BSOD problems :(

Discussion in 'Crashes, BSODs and Debugging' started by jaguar33, Apr 27, 2011.

  1. jaguar33

    jaguar33

    Joined:
    Apr 27, 2011
    Messages:
    4
    Hey, I've been suffering from very annoying BSODs for a long time now and it's about time I sought some help as I certainly can't solve this alone!

    First, I'll feel I should mention that I'm getting a variety (3 different kinds, maybe?) of BSOD errors so yeah I thought that was relevant. The heading things of the ones I've been getting are "system_service_exception", "IRQL_NOT_LESS_OR_EQUAL" and "BAD_POOL_CALLER". Not sure how helpful that information is or if it's in the mini-dumps anyway but can't hurt to mention.

    I've only attached some of the mini-dump things because of the forums maximum .zip size thingy.

    Any help would be greatly appreciated!

    P.S. I've included what I can remember of my system specs in the control panel thing, for ease of access the motherboard is GA-P35-DS4, the gfxcard is a Radeon 4870 and my processor is a Core 2 Duo E6750. Danke!

    EDIT: Oh wow, I've actually JUST realized that this forum is exclusively for Windows 7.. I found it by googling and didn't bother to read anything but the stickies, I hope someone can still help. :D

    Attached Files:

    Last edited: Apr 27, 2011
    jaguar33, Apr 27, 2011
    #1
  2. jaguar33

    cybercore VIP Member

    Joined:
    Sep 22, 2010
    Messages:
    613
    Location:
    OH Cleveland
    Memory looks alright, at least its settings.
    The most recent crash dump in your archive is of 12/31/2010 -- can you attach more recent crash files?
    cybercore, Apr 28, 2011
    #2
  3. jaguar33

    jaguar33

    Joined:
    Apr 27, 2011
    Messages:
    4
    Here are some more recent ones.

    Attached Files:

    jaguar33, Apr 29, 2011
    #3
  4. jaguar33

    cybercore VIP Member

    Joined:
    Sep 22, 2010
    Messages:
    613
    Location:
    OH Cleveland
    Right, the most recent file in this archive is January 2011. Anyway, update Realtek and Speedfan:

    Realtek LAN
    Rtlh64.sys Tue Sep 26 07:20:23 2006

    Speedfan
    speedfan.sys Sun Sep 24 09:26:48 2006


    If crashes persist, load bios defaults and test your hardware:

    www.memtest.org

    http://www.carrona.org/hddiag.html


    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini010311-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`02447000 PsLoadedModuleList = 0xfffff800`0260bdd0
    Debug session time: Sun Jan  2 23:44:06.395 2011 (UTC - 4:00)
    System Uptime: 0 days 9:33:45.193
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 110b, 2d0005, fffffa8002e19170}
    
    Unable to load image \SystemRoot\System32\drivers\tcpip.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tcpip.sys
    *** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
    GetPointerFromAddress: unable to read from fffff8000266e080
    Probably caused by : tcpip.sys ( tcpip+5d4f9 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 000000000000110b, (reserved)
    Arg3: 00000000002d0005, Memory contents of the pool block
    Arg4: fffffa8002e19170, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    
    POOL_ADDRESS:  fffffa8002e19170 
    
    FREED_POOL_TAG:  TNbl
    
    BUGCHECK_STR:  0xc2_7_TNbl
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  PnkBstrB.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000257a3a5 to fffff800024a1450
    
    STACK_TEXT:  
    fffffa60`01722af8 fffff800`0257a3a5 : 00000000`000000c2 00000000`00000007 00000000`0000110b 00000000`002d0005 : nt!KeBugCheckEx
    fffffa60`01722b00 fffffa60`00e694f9 : 00000000`00000000 fffffa80`02e19190 fffffa80`03047ef0 fffffa60`02a0460a : nt!ExDeferredFreePool+0x90a
    fffffa60`01722bb0 00000000`00000000 : fffffa80`02e19190 fffffa80`03047ef0 fffffa60`02a0460a 00000000`00000001 : tcpip+0x5d4f9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tcpip+5d4f9
    fffffa60`00e694f9 ??              ???
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  tcpip+5d4f9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tcpip
    
    IMAGE_NAME:  tcpip.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b1e9351
    
    FAILURE_BUCKET_ID:  X64_0xc2_7_TNbl_tcpip+5d4f9
    
    BUCKET_ID:  X64_0xc2_7_TNbl_tcpip+5d4f9
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini010311-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`0241c000 PsLoadedModuleList = 0xfffff800`025e0dd0
    Debug session time: Mon Jan  3 17:15:53.408 2011 (UTC - 4:00)
    System Uptime: 0 days 17:30:21.493
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {20, fffffa8002e361f0, fffffa8002e36540, 535e740}
    
    Unable to load image \SystemRoot\System32\drivers\tcpip.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tcpip.sys
    *** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
    Unable to load image Rtlh64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rtlh64.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rtlh64.sys
    Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferListsComplete+f4 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000020, a pool block header size is corrupt.
    Arg2: fffffa8002e361f0, The pool entry we were looking for within the page.
    Arg3: fffffa8002e36540, The next pool entry.
    Arg4: 000000000535e740, (reserved)
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_20
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80002643080
     fffffa8002e361f0 
    
    CUSTOMER_CRASH_COUNT:  2
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000254f46a to fffff80002476450
    
    STACK_TEXT:  
    fffffa60`0171b8c8 fffff800`0254f46a : 00000000`00000019 00000000`00000020 fffffa80`02e361f0 fffffa80`02e36540 : nt!KeBugCheckEx
    fffffa60`0171b8d0 fffffa60`00e7f90f : 00000000`ffffff6a fffff800`02530ca2 fffffa80`01917000 00000000`7ffffa80 : nt!ExDeferredFreePool+0x9e3
    fffffa60`0171b980 00000000`ffffff6a : fffff800`02530ca2 fffffa80`01917000 00000000`7ffffa80 00000000`00000001 : tcpip+0x7990f
    fffffa60`0171b988 fffff800`02530ca2 : fffffa80`01917000 00000000`7ffffa80 00000000`00000001 fffffa80`02e36030 : 0xffffff6a
    fffffa60`0171b990 fffff800`024e86c9 : 00000000`20004000 00000000`00000000 fffffa80`02e36030 00000000`00000001 : nt!EtwpLogKernelEvent+0x202
    fffffa60`0171ba30 fffff800`024e8701 : fffffa80`01c9cc08 fffffa60`0171bbc0 fffffa80`04ab1a20 fffffa60`00c07299 : nt!EtwTraceTimedEvent+0xd9
    fffffa60`0171ba90 fffffa80`02e36030 : fffffa80`02e36130 00000000`00000001 00000000`00000100 fffffa80`02e36030 : nt!PerfInfoLogInterrupt+0x11
    fffffa60`0171baf0 fffffa80`02e36130 : 00000000`00000001 00000000`00000100 fffffa80`02e36030 00000000`00000001 : 0xfffffa80`02e36030
    fffffa60`0171baf8 00000000`00000001 : 00000000`00000100 fffffa80`02e36030 00000000`00000001 fffffa60`02ddd8f0 : 0xfffffa80`02e36130
    fffffa60`0171bb00 00000000`00000100 : fffffa80`02e36030 00000000`00000001 fffffa60`02ddd8f0 00000000`00000000 : 0x1
    fffffa60`0171bb08 fffffa80`02e36030 : 00000000`00000001 fffffa60`02ddd8f0 00000000`00000000 fffffa80`044d51a0 : 0x100
    fffffa60`0171bb10 00000000`00000001 : fffffa60`02ddd8f0 00000000`00000000 fffffa80`044d51a0 fffffa80`04a54b20 : 0xfffffa80`02e36030
    fffffa60`0171bb18 fffffa60`02ddd8f0 : 00000000`00000000 fffffa80`044d51a0 fffffa80`04a54b20 fffff800`0246ea62 : 0x1
    fffffa60`0171bb20 fffffa60`00da924c : fffffa80`044d51a0 fffffa60`00c5d110 00000000`00000001 fffffa60`02a253bf : pacer!PcFilterSendNetBufferListsComplete+0xf4
    fffffa60`0171bb90 fffffa60`02a6966d : fffffa80`044d51a0 fffffa80`02e36030 fffffa80`045d2020 00000000`00000000 : ndis!NdisMSendNetBufferListsComplete+0x7c
    fffffa60`0171bbd0 fffffa80`044d51a0 : fffffa80`02e36030 fffffa80`045d2020 00000000`00000000 00000000`00000000 : Rtlh64+0x766d
    fffffa60`0171bbd8 fffffa80`02e36030 : fffffa80`045d2020 00000000`00000000 00000000`00000000 fffffa80`04445028 : 0xfffffa80`044d51a0
    fffffa60`0171bbe0 fffffa80`045d2020 : 00000000`00000000 00000000`00000000 fffffa80`04445028 fffffa80`044d51a0 : 0xfffffa80`02e36030
    fffffa60`0171bbe8 00000000`00000000 : 00000000`00000000 fffffa80`04445028 fffffa80`044d51a0 00000000`00000000 : 0xfffffa80`045d2020
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    pacer!PcFilterSendNetBufferListsComplete+f4
    fffffa60`02ddd8f0 4c8d5c2450      lea     r11,[rsp+50h]
    
    SYMBOL_STACK_INDEX:  d
    
    SYMBOL_NAME:  pacer!PcFilterSendNetBufferListsComplete+f4
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: pacer
    
    IMAGE_NAME:  pacer.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  49e02de0
    
    FAILURE_BUCKET_ID:  X64_0x19_20_pacer!PcFilterSendNetBufferListsComplete+f4
    
    BUCKET_ID:  X64_0x19_20_pacer!PcFilterSendNetBufferListsComplete+f4
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini010311-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`02447000 PsLoadedModuleList = 0xfffff800`0260bdd0
    Debug session time: Sun Jan  2 23:44:06.395 2011 (UTC - 4:00)
    System Uptime: 0 days 9:33:45.193
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 110b, 2d0005, fffffa8002e19170}
    
    Unable to load image \SystemRoot\System32\drivers\tcpip.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tcpip.sys
    *** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
    GetPointerFromAddress: unable to read from fffff8000266e080
    Probably caused by : tcpip.sys ( tcpip+5d4f9 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 000000000000110b, (reserved)
    Arg3: 00000000002d0005, Memory contents of the pool block
    Arg4: fffffa8002e19170, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    
    POOL_ADDRESS:  fffffa8002e19170 
    
    FREED_POOL_TAG:  TNbl
    
    BUGCHECK_STR:  0xc2_7_TNbl
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  PnkBstrB.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000257a3a5 to fffff800024a1450
    
    STACK_TEXT:  
    fffffa60`01722af8 fffff800`0257a3a5 : 00000000`000000c2 00000000`00000007 00000000`0000110b 00000000`002d0005 : nt!KeBugCheckEx
    fffffa60`01722b00 fffffa60`00e694f9 : 00000000`00000000 fffffa80`02e19190 fffffa80`03047ef0 fffffa60`02a0460a : nt!ExDeferredFreePool+0x90a
    fffffa60`01722bb0 00000000`00000000 : fffffa80`02e19190 fffffa80`03047ef0 fffffa60`02a0460a 00000000`00000001 : tcpip+0x5d4f9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tcpip+5d4f9
    fffffa60`00e694f9 ??              ???
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  tcpip+5d4f9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tcpip
    
    IMAGE_NAME:  tcpip.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b1e9351
    
    FAILURE_BUCKET_ID:  X64_0xc2_7_TNbl_tcpip+5d4f9
    
    BUCKET_ID:  X64_0xc2_7_TNbl_tcpip+5d4f9
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini020211-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`02453000 PsLoadedModuleList = 0xfffff800`02617dd0
    Debug session time: Wed Feb  2 00:13:45.557 2011 (UTC - 4:00)
    System Uptime: 0 days 8:43:58.433
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 1, fffffa6000c0e2e0}
    
    Unable to load image Rtlh64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rtlh64.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rtlh64.sys
    Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferListsComplete+f4 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffffa6000c0e2e0, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000267a080
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    ndis!NdisFSendNetBufferListsComplete+110
    fffffa60`00c0e2e0 498916          mov     qword ptr [r14],rdx
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  chrome.exe
    
    TRAP_FRAME:  fffffa6001721a90 -- (.trap 0xfffffa6001721a90)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa6000d6d0e0
    rdx=fffffa8002e06d60 rsi=0000000000000000 rdi=0000000000000000
    rip=fffffa6000c0e2e0 rsp=fffffa6001721c20 rbp=0000000000000000
     r8=0000000000000001  r9=fffffa8001cd5780 r10=0000000000000090
    r11=fffffa6001721c88 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    ndis!NdisFSendNetBufferListsComplete+0x110:
    fffffa60`00c0e2e0 498916          mov     qword ptr [r14],rdx ds:e62e:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800024ad1ee to fffff800024ad450
    
    STACK_TEXT:  
    fffffa60`01721948 fffff800`024ad1ee : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffffa60`01721950 fffff800`024ac0cb : 00000000`00000001 fffffa80`04a7a010 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x6e
    fffffa60`01721a90 fffffa60`00c0e2e0 : 00000000`00000000 fffff800`024114ef fffffa80`0511b234 fffffa80`0511b1d8 : nt!KiPageFault+0x20b
    fffffa60`01721c20 fffffa60`02de28f0 : 00000000`00000000 fffffa80`044801a0 fffffa80`04a72b20 fffffa80`02e06f70 : ndis!NdisFSendNetBufferListsComplete+0x110
    fffffa60`01721c90 fffffa60`00db024c : fffffa80`044801a0 fffffa60`00c64110 00000000`00000001 fffffa80`04545200 : pacer!PcFilterSendNetBufferListsComplete+0xf4
    fffffa60`01721d00 fffffa60`02c679d7 : 00000000`00000000 fffffa80`01cd5780 00000000`00000000 fffffa80`01cd5780 : ndis!NdisMSendNetBufferListsComplete+0x7c
    fffffa60`01721d40 00000000`00000000 : fffffa80`01cd5780 00000000`00000000 fffffa80`01cd5780 fffffa80`04645b00 : Rtlh64+0x69d7
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    pacer!PcFilterSendNetBufferListsComplete+f4
    fffffa60`02de28f0 4c8d5c2450      lea     r11,[rsp+50h]
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  pacer!PcFilterSendNetBufferListsComplete+f4
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: pacer
    
    IMAGE_NAME:  pacer.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  49e02de0
    
    FAILURE_BUCKET_ID:  X64_0xD1_pacer!PcFilterSendNetBufferListsComplete+f4
    
    BUCKET_ID:  X64_0xD1_pacer!PcFilterSendNetBufferListsComplete+f4
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini010311-03.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`0241c000 PsLoadedModuleList = 0xfffff800`025e0dd0
    Debug session time: Mon Jan  3 17:21:18.093 2011 (UTC - 4:00)
    System Uptime: 0 days 0:04:36.944
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 110b, 0, fffffa8001e49200}
    
    Unable to load image \SystemRoot\System32\drivers\tcpip.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tcpip.sys
    *** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
    GetPointerFromAddress: unable to read from fffff80002643080
    Probably caused by : tcpip.sys ( tcpip+7990f )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 000000000000110b, (reserved)
    Arg3: 0000000000000000, Memory contents of the pool block
    Arg4: fffffa8001e49200, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    
    POOL_ADDRESS:  fffffa8001e49200 
    
    FREED_POOL_TAG:  TNbl
    
    BUGCHECK_STR:  0xc2_7_TNbl
    
    CUSTOMER_CRASH_COUNT:  3
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000254f3a5 to fffff80002476450
    
    STACK_TEXT:  
    fffffa60`01722af8 fffff800`0254f3a5 : 00000000`000000c2 00000000`00000007 00000000`0000110b 00000000`00000000 : nt!KeBugCheckEx
    fffffa60`01722b00 fffffa60`00e7e90f : 00000000`ffffff6a fffffa80`5a6f6d74 fffffa80`044ccf00 fffffa60`02a0860a : nt!ExDeferredFreePool+0x90a
    fffffa60`01722bb0 00000000`ffffff6a : fffffa80`5a6f6d74 fffffa80`044ccf00 fffffa60`02a0860a 00000000`00000001 : tcpip+0x7990f
    fffffa60`01722bb8 fffffa80`5a6f6d74 : fffffa80`044ccf00 fffffa60`02a0860a 00000000`00000001 fffffa80`01e49030 : 0xffffff6a
    fffffa60`01722bc0 fffffa80`044ccf00 : fffffa60`02a0860a 00000000`00000001 fffffa80`01e49030 fffffa80`044b61a0 : 0xfffffa80`5a6f6d74
    fffffa60`01722bc8 fffffa60`02a0860a : 00000000`00000001 fffffa80`01e49030 fffffa80`044b61a0 fffffa60`00b3a8e7 : 0xfffffa80`044ccf00
    fffffa60`01722bd0 fffffa60`02a0d0d5 : fffffa80`00000001 fffffa80`044cc050 00000000`00000000 00000000`00000001 : USBPORT!USBPORT_Xdpc_iSetState+0x3e
    fffffa60`01722c10 fffffa60`02a1f9d6 : fffffa60`00e62460 fffffa80`044cc050 00000000`00000000 fffff800`0254fee3 : USBPORT!USBPORT_ReleaseEpListLock+0x21
    fffffa60`01722c40 fffffa80`04734d70 : 00000000`00000000 fffffa80`01e49030 fffffa80`01e49130 00000000`00000001 : USBPORT!USBPORT_Core_ProcessScatterGatherList+0x4d6
    fffffa60`01722d10 00000000`00000000 : fffffa80`01e49030 fffffa80`01e49130 00000000`00000001 00000000`044ccf00 : 0xfffffa80`04734d70
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tcpip+7990f
    fffffa60`00e7e90f ??              ???
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  tcpip+7990f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tcpip
    
    IMAGE_NAME:  tcpip.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b1e9351
    
    FAILURE_BUCKET_ID:  X64_0xc2_7_TNbl_tcpip+7990f
    
    BUCKET_ID:  X64_0xc2_7_TNbl_tcpip+7990f
    
    Followup: MachineOwner
    ---------
    
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffffa60`02a80000 fffffa60`02a8ff00   1394BUS  1394BUS.SYS  Sat Jan 19 01:34:04 2008 (479199DC)
    fffffa60`008e8000 fffffa60`0093e000   acpi     acpi.sys     Sat Apr 11 01:03:26 2009 (49E0249E)
    fffffa60`02e94000 fffffa60`02eff000   afd      afd.sys      Sat Apr 11 01:44:21 2009 (49E02E35)
    fffffa60`0318b000 fffffa60`03196000   asyncmac asyncmac.sys Sat Jan 19 01:37:27 2008 (47919AA7)
    fffffa60`009d4000 fffffa60`009dc000   atapi    atapi.sys    Sat Apr 11 01:34:19 2009 (49E02BDB)
    fffffa60`009dc000 fffffa60`00a00000   ataport  ataport.SYS  Sat Apr 11 01:34:25 2009 (49E02BE1)
    fffffa60`02d1a000 fffffa60`02d3a000   AtihdLH6 AtihdLH6.sys Wed Nov 17 07:01:27 2010 (4CE3C417)
    fffffa60`02000000 fffffa60`02811000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
    fffffa60`00bb0000 fffffa60`00bfc000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
    fffff960`008f0000 fffff960`00951000   ATMFD    ATMFD.DLL    Mon Jun 15 09:05:59 2009 (4A364737)
    fffffa60`00dd6000 fffffa60`00df4000   bowser   bowser.sys   Sat Jan 19 00:54:51 2008 (479190AB)
    fffff960`006f0000 fffff960`00701000   cdd      cdd.dll      unavailable (00000000)
    fffffa60`006b6000 fffffa60`00768000   CI       CI.dll       Sat Apr 11 03:08:09 2009 (49E041D9)
    fffffa60`00fd3000 fffffa60`00fff000   CLASSPNP CLASSPNP.SYS Sat Apr 11 01:34:15 2009 (49E02BD7)
    fffffa60`00659000 fffffa60`006b6000   CLFS     CLFS.SYS     Sat Apr 11 00:54:21 2009 (49E0227D)
    fffffa60`03024000 fffffa60`03032000   crashdmp crashdmp.sys Sat Apr 11 01:34:31 2009 (49E02BE7)
    fffffa60`00dcc000 fffffa60`00dd6000   crcdisk  crcdisk.sys  Thu Nov 02 05:39:40 2006 (4549BCDC)
    fffffa60`03064000 fffffa60`03067180   dadder   dadder.sys   Thu Aug 02 05:33:03 2007 (46B1A4CF)
    fffffa60`03007000 fffffa60`03024000   dfsc     dfsc.sys     Sat Apr 11 00:54:44 2009 (49E02294)
    fffffa60`011ea000 fffffa60`011fe000   disk     disk.sys     Sat Apr 11 01:34:38 2009 (49E02BEE)
    fffffa60`02d75000 fffffa60`02d98000   drmk     drmk.sys     Sat Jan 19 02:20:04 2008 (4791A4A4)
    fffffa60`0303e000 fffffa60`03046000   dump_atapi dump_atapi.sys Sat Apr 11 01:34:19 2009 (49E02BDB)
    fffffa60`03032000 fffffa60`0303e000   dump_dumpata dump_dumpata.sys Sat Apr 11 01:34:22 2009 (49E02BDE)
    fffffa60`030a7000 fffffa60`030b3000   Dxapi    Dxapi.sys    Sat Jan 19 01:08:00 2008 (479193C0)
    fffffa60`02811000 fffffa60`028f4000   dxgkrnl  dxgkrnl.sys  Thu Sep 24 21:27:15 2009 (4ABC1C73)
    fffffa60`00fa7000 fffffa60`00fd3000   ecache   ecache.sys   Sat Apr 11 01:36:18 2009 (49E02C52)
    fffffa60`02a90000 fffffa60`02a9d000   fdc      fdc.sys      Sat Jan 19 01:28:45 2008 (4791989D)
    fffffa60`00a4d000 fffffa60`00a61000   fileinfo fileinfo.sys Sat Jan 19 01:05:23 2008 (47919323)
    fffffa60`02cfb000 fffffa60`02d06000   flpydisk flpydisk.sys Sat Jan 19 01:28:45 2008 (4791989D)
    fffffa60`00a06000 fffffa60`00a4d000   fltmgr   fltmgr.sys   Sat Apr 11 00:54:38 2009 (49E0228E)
    fffffa60`02de7000 fffffa60`02df1000   Fs_Rec   Fs_Rec.SYS   Sat Jan 19 00:53:41 2008 (47919065)
    fffffa60`00f7b000 fffffa60`00fa7000   fwpkclnt fwpkclnt.sys Sat Apr 11 01:42:44 2009 (49E02DD4)
    fffff800`02934000 fffff800`0297a000   hal      hal.dll      Sat Apr 11 03:04:56 2009 (49E04118)
    fffffa60`02904000 fffffa60`029f1000   HDAudBus HDAudBus.sys Sat Apr 11 01:39:38 2009 (49E02D1A)
    fffffa60`02d9e000 fffffa60`02de7000   HdAudio  HdAudio.sys  Sat Apr 11 01:39:51 2009 (49E02D27)
    fffffa60`03071000 fffffa60`03083000   HIDCLASS HIDCLASS.SYS Sat Apr 11 01:39:32 2009 (49E02D14)
    fffffa60`02be8000 fffffa60`02befb80   HIDPARSE HIDPARSE.SYS Sat Jan 19 01:33:51 2008 (479199CF)
    fffffa60`03068000 fffffa60`03071000   hidusb   hidusb.sys   Sat Apr 11 01:39:32 2009 (49E02D14)
    fffffa60`04e0c000 fffffa60`04eaf000   HTTP     HTTP.sys     Tue Nov 03 15:07:14 2009 (4AF08D72)
    fffffa60`02ae2000 fffffa60`02af8000   i8042prt i8042prt.sys Sat Jan 19 01:28:08 2008 (47919878)
    fffffa60`00b9d000 fffffa60`00bb0000   intelppm intelppm.sys Sat Jan 19 00:52:45 2008 (4791902D)
    fffffa60`02af8000 fffffa60`02b06000   kbdclass kbdclass.sys Sat Jan 19 01:28:05 2008 (47919875)
    fffffa60`00600000 fffffa60`0060a000   kdcom    kdcom.dll    Sat Apr 11 03:07:57 2009 (49E041CD)
    fffffa60`02c64000 fffffa60`02c98000   ks       ks.sys       Sat Apr 11 01:33:51 2009 (49E02BBF)
    fffffa60`00a61000 fffffa60`00ae8000   ksecdd   ksecdd.sys   Mon Jun 15 09:15:18 2009 (4A364966)
    fffffa60`02d98000 fffffa60`02d9d180   ksthunk  ksthunk.sys  Sat Jan 19 01:28:14 2008 (4791987E)
    fffffa60`03196000 fffffa60`031aa000   lltdio   lltdio.sys   Sat Jan 19 01:35:48 2008 (47919A44)
    fffffa60`030c6000 fffffa60`030e8000   luafv    luafv.sys    Sat Jan 19 00:59:06 2008 (479191AA)
    fffffa60`0060a000 fffffa60`00645000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Apr 11 03:05:41 2009 (49E04145)
    fffffa60`030b3000 fffffa60`030c6000   monitor  monitor.sys  Sat Jan 19 01:32:34 2008 (47919982)
    fffffa60`02c56000 fffffa60`02c62000   mouclass mouclass.sys Sat Jan 19 01:28:05 2008 (47919875)
    fffffa60`0309c000 fffffa60`030a7000   mouhid   mouhid.sys   Sat Jan 19 01:28:10 2008 (4791987A)
    fffffa60`009c1000 fffffa60`009d4000   mountmgr mountmgr.sys Sat Jan 19 01:28:01 2008 (47919871)
    fffffa60`02fe4000 fffffa60`02ffe000   mpsdrv   mpsdrv.sys   Sat Jan 19 01:35:28 2008 (47919A30)
    fffffa60`04c0f000 fffffa60`04c38000   mrxsmb   mrxsmb.sys   Fri Dec 04 11:20:18 2009 (4B1936C2)
    fffffa60`04c38000 fffffa60`04c81000   mrxsmb10 mrxsmb10.sys Fri Dec 04 11:20:25 2009 (4B1936C9)
    fffffa60`04c81000 fffffa60`04ca0000   mrxsmb20 mrxsmb20.sys Sat Apr 11 00:55:26 2009 (49E022BE)
    fffffa60`02e37000 fffffa60`02e42000   Msfs     Msfs.SYS     Sat Jan 19 00:53:55 2008 (47919073)
    fffffa60`00947000 fffffa60`00951000   msisadrv msisadrv.sys Sat Jan 19 01:02:50 2008 (4791928A)
    fffffa60`02b06000 fffffa60`02b3f000   msiscsi  msiscsi.sys  Sat Apr 11 01:36:09 2009 (49E02C49)
    fffffa60`00ae8000 fffffa60`00b38000   msrpc    msrpc.sys    Sat Apr 11 01:32:13 2009 (49E02B5D)
    fffffa60`02c98000 fffffa60`02ca3000   mssmbios mssmbios.sys Sat Jan 19 01:02:54 2008 (4791928E)
    fffffa60`011d8000 fffffa60`011ea000   mup      mup.sys      Sat Apr 11 00:54:47 2009 (49E02297)
    fffffa60`00c09000 fffffa60`00dcc000   ndis     ndis.sys     Sat Apr 11 01:43:15 2009 (49E02DF3)
    fffffa60`02bcc000 fffffa60`02bd8000   ndistapi ndistapi.sys Sat Jan 19 01:37:22 2008 (47919AA2)
    fffffa60`007ce000 fffffa60`007ff000   ndiswan  ndiswan.sys  Sat Apr 11 01:43:39 2009 (49E02E0B)
    fffffa60`02d06000 fffffa60`02d1a000   NDProxy  NDProxy.SYS  Sat Jan 19 01:37:26 2008 (47919AA6)
    fffffa60`02f61000 fffffa60`02f70000   netbios  netbios.sys  Sat Jan 19 01:36:35 2008 (47919A73)
    fffffa60`02eff000 fffffa60`02f43000   netbt    netbt.sys    Sat Apr 11 01:42:31 2009 (49E02DC7)
    fffffa60`00b38000 fffffa60`00b91000   NETIO    NETIO.SYS    Sat Apr 11 01:43:34 2009 (49E02E06)
    fffffa60`02e42000 fffffa60`02e53000   Npfs     Npfs.SYS     Sat Apr 11 00:54:22 2009 (49E0227E)
    fffffa60`02fd8000 fffffa60`02fe4000   nsiproxy nsiproxy.sys Sat Jan 19 01:36:45 2008 (47919A7D)
    fffff800`0241c000 fffff800`02934000   nt       ntkrnlmp.exe Tue Dec 08 12:18:34 2009 (4B1E8A6A)
    fffffa60`01005000 fffffa60`01185000   Ntfs     Ntfs.sys     Sat Apr 11 00:55:38 2009 (49E022CA)
    fffffa60`02df1000 fffffa60`02dfa000   Null     Null.SYS     Thu Nov 02 05:37:15 2006 (4549BC4B)
    fffffa60`02a6e000 fffffa60`02a7fb00   ohci1394 ohci1394.sys Sat Apr 11 01:39:49 2009 (49E02D25)
    fffffa60`02f43000 fffffa60`02f61000   pacer    pacer.sys    Sat Apr 11 01:42:56 2009 (49E02DE0)
    fffffa60`02ac6000 fffffa60`02ae2000   parport  parport.sys  Sat Jan 19 01:28:36 2008 (47919894)
    fffffa60`00981000 fffffa60`00996000   partmgr  partmgr.sys  Sat Apr 11 01:34:51 2009 (49E02BFB)
    fffffa60`00951000 fffffa60`00981000   pci      pci.sys      Sat Apr 11 01:03:33 2009 (49E024A5)
    fffffa60`009aa000 fffffa60`009b1000   pciide   pciide.sys   Sat Apr 11 01:34:28 2009 (49E02BE4)
    fffffa60`009b1000 fffffa60`009c1000   PCIIDEX  PCIIDEX.SYS  Sat Apr 11 01:34:22 2009 (49E02BDE)
    fffffa60`04eaf000 fffffa60`04f65000   peauth   peauth.sys   Mon Oct 23 07:57:00 2006 (453CAE0C)
    fffffa60`02d3a000 fffffa60`02d75000   portcls  portcls.sys  Sat Apr 11 01:39:36 2009 (49E02D18)
    fffffa60`00645000 fffffa60`00659000   PSHED    PSHED.dll    Sat Apr 11 03:08:17 2009 (49E041E1)
    fffffa60`02e53000 fffffa60`02e5c000   rasacd   rasacd.sys   Sat Jan 19 01:37:30 2008 (47919AAA)
    fffffa60`02ba9000 fffffa60`02bcc000   rasl2tp  rasl2tp.sys  Sat Apr 11 01:43:37 2009 (49E02E09)
    fffffa60`02bd8000 fffffa60`02be8000   raspppoe raspppoe.sys Sat Apr 11 01:43:33 2009 (49E02E05)
    fffffa60`02c0d000 fffffa60`02c2b000   raspptp  raspptp.sys  Sat Apr 11 01:43:38 2009 (49E02E0A)
    fffffa60`02c2b000 fffffa60`02c43000   rassstp  rassstp.sys  Sat Apr 11 01:43:46 2009 (49E02E12)
    fffffa60`02f8b000 fffffa60`02fd8000   rdbss    rdbss.sys    Sat Apr 11 00:55:21 2009 (49E022B9)
    fffffa60`02e25000 fffffa60`02e2e000   RDPCDD   RDPCDD.sys   Sat Jan 19 01:42:04 2008 (47919BBC)
    fffffa60`02e2e000 fffffa60`02e37000   rdpencdd rdpencdd.sys Sat Jan 19 01:42:03 2008 (47919BBB)
    fffffa60`031aa000 fffffa60`031c2000   rspndr   rspndr.sys   Sat Jan 19 01:35:48 2008 (47919A44)
    fffffa60`02a5d000 fffffa60`02a6e000   Rtlh64   Rtlh64.sys   Tue Sep 26 07:20:23 2006 (45190CF7)
    fffffa60`04f65000 fffffa60`04f70000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffffa60`02aba000 fffffa60`02ac6000   serenum  serenum.sys  Sat Jan 19 01:28:36 2008 (47919894)
    fffffa60`02a9d000 fffffa60`02aba000   serial   serial.sys   Sat Jan 19 01:28:41 2008 (47919899)
    fffffa60`02e79000 fffffa60`02e94000   smb      smb.sys      Sat Apr 11 01:42:19 2009 (49E02DBB)
    fffffa60`011d1000 fffffa60`011d8000   speedfan speedfan.sys Sun Sep 24 09:26:48 2006 (45168798)
    fffffa60`011c9000 fffffa60`011d1000   spldr    spldr.sys    Mon Jan 12 16:51:29 2009 (496BBB61)
    fffffa60`030f1000 fffffa60`0318b000   spsys    spsys.sys    Tue Mar 10 13:16:43 2009 (49B6A07B)
    fffffa60`04cd2000 fffffa60`04d67000   srv      srv.sys      Fri Dec 11 07:04:08 2009 (4B223538)
    fffffa60`04ca0000 fffffa60`04cd2000   srv2     srv2.sys     Mon Sep 14 05:45:22 2009 (4AAE10B2)
    fffffa60`031c2000 fffffa60`031eb000   srvnet   srvnet.sys   Fri Dec 11 07:03:47 2009 (4B223523)
    fffffa60`02b3f000 fffffa60`02b9c000   storport storport.sys Sat Apr 11 01:34:45 2009 (49E02BF5)
    fffffa60`02c62000 fffffa60`02c63480   swenum   swenum.sys   Thu Nov 02 05:37:33 2006 (4549BC5D)
    fffffa60`00e05000 fffffa60`00f7b000   tcpip    tcpip.sys    Tue Dec 08 12:56:33 2009 (4B1E9351)
    fffffa60`04f70000 fffffa60`04f80000   tcpipreg tcpipreg.sys Tue Dec 08 12:55:32 2009 (4B1E9314)
    fffffa60`02b9c000 fffffa60`02ba9000   TDI      TDI.SYS      Sat Apr 11 01:44:14 2009 (49E02E2E)
    fffffa60`02e5c000 fffffa60`02e79000   tdx      tdx.sys      Sat Apr 11 01:43:00 2009 (49E02DE4)
    fffffa60`02c43000 fffffa60`02c56000   termdd   termdd.sys   Sat Apr 11 01:48:13 2009 (49E02F1D)
    fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    Sat Jan 19 01:42:04 2008 (47919BBC)
    fffffa60`00c00000 fffffa60`00c09000   tunmp    tunmp.sys    Sat Jan 19 01:36:30 2008 (47919A6E)
    fffffa60`00b91000 fffffa60`00b9d000   tunnel   tunnel.sys   Sat Jan 19 01:36:44 2008 (47919A7C)
    fffffa60`02ca3000 fffffa60`02cb3000   umbus    umbus.sys    Sat Jan 19 01:34:16 2008 (479199E8)
    fffffa60`03083000 fffffa60`0309b280   usbaudio usbaudio.sys Sat Apr 11 01:39:34 2009 (49E02D16)
    fffffa60`03046000 fffffa60`03062000   usbccgp  usbccgp.sys  Sat Jan 19 01:34:04 2008 (479199DC)
    fffffa60`03062000 fffffa60`03063e00   USBD     USBD.SYS     Sat Jan 19 01:33:53 2008 (479199D1)
    fffffa60`02a4c000 fffffa60`02a5d000   usbehci  usbehci.sys  Sat Apr 11 01:39:36 2009 (49E02D18)
    fffffa60`02cb3000 fffffa60`02cfb000   usbhub   usbhub.sys   Sat Apr 11 01:39:52 2009 (49E02D28)
    fffffa60`02a06000 fffffa60`02a4c000   USBPORT  USBPORT.SYS  Sat Apr 11 01:39:39 2009 (49E02D1B)
    fffffa60`029f1000 fffffa60`029fd000   usbuhci  usbuhci.sys  Sat Jan 19 01:33:56 2008 (479199D4)
    fffffa60`02bf0000 fffffa60`02bfe000   vga      vga.sys      Sat Jan 19 01:32:21 2008 (47919975)
    fffffa60`02e00000 fffffa60`02e25000   VIDEOPRT VIDEOPRT.SYS Sat Jan 19 01:32:25 2008 (47919979)
    fffffa60`00996000 fffffa60`009aa000   volmgr   volmgr.sys   Sat Apr 11 01:34:49 2009 (49E02BF9)
    fffffa60`00768000 fffffa60`007ce000   volmgrx  volmgrx.sys  Sat Apr 11 01:35:14 2009 (49E02C12)
    fffffa60`01185000 fffffa60`011c9000   volsnap  volsnap.sys  Sat Apr 11 01:35:33 2009 (49E02C25)
    fffffa60`02f70000 fffffa60`02f8b000   wanarp   wanarp.sys   Sat Apr 11 01:43:38 2009 (49E02E0A)
    fffffa60`028f4000 fffffa60`02904000   watchdog watchdog.sys Sat Apr 11 01:09:16 2009 (49E025FC)
    fffffa60`00800000 fffffa60`008da000   Wdf01000 Wdf01000.sys Sat Jan 19 01:33:27 2008 (479199B7)
    fffffa60`008da000 fffffa60`008e8000   WDFLDR   WDFLDR.SYS   Sat Jan 19 01:32:33 2008 (47919981)
    fffff960`000c0000 fffff960`00374000   win32k   win32k.sys   Fri Aug 14 09:42:57 2009 (4A8569E1)
    fffffa60`0093e000 fffffa60`00947000   WMILIB   WMILIB.SYS   Sat Jan 19 01:33:45 2008 (479199C9)
    
    Unloaded modules:
    fffffa60`030e8000 fffffa60`030f1000   drmkaud.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffffa60`00dd6000 fffffa60`00de4000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffffa60`00de4000 fffffa60`00df0000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffffa60`00df0000 fffffa60`00df8000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    fffffa60`02c00000 fffffa60`02c0b000   kbdhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    fffffa60`02e0b000 fffffa60`02e27000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001C000
    
    
    cybercore, Apr 29, 2011
    #4
  5. jaguar33

    jaguar33

    Joined:
    Apr 27, 2011
    Messages:
    4
    Hey again,

    Sorry about posting old logs twice, haha, I misinterpreted how the dates were displayed. I've posted the ones for this month and if they aren't I fear for my ability to read.

    I've updated the Realtek LAN driver and since the logs you saw I'd already uninstalled SpeedFan.

    I'll post back soon to say if I've had continued bluescreens. As mentioned some newer logs are attached to this post.

    Attached Files:

    jaguar33, Apr 30, 2011
    #5
  6. jaguar33

    cybercore VIP Member

    Joined:
    Sep 22, 2010
    Messages:
    613
    Location:
    OH Cleveland

    Aha, ha ha, this means I have to read your crash dumps twice - for the wrong reason! Now, do you think it's fun? :)


    ~~~~~~


    ☛ Update the Realtek driver for sure:
    Rtlh64.sys Tue Sep 26 07:20:23 2006


    ☛ Command Prompt > sfc /scannow


    ☛ I see memory access violation in your crash dumps, so let me see your RAM:

    - CPUZ MEMORY tab
    - CPUZ CPU tab
    - PASSMARK RAMMon HTML.zip



    ~~~~~~~~~~~


    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini042511-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`02406000 PsLoadedModuleList = 0xfffff800`025cadd0
    Debug session time: Mon Apr 25 01:25:18.944 2011 (UTC - 4:00)
    System Uptime: 0 days 5:30:42.964
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {20, fffffa8005a3ba20, fffffa8005a3bf90, 457e4a0}
    
    Unable to load image \SystemRoot\System32\drivers\tcpip.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tcpip.sys
    *** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
    Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+137 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000020, a pool block header size is corrupt.
    Arg2: fffffa8005a3ba20, The pool entry we were looking for within the page.
    Arg3: fffffa8005a3bf90, The next pool entry.
    Arg4: 000000000457e4a0, (reserved)
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_20
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff8000262d080
     fffffa8005a3ba20 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000253946a to fffff80002460450
    
    STACK_TEXT:  
    fffff800`03699c88 fffff800`0253946a : 00000000`00000019 00000000`00000020 fffffa80`05a3ba20 fffffa80`05a3bf90 : nt!KeBugCheckEx
    fffff800`03699c90 fffffa60`00e8390f : 00000000`ffffff6a 00000001`00000024 00000000`00000074 fffffa60`7ffffa80 : nt!ExDeferredFreePool+0x9e3
    fffff800`03699d40 00000000`ffffff6a : 00000001`00000024 00000000`00000074 fffffa60`7ffffa80 00000000`00000001 : tcpip+0x7990f
    fffff800`03699d48 00000001`00000024 : 00000000`00000074 fffffa60`7ffffa80 00000000`00000001 fffffa80`05a3b860 : 0xffffff6a
    fffff800`03699d50 00000000`00000074 : fffffa60`7ffffa80 00000000`00000001 fffffa80`05a3b860 fffffa80`045e01a0 : 0x1`00000024
    fffff800`03699d58 fffffa60`7ffffa80 : 00000000`00000001 fffffa80`05a3b860 fffffa80`045e01a0 fffffa60`00b438e7 : 0x74
    fffff800`03699d60 00000000`00000001 : fffffa80`05a3b860 fffffa80`045e01a0 fffffa60`00b438e7 fffffa80`04b74760 : 0xfffffa60`7ffffa80
    fffff800`03699d68 fffffa80`05a3b860 : fffffa80`045e01a0 fffffa60`00b438e7 fffffa80`04b74760 00000000`00000001 : 0x1
    fffff800`03699d70 fffffa80`045e01a0 : fffffa60`00b438e7 fffffa80`04b74760 00000000`00000001 00000000`00000001 : 0xfffffa80`05a3b860
    fffff800`03699d78 fffffa60`00b438e7 : fffffa80`04b74760 00000000`00000001 00000000`00000001 fffffa80`045e0050 : 0xfffffa80`045e01a0
    fffff800`03699d80 fffffa60`00e716dc : fffff800`03699eb0 fffffa80`045e0001 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x137
    fffff800`03699e40 fffff800`03699eb0 : fffffa80`045e0001 00000000`00000000 00000000`00000000 fffffa80`04b741f0 : tcpip+0x676dc
    fffff800`03699e48 fffffa80`045e0001 : 00000000`00000000 00000000`00000000 fffffa80`04b741f0 fffffa60`00c0b299 : 0xfffff800`03699eb0
    fffff800`03699e50 00000000`00000000 : 00000000`00000000 fffffa80`04b741f0 fffffa60`00c0b299 00000000`00000000 : 0xfffffa80`045e0001
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioDereferenceNetBufferListChain+137
    fffffa60`00b438e7 4c8bb42480000000 mov     r14,qword ptr [rsp+80h]
    
    SYMBOL_STACK_INDEX:  a
    
    SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferListChain+137
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  49e02e06
    
    FAILURE_BUCKET_ID:  X64_0x19_20_NETIO!NetioDereferenceNetBufferListChain+137
    
    BUCKET_ID:  X64_0x19_20_NETIO!NetioDereferenceNetBufferListChain+137
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini042411-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`02404000 PsLoadedModuleList = 0xfffff800`025c8dd0
    Debug session time: Sun Apr 24 18:50:23.944 2011 (UTC - 4:00)
    System Uptime: 0 days 0:06:25.850
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {2f, 2, 1, fffff80002468492}
    
    Unable to load image \SystemRoot\System32\drivers\tcpip.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tcpip.sys
    *** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
    Probably caused by : afd.sys ( afd!AfdTLFastDgramSendComplete+50 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 000000000000002f, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002468492, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000262b080
     000000000000002f 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeAcquireInStackQueuedSpinLock+22
    fffff800`02468492 488711          xchg    rdx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  2
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  hl2.exe
    
    TRAP_FRAME:  fffffa600335bbc0 -- (.trap 0xfffffa600335bbc0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=000000000000002f
    rdx=fffffa600335bd80 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002468492 rsp=fffffa600335bd58 rbp=fffffa800533ef30
     r8=fffffa600335bd80  r9=fffffa80046f7780 r10=00000000000000f4
    r11=fffffa600335bf68 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac pe cy
    nt!KeAcquireInStackQueuedSpinLock+0x22:
    fffff800`02468492 488711          xchg    rdx,qword ptr [rcx] ds:0010:00000000`0000002f=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000245e1ee to fffff8000245e450
    
    STACK_TEXT:  
    fffffa60`0335ba78 fffff800`0245e1ee : 00000000`0000000a 00000000`0000002f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffffa60`0335ba80 fffff800`0245d0cb : 00000000`00000001 00000000`00000002 fffffa80`046f7780 ffffffff`ffffffff : nt!KiBugCheckDispatch+0x6e
    fffffa60`0335bbc0 fffff800`02468492 : fffffa60`03040a40 fffffa80`001c0c92 fffff800`02518647 fffffa60`0335ddb0 : nt!KiPageFault+0x20b
    fffffa60`0335bd58 fffffa60`03040a40 : fffffa80`001c0c92 fffff800`02518647 fffffa60`0335ddb0 fffff800`02518647 : nt!KeAcquireInStackQueuedSpinLock+0x22
    fffffa60`0335bd60 fffffa60`00e37510 : 00000000`00000000 00000000`00000000 00000000`00000010 00000000`00000202 : afd!AfdTLFastDgramSendComplete+0x50
    fffffa60`0335bdb0 00000000`00000000 : 00000000`00000000 00000000`00000010 00000000`00000202 fffffa60`0335bde8 : tcpip+0x31510
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    afd!AfdTLFastDgramSendComplete+50
    fffffa60`03040a40 29737c          sub     dword ptr [rbx+7Ch],esi
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  afd!AfdTLFastDgramSendComplete+50
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: afd
    
    IMAGE_NAME:  afd.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  49e02e35
    
    FAILURE_BUCKET_ID:  X64_0xA_afd!AfdTLFastDgramSendComplete+50
    
    BUCKET_ID:  X64_0xA_afd!AfdTLFastDgramSendComplete+50
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini042511-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`02461000 PsLoadedModuleList = 0xfffff800`02625dd0
    Debug session time: Mon Apr 25 03:39:59.884 2011 (UTC - 4:00)
    System Uptime: 0 days 2:13:50.211
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {20, fffffa8002c093b0, fffffa8002c09520, 4179800}
    
    Unable to load image \SystemRoot\System32\drivers\tcpip.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tcpip.sys
    *** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
    Unable to load image \SystemRoot\system32\DRIVERS\Rtlh64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rtlh64.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rtlh64.sys
    Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+137 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000020, a pool block header size is corrupt.
    Arg2: fffffa8002c093b0, The pool entry we were looking for within the page.
    Arg3: fffffa8002c09520, The next pool entry.
    Arg4: 0000000004179800, (reserved)
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_20
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80002688080
     fffffa8002c093b0 
    
    CUSTOMER_CRASH_COUNT:  2
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  PMB.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000259446a to fffff800024bb450
    
    STACK_TEXT:  
    fffffa60`01722af8 fffff800`0259446a : 00000000`00000019 00000000`00000020 fffffa80`02c093b0 fffffa80`02c09520 : nt!KeBugCheckEx
    fffffa60`01722b00 fffffa60`00e8890f : 00000000`ffffff6a fffffa80`5a6f6d74 fffffa80`044caf00 fffffa60`7ffffa80 : nt!ExDeferredFreePool+0x9e3
    fffffa60`01722bb0 00000000`ffffff6a : fffffa80`5a6f6d74 fffffa80`044caf00 fffffa60`7ffffa80 00000000`00000001 : tcpip+0x7990f
    fffffa60`01722bb8 fffffa80`5a6f6d74 : fffffa80`044caf00 fffffa60`7ffffa80 00000000`00000001 fffffa80`02c091f0 : 0xffffff6a
    fffffa60`01722bc0 fffffa80`044caf00 : fffffa60`7ffffa80 00000000`00000001 fffffa80`02c091f0 fffffa80`044c41a0 : 0xfffffa80`5a6f6d74
    fffffa60`01722bc8 fffffa60`7ffffa80 : 00000000`00000001 fffffa80`02c091f0 fffffa80`044c41a0 fffffa60`00b418e7 : 0xfffffa80`044caf00
    fffffa60`01722bd0 00000000`00000001 : fffffa80`02c091f0 fffffa80`044c41a0 fffffa60`00b418e7 fffffa80`04a6bc40 : 0xfffffa60`7ffffa80
    fffffa60`01722bd8 fffffa80`02c091f0 : fffffa80`044c41a0 fffffa60`00b418e7 fffffa80`04a6bc40 00000000`00000001 : 0x1
    fffffa60`01722be0 fffffa80`044c41a0 : fffffa60`00b418e7 fffffa80`04a6bc40 00000000`00000001 00000000`00000001 : 0xfffffa80`02c091f0
    fffffa60`01722be8 fffffa60`00b418e7 : fffffa80`04a6bc40 00000000`00000001 00000000`00000001 fffffa60`0293d0d5 : 0xfffffa80`044c41a0
    fffffa60`01722bf0 fffffa60`00e766dc : fffffa60`01722c78 00000000`00000001 fffffa80`044ca1a0 fffffa80`04d20010 : NETIO!NetioDereferenceNetBufferListChain+0x137
    fffffa60`01722cb0 fffffa60`01722c78 : 00000000`00000001 fffffa80`044ca1a0 fffffa80`04d20010 fffffa80`04a6b6d0 : tcpip+0x676dc
    fffffa60`01722cb8 00000000`00000001 : fffffa80`044ca1a0 fffffa80`04d20010 fffffa80`04a6b6d0 fffffa60`00c11299 : 0xfffffa60`01722c78
    fffffa60`01722cc0 fffffa80`044ca1a0 : fffffa80`04d20010 fffffa80`04a6b6d0 fffffa60`00c11299 fffffa80`044ca050 : 0x1
    fffffa60`01722cc8 fffffa80`04d20010 : fffffa80`04a6b6d0 fffffa60`00c11299 fffffa80`044ca050 00000000`00000000 : 0xfffffa80`044ca1a0
    fffffa60`01722cd0 fffffa80`04a6b6d0 : fffffa60`00c11299 fffffa80`044ca050 00000000`00000000 00000000`00000000 : 0xfffffa80`04d20010
    fffffa60`01722cd8 fffffa60`00c11299 : fffffa80`044ca050 00000000`00000000 00000000`00000000 fffffa80`045b8960 : 0xfffffa80`04a6b6d0
    fffffa60`01722ce0 fffffa60`030ee8f0 : 00000000`00000000 fffffa80`044c41a0 fffffa80`04a68010 fffffa80`05a2a010 : ndis!NdisFSendNetBufferListsComplete+0xc9
    fffffa60`01722d50 fffffa60`00db324c : fffffa80`044c41a0 fffffa60`00c67110 00000000`00000001 fffffa60`029503bf : pacer!PcFilterSendNetBufferListsComplete+0xf4
    fffffa60`01722dc0 fffffa60`0299466d : fffffa80`044c41a0 fffffa80`02c091f0 fffffa80`0459c4a0 fffffa80`044caf00 : ndis!NdisMSendNetBufferListsComplete+0x7c
    fffffa60`01722e00 fffffa80`044c41a0 : fffffa80`02c091f0 fffffa80`0459c4a0 fffffa80`044caf00 fffffa80`01e634d0 : Rtlh64+0x766d
    fffffa60`01722e08 fffffa80`02c091f0 : fffffa80`0459c4a0 fffffa80`044caf00 fffffa80`01e634d0 fffffa80`044ff028 : 0xfffffa80`044c41a0
    fffffa60`01722e10 fffffa80`0459c4a0 : fffffa80`044caf00 fffffa80`01e634d0 fffffa80`044ff028 fffffa80`044c41a0 : 0xfffffa80`02c091f0
    fffffa60`01722e18 fffffa80`044caf00 : fffffa80`01e634d0 fffffa80`044ff028 fffffa80`044c41a0 00000000`00000000 : 0xfffffa80`0459c4a0
    fffffa60`01722e20 fffffa80`01e634d0 : fffffa80`044ff028 fffffa80`044c41a0 00000000`00000000 00000000`00000000 : 0xfffffa80`044caf00
    fffffa60`01722e28 fffffa80`044ff028 : fffffa80`044c41a0 00000000`00000000 00000000`00000000 fffffa80`02b2e4b0 : 0xfffffa80`01e634d0
    fffffa60`01722e30 fffffa80`044c41a0 : 00000000`00000000 00000000`00000000 fffffa80`02b2e4b0 00000000`00000000 : 0xfffffa80`044ff028
    fffffa60`01722e38 00000000`00000000 : 00000000`00000000 fffffa80`02b2e4b0 00000000`00000000 fffffa60`03c75ca0 : 0xfffffa80`044c41a0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioDereferenceNetBufferListChain+137
    fffffa60`00b418e7 4c8bb42480000000 mov     r14,qword ptr [rsp+80h]
    
    SYMBOL_STACK_INDEX:  a
    
    SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferListChain+137
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  49e02e06
    
    FAILURE_BUCKET_ID:  X64_0x19_20_NETIO!NetioDereferenceNetBufferListChain+137
    
    BUCKET_ID:  X64_0x19_20_NETIO!NetioDereferenceNetBufferListChain+137
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini042611-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`02414000 PsLoadedModuleList = 0xfffff800`025d8dd0
    Debug session time: Tue Apr 26 08:34:18.504 2011 (UTC - 4:00)
    System Uptime: 1 days 4:53:00.248
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {20, fffffa800551bf20, fffffa800551c380, 44660e0}
    
    Unable to load image \SystemRoot\System32\drivers\tcpip.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tcpip.sys
    *** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
    Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for atikmdag.sys
    *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
    Unable to load image \SystemRoot\system32\DRIVERS\Rtlh64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rtlh64.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rtlh64.sys
    Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+137 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000020, a pool block header size is corrupt.
    Arg2: fffffa800551bf20, The pool entry we were looking for within the page.
    Arg3: fffffa800551c380, The next pool entry.
    Arg4: 00000000044660e0, (reserved)
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_20
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff8000263b080
     fffffa800551bf20 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  hl2.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000254746a to fffff8000246e450
    
    STACK_TEXT:  
    fffffa60`01722af8 fffff800`0254746a : 00000000`00000019 00000000`00000020 fffffa80`0551bf20 fffffa80`0551c380 : nt!KeBugCheckEx
    fffffa60`01722b00 fffffa60`00e8390f : 00000000`ffffff6a fffffa80`5a6f6d74 fffffa80`044c7f00 fffffa60`7ffffa80 : nt!ExDeferredFreePool+0x9e3
    fffffa60`01722bb0 00000000`ffffff6a : fffffa80`5a6f6d74 fffffa80`044c7f00 fffffa60`7ffffa80 00000000`00000001 : tcpip+0x7990f
    fffffa60`01722bb8 fffffa80`5a6f6d74 : fffffa80`044c7f00 fffffa60`7ffffa80 00000000`00000001 fffffa80`0551bd60 : 0xffffff6a
    fffffa60`01722bc0 fffffa80`044c7f00 : fffffa60`7ffffa80 00000000`00000001 fffffa80`0551bd60 fffffa80`044bd1a0 : 0xfffffa80`5a6f6d74
    fffffa60`01722bc8 fffffa60`7ffffa80 : 00000000`00000001 fffffa80`0551bd60 fffffa80`044bd1a0 fffffa60`00b428e7 : 0xfffffa80`044c7f00
    fffffa60`01722bd0 00000000`00000001 : fffffa80`0551bd60 fffffa80`044bd1a0 fffffa60`00b428e7 fffffa80`04ab3110 : 0xfffffa60`7ffffa80
    fffffa60`01722bd8 fffffa80`0551bd60 : fffffa80`044bd1a0 fffffa60`00b428e7 fffffa80`04ab3110 00000000`00000001 : 0x1
    fffffa60`01722be0 fffffa80`044bd1a0 : fffffa60`00b428e7 fffffa80`04ab3110 00000000`00000001 00000000`00000001 : 0xfffffa80`0551bd60
    fffffa60`01722be8 fffffa60`00b428e7 : fffffa80`04ab3110 00000000`00000001 00000000`00000001 fffffa60`022f04c1 : 0xfffffa80`044bd1a0
    fffffa60`01722bf0 fffffa60`00e716dc : fffffa60`01722c01 fffffa60`022eed01 fffffa60`01722cf4 fffffa80`04ba5180 : NETIO!NetioDereferenceNetBufferListChain+0x137
    fffffa60`01722cb0 fffffa60`01722c01 : fffffa60`022eed01 fffffa60`01722cf4 fffffa80`04ba5180 fffffa80`04b226f0 : tcpip+0x676dc
    fffffa60`01722cb8 fffffa60`022eed01 : fffffa60`01722cf4 fffffa80`04ba5180 fffffa80`04b226f0 fffffa60`00c0a299 : 0xfffffa60`01722c01
    fffffa60`01722cc0 fffffa60`01722cf4 : fffffa80`04ba5180 fffffa80`04b226f0 fffffa60`00c0a299 fffffa80`02b9b5b0 : atikmdag+0xe1d01
    fffffa60`01722cc8 fffffa80`04ba5180 : fffffa80`04b226f0 fffffa60`00c0a299 fffffa80`02b9b5b0 fffff800`0247705a : 0xfffffa60`01722cf4
    fffffa60`01722cd0 fffffa80`04b226f0 : fffffa60`00c0a299 fffffa80`02b9b5b0 fffff800`0247705a 00000000`0000008d : 0xfffffa80`04ba5180
    fffffa60`01722cd8 fffffa60`00c0a299 : fffffa80`02b9b5b0 fffff800`0247705a 00000000`0000008d fffffa60`005ec9d0 : 0xfffffa80`04b226f0
    fffffa60`01722ce0 fffffa60`030fa8f0 : 00000000`00000000 fffffa80`044bd1a0 fffffa80`04ab6010 fffffa60`01722d80 : ndis!NdisFSendNetBufferListsComplete+0xc9
    fffffa60`01722d50 fffffa60`00dac24c : fffffa80`044bd1a0 fffffa60`00c60110 00000000`00000001 fffffa60`022f0035 : pacer!PcFilterSendNetBufferListsComplete+0xf4
    fffffa60`01722dc0 fffffa60`02d5f66d : fffffa80`044bd1a0 fffffa80`0551bd60 fffffa80`04542cc0 fffffa80`0450b000 : ndis!NdisMSendNetBufferListsComplete+0x7c
    fffffa60`01722e00 fffffa80`044bd1a0 : fffffa80`0551bd60 fffffa80`04542cc0 fffffa80`0450b000 fffffa80`01e78890 : Rtlh64+0x766d
    fffffa60`01722e08 fffffa80`0551bd60 : fffffa80`04542cc0 fffffa80`0450b000 fffffa80`01e78890 fffffa80`0450b028 : 0xfffffa80`044bd1a0
    fffffa60`01722e10 fffffa80`04542cc0 : fffffa80`0450b000 fffffa80`01e78890 fffffa80`0450b028 fffffa80`044bd1a0 : 0xfffffa80`0551bd60
    fffffa60`01722e18 fffffa80`0450b000 : fffffa80`01e78890 fffffa80`0450b028 fffffa80`044bd1a0 00000000`00000000 : 0xfffffa80`04542cc0
    fffffa60`01722e20 fffffa80`01e78890 : fffffa80`0450b028 fffffa80`044bd1a0 00000000`00000000 00000000`00000000 : 0xfffffa80`0450b000
    fffffa60`01722e28 fffffa80`0450b028 : fffffa80`044bd1a0 00000000`00000000 00000000`00000000 fffffa80`04598780 : 0xfffffa80`01e78890
    fffffa60`01722e30 fffffa80`044bd1a0 : 00000000`00000000 00000000`00000000 fffffa80`04598780 00000000`00000000 : 0xfffffa80`0450b028
    fffffa60`01722e38 00000000`00000000 : 00000000`00000000 fffffa80`04598780 00000000`00000000 fffffa60`09c82ca0 : 0xfffffa80`044bd1a0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioDereferenceNetBufferListChain+137
    fffffa60`00b428e7 4c8bb42480000000 mov     r14,qword ptr [rsp+80h]
    
    SYMBOL_STACK_INDEX:  a
    
    SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferListChain+137
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  49e02e06
    
    FAILURE_BUCKET_ID:  X64_0x19_20_NETIO!NetioDereferenceNetBufferListChain+137
    
    BUCKET_ID:  X64_0x19_20_NETIO!NetioDereferenceNetBufferListChain+137
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\Mini042711-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6002.18160.amd64fre.vistasp2_gdr.091208-0542
    Machine Name:
    Kernel base = 0xfffff800`02463000 PsLoadedModuleList = 0xfffff800`02627dd0
    Debug session time: Tue Apr 26 22:46:52.180 2011 (UTC - 4:00)
    System Uptime: 0 days 2:32:31.570
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffffa600300d40a, fffffa60059f1be0, 0}
    
    Probably caused by : afd.sys ( afd!AfdTLReleaseIndications+1a )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffffa600300d40a, Address of the instruction which caused the bugcheck
    Arg3: fffffa60059f1be0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    afd!AfdTLReleaseIndications+1a
    fffffa60`0300d40a 488b4108        mov     rax,qword ptr [rcx+8]
    
    CONTEXT:  fffffa60059f1be0 -- (.cxr 0xfffffa60059f1be0)
    rax=fffffa600300f4e0 rbx=00000000ffffffff rcx=0000000000000000
    rdx=fffffa60059f2460 rsi=fffffa8001f0b4e0 rdi=fffffa8004ee4250
    rip=fffffa600300d40a rsp=fffffa60059f2440 rbp=fffffa60059f2ca0
     r8=0000000000000000  r9=0000000000000001 r10=0000000000000000
    r11=00000000045cfa14 r12=fffffa8001e72010 r13=fffffa60059f2a98
    r14=0000000000000000 r15=fffffa60059f2790
    iopl=0         nv up ei ng nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
    afd!AfdTLReleaseIndications+0x1a:
    fffffa60`0300d40a 488b4108        mov     rax,qword ptr [rcx+8] ds:002b:00000000`00000008=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  PMB.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffffa6003040fa6 to fffffa600300d40a
    
    STACK_TEXT:  
    fffffa60`059f2440 fffffa60`03040fa6 : fffffa60`059f2970 00000000`ffffffff fffffa80`04cf2570 00000000`00000000 : afd!AfdTLReleaseIndications+0x1a
    fffffa60`059f2490 fffffa60`0302efe1 : fffffa80`01e72010 fffffa60`059f2790 fffffa60`00000400 fffffa80`04ee4250 : afd!AfdFastConnectionReceive+0x517
    fffffa60`059f26b0 fffff800`0271facc : 00000000`00000400 fffffa60`0302e010 fffffa80`01ee57a0 fffffa80`0203b001 : afd!AfdFastIoDeviceControl+0xfd1
    fffffa60`059f2a10 fffff800`027287a6 : fffffa60`059f2ba8 00000000`0000030c 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x34c
    fffffa60`059f2b40 fffff800`024bcef3 : 00000000`00000000 0000001e`82538d46 00000000`00000000 fffff800`024b5cd6 : nt!NtDeviceIoControlFile+0x56
    fffffa60`059f2bb0 00000000`74da385e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`043ae908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74da385e
    
    
    FOLLOWUP_IP: 
    afd!AfdTLReleaseIndications+1a
    fffffa60`0300d40a 488b4108        mov     rax,qword ptr [rcx+8]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  afd!AfdTLReleaseIndications+1a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: afd
    
    IMAGE_NAME:  afd.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  49e02e35
    
    STACK_COMMAND:  .cxr 0xfffffa60059f1be0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_afd!AfdTLReleaseIndications+1a
    
    BUCKET_ID:  X64_0x3B_afd!AfdTLReleaseIndications+1a
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffffa60`029a7000 fffffa60`029b6f00   1394BUS  1394BUS.SYS  Sat Jan 19 01:34:04 2008 (479199DC)
    fffffa60`008f1000 fffffa60`00947000   acpi     acpi.sys     Sat Apr 11 01:03:26 2009 (49E0249E)
    fffffa60`0300b000 fffffa60`03076000   afd      afd.sys      Sat Apr 11 01:44:21 2009 (49E02E35)
    fffffa60`04cd0000 fffffa60`04cdb000   asyncmac asyncmac.sys Sat Jan 19 01:37:27 2008 (47919AA7)
    fffffa60`009dd000 fffffa60`009e5000   atapi    atapi.sys    Sat Apr 11 01:34:19 2009 (49E02BDB)
    fffffa60`007da000 fffffa60`007fe000   ataport  ataport.SYS  Sat Apr 11 01:34:25 2009 (49E02BE1)
    fffffa60`02e6a000 fffffa60`02e8a000   AtihdLH6 AtihdLH6.sys Wed Nov 17 07:01:27 2010 (4CE3C417)
    fffffa60`02006000 fffffa60`0292d000   atikmdag atikmdag.sys Tue Mar 08 23:32:17 2011 (4D7702D1)
    fffffa60`00b9e000 fffffa60`00bed000   atikmpag atikmpag.sys Tue Mar 08 23:17:42 2011 (4D76FF66)
    fffff960`00880000 fffff960`008e1000   ATMFD    ATMFD.DLL    Mon Jun 15 09:05:59 2009 (4A364737)
    fffffa60`04320000 fffffa60`0433e000   bowser   bowser.sys   Sat Jan 19 00:54:51 2008 (479190AB)
    fffff960`00610000 fffff960`00621000   cdd      cdd.dll      Thu Sep 24 21:26:38 2009 (4ABC1C4E)
    fffffa60`006c2000 fffffa60`00774000   CI       CI.dll       Sat Apr 11 03:08:09 2009 (49E041D9)
    fffffa60`00dc5000 fffffa60`00df1000   CLASSPNP CLASSPNP.SYS Sat Apr 11 01:34:15 2009 (49E02BD7)
    fffffa60`00665000 fffffa60`006c2000   CLFS     CLFS.SYS     Sat Apr 11 00:54:21 2009 (49E0227D)
    fffffa60`03178000 fffffa60`03186000   crashdmp crashdmp.sys Sat Apr 11 01:34:31 2009 (49E02BE7)
    fffffa60`00fd9000 fffffa60`00fe3000   crcdisk  crcdisk.sys  Thu Nov 02 05:39:40 2006 (4549BCDC)
    fffffa60`031d1000 fffffa60`031d4180   dadder   dadder.sys   Thu Aug 02 05:33:03 2007 (46B1A4CF)
    fffffa60`0315b000 fffffa60`03178000   dfsc     dfsc.sys     Sat Apr 11 00:54:44 2009 (49E02294)
    fffffa60`011e7000 fffffa60`011fb000   disk     disk.sys     Sat Apr 11 01:34:38 2009 (49E02BEE)
    fffffa60`02ec5000 fffffa60`02ee8000   drmk     drmk.sys     Sat Jan 19 02:20:04 2008 (4791A4A4)
    fffffa60`03192000 fffffa60`0319a000   dump_atapi dump_atapi.sys Sat Apr 11 01:34:19 2009 (49E02BDB)
    fffffa60`03186000 fffffa60`03192000   dump_dumpata dump_dumpata.sys Sat Apr 11 01:34:22 2009 (49E02BDE)
    fffffa60`02dcc000 fffffa60`02dd8000   Dxapi    Dxapi.sys    Sat Jan 19 01:08:00 2008 (479193C0)
    fffffa60`02a0e000 fffffa60`02af1000   dxgkrnl  dxgkrnl.sys  Thu Sep 24 21:27:15 2009 (4ABC1C73)
    fffffa60`00fad000 fffffa60`00fd9000   ecache   ecache.sys   Sat Apr 11 01:36:18 2009 (49E02C52)
    fffffa60`02d53000 fffffa60`02d5c000   ESLvnic  ESLvnic.sys  Wed Dec 02 06:21:44 2009 (4B164DC8)
    fffffa60`04cdb000 fffffa60`04d90000   ESLWireACD ESLWireACD.sys Wed Mar 09 09:29:14 2011 (4D778EBA)
    fffffa60`02a00000 fffffa60`02a0d000   fdc      fdc.sys      unavailable (00000000)
    fffffa60`00a47000 fffffa60`00a5b000   fileinfo fileinfo.sys Sat Jan 19 01:05:23 2008 (47919323)
    fffffa60`02e4b000 fffffa60`02e56000   flpydisk flpydisk.sys unavailable (00000000)
    fffffa60`00a00000 fffffa60`00a47000   fltmgr   fltmgr.sys   Sat Apr 11 00:54:38 2009 (49E0228E)
    fffffa60`02f53000 fffffa60`02f5d000   Fs_Rec   Fs_Rec.SYS   unavailable (00000000)
    fffffa60`00f81000 fffffa60`00fad000   fwpkclnt fwpkclnt.sys Sat Apr 11 01:42:44 2009 (49E02DD4)
    fffff800`0241d000 fffff800`02463000   hal      hal.dll      Sat Apr 11 03:04:56 2009 (49E04118)
    fffffa60`02b01000 fffffa60`02bee000   HDAudBus HDAudBus.sys Sat Apr 11 01:39:38 2009 (49E02D1A)
    fffffa60`02eee000 fffffa60`02f37000   HdAudio  HdAudio.sys  Sat Apr 11 01:39:51 2009 (49E02D27)
    fffffa60`031de000 fffffa60`031f0000   HIDCLASS HIDCLASS.SYS Sat Apr 11 01:39:32 2009 (49E02D14)
    fffffa60`02f71000 fffffa60`02f78b80   HIDPARSE HIDPARSE.SYS Sat Jan 19 01:33:51 2008 (479199CF)
    fffffa60`031d5000 fffffa60`031de000   hidusb   hidusb.sys   Sat Apr 11 01:39:32 2009 (49E02D14)
    fffffa60`03a0d000 fffffa60`03ab0000   HTTP     HTTP.sys     Tue Nov 03 15:07:14 2009 (4AF08D72)
    fffffa60`009e5000 fffffa60`009fb000   i8042prt i8042prt.sys Sat Jan 19 01:28:08 2008 (47919878)
    fffffa60`00b8b000 fffffa60`00b9e000   intelppm intelppm.sys Sat Jan 19 00:52:45 2008 (4791902D)
    fffffa60`00bed000 fffffa60`00bfb000   kbdclass kbdclass.sys Sat Jan 19 01:28:05 2008 (47919875)
    fffffa60`0060c000 fffffa60`00616000   kdcom    kdcom.dll    Sat Apr 11 03:07:57 2009 (49E041CD)
    fffffa60`02d7d000 fffffa60`02db1000   ks       ks.sys       Sat Apr 11 01:33:51 2009 (49E02BBF)
    fffffa60`00a5b000 fffffa60`00ae2000   ksecdd   ksecdd.sys   Mon Jun 15 09:15:18 2009 (4A364966)
    fffffa60`02ee8000 fffffa60`02eed180   ksthunk  ksthunk.sys  Sat Jan 19 01:28:14 2008 (4791987E)
    fffffa60`042cb000 fffffa60`042df000   lltdio   lltdio.sys   Sat Jan 19 01:35:48 2008 (47919A44)
    fffffa60`04206000 fffffa60`04228000   luafv    luafv.sys    Sat Jan 19 00:59:06 2008 (479191AA)
    fffffa60`00616000 fffffa60`00651000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Apr 11 03:05:41 2009 (49E04145)
    fffffa60`02dd8000 fffffa60`02deb000   monitor  monitor.sys  Sat Jan 19 01:32:34 2008 (47919982)
    fffffa60`02d6f000 fffffa60`02d7b000   mouclass mouclass.sys Sat Jan 19 01:28:05 2008 (47919875)
    fffffa60`031f0000 fffffa60`031fb000   mouhid   mouhid.sys   Sat Jan 19 01:28:10 2008 (4791987A)
    fffffa60`009ca000 fffffa60`009dd000   mountmgr mountmgr.sys Sat Jan 19 01:28:01 2008 (47919871)
    fffffa60`0433e000 fffffa60`04358000   mpsdrv   mpsdrv.sys   Sat Jan 19 01:35:28 2008 (47919A30)
    fffffa60`04358000 fffffa60`04381000   mrxsmb   mrxsmb.sys   Fri Dec 04 11:20:18 2009 (4B1936C2)
    fffffa60`04381000 fffffa60`043ca000   mrxsmb10 mrxsmb10.sys Fri Dec 04 11:20:25 2009 (4B1936C9)
    fffffa60`043ca000 fffffa60`043e9000   mrxsmb20 mrxsmb20.sys Sat Apr 11 00:55:26 2009 (49E022BE)
    fffffa60`02fbe000 fffffa60`02fc9000   Msfs     Msfs.SYS     unavailable (00000000)
    fffffa60`00950000 fffffa60`0095a000   msisadrv msisadrv.sys Sat Jan 19 01:02:50 2008 (4791928A)
    fffffa60`02c0a000 fffffa60`02c43000   msiscsi  msiscsi.sys  Sat Apr 11 01:36:09 2009 (49E02C49)
    fffffa60`00ae2000 fffffa60`00b32000   msrpc    msrpc.sys    unavailable (00000000)
    fffffa60`02db1000 fffffa60`02dbc000   mssmbios mssmbios.sys Sat Jan 19 01:02:54 2008 (4791928E)
    fffffa60`011d5000 fffffa60`011e7000   mup      mup.sys      Sat Apr 11 00:54:47 2009 (49E02297)
    fffffa60`00c02000 fffffa60`00dc5000   ndis     ndis.sys     Sat Apr 11 01:43:15 2009 (49E02DF3)
    fffffa60`02cd0000 fffffa60`02cdc000   ndistapi ndistapi.sys Sat Jan 19 01:37:22 2008 (47919AA2)
    fffffa60`02cdc000 fffffa60`02d0d000   ndiswan  ndiswan.sys  Sat Apr 11 01:43:39 2009 (49E02E0B)
    fffffa60`02e56000 fffffa60`02e6a000   NDProxy  NDProxy.SYS  Sat Jan 19 01:37:26 2008 (47919AA6)
    fffffa60`030d8000 fffffa60`030e7000   netbios  netbios.sys  Sat Jan 19 01:36:35 2008 (47919A73)
    fffffa60`03076000 fffffa60`030ba000   netbt    netbt.sys    Sat Apr 11 01:42:31 2009 (49E02DC7)
    fffffa60`00b32000 fffffa60`00b8b000   NETIO    NETIO.SYS    Sat Apr 11 01:43:34 2009 (49E02E06)
    fffffa60`02fc9000 fffffa60`02fda000   Npfs     Npfs.SYS     Sat Apr 11 00:54:22 2009 (49E0227E)
    fffffa60`0314f000 fffffa60`0315b000   nsiproxy nsiproxy.sys Sat Jan 19 01:36:45 2008 (47919A7D)
    fffff800`02463000 fffff800`0297b000   nt       ntkrnlmp.exe Tue Dec 08 12:18:34 2009 (4B1E8A6A)
    fffffa60`01009000 fffffa60`01189000   Ntfs     Ntfs.sys     Sat Apr 11 00:55:38 2009 (49E022CA)
    fffffa60`02f5d000 fffffa60`02f66000   Null     Null.SYS     unavailable (00000000)
    fffffa60`02995000 fffffa60`029a6b00   ohci1394 ohci1394.sys Sat Apr 11 01:39:49 2009 (49E02D25)
    fffffa60`030ba000 fffffa60`030d8000   pacer    pacer.sys    Sat Apr 11 01:42:56 2009 (49E02DE0)
    fffffa60`029e0000 fffffa60`029fc000   parport  parport.sys  Sat Jan 19 01:28:36 2008 (47919894)
    fffffa60`0098a000 fffffa60`0099f000   partmgr  partmgr.sys  Sat Apr 11 01:34:51 2009 (49E02BFB)
    fffffa60`0095a000 fffffa60`0098a000   pci      pci.sys      Sat Apr 11 01:03:33 2009 (49E024A5)
    fffffa60`009b3000 fffffa60`009ba000   pciide   pciide.sys   Sat Apr 11 01:34:28 2009 (49E02BE4)
    fffffa60`009ba000 fffffa60`009ca000   PCIIDEX  PCIIDEX.SYS  Sat Apr 11 01:34:22 2009 (49E02BDE)
    fffffa60`03ab0000 fffffa60`03b66000   peauth   peauth.sys   Mon Oct 23 07:57:00 2006 (453CAE0C)
    fffffa60`02e8a000 fffffa60`02ec5000   portcls  portcls.sys  Sat Apr 11 01:39:36 2009 (49E02D18)
    fffffa60`00651000 fffffa60`00665000   PSHED    PSHED.dll    Sat Apr 11 03:08:17 2009 (49E041E1)
    fffffa60`03b81000 fffffa60`03b91000   qwavedrv qwavedrv.sys Sat Jan 19 01:37:01 2008 (47919A8D)
    fffffa60`02fda000 fffffa60`02fe3000   rasacd   rasacd.sys   Sat Jan 19 01:37:30 2008 (47919AAA)
    fffffa60`02cad000 fffffa60`02cd0000   rasl2tp  rasl2tp.sys  Sat Apr 11 01:43:37 2009 (49E02E09)
    fffffa60`02d0d000 fffffa60`02d1d000   raspppoe raspppoe.sys Sat Apr 11 01:43:33 2009 (49E02E05)
    fffffa60`02d1d000 fffffa60`02d3b000   raspptp  raspptp.sys  Sat Apr 11 01:43:38 2009 (49E02E0A)
    fffffa60`02d3b000 fffffa60`02d53000   rassstp  rassstp.sys  Sat Apr 11 01:43:46 2009 (49E02E12)
    fffffa60`03102000 fffffa60`0314f000   rdbss    rdbss.sys    Sat Apr 11 00:55:21 2009 (49E022B9)
    fffffa60`02fac000 fffffa60`02fb5000   RDPCDD   RDPCDD.sys   Sat Jan 19 01:42:04 2008 (47919BBC)
    fffffa60`02fb5000 fffffa60`02fbe000   rdpencdd rdpencdd.sys Sat Jan 19 01:42:03 2008 (47919BBB)
    fffffa60`042df000 fffffa60`042f7000   rspndr   rspndr.sys   Sat Jan 19 01:35:48 2008 (47919A44)
    fffffa60`02984000 fffffa60`02995000   Rtlh64   Rtlh64.sys   Tue Sep 26 07:20:23 2006 (45190CF7)
    fffffa60`03b66000 fffffa60`03b71000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffffa60`029d4000 fffffa60`029e0000   serenum  serenum.sys  Sat Jan 19 01:28:36 2008 (47919894)
    fffffa60`029b7000 fffffa60`029d4000   serial   serial.sys   Sat Jan 19 01:28:41 2008 (47919899)
    fffffa60`02f37000 fffffa60`02f52000   smb      smb.sys      Sat Apr 11 01:42:19 2009 (49E02DBB)
    fffffa60`011cd000 fffffa60`011d5000   spldr    spldr.sys    Mon Jan 12 16:51:29 2009 (496BBB61)
    fffffa60`04231000 fffffa60`042cb000   spsys    spsys.sys    Tue Mar 10 13:16:43 2009 (49B6A07B)
    fffffa60`04c3b000 fffffa60`04cd0000   srv      srv.sys      Fri Dec 11 07:04:08 2009 (4B223538)
    fffffa60`04c09000 fffffa60`04c3b000   srv2     srv2.sys     Mon Sep 14 05:45:22 2009 (4AAE10B2)
    fffffa60`042f7000 fffffa60`04320000   srvnet   srvnet.sys   Fri Dec 11 07:03:47 2009 (4B223523)
    fffffa60`02c43000 fffffa60`02ca0000   storport storport.sys Sat Apr 11 01:34:45 2009 (49E02BF5)
    fffffa60`02d7b000 fffffa60`02d7c480   swenum   swenum.sys   Thu Nov 02 05:37:33 2006 (4549BC5D)
    fffffa60`00e0b000 fffffa60`00f81000   tcpip    tcpip.sys    Tue Dec 08 12:56:33 2009 (4B1E9351)
    fffffa60`03b71000 fffffa60`03b81000   tcpipreg tcpipreg.sys Tue Dec 08 12:55:32 2009 (4B1E9314)
    fffffa60`02ca0000 fffffa60`02cad000   TDI      TDI.SYS      Sat Apr 11 01:44:14 2009 (49E02E2E)
    fffffa60`02fe3000 fffffa60`03000000   tdx      tdx.sys      Sat Apr 11 01:43:00 2009 (49E02DE4)
    fffffa60`02d5c000 fffffa60`02d6f000   termdd   termdd.sys   Sat Apr 11 01:48:13 2009 (49E02F1D)
    fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffffa60`00e00000 fffffa60`00e09000   tunmp    tunmp.sys    Sat Jan 19 01:36:30 2008 (47919A6E)
    fffffa60`00df1000 fffffa60`00dfd000   tunnel   tunnel.sys   Sat Jan 19 01:36:44 2008 (47919A7C)
    fffffa60`02dbc000 fffffa60`02dcc000   umbus    umbus.sys    Sat Jan 19 01:34:16 2008 (479199E8)
    fffffa60`031b8000 fffffa60`031d0280   usbaudio usbaudio.sys Sat Apr 11 01:39:34 2009 (49E02D16)
    fffffa60`0319a000 fffffa60`031b6000   usbccgp  usbccgp.sys  Sat Jan 19 01:34:04 2008 (479199DC)
    fffffa60`031b6000 fffffa60`031b7e00   USBD     USBD.SYS     Sat Jan 19 01:33:53 2008 (479199D1)
    fffffa60`02973000 fffffa60`02984000   usbehci  usbehci.sys  Sat Apr 11 01:39:36 2009 (49E02D18)
    fffffa60`02e03000 fffffa60`02e4b000   usbhub   usbhub.sys   Sat Apr 11 01:39:52 2009 (49E02D28)
    fffffa60`0292d000 fffffa60`02973000   USBPORT  USBPORT.SYS  Sat Apr 11 01:39:39 2009 (49E02D1B)
    fffffa60`02bee000 fffffa60`02bfa000   usbuhci  usbuhci.sys  Sat Jan 19 01:33:56 2008 (479199D4)
    fffffa60`02f79000 fffffa60`02f87000   vga      vga.sys      Sat Jan 19 01:32:21 2008 (47919975)
    fffffa60`02f87000 fffffa60`02fac000   VIDEOPRT VIDEOPRT.SYS Sat Jan 19 01:32:25 2008 (47919979)
    fffffa60`0099f000 fffffa60`009b3000   volmgr   volmgr.sys   Sat Apr 11 01:34:49 2009 (49E02BF9)
    fffffa60`00774000 fffffa60`007da000   volmgrx  volmgrx.sys  Sat Apr 11 01:35:14 2009 (49E02C12)
    fffffa60`01189000 fffffa60`011cd000   volsnap  volsnap.sys  Sat Apr 11 01:35:33 2009 (49E02C25)
    fffffa60`030e7000 fffffa60`03102000   wanarp   wanarp.sys   Sat Apr 11 01:43:38 2009 (49E02E0A)
    fffffa60`02af1000 fffffa60`02b01000   watchdog watchdog.sys Sat Apr 11 01:09:16 2009 (49E025FC)
    fffffa60`00809000 fffffa60`008e3000   Wdf01000 Wdf01000.sys Sat Jan 19 01:33:27 2008 (479199B7)
    fffffa60`008e3000 fffffa60`008f1000   WDFLDR   WDFLDR.SYS   Sat Jan 19 01:32:33 2008 (47919981)
    fffff960`000c0000 fffff960`00374000   win32k   win32k.sys   Fri Aug 14 09:42:57 2009 (4A8569E1)
    fffffa60`00947000 fffffa60`00950000   WMILIB   WMILIB.SYS   Sat Jan 19 01:33:45 2008 (479199C9)
    
    Unloaded modules:
    fffffa60`04228000 fffffa60`04231000   drmkaud.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffffa60`00fe3000 fffffa60`00ff1000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffffa60`00ff1000 fffffa60`00ffd000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffffa60`01000000 fffffa60`01008000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    fffffa60`02f66000 fffffa60`02f71000   kbdhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    fffffa60`02f37000 fffffa60`02f53000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001C000
    
    
    cybercore, May 2, 2011
    #6
  7. jaguar33

    jaguar33

    Joined:
    Apr 27, 2011
    Messages:
    4
    I really don't mean to waste your time and I'm very thankful for all of your help, I'm just a bit daft.

    I ran the sfc scan thing you asked me to to, and it said it found no integrity error thingies, I've attached the files you asked for.

    Thanks again for your help, much appreciated!

    Attached Files:

    jaguar33, May 2, 2011
    #7
  8. jaguar33

    cybercore VIP Member

    Joined:
    Sep 22, 2010
    Messages:
    613
    Location:
    OH Cleveland
    From what I see in your screenshots, CPU and RAM are set well. CPU looks alright - @2-2,66, and so does RAM - 2 x CM2X1024-6400 800Mhz 5 5 5 18.

    What I can't see is the memory voltage, sometimes wrong (or slightly insufficient when it's not giving enough "juice") voltage is the problem.

    ~~~~~~

    No integrity violations - GOOD.

    ☛ Update the Realtek LAN driver for sure:
    Rtlh64.sys Tue Sep 26 07:20:23 2006


    ☛ Load bios setup defaults (just in case something's not right in your bios)


    ☛ Run 10 passes of www.memtest.org
    cybercore, May 3, 2011
    #8

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. MsYau
    Replies:
    14
    Views:
    3,366
    saugatdb
    Feb 2, 2009
  2. mediator88

    BSOD followed by USB problems

    mediator88, Sep 18, 2010, in forum: Crashes, BSODs and Debugging
    Replies:
    5
    Views:
    1,213
    TorrentG
    Sep 19, 2010
  3. ajhill

    BSOD problems

    ajhill, Jan 13, 2011, in forum: Crashes, BSODs and Debugging
    Replies:
    9
    Views:
    1,706
    cybercore
    Jan 24, 2011
  4. Doubled904

    BSOD problems.

    Doubled904, Apr 23, 2012, in forum: Crashes, BSODs and Debugging
    Replies:
    2
    Views:
    685
    Doubled904
    Apr 25, 2012
  5. turtle

    Various BSOD Problems

    turtle, Jun 6, 2013, in forum: Windows 7 Support
    Replies:
    2
    Views:
    337
    TrainableMan
    Jun 6, 2013
Loading...

Share This Page