BSOD at login on WIN 7

Joined
Dec 10, 2010
Messages
4
Reaction score
0
I Have been getting constant BSOD soon after login. The resons it sayd Driver_IRQL_not_less_or_equal and files it would mention iastor.sys sometimes and othertimes it would say ntfs.sys.

I had posted a thred earlier and the advise received was to remove McAfee, which I have done. But still the same issue, I have attached the latest dmp files.

PLEASE HELP
 

Attachments

Joined
Dec 10, 2010
Messages
4
Reaction score
0
my pc details are as below:-
Intel core Quad CPU Q9300 @ 2.5Ghz
System memory 4098MB
Product Acer Aspire M5800
BIOS P01-A2 Rel date(08/11/2009)
Boot Device - Hitachi HDT721010S
O/S : Windows 7
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Hello,

your crash dumps all as one show this:

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. Typically the address is just plain bad or it is pointing at freed memory.
Probably caused by : iaStor.sys <- Intel Matrix Storage Driver



1. Update this Motherboard Driver called Intell Matrix Storage:

iaStor.sys Thu Jun 04 21:53:40 2009

http://downloadcenter.intel.com/



2. If the crashes are being severe like once every hour then remove McAfee for sure, BSOD's will stop:

http://service.mcafee.com/FAQDocument.aspx?id=TS100507


Install MSE:

http://www.microsoft.com/security_essentials/



3. Update all other outdated drivers:

e1y62x64.sys Fri Jun 12 21:16:42 2009
Intel(R) Gigabit Network Connection

igdkmd64.sys Wed Jun 03 14:16:49 2009
Intel GMA Graphics Accelerator

mwlPSDFilter.sys Tue Jun 02 06:07:30 2009
mwlPSDVDisk.sys Tue Jun 02 06:15:29 2009
EgisTec PrivateSafe Driver

RTKVHD64.sys Mon Jul 20 06:52:29 2009
Realtek Audio


4. 1-3 should fully fix you, otherwise remove EgisTec PrivateSafe.



DMP

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121210-23712-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02453000 PsLoadedModuleList = 0xfffff800`02690e50
Debug session time: Sun Dec 12 05:37:19.947 2010 (UTC - 5:00)
System Uptime: 0 days 0:02:50.447
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
...................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffff880041b5738, 2, 0, fffff88001126ee1}

Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4aee1 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff880041b5738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001126ee1, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800026fb0e0
 fffff880041b5738 

CURRENT_IRQL:  2

FAULTING_IP: 
iaStor+4aee1
fffff880`01126ee1 4c8b6138        mov     r12,qword ptr [rcx+38h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88001dd59f0 -- (.trap 0xfffff88001dd59f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004b15c68 rbx=0000000000000000 rcx=fffff880041b5700
rdx=fffffa8005c12160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001126ee1 rsp=fffff88001dd5b80 rbp=fffffa8005c12160
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
r11=fffffa80069bedf0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
iaStor+0x4aee1:
fffff880`01126ee1 4c8b6138        mov     r12,qword ptr [rcx+38h] ds:002d:fffff880`041b5738=0000000000000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800024c2ca9 to fffff800024c3740

STACK_TEXT:  
fffff880`01dd58a8 fffff800`024c2ca9 : 00000000`0000000a fffff880`041b5738 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`01dd58b0 fffff800`024c1920 : 00000000`18daf10f fffffa80`05c28700 fffff880`01dd5db0 fffffa80`03d1bb60 : nt!KiBugCheckDispatch+0x69
fffff880`01dd59f0 fffff880`01126ee1 : fffffa80`04b15000 0000057f`fa156fd8 00000000`00000000 fffffa80`05c28700 : nt!KiPageFault+0x260
fffff880`01dd5b80 fffffa80`04b15000 : 0000057f`fa156fd8 00000000`00000000 fffffa80`05c28700 00000000`c0000001 : iaStor+0x4aee1
fffff880`01dd5b88 0000057f`fa156fd8 : 00000000`00000000 fffffa80`05c28700 00000000`c0000001 fffff880`02ee94ba : 0xfffffa80`04b15000
fffff880`01dd5b90 00000000`00000000 : fffffa80`05c28700 00000000`c0000001 fffff880`02ee94ba 00000000`00000000 : 0x57f`fa156fd8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
iaStor+4aee1
fffff880`01126ee1 4c8b6138        mov     r12,qword ptr [rcx+38h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  iaStor+4aee1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: iaStor

IMAGE_NAME:  iaStor.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a287aa4

FAILURE_BUCKET_ID:  X64_0xD1_iaStor+4aee1

BUCKET_ID:  X64_0xD1_iaStor+4aee1

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121210-20482-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03057000 PsLoadedModuleList = 0xfffff800`03294e50
Debug session time: Sun Dec 12 05:54:22.878 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:42.798
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, 2, 1, fffff880010eb771}

Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4a771 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880010eb771, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ff0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
iaStor+4a771
fffff880`010eb771 488911          mov     qword ptr [rcx],rdx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  fffff880009b0920 -- (.trap 0xfffff880009b0920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010eb771 rsp=fffff880009b0ab0 rbp=0000000000000000
 r8=fffffa8004745000  r9=0000000000000000 r10=fffff880010a66b8
r11=fffff88006334948 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
iaStor+0x4a771:
fffff880`010eb771 488911          mov     qword ptr [rcx],rdx ds:0246:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030c6ca9 to fffff800030c7740

STACK_TEXT:  
fffff880`009b07d8 fffff800`030c6ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009b07e0 fffff800`030c5920 : 00000000`00000000 00000000`00000000 fffffa80`03d25c68 fffff800`030a6e05 : nt!KiBugCheckDispatch+0x69
fffff880`009b0920 fffff880`010eb771 : fffffa80`04745ad0 fffffa80`03c9b1a0 fffffa80`0814c6c1 00000000`00000000 : nt!KiPageFault+0x260
fffff880`009b0ab0 fffffa80`04745ad0 : fffffa80`03c9b1a0 fffffa80`0814c6c1 00000000`00000000 00000000`00000001 : iaStor+0x4a771
fffff880`009b0ab8 fffffa80`03c9b1a0 : fffffa80`0814c6c1 00000000`00000000 00000000`00000001 fffffa80`03c9b1a0 : 0xfffffa80`04745ad0
fffff880`009b0ac0 fffffa80`0814c6c1 : 00000000`00000000 00000000`00000001 fffffa80`03c9b1a0 fffff800`03241e80 : 0xfffffa80`03c9b1a0
fffff880`009b0ac8 00000000`00000000 : 00000000`00000001 fffffa80`03c9b1a0 fffff800`03241e80 fffff880`010f3733 : 0xfffffa80`0814c6c1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
iaStor+4a771
fffff880`010eb771 488911          mov     qword ptr [rcx],rdx

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  iaStor+4a771

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: iaStor

IMAGE_NAME:  iaStor.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a287aa4

FAILURE_BUCKET_ID:  X64_0xD1_iaStor+4a771

BUCKET_ID:  X64_0xD1_iaStor+4a771

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121210-20935-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03019000 PsLoadedModuleList = 0xfffff800`03256e50
Debug session time: Sun Dec 12 05:41:23.952 2010 (UTC - 5:00)
System Uptime: 0 days 0:03:10.871
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {19000002ac, 2, 0, fffff8800104ff2b}

Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4af2b )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000019000002ac, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800104ff2b, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c10e0
 00000019000002ac 

CURRENT_IRQL:  2

FAULTING_IP: 
iaStor+4af2b
fffff880`0104ff2b 498b5520        mov     rdx,qword ptr [r13+20h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880087559f0 -- (.trap 0xfffff880087559f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000026161 rbx=0000000000000000 rcx=fffff88008f716b0
rdx=fffffa8003ea2920 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800104ff2b rsp=fffff88008755b80 rbp=fffffa8003ea2920
 r8=fffff80003019000  r9=0000000000000000 r10=00000000000094bf
r11=fffffa8008196c00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
iaStor+0x4af2b:
fffff880`0104ff2b 498b5520        mov     rdx,qword ptr [r13+20h] ds:0001:00000000`00000020=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003088ca9 to fffff80003089740

STACK_TEXT:  
fffff880`087558a8 fffff800`03088ca9 : 00000000`0000000a 00000019`000002ac 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`087558b0 fffff800`03087920 : fffffa80`065a0650 00000000`00002fcb 00000000`00000002 fffff880`03d7d630 : nt!KiBugCheckDispatch+0x69
fffff880`087559f0 fffff880`0104ff2b : fffffa80`04b62000 00000000`00000002 00000000`00000000 fffffa80`075f4c00 : nt!KiPageFault+0x260
fffff880`08755b80 fffffa80`04b62000 : 00000000`00000002 00000000`00000000 fffffa80`075f4c00 00000000`000007ff : iaStor+0x4af2b
fffff880`08755b88 00000000`00000002 : 00000000`00000000 fffffa80`075f4c00 00000000`000007ff 00000000`00000020 : 0xfffffa80`04b62000
fffff880`08755b90 00000000`00000000 : fffffa80`075f4c00 00000000`000007ff 00000000`00000020 fffff8a0`05e47170 : 0x2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
iaStor+4af2b
fffff880`0104ff2b 498b5520        mov     rdx,qword ptr [r13+20h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  iaStor+4af2b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: iaStor

IMAGE_NAME:  iaStor.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a287aa4

FAILURE_BUCKET_ID:  X64_0xD1_iaStor+4af2b

BUCKET_ID:  X64_0xD1_iaStor+4af2b

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121210-21356-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03011000 PsLoadedModuleList = 0xfffff800`0324ee50
Debug session time: Sun Dec 12 05:29:32.951 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:25.871
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffffffffffffe1, 1, fffff880010d24ff, 0}

Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys

Could not read faulting driver name
Probably caused by : iaStor.sys ( iaStor+524ff )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe1, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff880010d24ff, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b90e0
 ffffffffffffffe1 

FAULTING_IP: 
iaStor+524ff
fffff880`010d24ff 48894620        mov     qword ptr [rsi+20h],rax

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880033176d0 -- (.trap 0xfffff880033176d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7fffffffffffffff rbx=0000000000000000 rcx=fffffa8004aee000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010d24ff rsp=fffff88003317860 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffff880010856b8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
iaStor+0x524ff:
fffff880`010d24ff 48894620        mov     qword ptr [rsi+20h],rax ds:e36e:00000000`00000020=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003101f14 to fffff80003081740

STACK_TEXT:  
fffff880`03317568 fffff800`03101f14 : 00000000`00000050 ffffffff`ffffffe1 00000000`00000001 fffff880`033176d0 : nt!KeBugCheckEx
fffff880`03317570 fffff800`0307f82e : 00000000`00000001 fffff880`02c146b0 fffffa80`00020000 fffffa80`03c9db00 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`033176d0 fffff880`010d24ff : fffffa80`06167db0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`03317860 fffffa80`06167db0 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : iaStor+0x524ff
fffff880`03317868 00000000`00000001 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`06167db0
fffff880`03317870 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
iaStor+524ff
fffff880`010d24ff 48894620        mov     qword ptr [rsi+20h],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  iaStor+524ff

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: iaStor

IMAGE_NAME:  iaStor.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a287aa4

FAILURE_BUCKET_ID:  X64_0x50_iaStor+524ff

BUCKET_ID:  X64_0x50_iaStor+524ff

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121210-23306-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0305b000 PsLoadedModuleList = 0xfffff800`03298e50
Debug session time: Sun Dec 12 05:56:36.867 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:49.802
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff8800110a7cb, fffff88002fb67c8, fffff88002fb6030}

Probably caused by : iaStor.sys ( iaStor+527cb )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800110a7cb, The address that the exception occurred at
Arg3: fffff88002fb67c8, Exception Record Address
Arg4: fffff88002fb6030, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
iaStor+527cb
fffff880`0110a7cb 80380e          cmp     byte ptr [rax],0Eh

EXCEPTION_RECORD:  fffff88002fb67c8 -- (.exr 0xfffff88002fb67c8)
ExceptionAddress: fffff8800110a7cb (iaStor+0x00000000000527cb)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

CONTEXT:  fffff88002fb6030 -- (.cxr 0xfffff88002fb6030)
rax=0000000000000000 rbx=fffff880066d5700 rcx=fffffa80077ec200
rdx=fffffa800818b4f1 rsi=fffff88002d63140 rdi=fffffa80077ec200
rip=fffff8800110a7cb rsp=fffff88002fb6a08 rbp=fffffa8004b63c68
 r8=fffffa800818b4f0  r9=0000000000000000 r10=fffffa8004b63d80
r11=fffff88002d63140 r12=fffffa8004b63000 r13=0000000000000000
r14=0000000000000009 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
iaStor+0x527cb:
fffff880`0110a7cb 80380e          cmp     byte ptr [rax],0Eh ds:002b:00000000`00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800033030e0
 0000000000000000 

FOLLOWUP_IP: 
iaStor+527cb
fffff880`0110a7cb 80380e          cmp     byte ptr [rax],0Eh

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff88001102cc2 to fffff8800110a7cb

STACK_TEXT:  
fffff880`02fb6a08 fffff880`01102cc2 : fffff880`066d5700 fffff880`02d63140 00000000`00000000 fffffa80`04b63000 : iaStor+0x527cb
fffff880`02fb6a10 fffff880`066d5700 : fffff880`02d63140 00000000`00000000 fffffa80`04b63000 fffffa80`08367410 : iaStor+0x4acc2
fffff880`02fb6a18 fffff880`02d63140 : 00000000`00000000 fffffa80`04b63000 fffffa80`08367410 fffffa80`083f39a0 : 0xfffff880`066d5700
fffff880`02fb6a20 00000000`00000000 : fffffa80`04b63000 fffffa80`08367410 fffffa80`083f39a0 fffffa80`04b68e09 : 0xfffff880`02d63140


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  iaStor+527cb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: iaStor

IMAGE_NAME:  iaStor.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a287aa4

STACK_COMMAND:  .cxr 0xfffff88002fb6030 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_iaStor+527cb

BUCKET_ID:  X64_0x7E_iaStor+527cb

Followup: MachineOwner
---------


DRIVERS

Code:
start             end                 module name
fffff880`0364a000 fffff880`03675000   000      000.fcl      Fri Sep 26 09:11:22 2008 (48DCDF7A)
fffff880`04600000 fffff880`0463e000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f85000 fffff880`00fdc000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03b26000 fffff880`03bb0000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`046a1000 fffff880`046b7000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`011d4000 fffff880`011df000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`02bb1000 fffff880`02bb8000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`040f0000 fffff880`04101000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02586000 fffff880`025a4000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00680000 fffff960`006a7000   cdd      cdd.dll      unavailable (00000000)
fffff880`02b75000 fffff880`02b9f000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`062fc000 fffff880`06309980   cfwids   cfwids.sys   Wed Oct 06 16:00:36 2010 (4CACD564)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`04092000 fffff880`0409d000   ckldrv   ckldrv.sys   Mon Mar 17 12:46:29 2008 (47DEA065)
fffff880`01060000 fffff880`01090000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d3e000 fffff880`00d9c000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01200000 fffff880`01273000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04691000 fffff880`046a1000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05a00000 fffff880`05a0e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`040d2000 fffff880`040f0000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`040c3000 fffff880`040d2000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01400000 fffff880`01416000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05bcc000 fffff880`05bee000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0506a000 fffff880`0507d000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`02a37000 fffff880`02b53000   dump_iaStor dump_iaStor.sys Thu Jun 04 21:53:40 2009 (4A287AA4)
fffff880`0401d000 fffff880`04029000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04204000 fffff880`042f8000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`042f8000 fffff880`0433e000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0433e000 fffff880`04387000   e1y62x64 e1y62x64.sys Fri Jun 12 21:16:42 2009 (4A32FDFA)
fffff880`0104c000 fffff880`01060000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`015ea000 fffff880`015f4000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`013b3000 fffff880`013ed000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`00d9c000 fffff880`00de6000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`0467b000 fffff880`04688000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03012000 fffff800`0305b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04ddb000 fffff880`04dff000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`051e3000 fffff880`051fc000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05bf4000 fffff880`05bfc080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0507d000 fffff880`0508b000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`024be000 fffff880`02586000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`017eb000 fffff880`017f4000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`010b8000 fffff880`011d4000   iaStor   iaStor.sys   Thu Jun 04 21:53:40 2009 (4A287AA4)
fffff880`046dc000 fffff880`04dda660   igdkmd64 igdkmd64.sys Wed Jun 03 14:16:49 2009 (4A26BE11)
fffff880`0518f000 fffff880`051b6000   IntcHdmi IntcHdmi.sys Tue May 26 07:13:09 2009 (4A1BCEC5)
fffff880`04127000 fffff880`0413d000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`041ce000 fffff880`041dd000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0464b000 fffff880`04659000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bd4000 fffff800`00bd7000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`0508e000 fffff880`050d1000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`015bf000 fffff880`015d9000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`017c0000 fffff880`017eb000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05bee000 fffff880`05bf3200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03a5d000 fffff880`03a72000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`012ad000 fffff880`012d0000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ce6000 fffff880`00d2a000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`02400000 fffff880`0241bc80   mfeapfk  mfeapfk.sys  Wed Oct 06 15:56:26 2010 (4CACD46A)
fffff880`051b6000 fffff880`051e2800   mfeavfk  mfeavfk.sys  Wed Oct 06 15:56:49 2010 (4CACD481)
fffff880`05000000 fffff880`05069780   mfefirek mfefirek.sys Wed Oct 06 15:59:47 2010 (4CACD533)
fffff880`012d6000 fffff880`01354c80   mfehidk  mfehidk.sys  Wed Oct 06 15:55:49 2010 (4CACD445)
fffff880`03a00000 fffff880`03a10900   mfenlfk  mfenlfk.sys  Wed Oct 06 15:56:13 2010 (4CACD45D)
fffff880`03a72000 fffff880`03ab5200   mfewfpk  mfewfpk.sys  Wed Oct 06 15:56:04 2010 (4CACD454)
fffff880`03a4f000 fffff880`03a5d000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0465c000 fffff880`0466b000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0463e000 fffff880`0464b000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`025a4000 fffff880`025bc000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`025bc000 fffff880`025e9000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`036e3000 fffff880`03731000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`03731000 fffff880`03754000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02a1b000 fffff880`02a26000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fe5000 fffff880`00fef000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01355000 fffff880`013b3000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`040b8000 fffff880`040c3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01654000 fffff880`01666000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`02b9f000 fffff880`02ba8000   mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 06:07:30 2009 (4A24F9E2)
fffff880`040b0000 fffff880`040b8000   mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 06:07:39 2009 (4A24F9EB)
fffff880`0409d000 fffff880`040b0000   mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 06:15:29 2009 (4A24FBC1)
fffff880`0166e000 fffff880`01760000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0413d000 fffff880`04149000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02493000 fffff880`024a6000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`04149000 fffff880`04178000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0513d000 fffff880`05152000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03a11000 fffff880`03a20000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03ae1000 fffff880`03b26000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01760000 fffff880`017c0000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02a26000 fffff880`02a37000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04086000 fffff880`04092000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0305b000 fffff800`03637000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0141c000 fffff880`015bf000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04673000 fffff880`0467b000   NTIDrvr  NTIDrvr.sys  Tue Mar 24 23:09:39 2009 (49C9A073)
fffff880`02ba8000 fffff880`02bb1000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02440000 fffff880`02493000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03bb9000 fffff880`03bdf000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`015d9000 fffff880`015ea000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`03754000 fffff880`037fa000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05152000 fffff880`0518f000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d2a000 fffff880`00d3e000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`046b7000 fffff880`046db000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04178000 fffff880`04193000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04193000 fffff880`041b4000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`041b4000 fffff880`041ce000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`04035000 fffff880`04086000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02a00000 fffff880`02a09000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02a09000 fffff880`02a12000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02a12000 fffff880`02a1b000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01273000 fffff880`012ad000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`024a6000 fffff880`024be000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05a0e000 fffff880`05bcba00   RTKVHD64 RTKVHD64.sys Mon Jul 20 06:52:29 2009 (4A644C6D)
fffff880`03600000 fffff880`0360b000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0164c000 fffff880`01654000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06235000 fffff880`062cb000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`03675000 fffff880`036dc000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0360b000 fffff880`03638000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`043fb000 fffff880`043fc480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`03802000 fffff880`039ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`03638000 fffff880`0364a000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`03ab6000 fffff880`03ac3000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`03ac3000 fffff880`03ae1000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03a3b000 fffff880`03a4f000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00430000 fffff960`0043a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`04101000 fffff880`04127000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0466b000 fffff880`04673000   UBHelper UBHelper.sys Mon Apr 27 04:48:19 2009 (49F57153)
fffff880`050d1000 fffff880`050e3000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04000000 fffff880`0401d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05bfd000 fffff880`05bfef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`043ea000 fffff880`043fb000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`050e3000 fffff880`0513d000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04394000 fffff880`043ea000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`041dd000 fffff880`041f8000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`04387000 fffff880`04394000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02bb8000 fffff880`02bc6000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02bc6000 fffff880`02beb000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e6a000 fffff880`00ec6000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01600000 fffff880`0164c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03bdf000 fffff880`03bf5000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03a20000 fffff880`03a3b000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02beb000 fffff880`02bfb000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ed2000 fffff880`00f76000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f76000 fffff880`00f85000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03bb0000 fffff880`03bb9000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00050000 fffff960`0035f000   win32k   win32k.sys   unavailable (00000000)
fffff880`04688000 fffff880`04691000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fdc000 fffff880`00fe5000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02b53000 fffff880`02b74000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`062cb000 fffff880`062fc000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`03675000 fffff880`036a2000   mfeavfk01.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002D000
fffff880`013ed000 fffff880`013fb000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`02a46000 fffff880`02b62000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0011C000
fffff880`02b62000 fffff880`02b75000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`0463e000 fffff880`0465c000   i8042prt.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001E000
 
Joined
Dec 10, 2010
Messages
4
Reaction score
0
Hi, I have tried to download the iastor.sys from the Intel web site and still I am getting BSOD. the latest dmp files are as attached.

Kindly review. I am only able to sometimes login with safe mode. When I login without Safe mode the BSOD appears after I login.
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
http://downloadcenter.intel.com/
http://www.intel.com/support/detect.htm?iid=dc_iduu

So far including the two latest, each of your bsods was caused by Intel Matrix Storage, so do your best to update the driver. Try searching and downloading it from Intel site, and try Intel Update Utility as well.

iaStor.sys Thu Jun 04 21:53:40 2009

6/25/2009:

http://downloadcenter.intel.com/Detail_Desc.aspx?agr=Y&DwnldID=17762&lang=eng


Also update Intel Gigabit Network:

e1y62x64.sys Fri Jun 12 21:16:42 2009



Code:
BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4a771 )

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121210-28532-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02463000 PsLoadedModuleList = 0xfffff800`026a0e50
Debug session time: Sun Dec 12 12:17:20.857 2010 (UTC - 5:00)
System Uptime: 0 days 0:04:06.357
Loading Kernel Symbols
...............................................................
..................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffff880047716e8, 2, 0, fffff88001086ee1}

Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4aee1 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff880047716e8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001086ee1, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000270b0e0
 fffff880047716e8 

CURRENT_IRQL:  2

FAULTING_IP: 
iaStor+4aee1
fffff880`01086ee1 4c8b6138        mov     r12,qword ptr [rcx+38h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88001dd59f0 -- (.trap 0xfffff88001dd59f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004a72c68 rbx=0000000000000000 rcx=fffff880047716b0
rdx=fffffa8005a8b150 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001086ee1 rsp=fffff88001dd5b80 rbp=fffffa8005a8b150
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
r11=fffffa8006469d00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
iaStor+0x4aee1:
fffff880`01086ee1 4c8b6138        mov     r12,qword ptr [rcx+38h] ds:6980:fffff880`047716e8=0000000000000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800024d2ca9 to fffff800024d3740

STACK_TEXT:  
fffff880`01dd58a8 fffff800`024d2ca9 : 00000000`0000000a fffff880`047716e8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`01dd58b0 fffff800`024d1920 : 00000000`23e75606 fffffa80`063cc300 fffff880`01dd5db0 fffffa80`03d1bb60 : nt!KiBugCheckDispatch+0x69
fffff880`01dd59f0 fffff880`01086ee1 : fffffa80`04a72000 fffff880`02d7a180 00000000`00000000 fffffa80`063cc300 : nt!KiPageFault+0x260
fffff880`01dd5b80 fffffa80`04a72000 : fffff880`02d7a180 00000000`00000000 fffffa80`063cc300 00000000`00000001 : iaStor+0x4aee1
fffff880`01dd5b88 fffff880`02d7a180 : 00000000`00000000 fffffa80`063cc300 00000000`00000001 fffffa80`06a98350 : 0xfffffa80`04a72000
fffff880`01dd5b90 00000000`00000000 : fffffa80`063cc300 00000000`00000001 fffffa80`06a98350 fffffa80`05a925d0 : tcpip!LruContext


STACK_COMMAND:  kb

FOLLOWUP_IP: 
iaStor+4aee1
fffff880`01086ee1 4c8b6138        mov     r12,qword ptr [rcx+38h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  iaStor+4aee1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: iaStor

IMAGE_NAME:  iaStor.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a287aa4

FAILURE_BUCKET_ID:  X64_0xD1_iaStor+4aee1

BUCKET_ID:  X64_0xD1_iaStor+4aee1

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121210-31605-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0240b000 PsLoadedModuleList = 0xfffff800`02648e50
Debug session time: Sun Dec 12 12:46:16.287 2010 (UTC - 5:00)
System Uptime: 0 days 0:27:39.787
Loading Kernel Symbols
...............................................................
.................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4a771 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+3638376264376233
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000b9a648 -- (.exr 0xfffff80000b9a648)
ExceptionAddress: fffff88001077771 (iaStor+0x000000000004a771)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000b9a6f0 -- (.trap 0xfffff80000b9a6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=80fffffa80000800
rdx=0c00000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001077771 rsp=fffff80000b9a880 rbp=0000000000000000
 r8=fffffa8004a8a000  r9=0000000000000000 r10=fffff880010326b8
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
iaStor+0x4a771:
fffff880`01077771 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000247346e to fffff8000247b710

STACK_TEXT:  
fffff800`00b99738 fffff800`0247346e : 00000000`00000000 00000000`00000000 fffff800`00b99eb0 fffff800`024a8668 : nt!KeBugCheck
fffff800`00b99740 fffff800`024a140d : fffff800`02689b7c fffff800`025c3e84 fffff800`0240b000 fffff800`00b9a648 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00b99770 fffff800`024a8a90 : fffff800`025cab14 fffff800`00b997e8 fffff800`00b9a648 fffff800`0240b000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b997a0 fffff800`024b59ef : fffff800`00b9a648 fffff800`00b99eb0 fffff800`00000000 fffffa80`066f8fc1 : nt!RtlDispatchException+0x410
fffff800`00b99e80 fffff800`0247ad82 : fffff800`00b9a648 00000000`00000000 fffff800`00b9a6f0 fffffa80`04a8aad0 : nt!KiDispatchException+0x16f
fffff800`00b9a510 fffff800`0247968a : 00000000`00000000 fffffa80`046fd930 fffffa80`046fda38 fffff800`0245ae05 : nt!KiExceptionDispatch+0xc2
fffff800`00b9a6f0 fffff880`01077771 : fffffa80`04a8aad0 fffffa80`03cb81a0 fffffa80`066f8fc1 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff800`00b9a880 fffffa80`04a8aad0 : fffffa80`03cb81a0 fffffa80`066f8fc1 00000000`00000000 00000000`00000001 : iaStor+0x4a771
fffff800`00b9a888 fffffa80`03cb81a0 : fffffa80`066f8fc1 00000000`00000000 00000000`00000001 fffffa80`03cb81a0 : 0xfffffa80`04a8aad0
fffff800`00b9a890 fffffa80`066f8fc1 : 00000000`00000000 00000000`00000001 fffffa80`03cb81a0 fffff880`009f0180 : 0xfffffa80`03cb81a0
fffff800`00b9a898 00000000`00000000 : 00000000`00000001 fffffa80`03cb81a0 fffff880`009f0180 fffff880`0107f733 : 0xfffffa80`066f8fc1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
iaStor+4a771
fffff880`01077771 ??              ???

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  iaStor+4a771

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: iaStor

IMAGE_NAME:  iaStor.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a287aa4

FAILURE_BUCKET_ID:  X64_0x1E_0_iaStor+4a771

BUCKET_ID:  X64_0x1E_0_iaStor+4a771

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+3638376264376233
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000b9a648 -- (.exr 0xfffff80000b9a648)
ExceptionAddress: fffff88001077771 (iaStor+0x000000000004a771)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000b9a6f0 -- (.trap 0xfffff80000b9a6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=80fffffa80000800
rdx=0c00000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001077771 rsp=fffff80000b9a880 rbp=0000000000000000
 r8=fffffa8004a8a000  r9=0000000000000000 r10=fffff880010326b8
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
iaStor+0x4a771:
fffff880`01077771 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000247346e to fffff8000247b710

STACK_TEXT:  
fffff800`00b99738 fffff800`0247346e : 00000000`00000000 00000000`00000000 fffff800`00b99eb0 fffff800`024a8668 : nt!KeBugCheck
fffff800`00b99740 fffff800`024a140d : fffff800`02689b7c fffff800`025c3e84 fffff800`0240b000 fffff800`00b9a648 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00b99770 fffff800`024a8a90 : fffff800`025cab14 fffff800`00b997e8 fffff800`00b9a648 fffff800`0240b000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b997a0 fffff800`024b59ef : fffff800`00b9a648 fffff800`00b99eb0 fffff800`00000000 fffffa80`066f8fc1 : nt!RtlDispatchException+0x410
fffff800`00b99e80 fffff800`0247ad82 : fffff800`00b9a648 00000000`00000000 fffff800`00b9a6f0 fffffa80`04a8aad0 : nt!KiDispatchException+0x16f
fffff800`00b9a510 fffff800`0247968a : 00000000`00000000 fffffa80`046fd930 fffffa80`046fda38 fffff800`0245ae05 : nt!KiExceptionDispatch+0xc2
fffff800`00b9a6f0 fffff880`01077771 : fffffa80`04a8aad0 fffffa80`03cb81a0 fffffa80`066f8fc1 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff800`00b9a880 fffffa80`04a8aad0 : fffffa80`03cb81a0 fffffa80`066f8fc1 00000000`00000000 00000000`00000001 : iaStor+0x4a771
fffff800`00b9a888 fffffa80`03cb81a0 : fffffa80`066f8fc1 00000000`00000000 00000000`00000001 fffffa80`03cb81a0 : 0xfffffa80`04a8aad0
fffff800`00b9a890 fffffa80`066f8fc1 : 00000000`00000000 00000000`00000001 fffffa80`03cb81a0 fffff880`009f0180 : 0xfffffa80`03cb81a0
fffff800`00b9a898 00000000`00000000 : 00000000`00000001 fffffa80`03cb81a0 fffff880`009f0180 fffff880`0107f733 : 0xfffffa80`066f8fc1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
iaStor+4a771
fffff880`01077771 ??              ???

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  iaStor+4a771

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: iaStor

IMAGE_NAME:  iaStor.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a287aa4

FAILURE_BUCKET_ID:  X64_0x1E_0_iaStor+4a771

BUCKET_ID:  X64_0x1E_0_iaStor+4a771

Followup: MachineOwner
---------




DRIVERS :

Code:
start             end                 module name
fffff880`02eab000 fffff880`02ee9000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f9d000 fffff880`00ff4000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02860000 fffff880`028ea000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02ee9000 fffff880`02eff000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01149000 fffff880`01154000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`02768000 fffff880`0276f000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02fe2000 fffff880`02ff3000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02f60000 fffff880`02f7e000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`02f9a000 fffff880`02fc4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0148a000 fffff880`014ba000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d48000 fffff880`00da6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0154b000 fffff880`015be000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`02e00000 fffff880`02e10000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0338e000 fffff880`0339c000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0299b000 fffff880`029b9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`01474000 fffff880`0148a000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0339c000 fffff880`033af000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0262e000 fffff880`0274a000   dump_iaStor dump_iaStor.sys Thu Jun 04 21:53:40 2009 (4A287AA4)
fffff880`033af000 fffff880`033bb000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00580000 fffff960`0059e000   dxg      dxg.sys      unavailable (00000000)
fffff880`02800000 fffff880`02849000   e1y62x64 e1y62x64.sys Fri Jun 12 21:16:42 2009 (4A32FDFA)
fffff880`011a0000 fffff880`011b4000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01154000 fffff880`011a0000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff960`009a0000 fffff960`009a9000   framebuf framebuf.dll unavailable (00000000)
fffff880`015cf000 fffff880`015d9000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0143a000 fffff880`01474000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`011b4000 fffff880`011fe000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`02fcc000 fffff880`02fd9000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`029e7000 fffff800`02a30000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`02e87000 fffff880`02eab000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`033e6000 fffff880`033ff000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`03200000 fffff880`03208080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`033d8000 fffff880`033e6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`017ea000 fffff880`017f3000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0102d000 fffff880`01149000   iaStor   iaStor.sys   Thu Jun 04 21:53:40 2009 (4A287AA4)
fffff880`01200000 fffff880`0120f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03233000 fffff880`03241000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bce000 fffff800`00bd1000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`032ca000 fffff880`0330d000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01531000 fffff880`0154b000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01759000 fffff880`01784000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00cf0000 fffff880`00d34000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`02f83000 fffff880`02f92000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03209000 fffff880`03216000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00ed0000 fffff880`00eea000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`014ba000 fffff880`014d2000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0120f000 fffff880`0123c000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`048b8000 fffff880`04906000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`04906000 fffff880`04929000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`027bb000 fffff880`027c6000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`014d3000 fffff880`01531000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02e10000 fffff880`02e1b000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017d8000 fffff880`017ea000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01607000 fffff880`016f9000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02f23000 fffff880`02f2f000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`032b5000 fffff880`032c8000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`02f2f000 fffff880`02f5e000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03379000 fffff880`0338e000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`0292f000 fffff880`0293e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`00da6000 fffff880`00deb000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`016f9000 fffff880`01759000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`027c6000 fffff880`027d7000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0298f000 fffff880`0299b000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0240b000 fffff800`029e7000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0123e000 fffff880`013e1000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02fc4000 fffff880`02fcc000   NTIDrvr  NTIDrvr.sys  Tue Mar 24 23:09:39 2009 (49C9A073)
fffff880`0275f000 fffff880`02768000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03262000 fffff880`032b5000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`028f3000 fffff880`02919000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`015be000 fffff880`015cf000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00d34000 fffff880`00d48000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02eff000 fffff880`02f23000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`029df000 fffff880`029fa000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0260d000 fffff880`0262e000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`015d9000 fffff880`015f3000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0293e000 fffff880`0298f000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`027b2000 fffff880`027bb000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01400000 fffff880`0143a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02f5e000 fffff880`02f5f480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`02c02000 fffff880`02dff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`02600000 fffff880`0260d000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`027d7000 fffff880`027f5000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`013e1000 fffff880`013f5000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`007a0000 fffff960`007aa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`029b9000 fffff880`029df000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`02f92000 fffff880`02f9a000   UBHelper UBHelper.sys Mon Apr 27 04:48:19 2009 (49F57153)
fffff880`0330d000 fffff880`0331f000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`03216000 fffff880`03233000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`033d6000 fffff880`033d7f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`02e76000 fffff880`02e87000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0331f000 fffff880`03379000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`02e20000 fffff880`02e76000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`033bb000 fffff880`033d6000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`02849000 fffff880`02856000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0276f000 fffff880`0277d000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0277d000 fffff880`027a2000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01784000 fffff880`017d0000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02919000 fffff880`0292f000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`027a2000 fffff880`027b2000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eea000 fffff880`00f8e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f8e000 fffff880`00f9d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`028ea000 fffff880`028f3000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00000000 fffff960`0030f000   win32k   win32k.sys   unavailable (00000000)
fffff880`02fd9000 fffff880`02fe2000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00ff4000 fffff880`00ffd000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03241000 fffff880`03262000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`014ba000 fffff880`014c8000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`02630000 fffff880`0274c000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0011C000
fffff880`0274c000 fffff880`0275f000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`02f65000 fffff880`02f83000   i8042prt.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001E000
fffff880`02ee9000 fffff880`02f65000   RT61.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0007C000
fffff880`017d0000 fffff880`017d8000   spldr.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Also search your motherboard support site for those two drivers, come hell or high water:

Intel Matrix Storage
Intel Gigabit Network
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top