Go Back   Tech Support Forum > Microsoft Support > BSOD, App Crashes And Hangs

User Tag List

[SOLVED] Multiple BSODs

This is a discussion on [SOLVED] Multiple BSODs within the BSOD, App Crashes And Hangs forums, part of the Tech Support Forum category. For the past month or so I have been getting a number of BSODs. It seems kind of random and


Closed Thread
 
Thread Tools Search this Thread
Old 03-06-2013, 08:34 AM   #1
Registered Member
 
Join Date: Mar 2013
Posts: 22
OS: Windows 8.1 64-bit



For the past month or so I have been getting a number of BSODs. It seems kind of random and occurs whenever I type in my internet browser's address bar. The weird thing is that it happens randomly. One moment I could type without worry and the next I get a BSOD. Below, I've posted the results of BlueScreenView. The most concerning at the moment is the last one listed, but most recent error, that popped up when I put my computer in sleep mode. I am not tech-savvy in the least and any help I can get would be appreciated. Thank you in advance for any help that can be provided.

Code:
==================================================
Dump File         : Mini030613-01.dmp
Crash Time        : 3/6/2013 1:41:48 AM
Bug Check String  : DRIVER_IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x000000d1
Parameter 1       : 0x8291001c
Parameter 2       : 0x00000002
Parameter 3       : 0x00000000
Parameter 4       : 0x88a5eedc
Caused By Driver  : hal.dll
Caused By Address : hal.dll+e493
File Description  : Hardware Abstraction Layer DLL
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : 
Stack Address 2   : 
Stack Address 3   : ntkrnlpa.exe+4499a
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030613-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 164,264
==================================================

==================================================
Dump File         : Mini030513-11.dmp
Crash Time        : 3/5/2013 2:44:53 PM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x0000026c
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000001
Parameter 4       : 0x826f5712
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+af712
Stack Address 2   : ntkrnlpa.exe+b1e8a
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-11.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,088
==================================================

==================================================
Dump File         : Mini030513-10.dmp
Crash Time        : 3/5/2013 2:41:22 PM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x886c8916
Parameter 3       : 0x8bbbf87c
Parameter 4       : 0x8bbbf578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-10.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 152,768
==================================================

==================================================
Dump File         : Mini030513-09.dmp
Crash Time        : 3/5/2013 2:36:27 PM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x00000002
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000000
Parameter 4       : 0x826e9515
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+a7515
Stack Address 2   : ntkrnlpa.exe+ac731
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-09.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,440
==================================================

==================================================
Dump File         : Mini030513-08.dmp
Crash Time        : 3/5/2013 9:54:47 AM
Bug Check String  : KERNEL_MODE_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000008e
Parameter 1       : 0xc0000005
Parameter 2       : 0x8287c244
Parameter 3       : 0x803fd800
Parameter 4       : 0x00000000
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+22e244
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+22e244
Stack Address 1   : ntkrnlpa.exe+23a50b
Stack Address 2   : ntkrnlpa.exe+23a5bf
Stack Address 3   : ntkrnlpa.exe+23acb8
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-08.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 152,960
==================================================

==================================================
Dump File         : Mini030513-07.dmp
Crash Time        : 3/5/2013 9:28:04 AM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x00000000
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000001
Parameter 4       : 0x826c97ac
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+af7ac
Stack Address 2   : ntkrnlpa.exe+b1e8a
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-07.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 154,096
==================================================

==================================================
Dump File         : Mini030513-06.dmp
Crash Time        : 3/5/2013 4:46:26 AM
Bug Check String  : PAGE_FAULT_IN_NONPAGED_AREA
Bug Check Code    : 0x00000050
Parameter 1       : 0xa4f33af8
Parameter 2       : 0x00000000
Parameter 3       : 0x886c8d89
Parameter 4       : 0x00000000
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+98339
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+98339
Stack Address 1   : ntkrnlpa.exe+4dd94
Stack Address 2   : 
Stack Address 3   : ntkrnlpa.exe+a5da2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-06.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,008
==================================================

==================================================
Dump File         : Mini030513-05.dmp
Crash Time        : 3/5/2013 4:34:04 AM
Bug Check String  : DRIVER_VERIFIER_IOMANAGER_VIOLATION
Bug Check Code    : 0x000000c9
Parameter 1       : 0x00000004
Parameter 2       : 0x8efee800
Parameter 3       : 0x00000000
Parameter 4       : 0x00000000
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+cdabf
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+cdabf
Stack Address 1   : ntkrnlpa.exe+e308e
Stack Address 2   : ntkrnlpa.exe+44951
Stack Address 3   : ntkrnlpa.exe+23f64c
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-05.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 137,280
==================================================

==================================================
Dump File         : Mini030513-04.dmp
Crash Time        : 3/5/2013 2:40:12 AM
Bug Check String  : DRIVER_VERIFIER_IOMANAGER_VIOLATION
Bug Check Code    : 0x000000c9
Parameter 1       : 0x00000004
Parameter 2       : 0x92c10d98
Parameter 3       : 0x00000000
Parameter 4       : 0x00000000
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+cdabf
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+cdabf
Stack Address 1   : ntkrnlpa.exe+e308e
Stack Address 2   : ntkrnlpa.exe+44951
Stack Address 3   : ntkrnlpa.exe+23f64c
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-04.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 137,280
==================================================

==================================================
Dump File         : Mini030513-03.dmp
Crash Time        : 3/5/2013 1:56:42 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x887ec916
Parameter 3       : 0x8b9bf87c
Parameter 4       : 0x8b9bf578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-03.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,360
==================================================

==================================================
Dump File         : Mini030513-02.dmp
Crash Time        : 3/5/2013 12:23:25 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x8245d598
Parameter 3       : 0x8b9bf858
Parameter 4       : 0x8b9bf554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-02.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,536
==================================================

==================================================
Dump File         : Mini030513-01.dmp
Crash Time        : 3/5/2013 12:20:30 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x82481598
Parameter 3       : 0x8b9d3858
Parameter 4       : 0x8b9d3554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030513-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,376
==================================================

==================================================
Dump File         : Mini030313-05.dmp
Crash Time        : 3/3/2013 8:11:22 PM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x0114fad4
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000001
Parameter 4       : 0x824b2712
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+af712
Stack Address 2   : ntkrnlpa.exe+b1e8a
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030313-05.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 154,240
==================================================

==================================================
Dump File         : Mini030313-04.dmp
Crash Time        : 3/3/2013 7:01:16 PM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x00000066
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000000
Parameter 4       : 0x824a9629
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+a7629
Stack Address 2   : ntkrnlpa.exe+af77e
Stack Address 3   : ntkrnlpa.exe+b1e8a
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030313-04.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 159,808
==================================================

==================================================
Dump File         : Mini030313-03.dmp
Crash Time        : 3/3/2013 2:55:48 PM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x82442598
Parameter 3       : 0xab011858
Parameter 4       : 0xab011554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030313-03.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,376
==================================================

==================================================
Dump File         : Mini030313-02.dmp
Crash Time        : 3/3/2013 2:41:43 PM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x887ec916
Parameter 3       : 0x8b9d787c
Parameter 4       : 0x8b9d7578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030313-02.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,376
==================================================

==================================================
Dump File         : Mini030313-01.dmp
Crash Time        : 3/3/2013 2:38:35 PM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x886f7916
Parameter 3       : 0x8b9bf87c
Parameter 4       : 0x8b9bf578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030313-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,376
==================================================

==================================================
Dump File         : Mini030213-01.dmp
Crash Time        : 3/2/2013 1:21:31 PM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x8866d916
Parameter 3       : 0x8b9d387c
Parameter 4       : 0x8b9d3578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030213-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 158,016
==================================================

==================================================
Dump File         : Mini030113-01.dmp
Crash Time        : 3/1/2013 8:51:03 PM
Bug Check String  : DRIVER_PORTION_MUST_BE_NONPAGED
Bug Check Code    : 0x000000d3
Parameter 1       : 0x814dae10
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000001
Parameter 4       : 0x824b1712
Caused By Driver  : win32k.sys
Caused By Address : win32k.sys+cae10
File Description  : Multi-User Win32 Driver
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6000.16386 (vista_rtm.061101-2205)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+af712
Stack Address 2   : ntkrnlpa.exe+b1e8a
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini030113-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 141,464
==================================================

==================================================
Dump File         : Mini022813-06.dmp
Crash Time        : 2/28/2013 7:27:59 PM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x8247c598
Parameter 3       : 0x8b9cf858
Parameter 4       : 0x8b9cf554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022813-06.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,344
==================================================

==================================================
Dump File         : Mini022813-05.dmp
Crash Time        : 2/28/2013 7:24:36 PM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x82441598
Parameter 3       : 0x8b9bf858
Parameter 4       : 0x8b9bf554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022813-05.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,088
==================================================

==================================================
Dump File         : Mini022813-04.dmp
Crash Time        : 2/28/2013 7:19:30 PM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x889f1916
Parameter 3       : 0x8b9bf87c
Parameter 4       : 0x8b9bf578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022813-04.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,632
==================================================

==================================================
Dump File         : Mini022813-03.dmp
Crash Time        : 2/28/2013 11:35:32 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x8244c598
Parameter 3       : 0x8b9bf858
Parameter 4       : 0x8b9bf554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022813-03.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,248
==================================================

==================================================
Dump File         : Mini022813-02.dmp
Crash Time        : 2/28/2013 11:29:16 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x8244a598
Parameter 3       : 0x8bda3858
Parameter 4       : 0x8bda3554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022813-02.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 156,128
==================================================

==================================================
Dump File         : Mini022813-01.dmp
Crash Time        : 2/28/2013 11:01:30 AM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x000027c0
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000001
Parameter 4       : 0x824b77ac
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+af7ac
Stack Address 2   : ntkrnlpa.exe+b1e8a
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022813-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,920
==================================================

==================================================
Dump File         : Mini022713-06.dmp
Crash Time        : 2/27/2013 3:35:36 PM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x00000000
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000001
Parameter 4       : 0x824f97ac
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+af7ac
Stack Address 2   : ntkrnlpa.exe+b1e8a
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022713-06.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 164,424
==================================================

==================================================
Dump File         : Mini022713-05.dmp
Crash Time        : 2/27/2013 9:23:51 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x88209916
Parameter 3       : 0x8b9c787c
Parameter 4       : 0x8b9c7578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022713-05.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 153,008
==================================================

==================================================
Dump File         : Mini022713-04.dmp
Crash Time        : 2/27/2013 9:21:18 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x82456598
Parameter 3       : 0x8b9d7858
Parameter 4       : 0x8b9d7554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022713-04.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 139,280
==================================================

==================================================
Dump File         : Mini022713-03.dmp
Crash Time        : 2/27/2013 1:35:17 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x87e11916
Parameter 3       : 0x8b9d387c
Parameter 4       : 0x8b9d3578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022713-03.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,272
==================================================

==================================================
Dump File         : Mini022713-02.dmp
Crash Time        : 2/27/2013 1:29:32 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x87e00916
Parameter 3       : 0x8b9cf87c
Parameter 4       : 0x8b9cf578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022713-02.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 155,016
==================================================

==================================================
Dump File         : Mini022713-01.dmp
Crash Time        : 2/27/2013 1:24:53 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x8247e598
Parameter 3       : 0x8bbbf858
Parameter 4       : 0x8bbbf554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022713-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,376
==================================================

==================================================
Dump File         : Mini022613-02.dmp
Crash Time        : 2/26/2013 7:07:42 AM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x00000016
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000000
Parameter 4       : 0x824e8716
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+ac716
Stack Address 2   : 
Stack Address 3   : ntkrnlpa.exe+a5da2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022613-02.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 154,144
==================================================

==================================================
Dump File         : Mini022613-01.dmp
Crash Time        : 2/26/2013 1:45:26 AM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x82453598
Parameter 3       : 0x8b9d3858
Parameter 4       : 0x8b9d3554
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+3e598
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+3e598
Stack Address 1   : ntkrnlpa.exe+3e61c
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022613-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,344
==================================================

==================================================
Dump File         : Mini022413-02.dmp
Crash Time        : 2/24/2013 8:29:23 PM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x00000014
Parameter 2       : 0x00000002
Parameter 3       : 0x00000000
Parameter 4       : 0x824e9022
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+b3022
Stack Address 2   : ntkrnlpa.exe+41c18
Stack Address 3   : ntkrnlpa.exe+84eab
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022413-02.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 152,944
==================================================

==================================================
Dump File         : Mini022413-01.dmp
Crash Time        : 2/24/2013 8:27:13 PM
Bug Check String  : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000007e
Parameter 1       : 0xc0000005
Parameter 2       : 0x87e19916
Parameter 3       : 0x8b9cf87c
Parameter 4       : 0x8b9cf578
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : ntkrnlpa.exe+a5da2
Stack Address 3   : ntkrnlpa.exe+1d5fa2
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini022413-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,376
==================================================

==================================================
Dump File         : Mini021913-01.dmp
Crash Time        : 2/19/2013 10:59:04 AM
Bug Check String  : KERNEL_MODE_EXCEPTION_NOT_HANDLED
Bug Check Code    : 0x1000008e
Parameter 1       : 0xc0000005
Parameter 2       : 0xddd7aeda
Parameter 3       : 0x80dbfc50
Parameter 4       : 0x00000000
Caused By Driver  : win32k.sys
Caused By Address : win32k.sys+ab00
File Description  : Multi-User Win32 Driver
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6000.16386 (vista_rtm.061101-2205)
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : ntkrnlpa.exe+afa26
Stack Address 2   : win32k.sys+c8b7b
Stack Address 3   : win32k.sys+b27d
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini021913-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,376
==================================================

==================================================
Dump File         : Mini021613-01.dmp
Crash Time        : 2/16/2013 10:39:58 AM
Bug Check String  : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x0000000a
Parameter 1       : 0x0000008d
Parameter 2       : 0x0000001b
Parameter 3       : 0x00000001
Parameter 4       : 0x824ed712
Caused By Driver  : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description  : NT Kernel & System
Product Name      : Microsoft® Windows® Operating System
Company           : Microsoft Corporation
File Version      : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor         : 32-bit
Crash Address     : ntkrnlpa.exe+4df99
Stack Address 1   : ntkrnlpa.exe+af712
Stack Address 2   : ntkrnlpa.exe+b1e8a
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini021613-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 160,352
==================================================

==================================================
Dump File         : Mini010108-01.dmp
Crash Time        : 1/1/2008 12:03:26 AM
Bug Check String  : DRIVER_IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x000000d1
Parameter 1       : 0x8290e01c
Parameter 2       : 0x00000002
Parameter 3       : 0x00000000
Parameter 4       : 0x88714edc
Caused By Driver  : 
Caused By Address : 
File Description  : 
Product Name      : 
Company           : 
File Version      : 
Processor         : 32-bit
Crash Address     : 
Stack Address 1   : 
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\Windows\Minidump\Mini010108-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 6002
Dump File Size    : 131,072
==================================================
soulcross19 is offline  
Sponsored Links
Advertisement
 
Old 03-06-2013, 10:33 AM   #2
TSF Team, Emeritus
 
JackBauer_24's Avatar
 
Join Date: Sep 2011
Location: New York, USA
Posts: 5,566
OS: Windows 7 Ultimate 64bit/Ubuntu 14.04 LTS 64bit

My System


Seems that that the Kernal is causing this, but I do not think that it is the NT Kernal it's self causing the BOSD. Go here to disable driver verfier then reboot in normal mode when the next BOSD happens post the report like you did before with BlueScreenView. It might be a driver or malware causing issues with the NT Kernal.

In the mean time I am moving this thread to the BOSD Vista/Windows 7 portion of this forum to better assist you.
__________________

Virus Help
Ubuntu Live CD
PC Running Slow?
Memtest
UBCD
Remember dust buildup in your PC can be a killer!!
JackBauer_24 is offline  
Old 03-08-2013, 10:54 PM   #3
Registered Member
 
Join Date: Mar 2013
Posts: 22
OS: Windows 8.1 64-bit



Thought I'd give an update on my issue. Bizarrely it seems to have resolved itself. For about a week or two I kept getting BSODs with increasing frequency and now after spending days searching for answers and finally deciding to post about my specific problem it has stopped. I don't want to say it's resolved quite yet, but I haven't had a BSOD since my post. Hopefully this keeps up. Thanks for the quick response btw.
soulcross19 is offline  
Sponsored Links
Advertisement
 
Old 03-09-2013, 02:29 AM   #4
Registered Member
 
Join Date: Mar 2013
Posts: 22
OS: Windows 8.1 64-bit



And of course just when I post to say that everything seems to be fine I get this when I attempt to put my computer in sleep mode...

==================================================
Dump File : Mini030913-01.dmp
Crash Time : 3/9/2013 2:24:00 AM
Bug Check String : DRIVER_IRQL_NOT_LESS_OR_EQUAL
Bug Check Code : 0x000000d1
Parameter 1 : 0x8293f000
Parameter 2 : 0x00000002
Parameter 3 : 0x00000000
Parameter 4 : 0x886feeb1
Caused By Driver : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4df99
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+4df99
Stack Address 1 :
Stack Address 2 :
Stack Address 3 : ntkrnlpa.exe+4499a
Computer Name :
Full Path : C:\Windows\Minidump\Mini030913-01.dmp
Processors Count : 4
Major Version : 15
Minor Version : 6002
Dump File Size : 160,376
==================================================

I'm starting to think that fate is messing with me.
soulcross19 is offline  
Old 03-09-2013, 08:15 PM   #5
Registered Member
 
Join Date: Mar 2013
Posts: 22
OS: Windows 8.1 64-bit



And now these popped up...

==================================================
Dump File : Mini030913-02.dmp
Crash Time : 3/9/2013 8:02:06 PM
Bug Check String : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000007e
Parameter 1 : 0xc0000005
Parameter 2 : 0x886bf916
Parameter 3 : 0x8bdd787c
Parameter 4 : 0x8bdd7578
Caused By Driver :
Caused By Address :
File Description :
Product Name :
Company :
File Version :
Processor : 32-bit
Crash Address :
Stack Address 1 :
Stack Address 2 : ntkrnlpa.exe+a5da2
Stack Address 3 : ntkrnlpa.exe+1d5fa2
Computer Name :
Full Path : C:\Windows\Minidump\Mini030913-02.dmp
Processors Count : 4
Major Version : 15
Minor Version : 6002
Dump File Size : 164,416
==================================================
==================================================
Dump File : Mini030913-03.dmp
Crash Time : 3/9/2013 858 PM
Bug Check String : KERNEL_MODE_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000008e
Parameter 1 : 0xc0000005
Parameter 2 : 0x8283cd58
Parameter 3 : 0x8bbd35e4
Parameter 4 : 0x00000000
Caused By Driver : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+23ad58
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18765 (vistasp2_gdr.130104-1437)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+23ad58
Stack Address 1 : ntkrnlpa.exe+23ae4c
Stack Address 2 : ntkrnlpa.exe+21246e
Stack Address 3 : ntkrnlpa.exe+2305de
Computer Name :
Full Path : C:\Windows\Minidump\Mini030913-03.dmp
Processors Count : 4
Major Version : 15
Minor Version : 6002
Dump File Size : 153,088
==================================================
soulcross19 is offline  
Old 03-10-2013, 09:53 AM   #6
TSF Enthusiast
 
Join Date: Jul 2012
Location: Colorado
Posts: 3,036
OS: Windows 7 Home Premium x64

My System


All the information you've sent so far tells us is that you are having problems with Windows and blue screens occurring. The 3rd party analysis software you are using is blaming Windows for the crashes, which usually happens because Windows is unable to flag the actual problem. We have more advanced tools for digging into the stack and checking for software/hardware conflicts on the system.

Please follow the blue screen posting instructions to provide us with the full reports.
https://www.techsupportforum.com/foru...ta-452654.html


-----
writhziden is offline  
Old 03-10-2013, 05:40 PM   #7
Registered Member
 
Join Date: Mar 2013
Posts: 22
OS: Windows 8.1 64-bit



Windows7_Vista_jcgriff2.zip

PERFMON REPORT.zip

Vista
x86
OEM version
Gateway GT5674
soulcross19 is offline  
Old 03-10-2013, 08:23 PM   #8
TSF Enthusiast
 
Join Date: Jul 2012
Location: Colorado
Posts: 3,036
OS: Windows 7 Home Premium x64

My System


I see Norton involved in many of your crashes. I would suggest removing it and replacing it with Microsoft Security Essentials to see if it provides more stability.
Download and run the Norton Removal Tool to uninstall your Norton product.URL

Microsoft Security Essentials - Microsoft Windows

Code:
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput1.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini031013-02.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: c:\symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x8261e000 PsLoadedModuleList = 0x82735c70 
Debug session time: Sun Mar 10 06:59:58.115 2013 (UTC - 6:00) 
System Uptime: 0 days 3:28:59.205 
Loading Kernel Symbols 
............................................................... 
................................................................ 
........................... 
Loading User Symbols 
Loading unloaded module list 
.... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck D1, {8291e01c, 2, 0, 88789edc} 

Probably caused by : acpi.sys ( acpi!ACPIDispatchForwardIrp+2a ) 

Followup: MachineOwner 
--------- 

0: kd> !niemiro.rawstack; q 
0xffffffff`827139a0  0xffffffff`8291e01c nt!$$VProc_ImageExportDirectory+0x1c 
0xffffffff`827139b0  0xffffffff`827139b4 nt!KiDoubleFaultStack+0x29b4 
0xffffffff`827139b4  0xffffffff`82713a38 nt!KiDoubleFaultStack+0x2a38 
0xffffffff`827139f8  0xffffffff`8291e000 nt!$$VProc_ImageExportDirectory+0x0 
0xffffffff`82713a0c  0xffffffff`8261e000 nt!_imp__VidBitBlt  (nt+0x0)+0x0 
0xffffffff`82713a14  0xffffffff`82713a38 nt!KiDoubleFaultStack+0x2a38 
0xffffffff`82713a38  0xffffffff`82713a70 nt!KiDoubleFaultStack+0x2a70 
0xffffffff`82713a68  0xffffffff`80755b02 acpi!AcpiPowerPhase4List+0x2 
0xffffffff`82713a70  0xffffffff`82713a88 nt!KiDoubleFaultStack+0x2a88 
0xffffffff`82713a74  0xffffffff`8266299a nt!IofCallDriver+0x63 
0xffffffff`82713a88  0xffffffff`82713a94 nt!KiDoubleFaultStack+0x2a94 
0xffffffff`82713a8c  0xffffffff`807346c2 acpi!ACPIDispatchForwardIrp+0x2a 
0xffffffff`82713a94  0xffffffff`82713aa8 nt!KiDoubleFaultStack+0x2aa8 
0xffffffff`82713a98  0xffffffff`8073b07a acpi!ACPIIrpDispatchDeviceControl+0xa4 
0xffffffff`82713aa8  0xffffffff`82713ad8 nt!KiDoubleFaultStack+0x2ad8 
0xffffffff`82713aac  0xffffffff`80734f02 acpi!ACPIDispatchIrp+0x19a 
0xffffffff`82713ac4  0xffffffff`82756302 nt!IopTimerLock+0x2 
0xffffffff`82713acc  0xffffffff`826525c2 nt!IoReuseIrp+0x27 
0xffffffff`82713ad4  0xffffffff`807532f4 acpi!AcpiFilterIrpDispatch+0x0 
0xffffffff`82713ad8  0xffffffff`82713af0 nt!KiDoubleFaultStack+0x2af0 
0xffffffff`82713adc  0xffffffff`8266299a nt!IofCallDriver+0x63 
0xffffffff`82713af0  0xffffffff`82713b04 nt!KiDoubleFaultStack+0x2b04 
0xffffffff`82713af4  0xffffffff`8b1ac8b9 CLASSPNP!SubmitTransferPacket+0x106 
0xffffffff`82713b04  0xffffffff`82713b44 nt!KiDoubleFaultStack+0x2b44 
0xffffffff`82713b08  0xffffffff`8b1abf8f CLASSPNP!ServiceTransferRequest+0x224 
0xffffffff`82713b10  0xffffffff`82713b94 nt!KiDoubleFaultStack+0x2b94 
0xffffffff`82713b44  0xffffffff`82713b58 nt!KiDoubleFaultStack+0x2b58 
0xffffffff`82713b48  0xffffffff`8b1ae6de CLASSPNP!ClasspServiceIdleRequest+0x21 
0xffffffff`82713b58  0xffffffff`82713b68 nt!KiDoubleFaultStack+0x2b68 
0xffffffff`82713b5c  0xffffffff`8b1aeab8 CLASSPNP!ClasspIdleTimerDpc+0x6d 
0xffffffff`82713b64  0xffffffff`82713c50 nt!KiDoubleFaultStack+0x2c50 
0xffffffff`82713b68  0xffffffff`82713c88 nt!KiDoubleFaultStack+0x2c88 
0xffffffff`82713b6c  0xffffffff`826c826b nt!KiTimerListExpire+0x367 
0xffffffff`82713b80  0xffffffff`8271c860 nt!KiTimerTableListHead+0x1ce0 
0xffffffff`82713b88  0xffffffff`82716e30 nt!KiInitialPCR+0x630 
0xffffffff`82713b94  0xffffffff`8b1aea4b CLASSPNP!ClasspIdleTimerDpc+0x0 
0xffffffff`82713ba0  0xffffffff`82665602 nt!ExfInterlockedPopEntryList+0x12 
0xffffffff`82713bac  0xffffffff`82756902 nt!KiTimerTableLock+0x402 
0xffffffff`82713bb0  0xffffffff`82713bc0 nt!KiDoubleFaultStack+0x2bc0 
0xffffffff`82713bc0  0xffffffff`82713bf8 nt!KiDoubleFaultStack+0x2bf8 
0xffffffff`82713bc8  0xffffffff`82716e58 nt!KiInitialPCR+0x658 
0xffffffff`82713bd8  0xffffffff`82713c08 nt!KiDoubleFaultStack+0x2c08 
0xffffffff`82713be0  0xffffffff`82663572 nt!READ_REGISTER_ULONG+0x6 
0xffffffff`82713bec  0xffffffff`829e197f hal!HalpQueryHpetCount+0x4b 
0xffffffff`82713c08  0xffffffff`82713c10 nt!KiDoubleFaultStack+0x2c10 
0xffffffff`82713c0c  0xffffffff`829e1dc1 hal!HalpHpetQueryPerformanceCounter+0x1d 
0xffffffff`82713c10  0xffffffff`82713c48 nt!KiDoubleFaultStack+0x2c48 
0xffffffff`82713c14  0xffffffff`82662eb5 nt!EtwpGetPerfCounter+0x8 
0xffffffff`82713c1c  0xffffffff`826c94b0 nt!EtwpReserveTraceBuffer+0xce 
0xffffffff`82713c34  0xffffffff`826cf851 nt!KiFlushTargetMultipleRangeTb+0x3e 
0xffffffff`82713c38  0xffffffff`82716920 nt!KiInitialPCR+0x120 
0xffffffff`82713c3c  0xffffffff`82713c74 nt!KiDoubleFaultStack+0x2c74 
0xffffffff`82713c40  0xffffffff`826c8f2c nt!KiIpiServiceRoutine+0x64 
0xffffffff`82713c74  0xffffffff`82716920 nt!KiInitialPCR+0x120 
0xffffffff`82713c78  0xffffffff`82716920 nt!KiInitialPCR+0x120 
0xffffffff`82713c88  0xffffffff`82713ce8 nt!KiDoubleFaultStack+0x2ce8 
0xffffffff`82713c8c  0xffffffff`826c7ea1 nt!KiTimerExpiration+0x2a0 
0xffffffff`82713c90  0xffffffff`82713cd0 nt!KiDoubleFaultStack+0x2cd0 
0xffffffff`82713c98  0xffffffff`82713cd8 nt!KiDoubleFaultStack+0x2cd8 
0xffffffff`82713ca0  0xffffffff`82716920 nt!KiInitialPCR+0x120 
0xffffffff`82713ca4  0xffffffff`82718300 nt!KiInitialPCR+0x1b00 
0xffffffff`82713ccc  0xffffffff`82716920 nt!KiInitialPCR+0x120 
0xffffffff`82713cd0  0xffffffff`82713cd0 nt!KiDoubleFaultStack+0x2cd0 
0xffffffff`82713cd4  0xffffffff`82713cd0 nt!KiDoubleFaultStack+0x2cd0 
0xffffffff`82713ce8  0xffffffff`82713d50 nt!KiDoubleFaultStack+0x2d50 
0xffffffff`82713cec  0xffffffff`826c8595 nt!KiRetireDpcList+0xba 
0xffffffff`82713d04  0xffffffff`8271a640 nt!KiInitialThread+0x0 
0xffffffff`82713d08  0xffffffff`82716800 nt!KiInitialPCR+0x0 
0xffffffff`82713d0c  0xffffffff`8271a640 nt!KiInitialThread+0x0 
0xffffffff`82713d54  0xffffffff`826c67dd nt!KiIdleLoop+0x49 
0xffffffff`82713dc0  0xffffffff`8265cef8 nt!KiThreadStartup+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput2.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini031013-01.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: srv*c:\symbols*https://msdl.microsoft.com/download/symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x8260c000 PsLoadedModuleList = 0x82723c70 
Debug session time: Sun Mar 10 03:30:10.760 2013 (UTC - 6:00) 
System Uptime: 0 days 5:23:50.460 
Loading Kernel Symbols 
............................................................... 
................................................................ 
.......................... 
Loading User Symbols 
Loading unloaded module list 
............... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck 1000007E, {c0000005, 8264a598, 8bbbf858, 8bbbf554} 

Probably caused by : ntkrpamp.exe ( nt!RtlImageNtHeaderEx+45 ) 

Followup: MachineOwner 
--------- 

3: kd> !niemiro.rawstack; q 
0xffffffff`8bbbf074  0xffffffff`8264a598 nt!RtlImageNtHeaderEx+0x45 
0xffffffff`8bbbf07c  0xffffffff`8270c200 nt!KiHardwareTrigger+0x0 
0xffffffff`8bbbf088  0xffffffff`826d9abf nt!KeBugCheckEx+0x1e 
0xffffffff`8bbbf2a4  0xffffffff`82744301 nt!IopTimerLock+0x1 
0xffffffff`8bbbf2ac  0xffffffff`829cd70c hal!KfLowerIrql+0x64 
0xffffffff`8bbbf2b4  0xffffffff`82744301 nt!IopTimerLock+0x1 
0xffffffff`8bbbf2bc  0xffffffff`826b416f nt!KiExitDispatcher+0x1db 
0xffffffff`8bbbf2d0  0xffffffff`8a8ab89e storport!RaidAdapterPostScatterGatherExecute+0x17a 
0xffffffff`8bbbf2f4  0xffffffff`826b879b nt!KeSetEvent+0xd4 
0xffffffff`8bbbf30c  0xffffffff`826be60c nt!IopFreeIrp+0xdc 
0xffffffff`8bbbf320  0xffffffff`826bf583 nt!IopCompleteRequest+0x40e 
0xffffffff`8bbbf32c  0xffffffff`826d9abf nt!KeBugCheckEx+0x1e 
0xffffffff`8bbbf338  0xffffffff`8264a598 nt!RtlImageNtHeaderEx+0x45 
0xffffffff`8bbbf34c  0xffffffff`827e1fe7 nt!PspSystemThreadStartup+0xdd 
0xffffffff`8bbbf358  0xffffffff`8264a598 nt!RtlImageNtHeaderEx+0x45 
0xffffffff`8bbbf364  0xffffffff`826ba1fc nt!_EH4_CallFilterFunc+0x12 
0xffffffff`8bbbf370  0xffffffff`8265ec88 nt! ?? ::FNODOBFM::`string'+0x1858 
0xffffffff`8bbbf378  0xffffffff`82633d36 nt!_except_handler4+0x8e 
0xffffffff`8bbbf390  0xffffffff`8265ec98 nt! ?? ::FNODOBFM::`string'+0x1868 
0xffffffff`8bbbf3a0  0xffffffff`826b53e2 nt!ExecuteHandler2+0x26 
0xffffffff`8bbbf3b8  0xffffffff`826b53f6 nt!ExecuteHandler2+0x3a 
0xffffffff`8bbbf3c4  0xffffffff`826b53b4 nt!ExecuteHandler+0x24 
0xffffffff`8bbbf3d8  0xffffffff`82633ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbf3e8  0xffffffff`82647bc6 nt!RtlDispatchException+0xb6 
0xffffffff`8bbbf3fc  0xffffffff`82633ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbf40c  0xffffffff`826bf51b nt!IopCompleteRequest+0x3a6 
0xffffffff`8bbbf448  0xffffffff`8a8bc314 storport!NullAnsiString+0x8 
0xffffffff`8bbbf454  0xffffffff`82915a8f nt!$$VProc_ImageExportDirectory+0x9a8f 
0xffffffff`8bbbf46c  0xffffffff`826338da nt!KiDispatchException+0x15b 
0xffffffff`8bbbf47c  0xffffffff`826338ef nt!KiDispatchException+0x170 
0xffffffff`8bbbf5ac  0xffffffff`829152e9 nt!$$VProc_ImageExportDirectory+0x92e9 
0xffffffff`8bbbf5bc  0xffffffff`8290fd78 nt!$$VProc_ImageExportDirectory+0x3d78 
0xffffffff`8bbbf60c  0xffffffff`8264a598 nt!RtlImageNtHeaderEx+0x45 
0xffffffff`8bbbf634  0xffffffff`829cf97f hal!HalpQueryHpetCount+0x4b 
0xffffffff`8bbbf654  0xffffffff`829cfdc1 hal!HalpHpetQueryPerformanceCounter+0x1d 
0xffffffff`8bbbf65c  0xffffffff`82650eb5 nt!EtwpGetPerfCounter+0x8 
0xffffffff`8bbbf664  0xffffffff`826b74b0 nt!EtwpReserveTraceBuffer+0xce 
0xffffffff`8bbbf698  0xffffffff`826b733e nt!EtwpLogKernelEvent+0x1fe 
0xffffffff`8bbbf6c8  0xffffffff`8270fc08 nt!EtwpRefCount+0x8 
0xffffffff`8bbbf6e4  0xffffffff`826bc526 nt!EtwTraceTimedEvent+0xa5 
0xffffffff`8bbbf730  0xffffffff`826495f2 nt!PfHardFaultLogWorker+0x32 
0xffffffff`8bbbf760  0xffffffff`82683edd nt!MiDispatchFault+0xd14 
0xffffffff`8bbbf768  0xffffffff`82683f4a nt!MiDispatchFault+0xd81 
0xffffffff`8bbbf774  0xffffffff`82683f64 nt!MiDispatchFault+0xd9b 
0xffffffff`8bbbf814  0xffffffff`82689cf0 nt!MiCheckVirtualAddress+0x42 
0xffffffff`8bbbf830  0xffffffff`82633ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbf840  0xffffffff`826577fa nt!CommonDispatchException+0x4a 
0xffffffff`8bbbf864  0xffffffff`8264a598 nt!RtlImageNtHeaderEx+0x45 
0xffffffff`8bbbf878  0xffffffff`82656c3a nt!KiFastCallEntry+0x12a 
0xffffffff`8bbbf898  0xffffffff`82659d94 nt!KiTrap0E+0xdc 
0xffffffff`8bbbf8a8  0xffffffff`826577ae nt!KiExceptionExit+0x186 
0xffffffff`8bbbf8b0  0xffffffff`8264a598 nt!RtlImageNtHeaderEx+0x45 
0xffffffff`8bbbf8c0  0xffffffff`8b00f92c Ntfs!NtfsFsdRead+0x30 
0xffffffff`8bbbf8c4  0xffffffff`8b00f928 Ntfs!NtfsFsdRead+0x2c 
0xffffffff`8bbbf914  0xffffffff`8264a598 nt!RtlImageNtHeaderEx+0x45 
0xffffffff`8bbbf924  0xffffffff`8264a61c nt!RtlImageNtHeader+0x1a 
0xffffffff`8bbbf9ac  0xffffffff`82654615 nt!ZwClose+0x11 
0xffffffff`8bbbfa38  0xffffffff`8a928ba7 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x251 
0xffffffff`8bbbfa44  0xffffffff`826f981d nt!ExFreePoolWithTag+0x817 
0xffffffff`8bbbfaa4  0xffffffff`82633ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbfab0  0xffffffff`8282cad8 nt!PsOpenProcess+0x229 
0xffffffff`8bbbfab4  0xffffffff`8282cf6b nt!NtOpenProcess+0x2d 
0xffffffff`8bbbfac0  0xffffffff`8282cf00 nt!PsGetNextJob+0x79 
0xffffffff`8bbbfac4  0xffffffff`8282cf00 nt!PsGetNextJob+0x79 
0xffffffff`8bbbfac8  0xffffffff`8282cf3e nt!NtOpenProcess+0x0 
0xffffffff`8bbbfacc  0xffffffff`8282cf00 nt!PsGetNextJob+0x79 
0xffffffff`8bbbfad0  0xffffffff`8b003d2a Ntfs!deskey+0x15e 
Unable to load image \??\C:\Windows\system32\Drivers\SYMEVENT.SYS, Win32 error 0n2 
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS 
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS 
0xffffffff`8bbbfad4  0xffffffff`979a0289 SYMEVENT!+0x17289 
0xffffffff`8bbbfad8  0xffffffff`9799df86 SYMEVENT+0x14f86 
0xffffffff`8bbbfae4  0xffffffff`979a0629 SYMEVENT+0x17629 
0xffffffff`8bbbfaf4  0xffffffff`979a42fc SYMEVENT+0x1b2fc 
0xffffffff`8bbbfbbc  0xffffffff`8260c000 nt!_imp__VidBitBlt  (nt+0x0)+0x0 
0xffffffff`8bbbfbc0  0xffffffff`8290c028 nt!$$VProc_ImageExportDirectory+0x28 
0xffffffff`8bbbfbd0  0xffffffff`8270e13c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbbfbfc  0xffffffff`8270e13c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbbfd48  0xffffffff`826b1da2 nt!ExpWorkerThread+0xfd 
0xffffffff`8bbbfd80  0xffffffff`827e1fa2 nt!PspSystemThreadStartup+0x9d 
0xffffffff`8bbbfdb4  0xffffffff`82633ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbfdc4  0xffffffff`8264af0e nt!KiThreadStartup+0x16 
0xffffffff`8bbbfdc8  0xffffffff`826b1ca5 nt!ExpWorkerThread+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput3.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030913-03.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: c:\symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x82602000 PsLoadedModuleList = 0x82719c70 
Debug session time: Sat Mar  9 22:05:17.278 2013 (UTC - 6:00) 
System Uptime: 0 days 0:04:44.067 
Loading Kernel Symbols 
............................................................... 
................................................................ 
......................... 
Loading User Symbols 
Loading unloaded module list 
.... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck 1000008E, {c0000005, 8283cd58, 8bbd35e4, 0} 

Probably caused by : ntkrpamp.exe ( nt!ExpAllocateHandleTableEntry+20 ) 

Followup: MachineOwner 
--------- 

1: kd> !niemiro.rawstack; q 
0xffffffff`8bbd30fc  0xffffffff`826ab3b4 nt!ExecuteHandler+0x24 
0xffffffff`8bbd3110  0xffffffff`82629ca9 nt!_except_handler4+0x0 
0xffffffff`8bbd3120  0xffffffff`8263dbc6 nt!RtlDispatchException+0xb6 
0xffffffff`8bbd3134  0xffffffff`82629ca9 nt!_except_handler4+0x0 
0xffffffff`8bbd315c  0xffffffff`829c370c hal!KfLowerIrql+0x64 
0xffffffff`8bbd3164  0xffffffff`8273a301 nt!IopTimerLock+0x1 
0xffffffff`8bbd316c  0xffffffff`826aa16f nt!KiExitDispatcher+0x1db 
0xffffffff`8bbd3184  0xffffffff`826cfabf nt!KeBugCheckEx+0x1e 
0xffffffff`8bbd3190  0xffffffff`8283cd58 nt!ExpAllocateHandleTableEntry+0x20 
0xffffffff`8bbd31a8  0xffffffff`82629928 nt!KiDispatchException+0x1a9 
0xffffffff`8bbd31b4  0xffffffff`8283cd58 nt!ExpAllocateHandleTableEntry+0x20 
0xffffffff`8bbd31fc  0xffffffff`8273a301 nt!IopTimerLock+0x1 
0xffffffff`8bbd3204  0xffffffff`829c370c hal!KfLowerIrql+0x64 
0xffffffff`8bbd320c  0xffffffff`8273a301 nt!IopTimerLock+0x1 
0xffffffff`8bbd3214  0xffffffff`826aa16f nt!KiExitDispatcher+0x1db 
0xffffffff`8bbd3230  0xffffffff`82613e01 nt!_output_l+0x83f 
0xffffffff`8bbd3240  0xffffffff`82613e8c nt!_output_l+0x8ca 
0xffffffff`8bbd324c  0xffffffff`826ae79b nt!KeSetEvent+0xd4 
0xffffffff`8bbd3264  0xffffffff`826b460c nt!IopFreeIrp+0xdc 
0xffffffff`8bbd3278  0xffffffff`826b5583 nt!IopCompleteRequest+0x40e 
0xffffffff`8bbd32a8  0xffffffff`829c0001 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x31 
0xffffffff`8bbd32b0  0xffffffff`82629ca9 nt!_except_handler4+0x0 
0xffffffff`8bbd32bc  0xffffffff`826b5592 nt!IopCompleteRequest+0x41d 
0xffffffff`8bbd32c0  0xffffffff`826b5e0c nt!KiDeliverApc+0xce 
0xffffffff`8bbd32dc  0xffffffff`829c36a8 hal!KfLowerIrql+0x0 
0xffffffff`8bbd32e4  0xffffffff`829c3468 hal!HalpDispatchSoftwareInterrupt+0x5e 
0xffffffff`8bbd32f8  0xffffffff`829c36a8 hal!KfLowerIrql+0x0 
0xffffffff`8bbd3344  0xffffffff`8283cd58 nt!ExpAllocateHandleTableEntry+0x20 
0xffffffff`8bbd335c  0xffffffff`8270413c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbd3360  0xffffffff`826b551b nt!IopCompleteRequest+0x3a6 
0xffffffff`8bbd3364  0xffffffff`826b551b nt!IopCompleteRequest+0x3a6 
0xffffffff`8bbd336c  0xffffffff`8264a180 nt!KeWaitForSingleObject+0x748 
0xffffffff`8bbd3370  0xffffffff`826b3851 nt!KiFlushTargetMultipleRangeTb+0x3e 
0xffffffff`8bbd3378  0xffffffff`826b3851 nt!KiFlushTargetMultipleRangeTb+0x3e 
0xffffffff`8bbd3384  0xffffffff`826acf2c nt!KiIpiServiceRoutine+0x64 
0xffffffff`8bbd3398  0xffffffff`829c3838 hal!HalEndSystemInterrupt+0x7a 
0xffffffff`8bbd33a4  0xffffffff`829bfc39 hal!HalpClockInterruptPn+0x195 
0xffffffff`8bbd33f0  0xffffffff`8290e1d6 nt!$$VProc_ImageExportDirectory+0xc1d6 
0xffffffff`8bbd33f8  0xffffffff`8290bc5c nt!$$VProc_ImageExportDirectory+0x9c5c 
0xffffffff`8bbd3404  0xffffffff`82903ed0 nt!$$VProc_ImageExportDirectory+0x1ed0 
0xffffffff`8bbd3408  0xffffffff`82602000 nt!_imp__VidBitBlt  (nt+0x0)+0x0 
0xffffffff`8bbd340c  0xffffffff`82902028 nt!$$VProc_ImageExportDirectory+0x28 
0xffffffff`8bbd3428  0xffffffff`8291147f nt!$$VProc_ImageExportDirectory+0xf47f 
0xffffffff`8bbd3448  0xffffffff`829ca441 hal!HalpRequestIpiSpecifyVector+0x91 
0xffffffff`8bbd346c  0xffffffff`829c370c hal!KfLowerIrql+0x64 
0xffffffff`8bbd347c  0xffffffff`826aa16f nt!KiExitDispatcher+0x1db 
0xffffffff`8bbd34b8  0xffffffff`82638300 nt!KeSignalGateBoostPriority+0x271 
0xffffffff`8bbd34cc  0xffffffff`8290b2e9 nt!$$VProc_ImageExportDirectory+0x92e9 
0xffffffff`8bbd34dc  0xffffffff`82905d78 nt!$$VProc_ImageExportDirectory+0x3d78 
0xffffffff`8bbd354c  0xffffffff`8267fcf0 nt!MiCheckVirtualAddress+0x42 
0xffffffff`8bbd3568  0xffffffff`82629ca9 nt!_except_handler4+0x0 
0xffffffff`8bbd3578  0xffffffff`8264d7fa nt!CommonDispatchException+0x4a 
0xffffffff`8bbd359c  0xffffffff`8283cd58 nt!ExpAllocateHandleTableEntry+0x20 
0xffffffff`8bbd35d0  0xffffffff`8264fd94 nt!KiTrap0E+0xdc 
0xffffffff`8bbd35e0  0xffffffff`8264d7ae nt!KiExceptionExit+0x186 
0xffffffff`8bbd35e8  0xffffffff`8283cd58 nt!ExpAllocateHandleTableEntry+0x20 
0xffffffff`8bbd3604  0xffffffff`82831acd nt!ObpChargeQuotaForObject+0x5f 
0xffffffff`8bbd364c  0xffffffff`8283cd58 nt!ExpAllocateHandleTableEntry+0x20 
0xffffffff`8bbd3670  0xffffffff`8283ce4c nt!ExCreateHandle+0x1b 
0xffffffff`8bbd368c  0xffffffff`8281446e nt!ObpCreateUnnamedHandle+0x1d3 
0xffffffff`8bbd36b0  0xffffffff`82814e9e nt!FsRtlReleaseFile+0x39 
0xffffffff`8bbd36e8  0xffffffff`828325de nt!ObInsertObject+0x10b 
0xffffffff`8bbd37a4  0xffffffff`8283d353 nt!ObOpenObjectByName+0x484 
0xffffffff`8bbd37e8  0xffffffff`8273a000 nt!CcMasterSpinLock+0x0 
0xffffffff`8bbd3800  0xffffffff`8262ae80 nt!CcZeroEndOfLastPage+0x198 
0xffffffff`8bbd3824  0xffffffff`82833f60 nt!NtCreateSection+0x1e1 
0xffffffff`8bbd384c  0xffffffff`82833d75 nt!NtCreateSection+0x0 
0xffffffff`8bbd3850  0xffffffff`828083b7 nt!NtOpenFile+0x2a 
0xffffffff`8bbd3880  0xffffffff`82629ca9 nt!_except_handler4+0x0 
0xffffffff`8bbd3890  0xffffffff`8264cc3a nt!KiFastCallEntry+0x12a 
0xffffffff`8bbd38b4  0xffffffff`8264a831 nt!ZwCreateSection+0x11 
*** ERROR: Module load completed but symbols could not be loaded for kbdclass.sys 
0xffffffff`8bbd38c0  0xffffffff`8b00392c kbdclass!+0x392c 
0xffffffff`8bbd38c4  0xffffffff`8b003928 kbdclass+0x3928 
0xffffffff`8bbd38e4  0xffffffff`8290957f nt!$$VProc_ImageExportDirectory+0x757f 
0xffffffff`8bbd38e8  0xffffffff`8290957f nt!$$VProc_ImageExportDirectory+0x757f 
0xffffffff`8bbd3918  0xffffffff`8264a831 nt!ZwCreateSection+0x11 
0xffffffff`8bbd39ac  0xffffffff`8264a615 nt!ZwClose+0x11 
0xffffffff`8bbd3a38  0xffffffff`8a925ba7 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x251 
0xffffffff`8bbd3a44  0xffffffff`826ef81d nt!ExFreePoolWithTag+0x817 
0xffffffff`8bbd3aa4  0xffffffff`82629ca9 nt!_except_handler4+0x0 
0xffffffff`8bbd3ab0  0xffffffff`82822ad8 nt!PsOpenProcess+0x229 
0xffffffff`8bbd3ab4  0xffffffff`82822f6b nt!NtOpenProcess+0x2d 
0xffffffff`8bbd3ac0  0xffffffff`82822f00 nt!PsGetNextJob+0x79 
0xffffffff`8bbd3ac4  0xffffffff`82822f00 nt!PsGetNextJob+0x79 
0xffffffff`8bbd3ac8  0xffffffff`82822f3e nt!NtOpenProcess+0x0 
0xffffffff`8bbd3acc  0xffffffff`82822f00 nt!PsGetNextJob+0x79 
0xffffffff`8bbd3ad0  0xffffffff`8b003d2a kbdclass+0x3d2a 
Unable to load image \??\C:\Windows\system32\Drivers\SYMEVENT.SYS, Win32 error 0n2 
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS 
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS 
0xffffffff`8bbd3ad4  0xffffffff`973bf289 SYMEVENT!+0x17289 
0xffffffff`8bbd3ad8  0xffffffff`973bcf86 SYMEVENT+0x14f86 
0xffffffff`8bbd3ae4  0xffffffff`973bf629 SYMEVENT+0x17629 
0xffffffff`8bbd3af4  0xffffffff`973c32fc SYMEVENT+0x1b2fc 
0xffffffff`8bbd3bc0  0xffffffff`826aaf43 nt!EtwpCCSwapTrace+0x3b1 
0xffffffff`8bbd3bd0  0xffffffff`8270413c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbd3bfc  0xffffffff`8270413c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbd3d48  0xffffffff`826a7da2 nt!ExpWorkerThread+0xfd 
0xffffffff`8bbd3d80  0xffffffff`827d7fa2 nt!PspSystemThreadStartup+0x9d 
0xffffffff`8bbd3db4  0xffffffff`82629ca9 nt!_except_handler4+0x0 
0xffffffff`8bbd3dc4  0xffffffff`82640f0e nt!KiThreadStartup+0x16 
0xffffffff`8bbd3dc8  0xffffffff`826a7ca5 nt!ExpWorkerThread+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput4.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030913-02.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: c:\symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x82636000 PsLoadedModuleList = 0x8274dc70 
Debug session time: Sat Mar  9 22:00:04.651 2013 (UTC - 6:00) 
System Uptime: 0 days 17:36:46.725 
Loading Kernel Symbols 
............................................................... 
................................................................ 
........................... 
Loading User Symbols 
Loading unloaded module list 
.......... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck 1000007E, {c0000005, 886bf916, 8bdd787c, 8bdd7578} 

*** ERROR: Module load completed but symbols could not be loaded for mssmbios.sys 
Probably caused by : mssmbios.sys ( mssmbios+3d2a ) 

Followup: MachineOwner 
--------- 

0: kd> !niemiro.rawstack; q 
0xffffffff`8bdd7090  0xffffffff`8272e93c nt!KiInitialPCR+0x13c 
0xffffffff`8bdd709c  0xffffffff`82736200 nt!KiHardwareTrigger+0x0 
0xffffffff`8bdd70a0  0xffffffff`8272e920 nt!KiInitialPCR+0x120 
0xffffffff`8bdd70a8  0xffffffff`82703abf nt!KeBugCheckEx+0x1e 
0xffffffff`8bdd72c4  0xffffffff`8272e920 nt!KiInitialPCR+0x120 
0xffffffff`8bdd72cc  0xffffffff`8276e301 nt!IopTimerLock+0x1 
0xffffffff`8bdd72d4  0xffffffff`8260a70c hal!KfLowerIrql+0x64 
0xffffffff`8bdd72dc  0xffffffff`8276e301 nt!IopTimerLock+0x1 
0xffffffff`8bdd72e4  0xffffffff`826de16f nt!KiExitDispatcher+0x1db 
0xffffffff`8bdd72f8  0xffffffff`8aaa889e storport!RaidAdapterPostScatterGatherExecute+0x17a 
0xffffffff`8bdd731c  0xffffffff`826e279b nt!KeSetEvent+0xd4 
0xffffffff`8bdd7334  0xffffffff`826e860c nt!IopFreeIrp+0xdc 
0xffffffff`8bdd734c  0xffffffff`82703abf nt!KeBugCheckEx+0x1e 
0xffffffff`8bdd736c  0xffffffff`8280bfe7 nt!PspSystemThreadStartup+0xdd 
0xffffffff`8bdd7384  0xffffffff`826e41fc nt!_EH4_CallFilterFunc+0x12 
0xffffffff`8bdd7390  0xffffffff`82688c88 nt! ?? ::FNODOBFM::`string'+0x1858 
0xffffffff`8bdd7398  0xffffffff`8265dd36 nt!_except_handler4+0x8e 
0xffffffff`8bdd73b0  0xffffffff`82688c98 nt! ?? ::FNODOBFM::`string'+0x1868 
0xffffffff`8bdd73c0  0xffffffff`826df3e2 nt!ExecuteHandler2+0x26 
0xffffffff`8bdd73d8  0xffffffff`826df3f6 nt!ExecuteHandler2+0x3a 
0xffffffff`8bdd73e4  0xffffffff`826df3b4 nt!ExecuteHandler+0x24 
0xffffffff`8bdd73f8  0xffffffff`8265dca9 nt!_except_handler4+0x0 
0xffffffff`8bdd7408  0xffffffff`82671bc6 nt!RtlDispatchException+0xb6 
0xffffffff`8bdd741c  0xffffffff`8265dca9 nt!_except_handler4+0x0 
0xffffffff`8bdd742c  0xffffffff`8273813c nt!ExWorkerQueue+0x3c 
0xffffffff`8bdd7460  0xffffffff`8272e920 nt!KiInitialPCR+0x120 
0xffffffff`8bdd7470  0xffffffff`8aab9314 storport!NullAnsiString+0x8 
0xffffffff`8bdd747c  0xffffffff`8293fa8f nt!$$VProc_ImageExportDirectory+0x9a8f 
0xffffffff`8bdd7490  0xffffffff`8265d8da nt!KiDispatchException+0x15b 
0xffffffff`8bdd74a0  0xffffffff`8265d8ef nt!KiDispatchException+0x170 
0xffffffff`8bdd7500  0xffffffff`82630000 hal!HalReportResourceUsage+0x60 
0xffffffff`8bdd7544  0xffffffff`8260a838 hal!HalEndSystemInterrupt+0x7a 
0xffffffff`8bdd7550  0xffffffff`826e3619 nt!KeUpdateSystemTime+0x129 
0xffffffff`8bdd759c  0xffffffff`8293af8d nt!$$VProc_ImageExportDirectory+0x4f8d 
0xffffffff`8bdd75b0  0xffffffff`82937ed0 nt!$$VProc_ImageExportDirectory+0x1ed0 
0xffffffff`8bdd75b4  0xffffffff`82636000 nt!_imp__VidBitBlt  (nt+0x0)+0x0 
0xffffffff`8bdd75b8  0xffffffff`82936028 nt!$$VProc_ImageExportDirectory+0x28 
0xffffffff`8bdd75d4  0xffffffff`8293f2e9 nt!$$VProc_ImageExportDirectory+0x92e9 
0xffffffff`8bdd75e4  0xffffffff`82939d78 nt!$$VProc_ImageExportDirectory+0x3d78 
0xffffffff`8bdd765c  0xffffffff`8260c97f hal!HalpQueryHpetCount+0x4b 
0xffffffff`8bdd767c  0xffffffff`8260cdc1 hal!HalpHpetQueryPerformanceCounter+0x1d 
0xffffffff`8bdd7684  0xffffffff`8267aeb5 nt!EtwpGetPerfCounter+0x8 
0xffffffff`8bdd768c  0xffffffff`826e14b0 nt!EtwpReserveTraceBuffer+0xce 
0xffffffff`8bdd76c0  0xffffffff`826e133e nt!EtwpLogKernelEvent+0x1fe 
0xffffffff`8bdd76f0  0xffffffff`82739c08 nt!EtwpRefCount+0x8 
0xffffffff`8bdd770c  0xffffffff`826e6526 nt!EtwTraceTimedEvent+0xa5 
0xffffffff`8bdd7758  0xffffffff`826735f2 nt!PfHardFaultLogWorker+0x32 
0xffffffff`8bdd7788  0xffffffff`826adedd nt!MiDispatchFault+0xd14 
0xffffffff`8bdd7790  0xffffffff`826adf4a nt!MiDispatchFault+0xd81 
0xffffffff`8bdd779c  0xffffffff`826adf64 nt!MiDispatchFault+0xd9b 
0xffffffff`8bdd77ac  0xffffffff`8260a70c hal!KfLowerIrql+0x64 
0xffffffff`8bdd77e8  0xffffffff`9853affd SYMEVENT!+0x15ffd 
0xffffffff`8bdd77ec  0xffffffff`98539cb6 SYMEVENT+0x14cb6 
0xffffffff`8bdd783c  0xffffffff`826b3cf0 nt!MiCheckVirtualAddress+0x42 
0xffffffff`8bdd7854  0xffffffff`8265dca9 nt!_except_handler4+0x0 
0xffffffff`8bdd7864  0xffffffff`826817fa nt!CommonDispatchException+0x4a 
0xffffffff`8bdd78bc  0xffffffff`82683d94 nt!KiTrap0E+0xdc 
0xffffffff`8bdd78cc  0xffffffff`826817ae nt!KiExceptionExit+0x186 
0xffffffff`8bdd79ac  0xffffffff`8267e615 nt!ZwClose+0x11 
0xffffffff`8bdd7a44  0xffffffff`8265dca9 nt!_except_handler4+0x0 
0xffffffff`8bdd7aa4  0xffffffff`8265dca9 nt!_except_handler4+0x0 
0xffffffff`8bdd7ab0  0xffffffff`82856ad8 nt!PsOpenProcess+0x229 
0xffffffff`8bdd7ab4  0xffffffff`82856f6b nt!NtOpenProcess+0x2d 
0xffffffff`8bdd7ac0  0xffffffff`82856f00 nt!PsGetNextJob+0x79 
0xffffffff`8bdd7ac4  0xffffffff`82856f00 nt!PsGetNextJob+0x79 
0xffffffff`8bdd7ac8  0xffffffff`82856f3e nt!NtOpenProcess+0x0 
0xffffffff`8bdd7acc  0xffffffff`82856f00 nt!PsGetNextJob+0x79 
0xffffffff`8bdd7ad0  0xffffffff`8b003d2a mssmbios!+0x3d2a 
0xffffffff`8bdd7ad4  0xffffffff`9853c289 SYMEVENT+0x17289 
0xffffffff`8bdd7ad8  0xffffffff`98539f86 SYMEVENT+0x14f86 
0xffffffff`8bdd7ae4  0xffffffff`9853c629 SYMEVENT+0x17629 
0xffffffff`8bdd7af4  0xffffffff`985402fc SYMEVENT+0x1b2fc 
0xffffffff`8bdd7bc0  0xffffffff`826def43 nt!EtwpCCSwapTrace+0x3b1 
0xffffffff`8bdd7bfc  0xffffffff`8273813c nt!ExWorkerQueue+0x3c 
0xffffffff`8bdd7d48  0xffffffff`826dbda2 nt!ExpWorkerThread+0xfd 
0xffffffff`8bdd7d80  0xffffffff`8280bfa2 nt!PspSystemThreadStartup+0x9d 
0xffffffff`8bdd7db4  0xffffffff`8265dca9 nt!_except_handler4+0x0 
0xffffffff`8bdd7dc4  0xffffffff`82674f0e nt!KiThreadStartup+0x16 
0xffffffff`8bdd7dc8  0xffffffff`826dbca5 nt!ExpWorkerThread+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput5.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030913-01.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: srv*c:\symbols*https://msdl.microsoft.com/download/symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x8263a000 PsLoadedModuleList = 0x82751c70 
Debug session time: Sat Mar  9 04:22:04.760 2013 (UTC - 6:00) 
System Uptime: 2 days 12:36:51.835 
Loading Kernel Symbols 
............................................................... 
................................................................ 
............................ 
Loading User Symbols 
Loading unloaded module list 
.................................................. 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck D1, {8293f000, 2, 0, 886feeb1} 

Probably caused by : acpi.sys ( acpi!ACPIDispatchForwardIrp+2a ) 

Followup: MachineOwner 
--------- 

0: kd> !niemiro.rawstack; q 
0xffffffff`8272f994  0xffffffff`8293f000 nt!$$VProc_ImageExportDirectory+0x5000 
0xffffffff`8272f9a4  0xffffffff`8272f9a8 nt!KiDoubleFaultStack+0x29a8 
0xffffffff`8272f9a8  0xffffffff`8272fa38 nt!KiDoubleFaultStack+0x2a38 
0xffffffff`8272f9e8  0xffffffff`8293efff nt!$$VProc_ImageExportDirectory+0x4fff 
0xffffffff`8272f9fc  0xffffffff`8293bed0 nt!$$VProc_ImageExportDirectory+0x1ed0 
0xffffffff`8272fa00  0xffffffff`8263a000 nt!_imp__VidBitBlt  (nt+0x0)+0x0 
0xffffffff`8272fa04  0xffffffff`8293a028 nt!$$VProc_ImageExportDirectory+0x28 
0xffffffff`8272fa08  0xffffffff`8272fa38 nt!KiDoubleFaultStack+0x2a38 
0xffffffff`8272fa20  0xffffffff`8293effc nt!$$VProc_ImageExportDirectory+0x4ffc 
0xffffffff`8272fa30  0xffffffff`8293dd78 nt!$$VProc_ImageExportDirectory+0x3d78 
0xffffffff`8272fa38  0xffffffff`8272fa70 nt!KiDoubleFaultStack+0x2a70 
0xffffffff`8272fa68  0xffffffff`80753b02 acpi!AcpiPowerPhase4List+0x2 
0xffffffff`8272fa70  0xffffffff`8272fa88 nt!KiDoubleFaultStack+0x2a88 
0xffffffff`8272fa74  0xffffffff`8267e99a nt!IofCallDriver+0x63 
0xffffffff`8272fa88  0xffffffff`8272fa94 nt!KiDoubleFaultStack+0x2a94 
0xffffffff`8272fa8c  0xffffffff`807326c2 acpi!ACPIDispatchForwardIrp+0x2a 
0xffffffff`8272fa94  0xffffffff`8272faa8 nt!KiDoubleFaultStack+0x2aa8 
0xffffffff`8272fa98  0xffffffff`8073907a acpi!ACPIIrpDispatchDeviceControl+0xa4 
0xffffffff`8272faa8  0xffffffff`8272fad8 nt!KiDoubleFaultStack+0x2ad8 
0xffffffff`8272faac  0xffffffff`80732f02 acpi!ACPIDispatchIrp+0x19a 
0xffffffff`8272facc  0xffffffff`8266e5c2 nt!IoReuseIrp+0x27 
0xffffffff`8272fad4  0xffffffff`807512f4 acpi!AcpiFilterIrpDispatch+0x0 
0xffffffff`8272fad8  0xffffffff`8272faf0 nt!KiDoubleFaultStack+0x2af0 
0xffffffff`8272fadc  0xffffffff`8267e99a nt!IofCallDriver+0x63 
0xffffffff`8272faf0  0xffffffff`8272fb04 nt!KiDoubleFaultStack+0x2b04 
0xffffffff`8272faf4  0xffffffff`8b1a68b9 CLASSPNP!SubmitTransferPacket+0x106 
0xffffffff`8272fb04  0xffffffff`8272fb44 nt!KiDoubleFaultStack+0x2b44 
0xffffffff`8272fb08  0xffffffff`8b1a5f8f CLASSPNP!ServiceTransferRequest+0x224 
0xffffffff`8272fb10  0xffffffff`8272fb94 nt!KiDoubleFaultStack+0x2b94 
0xffffffff`8272fb44  0xffffffff`8272fb58 nt!KiDoubleFaultStack+0x2b58 
0xffffffff`8272fb48  0xffffffff`8b1a86de CLASSPNP!ClasspServiceIdleRequest+0x21 
0xffffffff`8272fb58  0xffffffff`8272fb68 nt!KiDoubleFaultStack+0x2b68 
0xffffffff`8272fb5c  0xffffffff`8b1a8ab8 CLASSPNP!ClasspIdleTimerDpc+0x6d 
0xffffffff`8272fb64  0xffffffff`8272fc50 nt!KiDoubleFaultStack+0x2c50 
0xffffffff`8272fb68  0xffffffff`8272fc88 nt!KiDoubleFaultStack+0x2c88 
0xffffffff`8272fb6c  0xffffffff`826e426b nt!KiTimerListExpire+0x367 
0xffffffff`8272fb80  0xffffffff`82736c00 nt!KiTimerTableListHead+0x80 
0xffffffff`8272fb88  0xffffffff`82732e00 nt!KiInitialPCR+0x600 
0xffffffff`8272fb94  0xffffffff`8b1a8a4b CLASSPNP!ClasspIdleTimerDpc+0x0 
*** WARNING: Unable to verify timestamp for nvmfdx32.sys 
*** ERROR: Module load completed but symbols could not be loaded for nvmfdx32.sys 
0xffffffff`8272fba0  0xffffffff`8ad88c5c nvmfdx32!+0x9c5c 
0xffffffff`8272fbac  0xffffffff`82772802 nt!KiTimerTableLock+0x302 
0xffffffff`8272fbb0  0xffffffff`8272fbc0 nt!KiDoubleFaultStack+0x2bc0 
0xffffffff`8272fbb4  0xffffffff`8260e70c hal!KfLowerIrql+0x64 
0xffffffff`8272fbbc  0xffffffff`82772802 nt!KiTimerTableLock+0x302 
0xffffffff`8272fbc0  0xffffffff`8272fbf8 nt!KiDoubleFaultStack+0x2bf8 
0xffffffff`8272fbc4  0xffffffff`826e216f nt!KiExitDispatcher+0x1db 
0xffffffff`8272fbc8  0xffffffff`82732e30 nt!KiInitialPCR+0x630 
0xffffffff`8272fbdc  0xffffffff`82681602 nt!ExfInterlockedPopEntryList+0x12 
0xffffffff`8272fbec  0xffffffff`8261097f hal!HalpQueryHpetCount+0x4b 
0xffffffff`8272fc08  0xffffffff`8272fc10 nt!KiDoubleFaultStack+0x2c10 
0xffffffff`8272fc0c  0xffffffff`82610dc1 hal!HalpHpetQueryPerformanceCounter+0x1d 
0xffffffff`8272fc10  0xffffffff`8272fc48 nt!KiDoubleFaultStack+0x2c48 
0xffffffff`8272fc14  0xffffffff`8267eeb5 nt!EtwpGetPerfCounter+0x8 
0xffffffff`8272fc1c  0xffffffff`826e54b0 nt!EtwpReserveTraceBuffer+0xce 
0xffffffff`8272fc34  0xffffffff`826eb851 nt!KiFlushTargetMultipleRangeTb+0x3e 
0xffffffff`8272fc38  0xffffffff`82732920 nt!KiInitialPCR+0x120 
0xffffffff`8272fc3c  0xffffffff`8272fc74 nt!KiDoubleFaultStack+0x2c74 
0xffffffff`8272fc40  0xffffffff`826e4f2c nt!KiIpiServiceRoutine+0x64 
0xffffffff`8272fc74  0xffffffff`82732920 nt!KiInitialPCR+0x120 
0xffffffff`8272fc78  0xffffffff`82732920 nt!KiInitialPCR+0x120 
0xffffffff`8272fc88  0xffffffff`8272fce8 nt!KiDoubleFaultStack+0x2ce8 
0xffffffff`8272fc8c  0xffffffff`826e3ea1 nt!KiTimerExpiration+0x2a0 
0xffffffff`8272fc90  0xffffffff`8272fcd0 nt!KiDoubleFaultStack+0x2cd0 
0xffffffff`8272fc94  0xffffffff`8272fd02 nt!KiDoubleFaultStack+0x2d02 
0xffffffff`8272fc98  0xffffffff`8272fcd8 nt!KiDoubleFaultStack+0x2cd8 
0xffffffff`8272fca0  0xffffffff`82732920 nt!KiInitialPCR+0x120 
0xffffffff`8272fca4  0xffffffff`82734300 nt!KiInitialPCR+0x1b00 
0xffffffff`8272fcbc  0xffffffff`8272fd02 nt!KiDoubleFaultStack+0x2d02 
0xffffffff`8272fccc  0xffffffff`82732920 nt!KiInitialPCR+0x120 
0xffffffff`8272fcd0  0xffffffff`8272fcd0 nt!KiDoubleFaultStack+0x2cd0 
0xffffffff`8272fcd4  0xffffffff`8272fcd0 nt!KiDoubleFaultStack+0x2cd0 
0xffffffff`8272fce8  0xffffffff`8272fd50 nt!KiDoubleFaultStack+0x2d50 
0xffffffff`8272fcec  0xffffffff`826e4595 nt!KiRetireDpcList+0xba 
0xffffffff`8272fd04  0xffffffff`82736640 nt!KiInitialThread+0x0 
0xffffffff`8272fd08  0xffffffff`82732800 nt!KiInitialPCR+0x0 
0xffffffff`8272fd0c  0xffffffff`82736640 nt!KiInitialThread+0x0 
0xffffffff`8272fd54  0xffffffff`826e27dd nt!KiIdleLoop+0x49 
0xffffffff`8272fdc0  0xffffffff`82678ef8 nt!KiThreadStartup+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput43.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini010108-01.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: c:\symbols 
Executable search path is:  

"nt" was not found in the image list. 
Debugger will attempt to load "nt" at given base 00000000. 

Please provide the full image name, including the extension (i.e. kernel32.dll) 
for more reliable results.Base address and size overrides can be given as 
.reload =,. 
Unable to load image nt, Win32 error 0n2 
Unable to add module at 00000000 
Debugger can not determine kernel base address 
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Machine Name: 
Kernel base = 0x8260e000 PsLoadedModuleList = 0x82725c70 
Debug session time: Wed Mar  6 03:43:24.394 2013 (UTC - 6:00) 
System Uptime: 0 days 0:02:32.442 

"nt" was not found in the image list. 
Debugger will attempt to load "nt" at given base 00000000. 

Please provide the full image name, including the extension (i.e. kernel32.dll) 
for more reliable results.Base address and size overrides can be given as 
.reload =,. 
Unable to load image nt, Win32 error 0n2 
Unable to add module at 00000000 
Debugger can not determine kernel base address 
Loading Kernel Symbols 

Loading User Symbols 
Loading unloaded module list 
.... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck D1, {8290e01c, 2, 0, 88714edc} 

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. 

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE ) 

Followup: MachineOwner 
--------- 

0: kd> !niemiro.rawstack; q 
FAILURE: Dump file is corrupt. 
nt!_KTHREAD: 0xffffffff`876fdcd0 
Stack Base:  0x00000000`00000000 
Stack Limit: 0x00000000`00000000 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput6.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030613-01.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: srv*c:\symbols*https://msdl.microsoft.com/download/symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x82610000 PsLoadedModuleList = 0x82727c70 
Debug session time: Wed Mar  6 03:39:50.265 2013 (UTC - 6:00) 
System Uptime: 0 days 10:20:42.311 
Loading Kernel Symbols 
............................................................... 
................................................................ 
............................. 
Loading User Symbols 
Loading unloaded module list 
..................... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck D1, {8291001c, 2, 0, 88a5eedc} 

Probably caused by : acpi.sys ( acpi!ACPIDispatchForwardIrp+2a ) 

Followup: MachineOwner 
--------- 

0: kd> !niemiro.rawstack; q 
0xffffffff`827059a0  0xffffffff`8291001c nt!$$VProc_ImageExportDirectory+0x1c 
0xffffffff`827059b0  0xffffffff`827059b4 nt!KiDoubleFaultStack+0x29b4 
0xffffffff`827059b4  0xffffffff`82705a38 nt!KiDoubleFaultStack+0x2a38 
0xffffffff`827059c8  0xffffffff`827059d8 nt!KiDoubleFaultStack+0x29d8 
0xffffffff`827059cc  0xffffffff`829d8493 hal!HalRequestIpi+0x13 
0xffffffff`827059d8  0xffffffff`82705a20 nt!KiDoubleFaultStack+0x2a20 
0xffffffff`827059dc  0xffffffff`826bafd3 nt!KiIpiSend+0x27 
0xffffffff`827059f8  0xffffffff`82910000 nt!$$VProc_ImageExportDirectory+0x0 
0xffffffff`827059fc  0xffffffff`8afb4196 usbehci!EHCI_ReleaseAsyncDoorbellLock+0x1e 
0xffffffff`82705a0c  0xffffffff`82610000 nt!_imp__VidBitBlt  (nt+0x0)+0x0 
0xffffffff`82705a14  0xffffffff`82705a38 nt!KiDoubleFaultStack+0x2a38 
0xffffffff`82705a38  0xffffffff`82705a70 nt!KiDoubleFaultStack+0x2a70 
0xffffffff`82705a68  0xffffffff`8074cb02 acpi!AcpiPowerPhase4List+0x2 
0xffffffff`82705a70  0xffffffff`82705a88 nt!KiDoubleFaultStack+0x2a88 
0xffffffff`82705a74  0xffffffff`8265499a nt!IofCallDriver+0x63 
0xffffffff`82705a88  0xffffffff`82705a94 nt!KiDoubleFaultStack+0x2a94 
0xffffffff`82705a8c  0xffffffff`8072b6c2 acpi!ACPIDispatchForwardIrp+0x2a 
0xffffffff`82705a94  0xffffffff`82705aa8 nt!KiDoubleFaultStack+0x2aa8 
0xffffffff`82705a98  0xffffffff`8073207a acpi!ACPIIrpDispatchDeviceControl+0xa4 
0xffffffff`82705aa8  0xffffffff`82705ad8 nt!KiDoubleFaultStack+0x2ad8 
0xffffffff`82705aac  0xffffffff`8072bf02 acpi!ACPIDispatchIrp+0x19a 
0xffffffff`82705acc  0xffffffff`826445c2 nt!IoReuseIrp+0x27 
0xffffffff`82705ad4  0xffffffff`8074a2f4 acpi!AcpiFilterIrpDispatch+0x0 
0xffffffff`82705ad8  0xffffffff`82705af0 nt!KiDoubleFaultStack+0x2af0 
0xffffffff`82705adc  0xffffffff`8265499a nt!IofCallDriver+0x63 
0xffffffff`82705af0  0xffffffff`82705b04 nt!KiDoubleFaultStack+0x2b04 
0xffffffff`82705af4  0xffffffff`8b1a18b9 CLASSPNP!SubmitTransferPacket+0x106 
0xffffffff`82705b04  0xffffffff`82705b44 nt!KiDoubleFaultStack+0x2b44 
0xffffffff`82705b08  0xffffffff`8b1a0f8f CLASSPNP!ServiceTransferRequest+0x224 
0xffffffff`82705b10  0xffffffff`82705b94 nt!KiDoubleFaultStack+0x2b94 
0xffffffff`82705b44  0xffffffff`82705b58 nt!KiDoubleFaultStack+0x2b58 
0xffffffff`82705b48  0xffffffff`8b1a36de CLASSPNP!ClasspServiceIdleRequest+0x21 
0xffffffff`82705b58  0xffffffff`82705b68 nt!KiDoubleFaultStack+0x2b68 
0xffffffff`82705b5c  0xffffffff`8b1a3ab8 CLASSPNP!ClasspIdleTimerDpc+0x6d 
0xffffffff`82705b64  0xffffffff`82705c50 nt!KiDoubleFaultStack+0x2c50 
0xffffffff`82705b68  0xffffffff`82705c88 nt!KiDoubleFaultStack+0x2c88 
0xffffffff`82705b6c  0xffffffff`826ba26b nt!KiTimerListExpire+0x367 
0xffffffff`82705b80  0xffffffff`8270e270 nt!KiTimerTableListHead+0x16f0 
0xffffffff`82705b88  0xffffffff`82708e38 nt!KiInitialPCR+0x638 
0xffffffff`82705b94  0xffffffff`8b1a3a4b CLASSPNP!ClasspIdleTimerDpc+0x0 
0xffffffff`82705b9c  0xffffffff`8271d7b8 nt!PspRateControl+0x58 
0xffffffff`82705ba0  0xffffffff`826bf8f6 nt!PspReplenishmentDpc+0x0 
0xffffffff`82705ba8  0xffffffff`992d92a0 rdbss!s_RxTimerDpc+0x0 
0xffffffff`82705bac  0xffffffff`992c3005 rdbss!RxTimerDispatch+0x0 
0xffffffff`82705bb4  0xffffffff`829d170c hal!KfLowerIrql+0x64 
0xffffffff`82705bbc  0xffffffff`82748702 nt!KiTimerTableLock+0x202 
0xffffffff`82705bc0  0xffffffff`82705bf8 nt!KiDoubleFaultStack+0x2bf8 
0xffffffff`82705bc4  0xffffffff`826b816f nt!KiExitDispatcher+0x1db 
0xffffffff`82705bc8  0xffffffff`82708e00 nt!KiInitialPCR+0x600 
0xffffffff`82705bdc  0xffffffff`82657602 nt!ExfInterlockedPopEntryList+0x12 
0xffffffff`82705bec  0xffffffff`829d397f hal!HalpQueryHpetCount+0x4b 
0xffffffff`82705c08  0xffffffff`82705c10 nt!KiDoubleFaultStack+0x2c10 
0xffffffff`82705c0c  0xffffffff`829d3dc1 hal!HalpHpetQueryPerformanceCounter+0x1d 
0xffffffff`82705c10  0xffffffff`82705c48 nt!KiDoubleFaultStack+0x2c48 
0xffffffff`82705c14  0xffffffff`82654eb5 nt!EtwpGetPerfCounter+0x8 
0xffffffff`82705c1c  0xffffffff`826bb4b0 nt!EtwpReserveTraceBuffer+0xce 
0xffffffff`82705c44  0xffffffff`826baf4e nt!KiIpiServiceRoutine+0x86 
0xffffffff`82705c48  0xffffffff`82655572 nt!READ_REGISTER_ULONG+0x6 
0xffffffff`82705c74  0xffffffff`82708920 nt!KiInitialPCR+0x120 
0xffffffff`82705c78  0xffffffff`82708920 nt!KiInitialPCR+0x120 
0xffffffff`82705c88  0xffffffff`82705ce8 nt!KiDoubleFaultStack+0x2ce8 
0xffffffff`82705c8c  0xffffffff`826b9e2b nt!KiTimerExpiration+0x22a 
0xffffffff`82705c90  0xffffffff`82705cd0 nt!KiDoubleFaultStack+0x2cd0 
0xffffffff`82705c98  0xffffffff`82705cd8 nt!KiDoubleFaultStack+0x2cd8 
0xffffffff`82705ca0  0xffffffff`82708920 nt!KiInitialPCR+0x120 
0xffffffff`82705ca4  0xffffffff`8270a300 nt!KiInitialPCR+0x1b00 
0xffffffff`82705ccc  0xffffffff`82708920 nt!KiInitialPCR+0x120 
0xffffffff`82705cd0  0xffffffff`82705cd0 nt!KiDoubleFaultStack+0x2cd0 
0xffffffff`82705cd4  0xffffffff`82705cd0 nt!KiDoubleFaultStack+0x2cd0 
0xffffffff`82705ce8  0xffffffff`82705d50 nt!KiDoubleFaultStack+0x2d50 
0xffffffff`82705cec  0xffffffff`826ba595 nt!KiRetireDpcList+0xba 
0xffffffff`82705d04  0xffffffff`8270c640 nt!KiInitialThread+0x0 
0xffffffff`82705d08  0xffffffff`82708800 nt!KiInitialPCR+0x0 
0xffffffff`82705d0c  0xffffffff`8270c640 nt!KiInitialThread+0x0 
0xffffffff`82705d54  0xffffffff`826b87dd nt!KiIdleLoop+0x49 
0xffffffff`82705dc0  0xffffffff`8264eef8 nt!KiThreadStartup+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput7.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030513-11.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: c:\symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x82646000 PsLoadedModuleList = 0x8275dc70 
Debug session time: Tue Mar  5 16:43:14.587 2013 (UTC - 6:00) 
System Uptime: 0 days 0:02:46.451 
Loading Kernel Symbols 
............................................................... 
................................................................ 
...................... 
Loading User Symbols 
Loading unloaded module list 
.... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck A, {26c, 1b, 1, 826f5712} 

Probably caused by : ntkrpamp.exe ( nt!KiAttachProcess+9 ) 

Followup: MachineOwner 
--------- 

2: kd> !niemiro.rawstack; q 
0xffffffff`8bbcf888  0xffffffff`826f5712 nt!KiAttachProcess+0x9 
0xffffffff`8bbcf894  0xffffffff`826f5712 nt!KiAttachProcess+0x9 
0xffffffff`8bbcf89c  0xffffffff`8277e3c2 nt!KiDispatcherLock+0x2 
0xffffffff`8bbcf8b4  0xffffffff`828808db nt!ObpCloseHandleTableEntry+0x24e 
0xffffffff`8bbcf8cc  0xffffffff`8277e3c2 nt!KiDispatcherLock+0x2 
0xffffffff`8bbcf8f8  0xffffffff`826f5712 nt!KiAttachProcess+0x9 
0xffffffff`8bbcf90c  0xffffffff`826f7e8a nt!KeStackAttachProcess+0xa0 
0xffffffff`8bbcf9ac  0xffffffff`8268e615 nt!ZwClose+0x11 
0xffffffff`8bbcfa38  0xffffffff`8a929ba7 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x251 
0xffffffff`8bbcfa44  0xffffffff`8273381d nt!ExFreePoolWithTag+0x817 
0xffffffff`8bbcfaa4  0xffffffff`8266dca9 nt!_except_handler4+0x0 
0xffffffff`8bbcfab0  0xffffffff`82866ad8 nt!PsOpenProcess+0x229 
0xffffffff`8bbcfab4  0xffffffff`82866f6b nt!NtOpenProcess+0x2d 
0xffffffff`8bbcfac0  0xffffffff`82866f00 nt!PsGetNextJob+0x79 
0xffffffff`8bbcfac4  0xffffffff`82866f00 nt!PsGetNextJob+0x79 
0xffffffff`8bbcfac8  0xffffffff`82866f3e nt!NtOpenProcess+0x0 
0xffffffff`8bbcfacc  0xffffffff`82866f00 nt!PsGetNextJob+0x79 
0xffffffff`8bbcfad0  0xffffffff`8b003d2a Ntfs!TxfCreateTmInstance+0xfd 
Unable to load image \??\C:\Windows\system32\Drivers\SYMEVENT.SYS, Win32 error 0n2 
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS 
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS 
0xffffffff`8bbcfad4  0xffffffff`97956289 SYMEVENT!+0x17289 
0xffffffff`8bbcfad8  0xffffffff`97953f86 SYMEVENT+0x14f86 
0xffffffff`8bbcfae4  0xffffffff`97956629 SYMEVENT+0x17629 
0xffffffff`8bbcfaf4  0xffffffff`9795a2fc SYMEVENT+0x1b2fc 
0xffffffff`8bbcfb68  0xffffffff`82690c3a nt!KiFastCallEntry+0x12a 
0xffffffff`8bbcfb80  0xffffffff`8268f17d nt!ZwOpenProcess+0x11 
0xffffffff`8bbcfb94  0xffffffff`8283fd57 nt!NtSetInformationThread+0xa8a 
0xffffffff`8bbcfba4  0xffffffff`8294ff8c nt!$$VProc_ImageExportDirectory+0x9f8c 
0xffffffff`8bbcfbac  0xffffffff`8294fb44 nt!$$VProc_ImageExportDirectory+0x9b44 
0xffffffff`8bbcfbbc  0xffffffff`82646000 nt!_imp__VidBitBlt  (nt+0x0)+0x0 
0xffffffff`8bbcfbc0  0xffffffff`82946028 nt!$$VProc_ImageExportDirectory+0x28 
0xffffffff`8bbcfbd0  0xffffffff`8274813c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbcfbfc  0xffffffff`8274813c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbcfd48  0xffffffff`826ebda2 nt!ExpWorkerThread+0xfd 
0xffffffff`8bbcfd80  0xffffffff`8281bfa2 nt!PspSystemThreadStartup+0x9d 
0xffffffff`8bbcfdb4  0xffffffff`8266dca9 nt!_except_handler4+0x0 
0xffffffff`8bbcfdc4  0xffffffff`82684f0e nt!KiThreadStartup+0x16 
0xffffffff`8bbcfdc8  0xffffffff`826ebca5 nt!ExpWorkerThread+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput8.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030513-10.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: c:\symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x8263e000 PsLoadedModuleList = 0x82755c70 
Debug session time: Tue Mar  5 16:38:11.084 2013 (UTC - 6:00) 
System Uptime: 0 days 0:02:31.174 
Loading Kernel Symbols 
............................................................... 
................................................................ 
...................... 
Loading User Symbols 
Loading unloaded module list 
.... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck 1000007E, {c0000005, 886c8916, 8bbbf87c, 8bbbf578} 

Unable to load image \??\C:\Windows\system32\Drivers\SYMEVENT.SYS, Win32 error 0n2 
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS 
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS 
Probably caused by : SYMEVENT.SYS ( SYMEVENT+17289 ) 

Followup: MachineOwner 
--------- 

2: kd> !niemiro.rawstack; q 
0xffffffff`8bbbf09c  0xffffffff`8273e200 nt!KiHardwareTrigger+0x0 
0xffffffff`8bbbf0a8  0xffffffff`8270babf nt!KeBugCheckEx+0x1e 
0xffffffff`8bbbf2dc  0xffffffff`8261270c hal!KfLowerIrql+0x64 
0xffffffff`8bbbf2e4  0xffffffff`826ea79b nt!KeSetEvent+0xd4 
0xffffffff`8bbbf2fc  0xffffffff`826f060c nt!IopFreeIrp+0xdc 
0xffffffff`8bbbf310  0xffffffff`826f1583 nt!IopCompleteRequest+0x40e 
0xffffffff`8bbbf314  0xffffffff`826f1592 nt!IopCompleteRequest+0x41d 
0xffffffff`8bbbf324  0xffffffff`8260f0b0 hal!KeReleaseInStackQueuedSpinLock+0x0 
0xffffffff`8bbbf340  0xffffffff`8260f001 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x31 
0xffffffff`8bbbf34c  0xffffffff`8270babf nt!KeBugCheckEx+0x1e 
0xffffffff`8bbbf36c  0xffffffff`82813fe7 nt!PspSystemThreadStartup+0xdd 
0xffffffff`8bbbf384  0xffffffff`826ec1fc nt!_EH4_CallFilterFunc+0x12 
0xffffffff`8bbbf390  0xffffffff`82690c88 nt! ?? ::FNODOBFM::`string'+0x1858 
0xffffffff`8bbbf398  0xffffffff`82665d36 nt!_except_handler4+0x8e 
0xffffffff`8bbbf3b0  0xffffffff`82690c98 nt! ?? ::FNODOBFM::`string'+0x1868 
0xffffffff`8bbbf3c0  0xffffffff`826e73e2 nt!ExecuteHandler2+0x26 
0xffffffff`8bbbf3d8  0xffffffff`826e73f6 nt!ExecuteHandler2+0x3a 
0xffffffff`8bbbf3e4  0xffffffff`826e73b4 nt!ExecuteHandler+0x24 
0xffffffff`8bbbf3f8  0xffffffff`82665ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbf408  0xffffffff`82679bc6 nt!RtlDispatchException+0xb6 
0xffffffff`8bbbf41c  0xffffffff`82665ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbf458  0xffffffff`8293fed0 nt!$$VProc_ImageExportDirectory+0x1ed0 
0xffffffff`8bbbf47c  0xffffffff`82947a8f nt!$$VProc_ImageExportDirectory+0x9a8f 
0xffffffff`8bbbf490  0xffffffff`826658da nt!KiDispatchException+0x15b 
0xffffffff`8bbbf4a0  0xffffffff`826658ef nt!KiDispatchException+0x170 
0xffffffff`8bbbf5d4  0xffffffff`829472e9 nt!$$VProc_ImageExportDirectory+0x92e9 
0xffffffff`8bbbf5e4  0xffffffff`82941d78 nt!$$VProc_ImageExportDirectory+0x3d78 
0xffffffff`8bbbf684  0xffffffff`82776300 nt!IopTimerLock+0x0 
0xffffffff`8bbbf68c  0xffffffff`8261270c hal!KfLowerIrql+0x64 
0xffffffff`8bbbf694  0xffffffff`82776300 nt!IopTimerLock+0x0 
0xffffffff`8bbbf69c  0xffffffff`826e616f nt!KiExitDispatcher+0x1db 
0xffffffff`8bbbf6ac  0xffffffff`826f3690 nt!MiInsertCachedPte+0xbf 
0xffffffff`8bbbf6c4  0xffffffff`82750760 nt!MiCachedPtes+0xe0 
0xffffffff`8bbbf6c8  0xffffffff`82750760 nt!MiCachedPtes+0xe0 
0xffffffff`8bbbf6d0  0xffffffff`82750760 nt!MiCachedPtes+0xe0 
0xffffffff`8bbbf6d4  0xffffffff`82686180 nt!KeWaitForSingleObject+0x748 
0xffffffff`8bbbf6f8  0xffffffff`827567b0 nt!MmStandbyPageListByPriority+0x50 
0xffffffff`8bbbf6fc  0xffffffff`826c556f nt!MiInsertPageInList+0x90 
0xffffffff`8bbbf714  0xffffffff`826f53e0 nt!MiPfnReferenceCountIsZero+0x19b 
0xffffffff`8bbbf720  0xffffffff`82776d00 nt!MmExpansionLock+0x0 
0xffffffff`8bbbf728  0xffffffff`8261270c hal!KfLowerIrql+0x64 
0xffffffff`8bbbf73c  0xffffffff`826bb50a nt!MiWaitForInPageComplete+0xb5e 
0xffffffff`8bbbf788  0xffffffff`826b5edd nt!MiDispatchFault+0xd14 
0xffffffff`8bbbf790  0xffffffff`826b5f4a nt!MiDispatchFault+0xd81 
0xffffffff`8bbbf7ac  0xffffffff`8261270c hal!KfLowerIrql+0x64 
0xffffffff`8bbbf7e8  0xffffffff`96bc2ffd SYMEVENT!+0x15ffd 
0xffffffff`8bbbf7ec  0xffffffff`96bc1cb6 SYMEVENT+0x14cb6 
0xffffffff`8bbbf818  0xffffffff`8269dc05 nt!MiAllocateWsle+0x14b 
0xffffffff`8bbbf83c  0xffffffff`826bbcf0 nt!MiCheckVirtualAddress+0x42 
0xffffffff`8bbbf854  0xffffffff`82665ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbf864  0xffffffff`826897fa nt!CommonDispatchException+0x4a 
0xffffffff`8bbbf8bc  0xffffffff`8268bd94 nt!KiTrap0E+0xdc 
0xffffffff`8bbbf8cc  0xffffffff`826897ae nt!KiExceptionExit+0x186 
0xffffffff`8bbbf9ac  0xffffffff`82686615 nt!ZwClose+0x11 
0xffffffff`8bbbfa38  0xffffffff`8a929ba7 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x251 
0xffffffff`8bbbfa44  0xffffffff`8272b81d nt!ExFreePoolWithTag+0x817 
0xffffffff`8bbbfaa4  0xffffffff`82665ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbfab0  0xffffffff`8285ead8 nt!PsOpenProcess+0x229 
0xffffffff`8bbbfab4  0xffffffff`8285ef6b nt!NtOpenProcess+0x2d 
0xffffffff`8bbbfac0  0xffffffff`8285ef00 nt!PsGetNextJob+0x79 
0xffffffff`8bbbfac4  0xffffffff`8285ef00 nt!PsGetNextJob+0x79 
0xffffffff`8bbbfac8  0xffffffff`8285ef3e nt!NtOpenProcess+0x0 
0xffffffff`8bbbfacc  0xffffffff`8285ef00 nt!PsGetNextJob+0x79 
0xffffffff`8bbbfad4  0xffffffff`96bc4289 SYMEVENT+0x17289 
0xffffffff`8bbbfad8  0xffffffff`96bc1f86 SYMEVENT+0x14f86 
0xffffffff`8bbbfae4  0xffffffff`96bc4629 SYMEVENT+0x17629 
0xffffffff`8bbbfaf4  0xffffffff`96bc82fc SYMEVENT+0x1b2fc 
0xffffffff`8bbbfbc0  0xffffffff`826e6f43 nt!EtwpCCSwapTrace+0x3b1 
0xffffffff`8bbbfbfc  0xffffffff`8274013c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbbfd48  0xffffffff`826e3da2 nt!ExpWorkerThread+0xfd 
0xffffffff`8bbbfd80  0xffffffff`82813fa2 nt!PspSystemThreadStartup+0x9d 
0xffffffff`8bbbfdb4  0xffffffff`82665ca9 nt!_except_handler4+0x0 
0xffffffff`8bbbfdc4  0xffffffff`8267cf0e nt!KiThreadStartup+0x16 
0xffffffff`8bbbfdc8  0xffffffff`826e3ca5 nt!ExpWorkerThread+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput9.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030513-09.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: c:\symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x82642000 PsLoadedModuleList = 0x82759c70 
Debug session time: Tue Mar  5 16:34:52.873 2013 (UTC - 6:00) 
System Uptime: 0 days 0:13:49.948 
Loading Kernel Symbols 
............................................................... 
................................................................ 
......................... 
Loading User Symbols 
Loading unloaded module list 
.... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck A, {2, 1b, 0, 826e9515} 

Probably caused by : ntkrpamp.exe ( nt!KiUnwaitThread+14 ) 

Followup: MachineOwner 
--------- 

0: kd> !niemiro.rawstack; q 
0xffffffff`a25f6b3c  0xffffffff`826e9515 nt!KiUnwaitThread+0x14 
0xffffffff`a25f6b48  0xffffffff`826e9515 nt!KiUnwaitThread+0x14 
0xffffffff`a25f6b60  0xffffffff`8287cc98 nt!NtClose+0x0 
0xffffffff`a25f6b6c  0xffffffff`8287ccb8 nt!NtClose+0x20 
0xffffffff`a25f6b8c  0xffffffff`8268a615 nt!ZwClose+0x11 
0xffffffff`a25f6bac  0xffffffff`826e9515 nt!KiUnwaitThread+0x14 
0xffffffff`a25f6bd0  0xffffffff`826ee731 nt!KeSetEvent+0x6e 
0xffffffff`a25f6bd8  0xffffffff`8274413c nt!ExWorkerQueue+0x3c 
0xffffffff`a25f6d48  0xffffffff`826e7da2 nt!ExpWorkerThread+0xfd 
0xffffffff`a25f6d80  0xffffffff`82817fa2 nt!PspSystemThreadStartup+0x9d 
0xffffffff`a25f6db4  0xffffffff`82669ca9 nt!_except_handler4+0x0 
0xffffffff`a25f6dc4  0xffffffff`82680f0e nt!KiThreadStartup+0x16 
0xffffffff`a25f6dc8  0xffffffff`826e7ca5 nt!ExpWorkerThread+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput10.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030513-08.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: c:\symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x8264e000 PsLoadedModuleList = 0x82765c70 
Debug session time: Tue Mar  5 11:52:34.890 2013 (UTC - 6:00) 
System Uptime: 0 days 0:25:29.288 
Loading Kernel Symbols 
............................................................... 
................................................................ 
......................... 
Loading User Symbols 
Loading unloaded module list 
.... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck 1000008E, {c0000005, 8287c244, 803fd800, 0} 

Probably caused by : ntkrpamp.exe ( nt!ExpLookupHandleTableEntry+b ) 

Followup: MachineOwner 
--------- 

0: kd> !niemiro.rawstack; q 
0xffffffff`803fd020  0xffffffff`8277d2c0 nt!KiPreBugcheckStackSaveArea+0x0 
0xffffffff`803fd0e8  0xffffffff`8274693c nt!KiInitialPCR+0x13c 
0xffffffff`803fd0ec  0xffffffff`8287c244 nt!ExpLookupHandleTableEntry+0xb 
0xffffffff`803fd0f4  0xffffffff`8274e200 nt!KiHardwareTrigger+0x0 
0xffffffff`803fd0f8  0xffffffff`82746920 nt!KiInitialPCR+0x120 
0xffffffff`803fd100  0xffffffff`8271babf nt!KeBugCheckEx+0x1e 
0xffffffff`803fd314  0xffffffff`826f73b4 nt!ExecuteHandler+0x24 
0xffffffff`803fd328  0xffffffff`82675ca9 nt!_except_handler4+0x0 
0xffffffff`803fd338  0xffffffff`82689bc6 nt!RtlDispatchException+0xb6 
0xffffffff`803fd34c  0xffffffff`82675ca9 nt!_except_handler4+0x0 
0xffffffff`803fd368  0xffffffff`82701e0c nt!KiDeliverApc+0xce 
0xffffffff`803fd384  0xffffffff`826226a8 hal!KfLowerIrql+0x0 
0xffffffff`803fd388  0xffffffff`8274833c nt!KiInitialPCR+0x1b3c 
0xffffffff`803fd3a4  0xffffffff`8271babf nt!KeBugCheckEx+0x1e 
0xffffffff`803fd3b0  0xffffffff`8287c244 nt!ExpLookupHandleTableEntry+0xb 
0xffffffff`803fd3c4  0xffffffff`82675928 nt!KiDispatchException+0x1a9 
0xffffffff`803fd3d0  0xffffffff`8287c244 nt!ExpLookupHandleTableEntry+0xb 
0xffffffff`803fd404  0xffffffff`8275013c nt!ExWorkerQueue+0x3c 
0xffffffff`803fd408  0xffffffff`8270151b nt!IopCompleteRequest+0x3a6 
0xffffffff`803fd40c  0xffffffff`8270151b nt!IopCompleteRequest+0x3a6 
0xffffffff`803fd414  0xffffffff`82696180 nt!KeWaitForSingleObject+0x748 
0xffffffff`803fd438  0xffffffff`82746920 nt!KiInitialPCR+0x120 
0xffffffff`803fd448  0xffffffff`8a8c2314 storport!NullAnsiString+0x8 
0xffffffff`803fd454  0xffffffff`82957a8f nt!$$VProc_ImageExportDirectory+0x9a8f 
0xffffffff`803fd560  0xffffffff`8287c244 nt!ExpLookupHandleTableEntry+0xb 
0xffffffff`803fd5bc  0xffffffff`826f6a55 nt!EtwTraceContextSwap+0x14a 
0xffffffff`803fd5d8  0xffffffff`82746800 nt!KiInitialPCR+0x0 
0xffffffff`803fd5dc  0xffffffff`827506c4 nt!ExpLargePoolTableLock+0x0 
0xffffffff`803fd5ec  0xffffffff`8262270c hal!KfLowerIrql+0x64 
0xffffffff`803fd600  0xffffffff`826226a8 hal!KfLowerIrql+0x0 
0xffffffff`803fd604  0xffffffff`82748300 nt!KiInitialPCR+0x1b00 
0xffffffff`803fd608  0xffffffff`826f64dc nt!SwapContext_PatchFxe+0x30 
0xffffffff`803fd60c  0xffffffff`826226a8 hal!KfLowerIrql+0x0 
0xffffffff`803fd610  0xffffffff`82748300 nt!KiInitialPCR+0x1b00 
0xffffffff`803fd61c  0xffffffff`8262270c hal!KfLowerIrql+0x64 
0xffffffff`803fd620  0xffffffff`8274833c nt!KiInitialPCR+0x1b3c 
0xffffffff`803fd62c  0xffffffff`826fa2da nt!KiSwapThread+0x477 
0xffffffff`803fd630  0xffffffff`8275013c nt!ExWorkerQueue+0x3c 
0xffffffff`803fd65c  0xffffffff`827506e0 nt!NonPagedPoolDescriptor+0x0 
0xffffffff`803fd664  0xffffffff`826f94b0 nt!EtwpReserveTraceBuffer+0xce 
0xffffffff`803fd670  0xffffffff`8268453a nt!KeWaitForGate+0x21b 
0xffffffff`803fd69c  0xffffffff`8273b81d nt!ExFreePoolWithTag+0x817 
0xffffffff`803fd6ac  0xffffffff`827506e0 nt!NonPagedPoolDescriptor+0x0 
0xffffffff`803fd6e4  0xffffffff`82746920 nt!KiInitialPCR+0x120 
0xffffffff`803fd704  0xffffffff`82897ad7 nt!NtAllocateVirtualMemory+0x1632 
0xffffffff`803fd76c  0xffffffff`826cbcf0 nt!MiCheckVirtualAddress+0x42 
0xffffffff`803fd784  0xffffffff`82675ca9 nt!_except_handler4+0x0 
0xffffffff`803fd794  0xffffffff`826997fa nt!CommonDispatchException+0x4a 
0xffffffff`803fd7b8  0xffffffff`8287c244 nt!ExpLookupHandleTableEntry+0xb 
0xffffffff`803fd7ec  0xffffffff`8269bd94 nt!KiTrap0E+0xdc 
0xffffffff`803fd7fc  0xffffffff`826997ae nt!KiExceptionExit+0x186 
0xffffffff`803fd804  0xffffffff`8287c244 nt!ExpLookupHandleTableEntry+0xb 
0xffffffff`803fd820  0xffffffff`8285eb5c nt!NtUnmapViewOfSection+0x5f 
0xffffffff`803fd828  0xffffffff`8285ea00 nt!NtMapViewOfSection+0x1c5 
0xffffffff`803fd868  0xffffffff`8287c244 nt!ExpLookupHandleTableEntry+0xb 
0xffffffff`803fd878  0xffffffff`8288850b nt!ExMapHandleToPointer+0x1a 
0xffffffff`803fd890  0xffffffff`828885bf nt!ObpCloseHandle+0x5e 
0xffffffff`803fd8a0  0xffffffff`82888c98 nt!NtClose+0x0 
0xffffffff`803fd8ac  0xffffffff`82888cb8 nt!NtClose+0x20 
0xffffffff`803fd8c0  0xffffffff`82698c3a nt!KiFastCallEntry+0x12a 
0xffffffff`803fd8cc  0xffffffff`82696615 nt!ZwClose+0x11 
0xffffffff`803fd930  0xffffffff`82696615 nt!ZwClose+0x11 
0xffffffff`803fd9ac  0xffffffff`82696615 nt!ZwClose+0x11 
0xffffffff`803fda3c  0xffffffff`8262497f hal!HalpQueryHpetCount+0x4b 
0xffffffff`803fdaa4  0xffffffff`82675ca9 nt!_except_handler4+0x0 
0xffffffff`803fdab0  0xffffffff`8286ead8 nt!PsOpenProcess+0x229 
0xffffffff`803fdab4  0xffffffff`8286ef6b nt!NtOpenProcess+0x2d 
0xffffffff`803fdac0  0xffffffff`8286ef00 nt!PsGetNextJob+0x79 
0xffffffff`803fdac4  0xffffffff`8286ef00 nt!PsGetNextJob+0x79 
0xffffffff`803fdac8  0xffffffff`8286ef3e nt!NtOpenProcess+0x0 
0xffffffff`803fdacc  0xffffffff`8286ef00 nt!PsGetNextJob+0x79 
Unable to load image \??\C:\Windows\system32\Drivers\SYMEVENT.SYS, Win32 error 0n2 
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS 
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS 
0xffffffff`803fdad4  0xffffffff`959a2289 SYMEVENT!+0x17289 
0xffffffff`803fdad8  0xffffffff`9599ff86 SYMEVENT+0x14f86 
0xffffffff`803fdae4  0xffffffff`959a2629 SYMEVENT+0x17629 
0xffffffff`803fdaf4  0xffffffff`959a62fc SYMEVENT+0x1b2fc 
0xffffffff`803fdbc0  0xffffffff`826f6f43 nt!EtwpCCSwapTrace+0x3b1 
0xffffffff`803fdbd0  0xffffffff`8275013c nt!ExWorkerQueue+0x3c 
0xffffffff`803fdbfc  0xffffffff`8275013c nt!ExWorkerQueue+0x3c 
0xffffffff`803fdd48  0xffffffff`826f3da2 nt!ExpWorkerThread+0xfd 
0xffffffff`803fdd80  0xffffffff`82823fa2 nt!PspSystemThreadStartup+0x9d 
0xffffffff`803fddb4  0xffffffff`82675ca9 nt!_except_handler4+0x0 
0xffffffff`803fddc4  0xffffffff`8268cf0e nt!KiThreadStartup+0x16 
0xffffffff`803fddc8  0xffffffff`826f3ca5 nt!ExpWorkerThread+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput11.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030513-07.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: srv*c:\symbols*https://msdl.microsoft.com/download/symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x8261a000 PsLoadedModuleList = 0x82731c70 
Debug session time: Tue Mar  5 11:26:18.551 2013 (UTC - 6:00) 
System Uptime: 0 days 4:40:35.653 
Loading Kernel Symbols 
............................................................... 
................................................................ 
......................... 
Loading User Symbols 
Loading unloaded module list 
...... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck A, {0, 1b, 1, 826c97ac} 

Probably caused by : ntkrpamp.exe ( nt!KiAttachProcess+a3 ) 

Followup: MachineOwner 
--------- 

2: kd> !niemiro.rawstack; q 
0xffffffff`ac009880  0xffffffff`826c97ac nt!KiAttachProcess+0xa3 
0xffffffff`ac00988c  0xffffffff`826c97ac nt!KiAttachProcess+0xa3 
0xffffffff`ac0098f0  0xffffffff`826c97ac nt!KiAttachProcess+0xa3 
0xffffffff`ac00990c  0xffffffff`826cbe8a nt!KeStackAttachProcess+0xa0 
0xffffffff`ac0099ac  0xffffffff`82662615 nt!ZwClose+0x11 
0xffffffff`ac009a38  0xffffffff`8a928ba7 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x251 
0xffffffff`ac009a44  0xffffffff`8270781d nt!ExFreePoolWithTag+0x817 
0xffffffff`ac009aa4  0xffffffff`82641ca9 nt!_except_handler4+0x0 
0xffffffff`ac009ab0  0xffffffff`8283aad8 nt!PsOpenProcess+0x229 
0xffffffff`ac009ab4  0xffffffff`8283af6b nt!NtOpenProcess+0x2d 
0xffffffff`ac009ac0  0xffffffff`8283af00 nt!PsGetNextJob+0x79 
0xffffffff`ac009ac4  0xffffffff`8283af00 nt!PsGetNextJob+0x79 
0xffffffff`ac009ac8  0xffffffff`8283af3e nt!NtOpenProcess+0x0 
0xffffffff`ac009acc  0xffffffff`8283af00 nt!PsGetNextJob+0x79 
Unable to load image \??\C:\Windows\system32\Drivers\SYMEVENT.SYS, Win32 error 0n2 
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS 
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS 
0xffffffff`ac009ad4  0xffffffff`97f55289 SYMEVENT!+0x17289 
0xffffffff`ac009ad8  0xffffffff`97f52f86 SYMEVENT+0x14f86 
0xffffffff`ac009ae4  0xffffffff`97f55629 SYMEVENT+0x17629 
0xffffffff`ac009af4  0xffffffff`97f592fc SYMEVENT+0x1b2fc 
0xffffffff`ac009b68  0xffffffff`82664c3a nt!KiFastCallEntry+0x12a 
0xffffffff`ac009b80  0xffffffff`8266317d nt!ZwOpenProcess+0x11 
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2 
*** WARNING: Unable to verify timestamp for nvlddmkm.sys 
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys 
0xffffffff`ac009ba4  0xffffffff`92388a52 nvlddmkm!+0x17ba52 
0xffffffff`ac009bc0  0xffffffff`826c2f43 nt!EtwpCCSwapTrace+0x3b1 
0xffffffff`ac009bd0  0xffffffff`8271c13c nt!ExWorkerQueue+0x3c 
0xffffffff`ac009bfc  0xffffffff`8271c13c nt!ExWorkerQueue+0x3c 
0xffffffff`ac009d48  0xffffffff`826bfda2 nt!ExpWorkerThread+0xfd 
0xffffffff`ac009d80  0xffffffff`827effa2 nt!PspSystemThreadStartup+0x9d 
0xffffffff`ac009db4  0xffffffff`82641ca9 nt!_except_handler4+0x0 
0xffffffff`ac009dc4  0xffffffff`82658f0e nt!KiThreadStartup+0x16 
0xffffffff`ac009dc8  0xffffffff`826bfca5 nt!ExpWorkerThread+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨`` 
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\17904\kdc\outkdOutput12.1.txt' 

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64 
Copyright (c) Microsoft Corporation. All rights reserved. 


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_10\soulcross19\Windows7_Vista_jcgriff2\Mini030513-06.dmp] 
Mini Kernel Dump File: Only registers and stack trace are available 

Symbol search path is: srv*c:\symbols*https://msdl.microsoft.com/download/symbols 
Executable search path is:  
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible 
Product: WinNt, suite: TerminalServer SingleUserTS Personal 
Built by: 6002.18765.x86fre.vistasp2_gdr.130104-1437 
Machine Name: 
Kernel base = 0x82610000 PsLoadedModuleList = 0x82727c70 
Debug session time: Tue Mar  5 06:44:32.747 2013 (UTC - 6:00) 
System Uptime: 0 days 0:05:19.470 
Loading Kernel Symbols 
............................................................... 
................................................................ 
......................... 
Loading User Symbols 
Loading unloaded module list 
.... 
******************************************************************************* 
*                                                                             * 
*                        Bugcheck Analysis                                    * 
*                                                                             * 
******************************************************************************* 

Use !analyze -v to get detailed debugging information. 

BugCheck 50, {a4f33af8, 0, 886c8d89, 0} 

Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+dc ) 

Followup: MachineOwner 
--------- 

3: kd> !niemiro.rawstack; q 
0xffffffff`8bbcbb28  0xffffffff`82728800 nt!MmSystemCacheWs+0x0 
0xffffffff`8bbcbb74  0xffffffff`8265dd94 nt!KiTrap0E+0xdc 
0xffffffff`8bbcbb94  0xffffffff`82658615 nt!ZwClose+0x11 
0xffffffff`8bbcbba0  0xffffffff`8ad40a88 NETIO!NetioDereferenceNetBufferListChain+0xcf 
0xffffffff`8bbcbbc4  0xffffffff`82658615 nt!ZwClose+0x11 
0xffffffff`8bbcbbd0  0xffffffff`8271213c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbcbbfc  0xffffffff`8271213c nt!ExWorkerQueue+0x3c 
0xffffffff`8bbcbd48  0xffffffff`826b5da2 nt!ExpWorkerThread+0xfd 
0xffffffff`8bbcbd80  0xffffffff`827e5fa2 nt!PspSystemThreadStartup+0x9d 
0xffffffff`8bbcbdb4  0xffffffff`82637ca9 nt!_except_handler4+0x0 
0xffffffff`8bbcbdc4  0xffffffff`8264ef0e nt!KiThreadStartup+0x16 
0xffffffff`8bbcbdc8  0xffffffff`826b5ca5 nt!ExpWorkerThread+0x0 
quit: 

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
writhziden is offline  
Old 03-19-2013, 01:59 AM   #9
Registered Member
 
Join Date: Mar 2013
Posts: 22
OS: Windows 8.1 64-bit



Given that it's been over a week since the last post I feel safe enough to give an update. Everything seems to be working perfectly. I haven't had a single blue screen since I removed Norton. It just seems weird that after years of Norton working fine that it just up and started causing problems, but oh well. Thank you for the help I really appreciate it.
soulcross19 is offline  
Old 03-19-2013, 05:36 AM   #10
TSF Enthusiast
 
Join Date: Jul 2012
Location: Colorado
Posts: 3,036
OS: Windows 7 Home Premium x64

My System


You're welcome. I am very glad that your system is stable again. :-}

Once you are confident the problem is solved, please mark the thread solved by clicking Thread Tools at the top of the thread and choosing the option to Mark this thread as solved.



-----
writhziden is offline  
Closed Thread

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Similar Threads
Thread Thread Starter Forum Replies Last Post
Multiple BSODs
Looking for help to with multiple and increasing BSODs. Zipped files attached as requested: HISTORY OF PROBLEM About 6 weeks ago computer becoming noticeably slower. On 8 Nov SPAM email sent from my Live mail account (offering all my contacts untold riches if they got in touch etc)....
rjks BSOD, App Crashes And Hangs 3 12-19-2011 10:25 AM
[SOLVED] Repeated BSOD Multiples
Hello. This is my first post on this forum. The reason I have joined this community is to seek help for a serious issue related to my Desktop PC. I own a HP Pavilion a6530f Desktop PC that runs on Vista Home Premium. The BIOS of this PC is Phoenix Technologies, LTD 5.13 5/2/2008. This PC...
DavisG BSOD, App Crashes And Hangs 21 12-03-2011 02:28 PM
[SOLVED] Multiple Random BSODs
Hello! I'm not really sure of the problem, but I seem to be getting many random BSODs. It is my sister's computer, and she has been having problems for a few months now. The computer wouldn't let her install SP1 on Windows 7, and it kept getting BSODs, so I decided to reinstall the OS for her. I...
Melvintosh BSOD, App Crashes And Hangs 14 05-19-2011 05:01 PM
[SOLVED] Multiple BSODs
Over the past month I have been experiencing various BSODs ranging from when I turn on the laptop, to completely random ones. I have noticed that once the laptop is up and running, it seems a lot more stable and will be fine for days (if I hibernate it rather than turning off). Some (but not all)...
join_the_dots BSOD, App Crashes And Hangs 12 04-07-2011 03:36 PM
Multiple random BSODs, whits end
I built a custom pc in august, it started getting BSODs in december. I reinstalled windows, didn't help. bluescreens started getting worse, reinstalled windows again, helped for a week or so but they started again. There are no dump files from BSODs, but I have been taking pictures of the error...
whitenova BSOD, App Crashes And Hangs 12 02-25-2011 02:00 PM

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is on
Smilies are on
[IMG] code is on
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off


Post a Question


» Site Navigation
 > FAQ
  > 10.0.0.2
Powered by vBadvanced CMPS v3.2.3


All times are GMT -7. The time now is 11:34 PM.


Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2020, vBulletin Solutions, Inc.
vBulletin Security provided by vBSecurity v2.2.2 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
User Alert System provided by Advanced User Tagging v3.1.0 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
Copyright 2001 - 2018, Tech Support Forum

Windows 10 - Windows 7 - Windows XP - Windows Vista - Trojan Removal - Spyware Removal - Virus Removal - Networking - Security - Top Web Hosts