Hi Jesper. You have three different error codes in three dumps. That usually indicates a hardware or hardware related problem.
Error code 24, NTFS File System.
Usual causes: Disk corruption, insufficient physical memory, Device driver, Indexing, Resident antivirus, backup, defrag programs, Disk/Drive failing/failure.
Error code 3B, SYSTEM_SERVICE_EXCEPTION.
Usual causes: System service, Device driver, graphics driver, ?memory
Error code 7E, SYSTEM_THREAD_EXCEPTION_NOT_HANDLED.
Usual causes: Insufficient disk space, Device driver, Video card, BIOS, Breakpoint with no debugger attached, Hardware incompatibility, Faulty system service, Memory, 3rd party remote control,
Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c0a000 PsLoadedModuleList = 0xfffff800`02e47e50
Debug session time: Tue Sep 28 05:12:32.628 2010 (GMT-5)
System Uptime: 0 days 0:39:36.282
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88008a5fd68, fffff88008a5f5d0, fffff80002c99137}
Probably caused by : Ntfs.sys ( Ntfs! ?? ::FNODOBFM::`string'+2cc9 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88008a5fd68
Arg3: fffff88008a5f5d0
Arg4: fffff80002c99137
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88008a5fd68 -- (.exr 0xfffff88008a5fd68)
ExceptionAddress: fffff80002c99137 (nt!CcGetVirtualAddress+0x0000000000000047)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: ffffffffffffffff
Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000
CONTEXT: fffff88008a5f5d0 -- (.cxr 0xfffff88008a5f5d0)
rax=0000000000000000 rbx=000000000000000e rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000001 rdi=fffffa8008fbf7a0
rip=fffff80002c99137 rsp=fffff88008a5ffa0 rbp=ffdffa8008fb4010
r8=fffff88008a600f8 r9=fffff88008a600f0 r10=0000000000000000
r11=0000000000000001 r12=0000000000000001 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!CcGetVirtualAddress+0x47:
fffff800`02c99137 8b8598000000 mov eax,dword ptr [rbp+98h] ss:0018:ffdffa80`08fb40a8=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: rundll32.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: ffffffffffffffff
EXCEPTION_PARAMETER2: 0000000000000000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb20e0
0000000000000000
FOLLOWUP_IP:
Ntfs! ?? ::FNODOBFM::`string'+2cc9
fffff880`012553d8 cc int 3
FAULTING_IP:
nt!CcGetVirtualAddress+47
fffff800`02c99137 8b8598000000 mov eax,dword ptr [rbp+98h]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002c99137
STACK_TEXT:
fffff880`08a5eda8 fffff880`012553d8 : 00000000`00000024 00000000`001904fb fffff880`08a5fd68 fffff880`08a5f5d0 : nt!KeBugCheckEx
fffff880`08a5edb0 fffff880`0123d753 : fffff880`012813b8 fffff880`08a60920 fffff880`08a60920 00000000`00017007 : Ntfs! ?? ::FNODOBFM::`string'+0x2cc9
fffff880`08a5edf0 fffff800`02ca8d1c : 00000000`00010012 fffff800`02ca89af 00000000`00000010 00000000`00000246 : Ntfs! ?? ::FNODOBFM::`string'+0x1413
fffff880`08a5ee20 fffff800`02ca040d : fffff880`012813ac fffff880`08a60920 00000000`00000000 fffff880`01234000 : nt!_C_specific_handler+0x8c
fffff880`08a5ee90 fffff800`02ca7a90 : fffff880`012813ac fffff880`08a5ef08 fffff880`08a5fd68 fffff880`01234000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`08a5eec0 fffff800`02cb49ef : fffff880`08a5fd68 fffff880`08a5f5d0 fffff880`00000000 fffffa80`08fbf7a0 : nt!RtlDispatchException+0x410
fffff880`08a5f5a0 fffff800`02c79d82 : fffff880`08a5fd68 00000000`0000000e fffff880`08a5fe10 00000000`00000001 : nt!KiDispatchException+0x16f
fffff880`08a5fc30 fffff800`02c78552 : 00000000`00000000 00000000`00000000 fffff8a0`00213070 fffff8a0`002135f0 : nt!KiExceptionDispatch+0xc2
fffff880`08a5fe10 fffff800`02c99137 : fffff8a0`0f0f2140 fffff880`08a60090 00000000`00000002 fffff980`00000000 : nt!KiStackFault+0x112
fffff880`08a5ffa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcGetVirtualAddress+0x47
STACK_COMMAND: kb
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs! ?? ::FNODOBFM::`string'+2cc9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
FAILURE_BUCKET_ID: X64_0x24_Ntfs!_??_::FNODOBFM::_string_+2cc9
BUCKET_ID: X64_0x24_Ntfs!_??_::FNODOBFM::_string_+2cc9
Followup: MachineOwner
---------
Debug session time: Tue Sep 28 05:21:27.109 2010 (GMT-5)
System Uptime: 0 days 0:08:25.138
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002caa7b4, fffff880087fa020, 0}
Probably caused by : ntkrnlmp.exe ( nt!AlpcpLookasidePacketCallbackRoutine+14 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002caa7b4, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880087fa020, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!AlpcpLookasidePacketCallbackRoutine+14
fffff800`02caa7b4 488b7a10 mov rdi,qword ptr [rdx+10h]
CONTEXT: fffff880087fa020 -- (.cxr 0xfffff880087fa020)
rax=fffff80002caa7a0 rbx=fffffa8005b93f50 rcx=fffffa8005b93f50
rdx=ffdffa8005f26020 rsi=0000000000000001 rdi=0000000000000000
rip=fffff80002caa7b4 rsp=fffff880087fa9f0 rbp=fffff880087faca0
r8=fffff80002c5e000 r9=0000000000000000 r10=fffffffffffffffe
r11=fffffa8005b93f50 r12=0000000000000000 r13=fffff880087faba8
r14=ffffffffffffffff r15=0000000000299b70
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!AlpcpLookasidePacketCallbackRoutine+0x14:
fffff800`02caa7b4 488b7a10 mov rdi,qword ptr [rdx+10h] ds:002b:ffdffa80`05f26030=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: SearchFilterHo
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002fc9f48 to fffff80002caa7b4
STACK_TEXT:
fffff880`087fa9f0 fffff800`02fc9f48 : 00000000`00000000 fffff880`087fabc8 fffffa80`05b93f50 00000000`00000000 : nt!AlpcpLookasidePacketCallbackRoutine+0x14
fffff880`087faa90 fffff800`02cdeaa6 : 000007fe`00000000 fffff880`087faba8 fffff880`087fabc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x198
fffff880`087fab20 fffff800`02ccd993 : fffffa80`0855c6c0 00000000`775c4270 00000000`00000000 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`087fac20 00000000`7751165a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`011bfb48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7751165a
FOLLOWUP_IP:
nt!AlpcpLookasidePacketCallbackRoutine+14
fffff800`02caa7b4 488b7a10 mov rdi,qword ptr [rdx+10h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!AlpcpLookasidePacketCallbackRoutine+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff880087fa020 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!AlpcpLookasidePacketCallbackRoutine+14
BUCKET_ID: X64_0x3B_nt!AlpcpLookasidePacketCallbackRoutine+14
Followup: MachineOwner
---------
Debug session time: Tue Sep 28 04:08:16.096 2010 (GMT-5)
System Uptime: 0 days 0:44:47.125
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
Unable to load image \SystemRoot\system32\DRIVERS\atipmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atipmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atipmdag.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff88004b2610f, fffff8800219c278, fffff8800219bae0}
Probably caused by : atipmdag.sys ( atipmdag+2ad10f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004b2610f, The address that the exception occurred at
Arg3: fffff8800219c278, Exception Record Address
Arg4: fffff8800219bae0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
atipmdag+2ad10f
fffff880`04b2610f 8179083800bebe cmp dword ptr [rcx+8],0BEBE0038h
EXCEPTION_RECORD: fffff8800219c278 -- (.exr 0xfffff8800219c278)
ExceptionAddress: fffff88004b2610f (atipmdag+0x00000000002ad10f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff8800219bae0 -- (.cxr 0xfffff8800219bae0)
rax=0000000000000000 rbx=fffffa8007366000 rcx=ffdff8a000e29570
rdx=0000000000000003 rsi=fffffa8007366000 rdi=0000000000000000
rip=fffff88004b2610f rsp=fffff8800219c4b0 rbp=fffffa8006bc2000
r8=0000000000000003 r9=fffffa8006bc2000 r10=ffdff8a000e29570
r11=0000000000000000 r12=0000000000000000 r13=0000000000000149
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
atipmdag+0x2ad10f:
fffff880`04b2610f 8179083800bebe cmp dword ptr [rcx+8],0BEBE0038h ds:002b:ffdff8a0`00e29578=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ea90e0
ffffffffffffffff
FOLLOWUP_IP:
atipmdag+2ad10f
fffff880`04b2610f 8179083800bebe cmp dword ptr [rcx+8],0BEBE0038h
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88004b2610f
STACK_TEXT:
fffff880`0219c4b0 00000000`00000000 : fffffa80`06bc2000 fffffa80`07366000 fffff880`04b5b426 fffff880`0219c5b0 : atipmdag+0x2ad10f
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atipmdag+2ad10f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atipmdag
IMAGE_NAME: atipmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb09c5a
STACK_COMMAND: .cxr 0xfffff8800219bae0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_atipmdag+2ad10f
BUCKET_ID: X64_0x7E_atipmdag+2ad10f
Followup: MachineOwner
---------
0: kd> lmtsmn
start end module name
fffff880`00eb5000 fffff880`00f0c000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02caf000 fffff880`02d39000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04fdc000 fffff880`04ff2000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03efd000 fffff880`03f12000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c00000 fffff880`00c0b000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00db9000 fffff880`00dc2000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dc2000 fffff880`00dec000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`050da000 fffff880`050fc000 AtiHdmi AtiHdmi.sys Tue Mar 09 05:08:38 2010 (4B961E26)
fffff880`03f12000 fffff880`03f46000 atikmpag atikmpag.sys Mon Mar 29 07:46:26 2010 (4BB09312)
fffff880`01842000 fffff880`0184a000 AtiPcie AtiPcie.sys Mon Aug 24 04:25:26 2009 (4A924E76)
fffff880`04879000 fffff880`04ee8000 atipmdag atipmdag.sys Mon Mar 29 08:26:02 2010 (4BB09C5A)
fffff880`03e90000 fffff880`03ed7000 avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
fffff880`02deb000 fffff880`02df2080 avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
fffff880`0196a000 fffff880`019bb000 avgtdia avgtdia.sys Thu Jun 03 17:09:57 2010 (4C081A25)
fffff880`00f7d000 fffff880`00f89000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`042cc000 fffff880`045bb000 bcmwl664 bcmwl664.sys Mon Mar 22 23:08:39 2010 (4BA830B7)
fffff880`018be000 fffff880`018c5000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02dda000 fffff880`02deb000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05f44000 fffff880`05f62000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00680000 fffff960`006a7000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`05ad9000 fffff880`05af6000 cdfs cdfs.sys Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`01882000 fffff880`018ac000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cc8000 fffff880`00d88000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01812000 fffff880`01842000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c6a000 fffff880`00cc8000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04274000 fffff880`04278500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`0116d000 fffff880`011e0000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00f74000 fffff880`00f7d000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`045e3000 fffff880`045f3000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05af6000 fffff880`05b04000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02dbc000 fffff880`02dda000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c83000 fffff880`02c92000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01200000 fffff880`01216000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05139000 fffff880`0515b000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05b04000 fffff880`05b10000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05b1b000 fffff880`05b2e000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05b10000 fffff880`05b1b000 dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`05acd000 fffff880`05ad9000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04ee8000 fffff880`04fdc000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04800000 fffff880`04846000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`010fb000 fffff880`0110f000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010af000 fffff880`010fb000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013e6000 fffff880`013f0000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00c0b000 fffff880`00c45000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`031dd000 fffff800`03226000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04846000 fffff880`0486a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05a70000 fffff880`05a89000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05a89000 fffff880`05a91080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05a62000 fffff880`05a70000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05e7c000 fffff880`05f44000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015e5000 fffff880`015ee000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04279000 fffff880`04297000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05e23000 fffff880`05e3c000 idmwfp idmwfp.sys Wed Aug 25 10:27:07 2010 (4C75283B)
fffff880`03f46000 fffff880`03f97000 k57nd60a k57nd60a.sys Fri Oct 16 06:29:38 2009 (4AD84B12)
fffff880`04297000 fffff880`042a6000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bb2000 fffff800`00bbc000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`05016000 fffff880`05059000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013bb000 fffff880`013d5000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015ba000 fffff880`015e5000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0515b000 fffff880`05160200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05b80000 fffff880`05b95000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05b3c000 fffff880`05b5f000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c49000 fffff880`00c56000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05b2e000 fffff880`05b3c000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`042a8000 fffff880`042b7000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05a92000 fffff880`05a9f000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d9f000 fffff880`00db9000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05f62000 fffff880`05f7a000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05f7a000 fffff880`05fa7000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05fa7000 fffff880`05ff5000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05e00000 fffff880`05e23000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`00dec000 fffff880`00df7000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`01923000 fffff880`0192e000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f15000 fffff880`00f1f000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0110f000 fffff880`0116d000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c78000 fffff880`02c83000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01452000 fffff880`01464000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`018ac000 fffff880`018b5000 mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 06:07:30 2009 (4A24F9E2)
fffff880`02c70000 fffff880`02c78000 mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 06:07:39 2009 (4A24F9EB)
fffff880`02c5d000 fffff880`02c70000 mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 06:15:29 2009 (4A24FBC1)
fffff880`01468000 fffff880`0155a000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`045f3000 fffff880`045ff000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`05be8000 fffff880`05bfb000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`03e24000 fffff880`03e53000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`050c5000 fffff880`050da000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d7e000 fffff880`02d8d000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`019bb000 fffff880`01a00000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0155a000 fffff880`015ba000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0192e000 fffff880`0193f000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c01000 fffff800`031dd000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01218000 fffff880`013bb000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`045d0000 fffff880`045d8000 NTIDrvr NTIDrvr.sys Tue Mar 24 23:09:39 2009 (49C9A073)
fffff880`018b5000 fffff880`018be000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`05b95000 fffff880`05be8000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d42000 fffff880`02d68000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f5f000 fffff880`00f74000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f1f000 fffff880`00f52000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00d88000 fffff880`00d8f000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00d8f000 fffff880`00d9f000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d5000 fffff880`013e6000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06e86000 fffff880`06f2c000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`050fc000 fffff880`05139000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c56000 fffff880`00c6a000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03e00000 fffff880`03e24000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03e53000 fffff880`03e6e000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03e6e000 fffff880`03e8f000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03fe4000 fffff880`03ffe000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01908000 fffff880`01911000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01911000 fffff880`0191a000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0191a000 fffff880`01923000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05800000 fffff880`05818000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0581a000 fffff880`05a44100 RTKVHD64 RTKVHD64.sys Thu Feb 25 04:14:31 2010 (4B863F77)
fffff880`06f2c000 fffff880`06f37000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0144a000 fffff880`01452000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06e00000 fffff880`06e71000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`05161000 fffff880`051f7000 srv srv.sys Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`06f76000 fffff880`06fde000 srv2 srv2.sys Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`06f37000 fffff880`06f64000 srvnet srvnet.sys Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`042c0000 fffff880`042c1480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`03f97000 fffff880`03fe4000 SynTP SynTP.sys Thu Sep 17 22:30:41 2009 (4AB2F0D1)
fffff880`01603000 fffff880`01800000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06f64000 fffff880`06f76000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0195d000 fffff880`0196a000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0193f000 fffff880`0195d000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02da8000 fffff880`02dbc000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004e0000 fffff960`004ea000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`03ed7000 fffff880`03efd000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`045c8000 fffff880`045d0000 UBHelper UBHelper.sys Mon Apr 27 04:48:19 2009 (49F57153)
fffff880`05059000 fffff880`0506b000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05a45000 fffff880`05a62000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`042a6000 fffff880`042a7f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04263000 fffff880`04274000 usbehci usbehci.sys Fri Dec 04 02:26:02 2009 (4B18B98A)
fffff880`04256000 fffff880`04263000 usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
fffff880`0506b000 fffff880`050c5000 usbhub usbhub.sys Fri Dec 04 02:26:39 2009 (4B18B9AF)
fffff880`045d8000 fffff880`045e3000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04200000 fffff880`04256000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05a9f000 fffff880`05acc100 usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
fffff880`00f52000 fffff880`00f5f000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`018c5000 fffff880`018d3000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`018d3000 fffff880`018f8000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f89000 fffff880`00f9e000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f9e000 fffff880`00ffa000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`045bb000 fffff880`045c8000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02d68000 fffff880`02d7e000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02d8d000 fffff880`02da8000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`018f8000 fffff880`01908000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e02000 fffff880`00ea6000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea6000 fffff880`00eb5000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d39000 fffff880`02d42000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00050000 fffff960`0035f000 win32k win32k.sys Sat Jun 19 00:31:59 2010 (4C1C483F)
fffff880`042b7000 fffff880`042c0000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f0c000 fffff880`00f15000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05b5f000 fffff880`05b80000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`06e00000 fffff880`06e71000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0184a000 fffff880`01858000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01858000 fffff880`01864000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01864000 fffff880`0186f000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0186f000 fffff880`01882000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
To begin your troubleshooting, I recommend that you uninstall AVG antivirus using this removal tool: Tool (64 bit). If you have Identity Protection installed, remove it with this tool: Tool. AVG is known to cause BSOD's on some Win 7 systems. Download and install Microsoft Security Essentials in it place and make sure Windows Firewall is turned on.
Also completely uninstall EgisTec PrivateSafe Driver byEgis Technology Inc. The drivers for this software are out of date and there is a good chance this software is causing conflicts and memory corruption.
I also find this out of date driver loaded on your system. Oudtated drivers can and do cause memory corruption and BSOD's.
There is probably not an update for this driver unless Acer has an update. Try the Acer website. If there is no update, you can navigate to C:\Windows\System32\Drivers, locate this driver and rename it from .sys to .bak. Reboot and the driver will not load. However, this will break the utility to which the driver belongs. You can always go back and rename it again once your system is stable.
Uninstall AVG and Private Safe, update or rename the above driver, reboot and let's see how your system does. Post back and let us know. If you get another BSOD, upload it and we will start testing hardware.
You can go ahead and run Check Disk.
Run CHKDSK /R /F from an elevated (Run as adminstrator) Command Prompt. Please do this for each hard drive on your system.
When it tells you it can't do it right now - and asks you if you'd like to do it at the next reboot - answer Y (for Yes) and press Enter. Then reboot and let the test run. It may take a while for it to run, but keep an occasional eye on it to see if it generates any errors. See "CHKDSK LogFile" below in order to check the results of the test.
Elevated Command Prompt:
Go to Start and type in "cmd.exe" (without the quotes)
At the top of the Search Box, right click on Cmd.exe and select "Run as administrator"
CHKDSK LogFile:
Go to Start and type in "eventvwr.msc" (without the quotes) and press Enter
Expand the Windows logs heading, then select the Application log file entry.
Double click on the Source column header.
Scroll down the list until you find the Chkdsk entry (wininit for Windows 7) (winlogon for XP).
Copy/paste the results into your next post.