BSoD scare... Help very appreciated!!

kdbar

Member
Hey everyone, I just got a BSoD while on a group video chat on tinychat. I would love some help on how to tackle this problem. Thank you very much! Here is all the info I have that may help:

Problem signature:

Problem Event Name: BlueScreen
OS Version: 6.0.6002.2.2.0.768.3
Locale ID: 1033

Additional information about the problem:
BCCode: 1000007e
BCP1: FFFFFFFFC0000005
BCP2: FFFFF8000276EDA5
BCP3: FFFFFA6001D396E8
BCP4: FFFFFA6001D390C0
OS Version: 6_0_6002
Service Pack: 2_0
Product: 768_1

My laptop specs are here:

Toshiba Satellite A305 S6862 15 4 Widescreen Notebook Computer With Intel Core 2 Duo Processor T5750 With Centrino Processor Technology by Office Depot

I've also attached the minidump file.

I'm pretty sure I've updated all my drivers, but then again, I've just used Windows to check and am not sure. Thanks again!

-Sean C.
 

Attachments

  • Mini062610-01.zip
    23.4 KB · Views: 8

My Computer

Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Jonathan\AppData\Local\Temp\Temp1_Mini062610-01.zip\Mini062610-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18209.amd64fre.vistasp2_gdr.100218-0019
Machine Name:
Kernel base = 0xfffff800`0265f000 PsLoadedModuleList = 0xfffff800`02823dd0
Debug session time: Sat Jun 26 20:01:38.901 2010 (UTC - 4:00)
System Uptime: 0 days 4:58:06.303
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff8000276eda5, fffffa6001d396e8, fffffa6001d390c0}

Probably caused by : memory_corruption ( nt!MiLogPageAccess+255 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8000276eda5, The address that the exception occurred at
Arg3: fffffa6001d396e8, Exception Record Address
Arg4: fffffa6001d390c0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MiLogPageAccess+255
fffff800`0276eda5 488901          mov     qword ptr [rcx],rax

EXCEPTION_RECORD:  fffffa6001d396e8 -- (.exr 0xfffffa6001d396e8)
ExceptionAddress: fffff8000276eda5 (nt!MiLogPageAccess+0x0000000000000255)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffffa6001d390c0 -- (.cxr 0xfffffa6001d390c0)
rax=f680000015f00000 rbx=fffb4000000af800 rcx=bfdffdbfdffdbfdf
rdx=fffff680000015f0 rsi=fffff800027ceb90 rdi=fffffa8006d49000
rip=fffff8000276eda5 rsp=fffffa6001d39920 rbp=0000000000000008
 r8=fffffa800950ff00  r9=0000000000000003 r10=0000000000000005
r11=0000000000000569 r12=0000000000000430 r13=0000000000000430
r14=0000000000000000 r15=fffff680000015f0
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
nt!MiLogPageAccess+0x255:
fffff800`0276eda5 488901          mov     qword ptr [rcx],rax ds:002b:bfdffdbf`dffdbfdf=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  lsm.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002886080
 ffffffffffffffff 

FOLLOWUP_IP: 
nt!MiLogPageAccess+255
fffff800`0276eda5 488901          mov     qword ptr [rcx],rax

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff80002756e33 to fffff8000276eda5

STACK_TEXT:  
fffffa60`01d39920 fffff800`02756e33 : fffff700`01080498 c3000000`82623867 00000003`00000000 fffff800`73576d4d : nt!MiLogPageAccess+0x255
fffffa60`01d39980 fffff800`0277ab41 : fffffa80`0950ff00 00000000`00000001 fffffa60`01d39bb0 fffffa60`01d39be0 : nt!MiAgeWorkingSet+0x2d3
fffffa60`01d39b40 fffff800`026622e0 : fffffa80`00000368 00000000`00000002 fffff800`0280f3a8 00000000`00000000 : nt!MiProcessWorkingSets+0x231
fffffa60`01d39bb0 fffff800`026cd0d0 : fffffa80`03cc8b00 00000000`00000001 00000000`00000006 00000000`00000008 : nt! ?? ::FNODOBFM::`string'+0x34af0
fffffa60`01d39c10 fffff800`028c3f87 : fffffa80`03cc8b30 00000000`00000080 00000000`00000000 ffd3fbff`f7beff01 : nt!KeBalanceSetManager+0x120
fffffa60`01d39d50 fffff800`026f6656 : fffff800`027d2680 fffffa80`03cc8b30 fffff800`027d7b80 00000000`00000000 : nt!PspSystemThreadStartup+0x57
fffffa60`01d39d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiLogPageAccess+255

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4b7d238f

STACK_COMMAND:  .cxr 0xfffffa6001d390c0 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x7E_nt!MiLogPageAccess+255

BUCKET_ID:  X64_0x7E_nt!MiLogPageAccess+255

Followup: MachineOwner
---------

0: kd> lmsmn
start             end                 module name
fffffa60`03759000 fffffa60`03768f00   1394BUS  1394BUS.SYS 
fffffa60`00b70000 fffffa60`00bc6000   acpi     acpi.sys    
fffffa60`17791000 fffffa60`1779c000   AegisP   AegisP.sys  
fffffa60`037f1000 fffffa60`037fa000   Afc      Afc.sys     
fffffa60`06645000 fffffa60`066b0000   afd      afd.sys     
fffffa60`02560000 fffffa60`025a4000   aq2dqx27 aq2dqx27.SYS
fffffa60`00d0b000 fffffa60`00d13000   atapi    atapi.sys   
fffffa60`00d13000 fffffa60`00d37000   ataport  ataport.SYS 
fffff960`00840000 fffff960`008a1000   ATMFD    ATMFD.DLL   
fffffa60`00902000 fffffa60`0090e000   BATTC    BATTC.SYS   
fffffa60`17ad7000 fffffa60`17af5000   bowser   bowser.sys  
fffff960`006c0000 fffff960`006d1000   cdd      cdd.dll     
fffffa60`17d90000 fffffa60`17dac000   cdfs     cdfs.sys    
fffffa60`02fe2000 fffffa60`02ffe000   cdrom    cdrom.sys   
fffffa60`006c0000 fffffa60`00772000   CI       CI.dll      
fffffa60`014e6000 fffffa60`01512000   CLASSPNP CLASSPNP.SYS
fffffa60`00663000 fffffa60`006c0000   CLFS     CLFS.SYS    
fffffa60`0253d000 fffffa60`02541580   CmBatt   CmBatt.sys  
fffffa60`00a00000 fffffa60`00a03400   compbatt compbatt.sys
fffffa60`067bf000 fffffa60`067cd000   crashdmp crashdmp.sys
fffffa60`01512000 fffffa60`0151c000   crcdisk  crcdisk.sys 
fffffa60`06751000 fffffa60`0676e000   dfsc     dfsc.sys    
fffffa60`014d2000 fffffa60`014e6000   disk     disk.sys    
fffffa60`038fd000 fffffa60`03920000   drmk     drmk.sys    
fffffa60`02400000 fffffa60`02504000   dump_iaStor dump_iaStor.sys
fffffa60`067cd000 fffffa60`067d9000   Dxapi    Dxapi.sys   
fffffa60`02cb8000 fffffa60`02d9b000   dxgkrnl  dxgkrnl.sys 
fffffa60`17625000 fffffa60`176f7000   eamon    eamon.sys   
fffffa60`014a6000 fffffa60`014d2000   ecache   ecache.sys  
fffffa60`03933000 fffffa60`03956000   ehdrv    ehdrv.sys   
fffffa60`17c9f000 fffffa60`17cbf000   epfwwfpr epfwwfpr.sys
fffffa60`00d88000 fffffa60`00d9c000   fileinfo fileinfo.sys
fffffa60`00d41000 fffffa60`00d88000   fltmgr   fltmgr.sys  
fffffa60`03920000 fffffa60`0392a000   Fs_Rec   Fs_Rec.SYS  
fffffa60`02522000 fffffa60`0252a000   FwLnk    FwLnk.sys   
fffffa60`00fd0000 fffffa60`00ffc000   fwpkclnt fwpkclnt.sys
fffffa60`02553000 fffffa60`02560000   GEARAspiWDM GEARAspiWDM.sys
fffff800`02619000 fffff800`0265f000   hal      hal.dll     
fffffa60`02e07000 fffffa60`02ef4000   HDAudBus HDAudBus.sys
fffffa60`03879000 fffffa60`038c2000   HdAudio  HdAudio.sys 
fffffa60`17dc7000 fffffa60`17dceb80   HIDPARSE HIDPARSE.SYS
fffffa60`17a0b000 fffffa60`17aae000   HTTP     HTTP.sys    
fffffa60`037b5000 fffffa60`037cb000   i8042prt i8042prt.sys
fffffa60`00c07000 fffffa60`00d0b000   iaStor   iaStor.sys  
fffffa60`02600000 fffffa60`02cb7120   igdkmd64 igdkmd64.sys
fffffa60`00988000 fffffa60`00990000   intelide intelide.sys
fffffa60`0252a000 fffffa60`0253d000   intelppm intelppm.sys
fffffa60`037cb000 fffffa60`037d9000   kbdclass kbdclass.sys
fffffa60`0060a000 fffffa60`00614000   kdcom    kdcom.dll   
fffffa60`01598000 fffffa60`015cc000   ks       ks.sys      
fffffa60`00772000 fffffa60`007f9000   ksecdd   ksecdd.sys  
fffffa60`037fa000 fffffa60`037ff180   ksthunk  ksthunk.sys 
fffffa60`1779c000 fffffa60`177b0000   lltdio   lltdio.sys  
fffffa60`17603000 fffffa60`17625000   luafv    luafv.sys   
fffffa60`03200000 fffffa60`03206a00   ManyCam_x64 ManyCam_x64.sys
fffffa60`00614000 fffffa60`0064f000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll
fffffa60`067d9000 fffffa60`067ec000   monitor  monitor.sys 
fffffa60`037db000 fffffa60`037e7000   mouclass mouclass.sys
fffffa60`009a0000 fffffa60`009b3000   mountmgr mountmgr.sys
fffffa60`17af5000 fffffa60`17b0f000   mpsdrv   mpsdrv.sys  
fffffa60`17b0f000 fffffa60`17b36000   mrxdav   mrxdav.sys  
fffffa60`17b36000 fffffa60`17b5f000   mrxsmb   mrxsmb.sys  
fffffa60`17b5f000 fffffa60`17ba8000   mrxsmb10 mrxsmb10.sys
fffffa60`17ba8000 fffffa60`17bc7000   mrxsmb20 mrxsmb20.sys
fffffa60`00d37000 fffffa60`00d41000   msahci   msahci.sys  
fffffa60`0399b000 fffffa60`039a6000   Msfs     Msfs.SYS    
fffffa60`00bc6000 fffffa60`00bd0000   msisadrv msisadrv.sys
fffffa60`025b7000 fffffa60`025f0000   msiscsi  msiscsi.sys 
fffffa60`17ddc000 fffffa60`17dddb80   MSPCLOCK MSPCLOCK.sys
fffffa60`17dda000 fffffa60`17ddba00   MSPQM    MSPQM.sys   
fffffa60`00d9c000 fffffa60`00dec000   msrpc    msrpc.sys   
fffffa60`00e00000 fffffa60`00e0b000   mssmbios mssmbios.sys
fffffa60`01494000 fffffa60`014a6000   mup      mup.sys     
fffffa60`00e0d000 fffffa60`00fd0000   ndis     ndis.sys    
fffffa60`015ef000 fffffa60`015fb000   ndistapi ndistapi.sys
fffffa60`177e4000 fffffa60`177ef000   ndisuio  ndisuio.sys 
fffffa60`013cf000 fffffa60`01400000   ndiswan  ndiswan.sys 
fffffa60`03865000 fffffa60`03879000   NDProxy  NDProxy.SYS 
fffffa60`066ce000 fffffa60`066dd000   netbios  netbios.sys 
fffffa60`06601000 fffffa60`06645000   netbt    netbt.sys   
fffffa60`01007000 fffffa60`01060000   NETIO    NETIO.SYS   
fffffa60`03209000 fffffa60`03747000   NETw5v64 NETw5v64.sys
fffffa60`039a6000 fffffa60`039b7000   Npfs     Npfs.SYS    
fffffa60`06745000 fffffa60`06751000   nsiproxy nsiproxy.sys
fffff800`0265f000 fffff800`02b76000   nt       ntkrnlmp.exe
fffffa60`01206000 fffffa60`01386000   Ntfs     Ntfs.sys    
fffffa60`0392a000 fffffa60`03933000   Null     Null.SYS    
fffffa60`177b0000 fffffa60`177e4000   nwifi    nwifi.sys   
fffffa60`03747000 fffffa60`03758b00   ohci1394 ohci1394.sys
fffffa60`066b0000 fffffa60`066ce000   pacer    pacer.sys   
fffffa60`008ed000 fffffa60`00902000   partmgr  partmgr.sys 
fffffa60`00bd0000 fffffa60`00c00000   pci      pci.sys     
fffffa60`00990000 fffffa60`009a0000   PCIIDEX  PCIIDEX.SYS 
fffffa60`17cbf000 fffffa60`17d75000   peauth   peauth.sys  
fffffa60`038c2000 fffffa60`038fd000   portcls  portcls.sys 
fffffa60`0064f000 fffffa60`00663000   PSHED    PSHED.dll   
fffffa60`039b7000 fffffa60`039c0000   rasacd   rasacd.sys  
fffffa60`015cc000 fffffa60`015ef000   rasl2tp  rasl2tp.sys 
fffffa60`011d6000 fffffa60`011e6000   raspppoe raspppoe.sys
fffffa60`009b3000 fffffa60`009d1000   raspptp  raspptp.sys 
fffffa60`011e6000 fffffa60`011fe000   rassstp  rassstp.sys 
fffffa60`066f8000 fffffa60`06745000   rdbss    rdbss.sys   
fffffa60`03989000 fffffa60`03992000   RDPCDD   RDPCDD.sys  
fffffa60`03992000 fffffa60`0399b000   rdpencdd rdpencdd.sys
fffffa60`03789000 fffffa60`0379e000   rimmpx64 rimmpx64.sys
fffffa60`0379e000 fffffa60`037b5000   rimspx64 rimspx64.sys
fffffa60`02f45000 fffffa60`02f9c000   rixdpx64 rixdpx64.sys
fffffa60`009e1000 fffffa60`009f9000   rspndr   rspndr.sys  
fffffa60`02ef4000 fffffa60`02f45000   Rtlh64   Rtlh64.sys  
fffffa60`00b42000 fffffa60`00b70000   SCSIPORT SCSIPORT.SYS
fffffa60`03769000 fffffa60`03789000   sdbus    sdbus.sys   
fffffa60`17d75000 fffffa60`17d80000   secdrv   secdrv.SYS  
fffffa60`039dd000 fffffa60`039f8000   smb      smb.sys     
fffffa60`0148c000 fffffa60`01494000   spldr    spldr.sys   
fffffa60`176f7000 fffffa60`17791000   spsys    spsys.sys   
[COLOR=Red][B]fffffa60`00a05000 fffffa60`00b39000   sptd     sptd.sys    [/B][/COLOR]
fffffa60`17c0a000 fffffa60`17c9f000   srv      srv.sys     
fffffa60`17bc7000 fffffa60`17bf9000   srv2     srv2.sys    
fffffa60`17aae000 fffffa60`17ad7000   srvnet   srvnet.sys  
fffffa60`0152a000 fffffa60`01587000   storport storport.sys
fffffa60`01587000 fffffa60`01597a80   STREAM   STREAM.SYS  
fffffa60`03207000 fffffa60`03208480   swenum   swenum.sys  
fffffa60`02f9c000 fffffa60`02fe2000   SynTP    SynTP.sys   
fffffa60`01060000 fffffa60`011d6000   tcpip    tcpip.sys   
fffffa60`17d80000 fffffa60`17d90000   tcpipreg tcpipreg.sys
fffffa60`037e7000 fffffa60`037f1000   tdcmdpst tdcmdpst.sys
fffffa60`025f0000 fffffa60`025fd000   TDI      TDI.SYS     
fffffa60`039c0000 fffffa60`039dd000   tdx      tdx.sys     
fffffa60`00dec000 fffffa60`00dff000   termdd   termdd.sys  
fffffa60`01405000 fffffa60`0148c000   tos_sps64 tos_sps64.sys
fffffa60`03853000 fffffa60`03865000   tosporte tosporte.sys
fffffa60`025a4000 fffffa60`025b6980   tosrfcom tosrfcom.sys
fffff960`00400000 fffff960`0040a000   TSDDD    TSDDD.dll   
fffffa60`02519000 fffffa60`02522000   tunmp    tunmp.sys   
fffffa60`0250c000 fffffa60`02519000   tunnel   tunnel.sys  
fffffa60`013ca000 fffffa60`013cee80   TVALZ_O  TVALZ_O.SYS 
fffffa60`009d1000 fffffa60`009e1000   umbus    umbus.sys   
fffffa60`0676e000 fffffa60`0678a000   usbccgp  usbccgp.sys 
fffffa60`037d9000 fffffa60`037dae00   USBD     USBD.SYS    
fffffa60`02542000 fffffa60`02553000   usbehci  usbehci.sys 
fffffa60`0380b000 fffffa60`03853000   usbhub   usbhub.sys  
fffffa60`02db7000 fffffa60`02dfd000   USBPORT  USBPORT.SYS 
fffffa60`02dab000 fffffa60`02db7000   usbuhci  usbuhci.sys 
fffffa60`06795000 fffffa60`067be300   usbvideo usbvideo.sys
fffffa60`0678a000 fffffa60`06795000   UVCFTR_S UVCFTR_S.SYS
fffffa60`03956000 fffffa60`03964000   vga      vga.sys     
fffffa60`03964000 fffffa60`03989000   VIDEOPRT VIDEOPRT.SYS
fffffa60`0090e000 fffffa60`00922000   volmgr   volmgr.sys  
fffffa60`00922000 fffffa60`00988000   volmgrx  volmgrx.sys 
fffffa60`01386000 fffffa60`013ca000   volsnap  volsnap.sys 
fffffa60`066dd000 fffffa60`066f8000   wanarp   wanarp.sys  
fffffa60`02d9b000 fffffa60`02dab000   watchdog watchdog.sys
fffffa60`00805000 fffffa60`008df000   Wdf01000 Wdf01000.sys
fffffa60`008df000 fffffa60`008ed000   WDFLDR   WDFLDR.SYS  
fffff960`00000000 fffff960`002b4000   win32k   win32k.sys  
fffffa60`00b39000 fffffa60`00b42000   WMILIB   WMILIB.SYS  

Unloaded modules:
fffffa60`17db5000 fffffa60`17dc7000   HIDCLASS.SYS
fffffa60`17dac000 fffffa60`17db5000   hidusb.sys
fffffa60`17dcf000 fffffa60`17dda000   mouhid.sys
fffffa60`0151c000 fffffa60`0152a000   crashdmp.sys
fffffa60`02408000 fffffa60`0250c000   dump_iaStor.

If the crashes continue, please enable driver verifier: Using Driver Verifier to identify issues with Drivers - Windows 7 Forums
 

My Computer

System One

  • Manufacturer/Model
    Jonathan King
    CPU
    AMD Athlon Dual Core Processor 4850e overclocked @ 2.92 GHz
    Motherboard
    ASRock A780 FullDisplayPort
    Memory
    6.0GB Dual-Channel DDR2 290MHz Crucial Technology
    Graphics Card(s)
    ATI 3200 (onboard), nVidia 7200 GS (PCIe)
    Sound Card
    Realtek High Definition Audio
    Monitor(s) Displays
    17" Cybervison ds69T, 17" Starlogic
    Screen Resolution
    1024x768
    Hard Drives
    WD 320GB SATA, Hitachi 1TB SATA
    PSU
    Antec ea-430d 430W
    Case
    Antec 300
    Cooling
    stock cpu, 120mm rear, 140mm top
    Keyboard
    Microsoft Wired Desktop 500 (PS/2)
    Mouse
    Microsoft Wired Desktop 500 (USB)
    Internet Speed
    9.32 Mb/s download; 0.36 Mb/s upload
    Other Info
    Other OS's:
    Windows 7 Professional x64, Windows Professional x86, Ubuntu x64
Back
Top