Frequent BSOD error

Joined
Apr 25, 2011
Messages
4
Reaction score
0
Hello for the past week ive been having random BSODs sometimes very frequent and close together other times only once a day if im lucky, im not certain what is the cause i get a System_Service_Exception error every BSOD ive DLed appcrashview im not too certain how to read the mindumps.

ive got windows 7 64 bit and i use firefox over IE most of the time because from what ive been told it is safer but i sometimes seem to get BSOD when i open firefox occasionally not all the time so im not sure if its it or not. i play lots of games Crysis, WoW etc. but so far i haven't had a crash while playing them unless i alt tab and open firefox.

All my programs are up to date: latest firefox, Video card drivers, Mcafee, Spybot S&D.

Any help would be greatly appreciated, thanks!
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Some RAM issue here:



BugCheck 3B, {c0000005, fffff800036ed5c0, fffff8800883efb0, 0}
Probably caused by : ntkrnlmp.exe ( nt!IofCallDriver+50 )

nt! ?? ::FNODOBFM::`string'+0x42a70:
fffff800`0368c03c 4c8b442428 mov r8,qword ptr [rsp+28h]
fffff800`0368c041 4883c428 add rsp,28h
fffff800`0368c045 48ffe0 jmp rax

nt! ?? ::FNODOBFM::`string'+0x42a7c:
fffff800`0368c048 4533c9 xor r9d,r9d
fffff800`0368c04b 4533c0 xor r8d,r8d
fffff800`0368c04e 418d4935 lea ecx,[r9+35h]
fffff800`0368c052 e8c9750500 call nt!KiBugCheck3 (fffff800`036e3620)
fffff800`0368c057 cc int 3

nt! ?? ::FNODOBFM::`string'+0x42a8c:
fffff800`0368c058 440fb64001 movzx r8d,byte ptr [rax+1]
fffff800`0368c05d 4180f802 cmp r8b,2
fffff800`0368c061 7417 je nt! ?? ::FNODOBFM::`string'+0x42aae (fffff800`0368c07a)

nt! ?? ::FNODOBFM::`string'+0x42a97:
fffff800`0368c063 4180f803 cmp r8b,3
fffff800`0368c067 7411 je nt! ?? ::FNODOBFM::`string'+0x42aae (fffff800`0368c07a)

nt! ?? ::FNODOBFM::`string'+0x42a9d:
fffff800`0368c069 4c8b4108 mov r8,qword ptr [rcx+8]
fffff800`0368c06d 410fb6c1 movzx eax,r9b
fffff800`0368c071 4883c428 add rsp,28h
fffff800`0368c075 49ff64c070 jmp qword ptr [r8+rax*8+70h]

nt! ?? ::FNODOBFM::`string'+0x42aae:
fffff800`0368c07a 488bca mov rcx,rdx
fffff800`0368c07d 4883c428 add rsp,28h
fffff800`0368c081 e99a1c1500 jmp nt!IopPoHandleIrp (fffff800`037ddd20)

nt!IofCallDriver:
fffff800`036ed570 4883ec28 sub rsp,28h
fffff800`036ed574 488b059d6d2200 mov rax,qword ptr [nt!pIofCallDriver (fffff800`03914318)]
fffff800`036ed57b 4885c0 test rax,rax
fffff800`036ed57e 0f85b8eaf9ff jne nt! ?? ::FNODOBFM::`string'+0x42a70 (fffff800`0368c03c)

nt!IofCallDriver+0x14:
fffff800`036ed584 fe4a43 dec byte ptr [rdx+43h]
fffff800`036ed587 384243 cmp byte ptr [rdx+43h],al
fffff800`036ed58a 0f8eb8eaf9ff jle nt! ?? ::FNODOBFM::`string'+0x42a7c (fffff800`0368c048)

nt!IofCallDriver+0x20:
fffff800`036ed590 488b82b8000000 mov rax,qword ptr [rdx+0B8h]
fffff800`036ed597 4883e848 sub rax,48h
fffff800`036ed59b 488982b8000000 mov qword ptr [rdx+0B8h],rax
fffff800`036ed5a2 440fb608 movzx r9d,byte ptr [rax]
fffff800`036ed5a6 48894828 mov qword ptr [rax+28h],rcx
fffff800`036ed5aa 4180f916 cmp r9b,16h
fffff800`036ed5ae 0f84a4eaf9ff je nt! ?? ::FNODOBFM::`string'+0x42a8c (fffff800`0368c058)

nt!IofCallDriver+0x44:
fffff800`036ed5b4 4c8b4108 mov r8,qword ptr [rcx+8]
fffff800`036ed5b8 410fb6c1 movzx eax,r9b
fffff800`036ed5bc 4883c428 add rsp,28h
fffff800`036ed5c0 49ff64c070 jmp qword ptr [r8+rax*8+70h]

nt!IopPoHandleIrp:
fffff800`037ddd20 fff3 push rbx
fffff800`037ddd22 4883ec20 sub rsp,20h
fffff800`037ddd26 488d542438 lea rdx,[rsp+38h]
fffff800`037ddd2b 488bd9 mov rbx,rcx
fffff800`037ddd2e e8ddfeffff call nt!PoHandleIrp (fffff800`037ddc10)
fffff800`037ddd33 84c0 test al,al
fffff800`037ddd35 751d jne nt!IopPoHandleIrp+0x34 (fffff800`037ddd54)

nt!IopPoHandleIrp+0x17:
fffff800`037ddd37 488b83b8000000 mov rax,qword ptr [rbx+0B8h]
fffff800`037ddd3e 488bd3 mov rdx,rbx
fffff800`037ddd41 488b4828 mov rcx,qword ptr [rax+28h]
fffff800`037ddd45 440fb600 movzx r8d,byte ptr [rax]
fffff800`037ddd49 4c8b4908 mov r9,qword ptr [rcx+8]
fffff800`037ddd4d 43ff54c170 call qword ptr [r9+r8*8+70h]
fffff800`037ddd52 eb04 jmp nt!IopPoHandleIrp+0x38 (fffff800`037ddd58)

nt!IopPoHandleIrp+0x34:
fffff800`037ddd54 8b442438 mov eax,dword ptr [rsp+38h]

nt!IopPoHandleIrp+0x38:
fffff800`037ddd58 4883c420 add rsp,20h
fffff800`037ddd5c 5b pop rbx
fffff800`037ddd5d c3 ret



Update Atheros NIC driver and Realtek HD Audio
L1C62x64.sys Fri Sep 04 01:39:09 2009
RTKVHD64.sys Wed Oct 21 10:27:48 2009


If crashes persist after you update them, attach some more information about your hardware:

- Passmark Rammon HTML.zip
- cpu-z MEMORY tab snip
- cpu-z CPU tab snip





CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041811-18595-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0364c000 PsLoadedModuleList = 0xfffff800`03889e50
Debug session time: Sun Apr 17 21:36:06.902 2011 (UTC - 4:00)
System Uptime: 0 days 0:13:16.544
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, 80, fffff8800558afc0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000080, Address of the instruction which caused the bugcheck
Arg3: fffff8800558afc0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+0
00000000`00000080 ??              ???

CONTEXT:  fffff8800558afc0 -- (.cxr 0xfffff8800558afc0)
rax=000000000000000e rbx=fffffa80037eed20 rcx=fffffa80053795b0
rdx=fffffa8003b05d90 rsi=fffffa80037eed20 rdi=fffffa8003b05d90
rip=0000000000000080 rsp=fffff8800558b998 rbp=fffff8800558bc00
 r8=fffffa8000000000  r9=000000000000000e r10=fffff800038379a0
r11=fffffa8003d70280 r12=0000000000000000 r13=0000000000000001
r14=0000000000000001 r15=fffffa800542d690
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
00000000`00000080 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to 0000000000000080

STACK_TEXT:  
fffff880`0558a6f8 fffff800`036bbca9 : 00000000`0000003b 00000000`c0000005 00000000`00000080 fffff880`0558afc0 : nt!KeBugCheckEx
fffff880`0558a700 fffff800`036bb5fc : fffff880`0558b758 fffff880`0558afc0 00000000`00000000 fffff800`036eac90 : nt!KiBugCheckDispatch+0x69
fffff880`0558a840 fffff800`036e240d : fffff800`038dfd50 fffff800`03805ab4 fffff800`0364c000 fffff880`0558b758 : nt!KiSystemServiceHandler+0x7c
fffff880`0558a880 fffff800`036e9a90 : fffff800`0380c1c0 fffff880`0558a8f8 fffff880`0558b758 fffff800`0364c000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0558a8b0 fffff800`036f69ef : fffff880`0558b758 fffff880`0558afc0 fffff880`00000000 fffffa80`03b05d90 : nt!RtlDispatchException+0x410
fffff880`0558af90 fffff800`036bbd82 : fffff880`0558b758 fffffa80`037eed20 fffff880`0558b800 fffffa80`037eed20 : nt!KiDispatchException+0x16f
fffff880`0558b620 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceHandler+7c
fffff800`036bb5fc b801000000      mov     eax,1

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceHandler+7c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041811-27877-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03601000 PsLoadedModuleList = 0xfffff800`03846e90
Debug session time: Mon Apr 18 03:20:29.776 2011 (UTC - 4:00)
System Uptime: 0 days 2:58:19.462
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000368b5c0, fffff8800a07afb0, 0}

Probably caused by : ntkrnlmp.exe ( nt!IofCallDriver+50 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000368b5c0, Address of the instruction which caused the bugcheck
Arg3: fffff8800a07afb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!IofCallDriver+50
fffff800`0368b5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

CONTEXT:  fffff8800a07afb0 -- (.cxr 0xfffff8800a07afb0)
rax=000000000000000e rbx=fffffa8006350b40 rcx=fffffa80052f5a50
rdx=fffffa8004c9b360 rsi=fffffa8006350b40 rdi=fffffa8004c9b360
rip=fffff8000368b5c0 rsp=fffff8800a07b998 rbp=fffff8800a07bc00
 r8=006c006f12020019  r9=000000000000000e r10=fffff88002f63ca0
r11=fffffa8003acb100 r12=0000000000000000 r13=0000000000000001
r14=0000000000000001 r15=fffffa800530c990
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!IofCallDriver+0x50:
fffff800`0368b5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h] ds:002b:006c006f`120200f9=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff8000368b5c0

STACK_TEXT:  
fffff880`0a07b998 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x50


FOLLOWUP_IP: 
nt!IofCallDriver+50
fffff800`0368b5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!IofCallDriver+50

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff8800a07afb0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042211-20155-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03603000 PsLoadedModuleList = 0xfffff800`03848e90
Debug session time: Fri Apr 22 08:13:21.441 2011 (UTC - 4:00)
System Uptime: 0 days 12:53:54.753
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
...................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000368d5c0, fffff88009f4ffb0, 0}

Probably caused by : ntkrnlmp.exe ( nt!IofCallDriver+50 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000368d5c0, Address of the instruction which caused the bugcheck
Arg3: fffff88009f4ffb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!IofCallDriver+50
fffff800`0368d5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

CONTEXT:  fffff88009f4ffb0 -- (.cxr 0xfffff88009f4ffb0)
rax=000000000000000e rbx=fffffa8006e157e0 rcx=fffffa8004cc7b00
rdx=fffffa800802ddb0 rsi=fffffa8006e157e0 rdi=fffffa800802ddb0
rip=fffff8000368d5c0 rsp=fffff88009f50998 rbp=fffff88009f50c00
 r8=0000000000000000  r9=000000000000000e r10=fffff880009e8ca0
r11=fffffa80062f3fc0 r12=0000000000000000 r13=0000000000000001
r14=0000000000000001 r15=fffffa8004cc9e20
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!IofCallDriver+0x50:
fffff800`0368d5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h] ds:002b:00000000`000000e0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff8000368d5c0

STACK_TEXT:  
fffff880`09f50998 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x50


FOLLOWUP_IP: 
nt!IofCallDriver+50
fffff800`0368d5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!IofCallDriver+50

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff88009f4ffb0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042511-18720-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03663000 PsLoadedModuleList = 0xfffff800`038a8e90
Debug session time: Sun Apr 24 22:22:37.380 2011 (UTC - 4:00)
System Uptime: 0 days 3:32:44.692
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800036ed5c0, fffff8800883efb0, 0}

Probably caused by : ntkrnlmp.exe ( nt!IofCallDriver+50 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800036ed5c0, Address of the instruction which caused the bugcheck
Arg3: fffff8800883efb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!IofCallDriver+50
fffff800`036ed5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

CONTEXT:  fffff8800883efb0 -- (.cxr 0xfffff8800883efb0)
rax=000000000000000e rbx=fffffa80039bc8d0 rcx=fffffa800372ba70
rdx=fffffa800624b900 rsi=fffffa80039bc8d0 rdi=fffffa800624b900
rip=fffff800036ed5c0 rsp=fffff8800883f998 rbp=fffff8800883fc00
 r8=0000000072745045  r9=000000000000000e r10=fffff800038569a0
r11=fffffa8003850fc0 r12=0000000000000000 r13=0000000000000001
r14=0000000000000001 r15=fffffa80037089f0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!IofCallDriver+0x50:
fffff800`036ed5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h] ds:002b:00000000`72745125=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800036ed5c0

STACK_TEXT:  
fffff880`0883f998 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x50


FOLLOWUP_IP: 
nt!IofCallDriver+50
fffff800`036ed5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!IofCallDriver+50

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff8800883efb0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042511-19671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0360b000 PsLoadedModuleList = 0xfffff800`03850e90
Debug session time: Sun Apr 24 22:28:14.543 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:21.228
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800036955c0, fffff88009310fb0, 0}

Probably caused by : ntkrnlmp.exe ( nt!IofCallDriver+50 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800036955c0, Address of the instruction which caused the bugcheck
Arg3: fffff88009310fb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!IofCallDriver+50
fffff800`036955c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

CONTEXT:  fffff88009310fb0 -- (.cxr 0xfffff88009310fb0)
rax=000000000000000e rbx=fffffa80039ab730 rcx=fffffa8005a8ec80
rdx=fffffa8006a91310 rsi=fffffa80039ab730 rdi=fffffa8006a91310
rip=fffff800036955c0 rsp=fffff88009311998 rbp=fffff88009311c00
 r8=00000000000000a0  r9=000000000000000e r10=fffff800037fe9a0
r11=fffffa80066ed440 r12=0000000000000000 r13=0000000000000001
r14=0000000000000001 r15=fffffa8005a84e20
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!IofCallDriver+0x50:
fffff800`036955c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h] ds:002b:00000000`00000180=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800036955c0

STACK_TEXT:  
fffff880`09311998 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x50


FOLLOWUP_IP: 
nt!IofCallDriver+50
fffff800`036955c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!IofCallDriver+50

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff88009310fb0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

Followup: MachineOwner
---------




nt! ?? ::FNODOBFM::`string'+0x42a70:
fffff800`0368c03c 4c8b442428      mov     r8,qword ptr [rsp+28h]
fffff800`0368c041 4883c428        add     rsp,28h
fffff800`0368c045 48ffe0          jmp     rax

nt! ?? ::FNODOBFM::`string'+0x42a7c:
fffff800`0368c048 4533c9          xor     r9d,r9d
fffff800`0368c04b 4533c0          xor     r8d,r8d
fffff800`0368c04e 418d4935        lea     ecx,[r9+35h]
fffff800`0368c052 e8c9750500      call    nt!KiBugCheck3 (fffff800`036e3620)
fffff800`0368c057 cc              int     3

nt! ?? ::FNODOBFM::`string'+0x42a8c:
fffff800`0368c058 440fb64001      movzx   r8d,byte ptr [rax+1]
fffff800`0368c05d 4180f802        cmp     r8b,2
fffff800`0368c061 7417            je      nt! ?? ::FNODOBFM::`string'+0x42aae (fffff800`0368c07a)

nt! ?? ::FNODOBFM::`string'+0x42a97:
fffff800`0368c063 4180f803        cmp     r8b,3
fffff800`0368c067 7411            je      nt! ?? ::FNODOBFM::`string'+0x42aae (fffff800`0368c07a)

nt! ?? ::FNODOBFM::`string'+0x42a9d:
fffff800`0368c069 4c8b4108        mov     r8,qword ptr [rcx+8]
fffff800`0368c06d 410fb6c1        movzx   eax,r9b
fffff800`0368c071 4883c428        add     rsp,28h
fffff800`0368c075 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

nt! ?? ::FNODOBFM::`string'+0x42aae:
fffff800`0368c07a 488bca          mov     rcx,rdx
fffff800`0368c07d 4883c428        add     rsp,28h
fffff800`0368c081 e99a1c1500      jmp     nt!IopPoHandleIrp (fffff800`037ddd20)

nt!IofCallDriver:
fffff800`036ed570 4883ec28        sub     rsp,28h
fffff800`036ed574 488b059d6d2200  mov     rax,qword ptr [nt!pIofCallDriver (fffff800`03914318)]
fffff800`036ed57b 4885c0          test    rax,rax
fffff800`036ed57e 0f85b8eaf9ff    jne     nt! ?? ::FNODOBFM::`string'+0x42a70 (fffff800`0368c03c)

nt!IofCallDriver+0x14:
fffff800`036ed584 fe4a43          dec     byte ptr [rdx+43h]
fffff800`036ed587 384243          cmp     byte ptr [rdx+43h],al
fffff800`036ed58a 0f8eb8eaf9ff    jle     nt! ?? ::FNODOBFM::`string'+0x42a7c (fffff800`0368c048)

nt!IofCallDriver+0x20:
fffff800`036ed590 488b82b8000000  mov     rax,qword ptr [rdx+0B8h]
fffff800`036ed597 4883e848        sub     rax,48h
fffff800`036ed59b 488982b8000000  mov     qword ptr [rdx+0B8h],rax
fffff800`036ed5a2 440fb608        movzx   r9d,byte ptr [rax]
fffff800`036ed5a6 48894828        mov     qword ptr [rax+28h],rcx
fffff800`036ed5aa 4180f916        cmp     r9b,16h
fffff800`036ed5ae 0f84a4eaf9ff    je      nt! ?? ::FNODOBFM::`string'+0x42a8c (fffff800`0368c058)

nt!IofCallDriver+0x44:
fffff800`036ed5b4 4c8b4108        mov     r8,qword ptr [rcx+8]
fffff800`036ed5b8 410fb6c1        movzx   eax,r9b
fffff800`036ed5bc 4883c428        add     rsp,28h
fffff800`036ed5c0 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

nt!IopPoHandleIrp:
fffff800`037ddd20 fff3            push    rbx
fffff800`037ddd22 4883ec20        sub     rsp,20h
fffff800`037ddd26 488d542438      lea     rdx,[rsp+38h]
fffff800`037ddd2b 488bd9          mov     rbx,rcx
fffff800`037ddd2e e8ddfeffff      call    nt!PoHandleIrp (fffff800`037ddc10)
fffff800`037ddd33 84c0            test    al,al
fffff800`037ddd35 751d            jne     nt!IopPoHandleIrp+0x34 (fffff800`037ddd54)

nt!IopPoHandleIrp+0x17:
fffff800`037ddd37 488b83b8000000  mov     rax,qword ptr [rbx+0B8h]
fffff800`037ddd3e 488bd3          mov     rdx,rbx
fffff800`037ddd41 488b4828        mov     rcx,qword ptr [rax+28h]
fffff800`037ddd45 440fb600        movzx   r8d,byte ptr [rax]
fffff800`037ddd49 4c8b4908        mov     r9,qword ptr [rcx+8]
fffff800`037ddd4d 43ff54c170      call    qword ptr [r9+r8*8+70h]
fffff800`037ddd52 eb04            jmp     nt!IopPoHandleIrp+0x38 (fffff800`037ddd58)

nt!IopPoHandleIrp+0x34:
fffff800`037ddd54 8b442438        mov     eax,dword ptr [rsp+38h]

nt!IopPoHandleIrp+0x38:
fffff800`037ddd58 4883c420        add     rsp,20h
fffff800`037ddd5c 5b              pop     rbx
fffff800`037ddd5d c3              ret




DRIVERS

Code:
start             end                 module name
fffff880`05f56000 fffff880`05f81000   000      000.fcl      Fri Sep 26 09:11:22 2008 (48DCDF7A)
fffff880`00f19000 fffff880`00f70000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`04114000 fffff880`0419d000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`02ccd000 fffff880`02ce3000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`02c9c000 fffff880`02ca4000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`07671000 fffff880`0767c000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00ddb000 fffff880`00de4000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`04877000 fffff880`0519e000   atikmdag atikmdag.sys Tue Mar 08 23:32:17 2011 (4D7702D1)
fffff880`03e6d000 fffff880`03ebc000   atikmpag atikmpag.sys Tue Mar 08 23:17:42 2011 (4D76FF66)
fffff880`015f8000 fffff880`015ff000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03e20000 fffff880`03e31000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03800000 fffff880`0381e000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`007d0000 fffff960`007f7000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`0105e000 fffff880`01088000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`07773000 fffff880`07780980   cfwids   cfwids.sys   Wed Oct 06 16:00:36 2010 (4CACD564)
fffff880`00d01000 fffff880`00dc1000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01600000 fffff880`01630000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00ca3000 fffff880`00d01000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01418000 fffff880`0148a000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`02cbd000 fffff880`02ccd000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`05c00000 fffff880`05c0e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e02000 fffff880`03e20000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`040b4000 fffff880`040c3000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`019c6000 fffff880`019dc000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`043b3000 fffff880`043d5000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`043db000 fffff880`043e4000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04297000 fffff880`042a3000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`043e4000 fffff880`043f7000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0486b000 fffff880`04877000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03ebc000 fffff880`03fb0000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`0519e000 fffff880`051e4000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`01110000 fffff880`01124000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010c4000 fffff880`01110000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`0149b000 fffff880`014a5000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0198c000 fffff880`019c6000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01848000 fffff880`01892000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`02cb0000 fffff880`02cbd000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03bf5000 fffff800`03c3e000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`04800000 fffff880`04824000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`0431a000 fffff880`04376000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`04852000 fffff880`0486b000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`043f7000 fffff880`043ff080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04844000 fffff880`04852000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`03924000 fffff880`039ed000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01983000 fffff880`0198c000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`00e5c000 fffff880`00e64000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03e57000 fffff880`03e6d000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`02d98000 fffff880`02da7000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`07699000 fffff880`076a7000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bd1000 fffff800`00bdb000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`03fcd000 fffff880`03ff2000   keyscrambler keyscrambler.sys Thu Feb 11 10:04:33 2010 (4B741C81)
fffff880`02db8000 fffff880`02dfb000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`01200000 fffff880`0121b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`0121b000 fffff880`01246000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`043d5000 fffff880`043da200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04824000 fffff880`04837000   L1C62x64 L1C62x64.sys Fri Sep 04 01:39:09 2009 (4AA0A7FD)
fffff880`038f7000 fffff880`0390c000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`038b3000 fffff880`038d6000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c40000 fffff880`00c8f000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`07781000 fffff880`0779cc80   mfeapfk  mfeapfk.sys  Wed Oct 06 15:56:26 2010 (4CACD46A)
fffff880`04200000 fffff880`0422c800   mfeavfk  mfeavfk.sys  Wed Oct 06 15:56:49 2010 (4CACD481)
fffff880`0422d000 fffff880`04296780   mfefirek mfefirek.sys Wed Oct 06 15:59:47 2010 (4CACD533)
fffff880`01124000 fffff880`011a2c80   mfehidk  mfehidk.sys  Wed Oct 06 15:55:49 2010 (4CACD445)
fffff880`041cc000 fffff880`041dc900   mfenlfk  mfenlfk.sys  Wed Oct 06 15:56:13 2010 (4CACD45D)
fffff880`01892000 fffff880`018d5200   mfewfpk  mfewfpk.sys  Wed Oct 06 15:56:04 2010 (4CACD454)
fffff880`03ff2000 fffff880`04000000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`02da7000 fffff880`02db6000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`051e4000 fffff880`051f1000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dc1000 fffff880`00ddb000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`0381e000 fffff880`03836000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03836000 fffff880`03863000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`03863000 fffff880`038b0000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`05e3e000 fffff880`05e62000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`011be000 fffff880`011c9000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f79000 fffff880`00f83000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`040a9000 fffff880`040b4000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01971000 fffff880`01983000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014a5000 fffff880`01598000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`02d07000 fffff880`02d13000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02d13000 fffff880`02d42000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`04305000 fffff880`0431a000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`041dd000 fffff880`041ec000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`040cf000 fffff880`04114000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01598000 fffff880`015f8000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`011c9000 fffff880`011da000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0409d000 fffff880`040a9000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0360b000 fffff800`03bf5000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01255000 fffff880`013f8000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`019f1000 fffff880`019fa000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`041a6000 fffff880`041cc000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`02c7f000 fffff880`02c9c000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00fc3000 fffff880`00fd8000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f83000 fffff880`00fb6000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00fed000 fffff880`00ffd000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0148a000 fffff880`0149b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05e62000 fffff880`05f08000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04376000 fffff880`043b3000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c8f000 fffff880`00ca3000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02ce3000 fffff880`02d07000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`02d42000 fffff880`02d5d000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`02d5d000 fffff880`02d7e000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`02d7e000 fffff880`02d98000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0404c000 fffff880`0409d000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`011a3000 fffff880`011ac000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`011ac000 fffff880`011b5000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`011b5000 fffff880`011be000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01937000 fffff880`01971000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`0390c000 fffff880`03924000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c13000 fffff880`05dfd080   RTKVHD64 RTKVHD64.sys Wed Oct 21 10:27:48 2009 (4ADF1A64)
fffff880`05f08000 fffff880`05f13000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`02ca4000 fffff880`02cb0000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04000000 fffff880`0401d000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0192f000 fffff880`01937000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07600000 fffff880`07671000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`076aa000 fffff880`07742000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`05f81000 fffff880`05feb000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`05f13000 fffff880`05f44000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`02db6000 fffff880`02db7480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01644000 fffff880`01848000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`05f44000 fffff880`05f56000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`018d6000 fffff880`018e3000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`011da000 fffff880`011fc000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`04038000 fffff880`0404c000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00550000 fffff960`0055a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03e31000 fffff880`03e57000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`02c00000 fffff880`02c12000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`0767c000 fffff880`07699000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`05c0e000 fffff880`05c0ff00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`02c6e000 fffff880`02c7f000   usbehci  usbehci.sys  Sat Nov 20 05:43:54 2010 (4CE7A66A)
fffff880`042ab000 fffff880`04305000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`02c18000 fffff880`02c6e000   USBPORT  USBPORT.SYS  Sat Nov 20 05:44:00 2010 (4CE7A670)
fffff880`00de4000 fffff880`00dff000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
fffff880`04837000 fffff880`04844000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fb6000 fffff880`00fc3000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01246000 fffff880`01254000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01088000 fffff880`010ad000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fd8000 fffff880`00fed000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`018e3000 fffff880`0192f000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`0401d000 fffff880`04038000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`010ad000 fffff880`010bd000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e66000 fffff880`00f0a000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f0a000 fffff880`00f19000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0419d000 fffff880`041a6000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003f2000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`00f70000 fffff880`00f79000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`038d6000 fffff880`038f7000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
fffff880`07742000 fffff880`07773000   WUDFRd   WUDFRd.sys   Sat Nov 20 05:43:32 2010 (4CE7A654)

Unloaded modules:
fffff880`03fb0000 fffff880`03fcd000   usbccgp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001D000
fffff880`051f1000 fffff880`051ff000   kbdhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`05f81000 fffff880`05fae000   mfeavfk01.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002D000
fffff880`01630000 fffff880`0163e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019dc000 fffff880`019e8000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`019e8000 fffff880`019f1000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01400000 fffff880`01413000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Apr 25, 2011
Messages
4
Reaction score
0
Hello Cybercore i would like to thank you for your reply because it has provided me with some reasons as to why imay be having the BSOD, but i am yet to update them as im not sure how to go about it, any advice?

i went to Realtek driver website and downloaded a driver installer but after downloading it requested that to download the updates that i purchase it for $30 and i was wondering if there was a safe free alternative because a few free ones don't seem to have a good reputation.

edit: i set windows update to automatically update drivers but when i try to do it manually it says "windows has determined the driver software for your device is up to date" even though i think it may be wrong.
 
Last edited:
Joined
Apr 25, 2011
Messages
4
Reaction score
0
BSOD has started up again after 2-3weeks.

Hello for the past 2-3 weeks my computer hasn't had a BSOD only recently they have been starting up again and its happens 2-3 times each day. i'll try to be more specific with my computer.

Its Windows 7 Home Premium 64 bit
Processor: Intel(R) Core(TM)2 Quad CPU Q8400 @ 2.66GHz 2.67 GHZ
Installed Memory (RAM) 4GB
Video Card: ATI Radeon HD 5700 Series (i recently upgrade to this in march and also the voltage fan so it could be compatible)
Computer is 2 years old got it in March 2009

Any help would be appreciated thanks im thinking of just taking it to the computer shop where i got it from next.
 

Attachments

Last edited:
Joined
Apr 25, 2011
Messages
4
Reaction score
0
Also i'd like to add ive made the connection that just before the BSOD happens my keyboard seems to disconnect/not register and then comes up in the right tray box like its just been plugged in then the BSOD happens. sometimes this happens to the mouse too.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top