 13 05:50:47 2010 (4C3C36F7) fffff880`03a63000 fffff880`03a72000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`045db000 fffff880`045e9000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00bd1000 fffff800`00bdb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`03c00000 fffff880`03c43000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`013ae000 fffff880`013c8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`015ac000 fffff880`015d7000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`0457f000 fffff880`04584200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`092db000 fffff880`092f0000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`0184d000 fffff880`01870000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00c12000 fffff880`00c56000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`04424000 fffff880`04432000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`03c95000 fffff880`03ca4000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`045e9000 fffff880`045f6000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00e3f000 fffff880`00e59000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`018c4000 fffff880`018f1000   MpFilter MpFilter.sys Thu Oct 01 22:36:31 2009 (4AC5672F) fffff880`0a967000 fffff880`0a977000   MpNWMon  MpNWMon.sys  Thu Oct 01 22:36:22 2009 (4AC56726) fffff880`099ae000 fffff880`099c6000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`099c6000 fffff880`099f3000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`09800000 fffff880`0984e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`0984e000 fffff880`09871000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`00fee000 fffff880`00ff9000   msahci   msahci.sys   Fri Nov 13 23:36:50 2009 (4AFE33E2) fffff880`02cdb000 fffff880`02ce6000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00fa4000 fffff880`00fae000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`0111e000 fffff880`0117c000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`03b14000 fffff880`03b1f000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`0197f000 fffff880`01991000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`0145a000 fffff880`0154c000   ndis     ndis.sys     Thu Nov 19 22:45:55 2009 (4B0610F3) fffff880`04d5a000 fffff880`04d66000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`09343000 fffff880`09356000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5) fffff880`04d66000 fffff880`04d95000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`0448c000 fffff880`044a1000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`02c3c000 fffff880`02c4b000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02dac000 fffff880`02df1000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`0154c000 fffff880`015ac000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`02ce6000 fffff880`02cf7000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`03b08000 fffff880`03b14000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02e11000 fffff800`033ed000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`0120b000 fffff880`013ae000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`019ea000 fffff880`019f3000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`10b89000 fffff880`10b8a180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA) fffff880`04585000 fffff880`045a8000   nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D) fffff880`0fef7000 fffff880`10b88e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E) fffff880`03da8000 fffff880`03dfba80   nvmf6264 nvmf6264.sys Thu Mar 04 20:04:39 2010 (4B9058A7) fffff880`03ca9000 fffff880`03cb4000   nvsmu    nvsmu.sys    Mon Mar 22 21:29:19 2010 (4BA8196F) fffff880`01012000 fffff880`01051000   nvstor64 nvstor64.sys Fri Apr 09 05:22:41 2010 (4BBEF1E1) fffff880`092f0000 fffff880`09343000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B) fffff880`02c00000 fffff880`02c26000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00fae000 fffff880`00fe1000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00de4000 fffff880`00df4000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`013c8000 fffff880`013d9000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`09200000 fffff880`092a6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`04520000 fffff880`0455d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00c56000 fffff880`00c6a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`04d36000 fffff880`04d5a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`04d95000 fffff880`04db0000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`04db0000 fffff880`04dd1000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`04dd1000 fffff880`04deb000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`03ab7000 fffff880`03b08000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`04800000 fffff880`0480b000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`02cc0000 fffff880`02cc9000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02cc9000 fffff880`02cd2000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02cd2000 fffff880`02cdb000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`01945000 fffff880`0197f000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`09356000 fffff880`0936e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`03d88000 fffff880`03da8000   sdbus    sdbus.sys    Fri Oct 09 22:41:20 2009 (4ACFF450) fffff880`09871000 fffff880`0987c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E) fffff880`0a2cb000 fffff880`0a382000   Sftfslh  Sftfslh.sys  Wed Dec 02 19:55:48 2009 (4B170C94) fffff880`0a382000 fffff880`0a3cf000   Sftplaylh Sftplaylh.sys Wed Dec 02 19:55:40 2009 (4B170C8C) fffff880`0a279000 fffff880`0a284000   Sftredirlh Sftredirlh.sys Wed Dec 02 19:55:52 2009 (4B170C98) fffff880`10bf5000 fffff880`10c00000   Sftvollh Sftvollh.sys Wed Dec 02 19:55:23 2009 (4B170C7B) fffff880`0193d000 fffff880`01945000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB) fffff880`0a8eb000 fffff880`0a95c000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A) fffff880`0a816000 fffff880`0a8ac000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318) fffff880`0a212000 fffff880`0a279000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A) fffff880`0a3cf000 fffff880`0a3fc000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4) fffff880`01051000 fffff880`010b3000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE) fffff880`044a1000 fffff880`04520000   stwrt64  stwrt64.sys  Fri Feb 26 03:07:58 2010 (4B87815E) fffff880`0480b000 fffff880`0480c480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`03c48000 fffff880`03c93000   SynTP    SynTP.sys    Mon Aug 24 13:37:05 2009 (4A92CFC1) fffff880`04deb000 fffff880`04df8000   tap0901  tap0901.sys  Thu Aug 19 18:07:59 2010 (4C6DAB3F) fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`0a200000 fffff880`0a212000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`02d15000 fffff880`02d22000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`02cf7000 fffff880`02d15000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`02c66000 fffff880`02c7a000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`00590000 fffff960`0059a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`03a00000 fffff880`03a26000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`10be3000 fffff880`10bf5000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`01830000 fffff880`0184d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`03c93000 fffff880`03c94f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`03d15000 fffff880`03d26000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A) fffff880`04432000 fffff880`0448c000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF) fffff880`03cb4000 fffff880`03cbf000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`03cbf000 fffff880`03d15000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`00fe1000 fffff880`00fee000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`015d7000 fffff880`015e5000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`02c8b000 fffff880`02cb0000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`0144a000 fffff880`0145a000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`00e2a000 fffff880`00e3f000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00d88000 fffff880`00de4000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`018f1000 fffff880`0193d000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`04ca1000 fffff880`04cae000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39) fffff880`02c26000 fffff880`02c3c000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A) fffff880`0936e000 fffff880`09378000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40) fffff880`02c4b000 fffff880`02c66000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`02cb0000 fffff880`02cc0000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e91000 fffff880`00f35000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00f35000 fffff880`00f44000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02df1000 fffff880`02dfa000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`00030000 fffff960`00340000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E) fffff880`03a3c000 fffff880`03a45000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00f9b000 fffff880`00fa4000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`01870000 fffff880`01891000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1) fffff880`092aa000 fffff880`092db000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)  Unloaded modules: fffff880`01830000 fffff880`0183e000   crashdmp.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`0183e000 fffff880`01848000   dump_storpor     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`01848000 fffff880`01887000   dump_nvstor6     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`01887000 fffff880`0189a000   dump_dumpfve     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`03c00000 fffff880`03c31000   WUDFRd.sys     Timestamp: unavailable (00000000)     Checksum:  00000000

gtgt

Hi,

Attaching 2 recent minidumps. I also think there may be a new culprit: the XPS's media bar, which is a backlit, touch bar above the F keys. Apparently Dell has removed this item from subsequent models. Do the minidumps suggest a hardware conflict with Win 7?

Thanks,
George



CarlTR6

One dump blames your video driver and the other blames a Windows system driver. All drivers appear to be up to date. The mini dumps suggest a conflict but do not tell us what that conflict is. Both dumps indicate memory corruption is caused by conflicts as well as other causes. That media bar you mentioned is a possibility. Do you know how to disable it? Without your JC Griff tool uploads, I do not know what is being loaded at startup. Is that bar possibly loaded through the BIOS since it is built in hardware? If you can figure out how to disable it, try it. You might post the question about disabling that bar in the Hardware and Devices section: Hardware & Devices - Windows 7 Forums. I'd bet someone there knows about the bar.

I suggest that you run Prime95 to test both your CPU and your RAM. Follow the instructions in this tutorial: http://www.sevenforums.com/tutorials...t-prime95.html. Run 3 separate tests, one on each of the settings (Blend, Small FFTs, Large FFTs). Post your results.

Code:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e4d000 PsLoadedModuleList = 0xfffff800`0308ae50 Debug session time: Sun Jan  9 20:23:21.823 2011 (GMT-5) System Uptime: 0 days 3:42:50.633 Loading Kernel Symbols ............................................................... ................................................................ ......................................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 1000007E, {ffffffffc0000005, fffff80002eca14b, fffff880099c9608, fffff880099c8e70}  Probably caused by : cdd.dll ( cdd!PresentWorkerThread+4b8 )  Followup: MachineOwner ---------  0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003.  This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG.  This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG.  This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002eca14b, The address that the exception occurred at Arg3: fffff880099c9608, Exception Record Address Arg4: fffff880099c8e70, Context Record Address  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  nt!KiInsertTimerTable+13b fffff800`02eca14b 488b42f8        mov     rax,qword ptr [rdx-8]  EXCEPTION_RECORD:  fffff880099c9608 -- (.exr 0xfffff880099c9608) ExceptionAddress: fffff80002eca14b (nt!KiInsertTimerTable+0x000000000000013b)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  CONTEXT:  fffff880099c8e70 -- (.cxr 0xfffff880099c8e70) rax=0000000000000000 rbx=fffff880099c9a10 rcx=0000000000000000 rdx=fefffa80041b0b70 rsi=00000000000021e0 rdi=fffff80003037e80 rip=fffff80002eca14b rsp=fffff880099c9840 rbp=fffff8000303c268  r8=ffffffffffffffff  r9=00000000000000ff r10=fffff80003037e80 r11=fffff880099c9900 r12=fffff8000303c268 r13=0000000000000001 r14=0000000000000000 r15=0000001f21874a2f iopl=0         nv up ei ng nz ac pe cy cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293 nt!KiInsertTimerTable+0x13b: fffff800`02eca14b 488b42f8        mov     rax,qword ptr [rdx-8] ds:002b:fefffa80`041b0b68=???????????????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  PROCESS_NAME:  csrss.exe  CURRENT_IRQL:  2  ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  ffffffffffffffff  READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f50e0  ffffffffffffffff   FOLLOWUP_IP:  cdd!PresentWorkerThread+4b8 fffff960`006c5824 488d842420010000 lea     rax,[rsp+120h]  BUGCHECK_STR:  0x7E  LAST_CONTROL_TRANSFER:  from fffff80002ec9de0 to fffff80002eca14b  STACK_TEXT:   fffff880`099c9840 fffff800`02ec9de0 : ffffffff`fffd7501 fffff800`03037e80 fffff880`099c9a10 00000000`00000000 : nt!KiInsertTimerTable+0x13b fffff880`099c98a0 fffff800`02ec9ce4 : ffffffff`fffd7501 ffffffff`fffd7501 00000000`00000004 00000000`00000001 : nt!KiSetTimerEx+0xf0 fffff880`099c9930 fffff960`006c5824 : ffffffff`fffd7501 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KeSetTimer+0x14 fffff880`099c9970 fffff800`03161c06 : 00000000`02dde41b fffffa80`0677ca60 00000000`00000080 fffffa80`06723b30 : cdd!PresentWorkerThread+0x4b8 fffff880`099c9d00 fffff800`02e9bc26 : fffff880`009e9180 fffffa80`0677ca60 fffffa80`06772b60 00000000`00000202 : nt!PspSystemThreadStartup+0x5a fffff880`099c9d40 00000000`00000000 : fffff880`099ca000 fffff880`099c4000 fffff880`099c94b0 00000000`00000000 : nt!KxStartSystemThread+0x16   SYMBOL_STACK_INDEX:  3  SYMBOL_NAME:  cdd!PresentWorkerThread+4b8  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: cdd  IMAGE_NAME:  cdd.dll  DEBUG_FLR_IMAGE_TIMESTAMP:  4bf4408a  STACK_COMMAND:  .cxr 0xfffff880099c8e70 ; kb  FAILURE_BUCKET_ID:  X64_0x7E_cdd!PresentWorkerThread+4b8  BUCKET_ID:  X64_0x7E_cdd!PresentWorkerThread+4b8  Followup: MachineOwner ---------  Debug session time: Mon Jan 10 18:31:32.215 2011 (GMT-5) System Uptime: 0 days 2:53:36.026 Loading Kernel Symbols ............................................................... ................................................................ ...................................... Loading User Symbols Loading unloaded module list ....... Unable to load image nvlddmkm.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for nvlddmkm.sys *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  Use !analyze -v to get detailed debugging information.  BugCheck 1000007E, {ffffffffc0000005, fffff80002e88617, fffff880009e1028, fffff880009e0890}  Probably caused by : nvlddmkm.sys ( nvlddmkm+247b9 )  Followup: MachineOwner ---------  1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck.  Usually the exception address pinpoints the driver/function that caused the problem.  Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003.  This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG.  This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG.  This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002e88617, The address that the exception occurred at Arg3: fffff880009e1028, Exception Record Address Arg4: fffff880009e0890, Context Record Address  Debugging Details: ------------------   EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  FAULTING_IP:  nt!KeReleaseMutant+267 fffff800`02e88617 488b36          mov     rsi,qword ptr [rsi]  EXCEPTION_RECORD:  fffff880009e1028 -- (.exr 0xfffff880009e1028) ExceptionAddress: fffff80002e88617 (nt!KeReleaseMutant+0x0000000000000267)    ExceptionCode: c0000005 (Access violation)   ExceptionFlags: 00000000 NumberParameters: 2    Parameter[0]: 0000000000000000    Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff  CONTEXT:  fffff880009e0890 -- (.cxr 0xfffff880009e0890) rax=fefff88010ae4d58 rbx=fffff88010ae4d50 rcx=fffffa8003cdce68 rdx=fefff88010ae4d58 rsi=fefff88010ae4d58 rdi=fffff880009e9180 rip=fffff80002e88617 rsp=fffff880009e1260 rbp=0000000000000000  r8=0000000000000000  r9=0000000000000000 r10=0000000000000000 r11=fffffa80056337b0 r12=fffff88010ae4d58 r13=0000000000000000 r14=fffffa8003cdcb60 r15=0000000000000001 iopl=0         nv up ei ng nz na po cy cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287 nt!KeReleaseMutant+0x267: fffff800`02e88617 488b36          mov     rsi,qword ptr [rsi] ds:002b:fefff880`10ae4d58=???????????????? Resetting default scope  CUSTOMER_CRASH_COUNT:  1  DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT  PROCESS_NAME:  System  CURRENT_IRQL:  2  ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.  EXCEPTION_PARAMETER1:  0000000000000000  EXCEPTION_PARAMETER2:  ffffffffffffffff  READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b70e0  ffffffffffffffff   FOLLOWUP_IP:  nvlddmkm+247b9 fffff880`0fee57b9 ??              ???  BUGCHECK_STR:  0x7E  LAST_CONTROL_TRANSFER:  from fffff8800fee57b9 to fffff80002e88617  STACK_TEXT:   fffff880`009e1260 fffff880`0fee57b9 : fffffa80`00000000 00000000`00000001 00000000`00000300 00000000`00010000 : nt!KeReleaseMutant+0x267 fffff880`009e1310 fffffa80`00000000 : 00000000`00000001 00000000`00000300 00000000`00010000 fffff880`009e9180 : nvlddmkm+0x247b9 fffff880`009e1318 00000000`00000001 : 00000000`00000300 00000000`00010000 fffff880`009e9180 00000000`00000002 : 0xfffffa80`00000000 fffff880`009e1320 00000000`00000300 : 00000000`00010000 fffff880`009e9180 00000000`00000002 00000000`00000000 : 0x1 fffff880`009e1328 00000000`00010000 : fffff880`009e9180 00000000`00000002 00000000`00000000 fffff880`0ff9f50a : 0x300 fffff880`009e1330 fffff880`009e9180 : 00000000`00000002 00000000`00000000 fffff880`0ff9f50a fffffa80`05633000 : 0x10000 fffff880`009e1338 00000000`00000002 : 00000000`00000000 fffff880`0ff9f50a fffffa80`05633000 ffffe15e`c913e770 : 0xfffff880`009e9180 fffff880`009e1340 00000000`00000000 : fffff880`0ff9f50a fffffa80`05633000 ffffe15e`c913e770 fffff800`0302f2a8 : 0x2   SYMBOL_STACK_INDEX:  1  SYMBOL_NAME:  nvlddmkm+247b9  FOLLOWUP_NAME:  MachineOwner  MODULE_NAME: nvlddmkm  IMAGE_NAME:  nvlddmkm.sys  DEBUG_FLR_IMAGE_TIMESTAMP:  4c37918e  STACK_COMMAND:  .cxr 0xfffff880009e0890 ; kb  FAILURE_BUCKET_ID:  X64_0x7E_nvlddmkm+247b9  BUCKET_ID:  X64_0x7E_nvlddmkm+247b9  Followup: MachineOwner ---------  1: kd> LMtsmn start             end                 module name fffff880`03f17000 fffff880`03f55000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00f8f000 fffff880`00fe6000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`02caf000 fffff880`02d39000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`04d5d000 fffff880`04d73000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`01101000 fffff880`0110c000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`0cf47000 fffff880`0cf52000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5) fffff880`00c1a000 fffff880`00c23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00c23000 fffff880`00c4d000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118) fffff960`00950000 fffff960`009b1000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89) fffff880`00e5e000 fffff880`00e6a000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5) fffff880`0b6a1000 fffff880`0b6aa000   BCM42RLY BCM42RLY.sys Fri Oct 29 16:45:27 2010 (4CCB3267) fffff880`0485b000 fffff880`04cde000   bcmwl664 bcmwl664.sys Tue Oct 12 13:22:59 2010 (4CB49973) fffff880`015f6000 fffff880`015fd000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`03af3000 fffff880`03b04000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`0ad42000 fffff880`0ad60000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00790000 fffff960`007b7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A) fffff880`011ca000 fffff880`011f4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00d3c000 fffff880`00dfc000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`04ded000 fffff880`04dff000   circlass circlass.sys Mon Jul 13 20:06:34 2009 (4A5BCC0A) fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00cde000 fffff880`00d3c000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03bd2000 fffff880`03bd6500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7) fffff880`014e2000 fffff880`01555000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`00e55000 fffff880`00e5e000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`04d4d000 fffff880`04d5d000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`03fca000 fffff880`03fd8000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`03a52000 fffff880`03ad5000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`03ad5000 fffff880`03af3000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`02ded000 fffff880`02dfc000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`043d7000 fffff880`043f9000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`03e3f000 fffff880`03e52000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`03e00000 fffff880`03e3f000   dump_nvstor64 dump_nvstor64.sys Fri Apr 09 05:22:41 2010 (4BBEF1E1) fffff880`03fd8000 fffff880`03fe2000   dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35) fffff880`10bf4000 fffff880`10c00000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`04202000 fffff880`042f6000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`042f6000 fffff880`0433c000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`0b6aa000 fffff880`0b6e0000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0) fffff880`01158000 fffff880`0116c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`0110c000 fffff880`01158000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`01566000 fffff880`01570000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`033eb000 fffff800`03434000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`03ef3000 fffff880`03f17000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`10bc0000 fffff880`10bd9000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`10baf000 fffff880`10bc0000   hidir    hidir.sys    Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`0435f000 fffff880`04367080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`03e7d000 fffff880`03e8b000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`0ac7a000 fffff880`0ad42000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`016ed000 fffff880`016f6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`03b49000 fffff880`03b67000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03b2a000 fffff880`03b40000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`04ceb000 fffff880`04d4d000   itecir   itecir.sys   Tue Jul 13 05:50:47 2010 (4C3C36F7) fffff880`03b67000 fffff880`03b76000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`10bd9000 fffff880`10be7000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00bc7000 fffff800`00bd1000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`0436d000 fffff880`043b0000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`013ad000 fffff880`013c7000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`04855000 fffff880`0485a200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`014b1000 fffff880`014c6000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`03a00000 fffff880`03a23000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00c86000 fffff880`00cca000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`03e6f000 fffff880`03e7d000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`03bc3000 fffff880`03bd2000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`10be7000 fffff880`10bf4000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00c00000 fffff880`00c1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`01000000 fffff880`0102d000   MpFilter MpFilter.sys Thu Oct 01 22:36:31 2009 (4AC5672F) fffff880`0ad60000 fffff880`0ad78000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`0ad78000 fffff880`0ada5000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`0ada5000 fffff880`0adf3000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`0ac00000 fffff880`0ac23000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`00c4d000 fffff880`00c58000   msahci   msahci.sys   Fri Nov 13 23:36:50 2009 (4AFE33E2) fffff880`00c68000 fffff880`00c73000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00fef000 fffff880`00ff9000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`0116c000 fffff880`011ca000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`02c71000 fffff880`02c7c000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`017e9000 fffff880`017fb000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`016f7000 fffff880`017e9000   ndis     ndis.sys     Thu Nov 19 22:45:55 2009 (4B0610F3) fffff880`04d97000 fffff880`04da3000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`0a716000 fffff880`0a729000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5) fffff880`04da3000 fffff880`04dd2000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`043c2000 fffff880`043d7000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`02dc3000 fffff880`02dd2000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02d39000 fffff880`02d7e000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`00c73000 fffff880`00c84000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`02c65000 fffff880`02c71000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02e0f000 fffff800`033eb000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`0120a000 fffff880`013ad000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`014d7000 fffff880`014e0000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`10b53000 fffff880`10b54180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA) fffff880`0433c000 fffff880`0435f000   nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D) fffff880`0fec1000 fffff880`10b52e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E) fffff880`03f75000 fffff880`03fc9080   nvmf6264 nvmf6264.sys Thu Aug 12 07:46:06 2010 (4C63DEFE) fffff880`03bd7000 fffff880`03be2000   nvsmu    nvsmu.sys    Mon Mar 22 21:29:19 2010 (4BA8196F) fffff880`01060000 fffff880`0109f000   nvstor64 nvstor64.sys Fri Apr 09 05:22:41 2010 (4BBEF1E1) fffff880`0a6c3000 fffff880`0a716000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B) fffff880`02d87000 fffff880`02dad000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00c58000 fffff880`00c68000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`01555000 fffff880`01566000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`0a74b000 fffff880`0a7f1000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`0fe7f000 fffff880`0febc000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00cca000 fffff880`00cde000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`04d73000 fffff880`04d97000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`04dd2000 fffff880`04ded000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`04800000 fffff880`04821000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`04821000 fffff880`0483b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`02c14000 fffff880`02c65000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`04848000 fffff880`04853000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`01200000 fffff880`01209000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`01052000 fffff880`0105b000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`011f4000 fffff880`011fd000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`015bc000 fffff880`015f6000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`0a729000 fffff880`0a741000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`03f55000 fffff880`03f75000   sdbus    sdbus.sys    Fri Oct 09 22:41:20 2009 (4ACFF450) fffff880`0ac23000 fffff880`0ac2e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E) fffff880`0a600000 fffff880`0a6b7000   Sftfslh  Sftfslh.sys  Wed Dec 02 19:55:48 2009 (4B170C94) fffff880`0b6f0000 fffff880`0b73d000   Sftplaylh Sftplaylh.sys Wed Dec 02 19:55:40 2009 (4B170C8C) fffff880`0b696000 fffff880`0b6a1000   Sftredirlh Sftredirlh.sys Wed Dec 02 19:55:52 2009 (4B170C98) fffff880`03fe2000 fffff880`03fed000   Sftvollh Sftvollh.sys Wed Dec 02 19:55:23 2009 (4B170C7B) fffff880`016e5000 fffff880`016ed000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB) fffff880`0b600000 fffff880`0b696000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318) fffff880`0b77c000 fffff880`0b7e3000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A) fffff880`0b73d000 fffff880`0b76a000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4) fffff880`0109f000 fffff880`01101000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE) fffff880`0fe00000 fffff880`0fe7f000   stwrt64  stwrt64.sys  Fri Feb 26 03:07:58 2010 (4B87815E) fffff880`04853000 fffff880`04854480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`03b76000 fffff880`03bc1000   SynTP    SynTP.sys    Mon Aug 24 13:37:05 2009 (4A92CFC1) fffff880`0483b000 fffff880`04848000   tap0901  tap0901.sys  Thu Aug 19 18:07:59 2010 (4C6DAB3F) fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`0b76a000 fffff880`0b77c000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`02ca2000 fffff880`02caf000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`02c84000 fffff880`02ca2000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`02c00000 fffff880`02c14000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`00430000 fffff960`0043a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`03b04000 fffff880`03b2a000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`043b0000 fffff880`043c2000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`03e52000 fffff880`03e6f000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`03bc1000 fffff880`03bc2f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`03ee2000 fffff880`03ef3000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A) fffff880`10b55000 fffff880`10baf000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF) fffff880`03be2000 fffff880`03bed000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`03e8c000 fffff880`03ee2000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`013da000 fffff880`013e8000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`0102d000 fffff880`01052000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`016d5000 fffff880`016e5000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`00e6a000 fffff880`00e7f000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00e7f000 fffff880`00edb000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`01570000 fffff880`015bc000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`04cde000 fffff880`04ceb000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39) fffff880`02dad000 fffff880`02dc3000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A) fffff880`02dd2000 fffff880`02ded000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`013e8000 fffff880`013f8000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00edc000 fffff880`00f80000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00f80000 fffff880`00f8f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02d7e000 fffff880`02d87000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`00010000 fffff960`00320000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E) fffff880`03b40000 fffff880`03b49000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00fe6000 fffff880`00fef000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`03a23000 fffff880`03a44000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1) fffff880`01480000 fffff880`014b1000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)  Unloaded modules: fffff880`0a741000 fffff880`0a74b000   vwifimp.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`0ced6000 fffff880`0cf47000   spsys.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`01480000 fffff880`0148e000   crashdmp.sys     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`0148e000 fffff880`01498000   dump_storpor     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`01498000 fffff880`014d7000   dump_nvstor6     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`013c7000 fffff880`013da000   dump_dumpfve     Timestamp: unavailable (00000000)     Checksum:  00000000 fffff880`0433c000 fffff880`0436d000   WUDFRd.sys     Timestamp: unavailable (00000000)     Checksum:  00000000

Không có nhận xét nào:

Đăng nhận xét