Frequent / Repetitive Blue Screens


  1. Posts : 4
    Windows 7 Professional x64
       #1

    Frequent / Repetitive Blue Screens


    Whenever I am under a medium sized load, my computer will blue screen with various different blue screens such as "Page fault in nonpaged area" or "System service exception."

    I am running:
    x64 Full Retail Windows 7 Professional
    This computer is relatively new, I just built it, same with the OS.
    I have already tried a "repair" installation and that did not fix my issues.

    I have attached my Minidumps / my Performance Monitor output.

    I can reproduce this blue screen by attempting to render a video. Anytime I try to render a video about 25% of the way through I blue screen.

    Any help would be great, thanks.
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    Hi dustty and welcome to the forum. I looked at your three most recent dumps. All three indicate hardware/hardware related (drivers) issues and memory corruption. Because the dumps do not give a specific cause you will have to trouble shoot.

    To start the process, I see that sptd.sys was involved on one of your crashes:
    Please uninstall any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads. Select uninstall; do NOT select reinstall.

    Here is a free alternative CD virtualization program that does not use the sptd.sys driver.
    Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview

    I see that you are running Windows Defender. I recommend that you download and install Microsoft Security Essentials. MSE supersedes Defender, offers superior protection, and runs smoothly with Win 7. Defender causes problems on some Win 7 systems.

    Outdated drivers can an do cause memory corruption and BSOD's. I find the following outdated drivers loaded on your system. Those in red font are quite obsolete. Update these drivers through links provided.
    adfs.SYS Thu Jun 26 16:52:37 2008 - Adobe File System Driver. Adobe. Rename this driver. Se Note below.

    gdrv.sys Thu Mar 12 23:22:29 2009 - gdvr.sys - GIGABYTE Tools - Windows (R) Server 2003 DDK driver; belongs to EasySaver.. Uninstall EasySaver.

    PxHlpa64.sys Wed Mar 12 21:58:17 2008 - Sonic CD/DVD driver (used by many different CD/DVD programs) pxHelp20.sys programs
    Go to C:\Windows\System32\drivers and rename PxHlpa64.sys to PxHlpa64.BAK
    This will break your CD/DVD program, but can easily be renamed after we've finished.
       Note
    Renaming drivers. Create a restore point, using Windows Explorer, navigate to C:\Windows\System32\Drivers, locate the driver files, and rename them from .sys to .old. Reboot and the drivers will not load. This will break whatever software or hardware these drivers are associated with.

    Follow all of these suggestions, reboot, and let's see
    how your system runs. Update us and let us know. If you get another BSOD, upload it and we will go from there.
    Code:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03403000 PsLoadedModuleList = 0xfffff800`03640e50
    Debug session time: Fri Dec 17 00:40:36.033 2010 (GMT-5)
    System Uptime: 0 days 0:09:03.406
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41289, 7fef98b6001, a06, 7f2f98b6405}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a49 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041289, The subtype of the bugcheck.
    Arg2: 000007fef98b6001
    Arg3: 0000000000000a06
    Arg4: 000007f2f98b6405
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41289
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff800034c8379 to fffff80003473740
    
    STACK_TEXT:  
    fffff880`08e38978 fffff800`034c8379 : 00000000`0000001a 00000000`00041289 000007fe`f98b6001 00000000`00000a06 : nt!KeBugCheckEx
    fffff880`08e38980 fffff800`034a5bda : 20600000`6843c005 fffffa80`06039290 00000000`00000011 fffff880`08e38ac0 : nt! ?? ::FNODOBFM::`string'+0x4a49
    fffff880`08e389c0 fffff800`03441b6e : 00000000`00000000 fffffa80`03282260 00000000`00000000 20600000`6843c005 : nt!MiGetPageProtection+0xaa
    fffff880`08e38a00 fffff800`0344180a : fffffa80`06039290 fffffa80`05869060 fffffa80`05869060 000007fe`f98b6000 : nt!MiQueryAddressState+0x2ae
    fffff880`08e38a50 fffff800`0375ac38 : fffff880`00000020 000007fe`f98b7000 fffffa80`06039290 fffff780`00000000 : nt!MiQueryAddressSpan+0xaa
    fffff880`08e38ac0 fffff800`03472993 : 00000000`0000013c fffffa80`03282260 fffff880`08e38bc8 00000000`0017ad78 : nt!NtQueryVirtualMemory+0x386
    fffff880`08e38bb0 00000000`7761ff8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0017ad58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7761ff8a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+4a49
    fffff800`034c8379 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4a49
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1a_41289_nt!_??_::FNODOBFM::_string_+4a49
    
    BUCKET_ID:  X64_0x1a_41289_nt!_??_::FNODOBFM::_string_+4a49
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Fri Dec 18 02:19:49.093 2009 (GMT-5)
    System Uptime: 0 days 0:14:53.076
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffffab805572db8, 0, fffff96000186859, 5}
    
    
    Could not read faulting driver name
    Probably caused by : win32k.sys ( win32k!SetOrClrWF+69 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffffab805572db8, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff96000186859, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036bf0e0
     fffffab805572db8 
    
    FAULTING_IP: 
    win32k!SetOrClrWF+69
    fffff960`00186859 488b4808        mov     rcx,qword ptr [rax+8]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  csrss.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88003b66760 -- (.trap 0xfffff88003b66760)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffab805572db0 rbx=0000000000000000 rcx=0000000000000002
    rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff96000186859 rsp=fffff88003b668f0 rbp=fffff900c01053a0
     r8=00000000000002bf  r9=0000000000000001 r10=000000008c000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    win32k!SetOrClrWF+0x69:
    fffff960`00186859 488b4808        mov     rcx,qword ptr [rax+8] ds:1e90:fffffab8`05572db8=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800035068c1 to fffff80003487740
    
    STACK_TEXT:  
    fffff880`03b665f8 fffff800`035068c1 : 00000000`00000050 fffffab8`05572db8 00000000`00000000 fffff880`03b66760 : nt!KeBugCheckEx
    fffff880`03b66600 fffff800`0348582e : 00000000`00000000 fffff900`c0c104a0 fffff800`03493b00 fffff880`03b666c8 : nt! ?? ::FNODOBFM::`string'+0x40e8b
    fffff880`03b66760 fffff960`00186859 : 00000000`00000010 00000000`00000246 fffff880`03b66910 00000000`00000018 : nt!KiPageFault+0x16e
    fffff880`03b668f0 fffff960`00076a96 : 00000000`00000000 fffff900`c0c104a0 00000000`00000004 00000000`0000007f : win32k!SetOrClrWF+0x69
    fffff880`03b66920 fffff960`00076992 : fffff900`c0c104a0 fffff900`c01053a0 00000000`00000004 fffff900`c2639320 : win32k!xxxSimpleDoSyncPaint+0x46
    fffff880`03b66950 fffff960`00076a18 : fffff900`c2639908 fffff900`c01053a0 00000000`00000004 00000000`00000004 : win32k!xxxInternalDoSyncPaint+0x1e
    fffff880`03b669a0 fffff960`00076961 : fffff900`c0c00b90 00000000`00000000 00000000`00000000 fffff900`c01053a0 : win32k!xxxInternalDoSyncPaint+0xa4
    fffff880`03b669f0 fffff960`000c92f9 : fffff960`00311120 fffff960`00311120 00000000`00000000 fffff960`00000000 : win32k!xxxDoSyncPaint+0x51
    fffff880`03b66a20 fffff960`000c8f36 : fffff900`00000001 fffff900`c0c85fb0 00000000`00000000 fffff960`00000000 : win32k!xxxEndDeferWindowPosEx+0x381
    fffff880`03b66ae0 fffff960`000bde8d : fffff900`c0c85fb0 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!xxxSetWindowPos+0x156
    fffff880`03b66b60 fffff960`000cc4a3 : 00000000`00000000 00000000`00000001 fffff880`03b66ca0 00000000`00000001 : win32k!xxxShowWindow+0x37d
    fffff880`03b66bd0 fffff800`03486993 : fffffa80`0550fb60 00000000`00000001 fffff880`03b66bf8 fffffa80`03631d60 : win32k!NtUserShowWindow+0xe3
    fffff880`03b66c20 00000000`7739463a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0182eff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7739463a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!SetOrClrWF+69
    fffff960`00186859 488b4808        mov     rcx,qword ptr [rax+8]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  win32k!SetOrClrWF+69
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cbe5d3e
    
    FAILURE_BUCKET_ID:  X64_0x50_win32k!SetOrClrWF+69
    
    BUCKET_ID:  X64_0x50_win32k!SetOrClrWF+69
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Fri Dec 18 12:26:11.590 2009 (GMT-5)
    System Uptime: 0 days 0:38:40.574
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffff8ac05a98520, 2, 0, fffff80003486097}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeWaitForMultipleObjects+5c2 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffff8ac05a98520, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003486097, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ba0e0
     fffff8ac05a98520 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeWaitForMultipleObjects+5c2
    fffff800`03486097 498b4cc500      mov     rcx,qword ptr [r13+rax*8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  CamtasiaStudio
    
    TRAP_FRAME:  fffff88005a98050 -- (.trap 0xfffff88005a98050)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80050471e0
    rdx=fffff88005a98530 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003486097 rsp=fffff88005a981e0 rbp=fffff88005a98250
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000002
    r11=fffffa8005047168 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeWaitForMultipleObjects+0x5c2:
    fffff800`03486097 498b4cc500      mov     rcx,qword ptr [r13+rax*8] ds:0003:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003481ca9 to fffff80003482740
    
    STACK_TEXT:  
    fffff880`05a97f08 fffff800`03481ca9 : 00000000`0000000a fffff8ac`05a98520 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`05a97f10 fffff800`03480920 : 00000000`00000000 fffffa80`05047168 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`05a98050 fffff800`03486097 : 00000000`00000000 fffff880`05a98250 fffffa80`00000000 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`05a981e0 fffff818`0377e2ef : fffff841`00000002 fffff8ac`05a98520 00000081`00000000 0000001c`00000006 : nt!KeWaitForMultipleObjects+0x5c2
    fffff880`05a98490 fffff841`00000002 : fffff8ac`05a98520 00000081`00000000 0000001c`00000006 135b5c89`00000001 : 0xfffff818`0377e2ef
    fffff880`05a98498 fffff8ac`05a98520 : 00000081`00000000 0000001c`00000006 135b5c89`00000001 00000030`00000000 : 0xfffff841`00000002
    fffff880`05a984a0 00000081`00000000 : 0000001c`00000006 135b5c89`00000001 00000030`00000000 00000000`00000000 : 0xfffff8ac`05a98520
    fffff880`05a984a8 0000001c`00000006 : 135b5c89`00000001 00000030`00000000 00000000`00000000 fffffa80`05047168 : 0x81`00000000
    fffff880`05a984b0 135b5c89`00000001 : 00000030`00000000 00000000`00000000 fffffa80`05047168 fffff880`05a98600 : 0x1c`00000006
    fffff880`05a984b8 00000030`00000000 : 00000000`00000000 fffffa80`05047168 fffff880`05a98600 00000000`00000000 : 0x135b5c89`00000001
    fffff880`05a984c0 00000000`00000000 : fffffa80`05047168 fffff880`05a98600 00000000`00000000 fffffa80`00000000 : 0x30`00000000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeWaitForMultipleObjects+5c2
    fffff800`03486097 498b4cc500      mov     rcx,qword ptr [r13+rax*8]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeWaitForMultipleObjects+5c2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeWaitForMultipleObjects+5c2
    
    BUCKET_ID:  X64_0xA_nt!KeWaitForMultipleObjects+5c2
    
    Followup: MachineOwner
    ---------
    
    3: kd> lmtsmn
    start             end                 module name
    fffff880`0f200000 fffff880`0f23e000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00f76000 fffff880`00fcd000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`05699000 fffff880`056b1000   adfs     adfs.SYS     Thu Jun 26 16:52:37 2008 (48640195)
    fffff880`056b1000 fffff880`056f0000   afcdp    afcdp.sys    Fri Sep 11 12:19:38 2009 (4AAA789A)
    fffff880`0115e000 fffff880`011e8000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0f25a000 fffff880`0f270000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00ea7000 fffff880`00eb2000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`0456c000 fffff880`04574000   AppleCharger AppleCharger.sys Mon Apr 26 23:54:05 2010 (4BD65FDD)
    fffff880`05c71000 fffff880`05c7c000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`011f4000 fffff880`011fd000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e72000 fffff880`00e9c000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff960`00900000 fffff960`00961000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
    fffff880`01bf9000 fffff880`01c00000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`0455b000 fffff880`0456c000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`047a0000 fffff880`047be000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`01220000 fffff880`0124a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00ce7000 fffff880`00da7000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`0169b000 fffff880`016cb000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c89000 fffff880`00ce7000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0155b000 fffff880`015ce000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`0f24a000 fffff880`0f25a000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04cde000 fffff880`04cec000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`044ba000 fffff880`0453d000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`04dab000 fffff880`04dbd000   dc3d     dc3d.sys     Thu Jul 01 06:07:45 2010 (4C2C68F1)
    fffff880`0453d000 fffff880`0455b000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02e68000 fffff880`02e77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01a00000 fffff880`01a16000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`046b0000 fffff880`046d2000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`04cec000 fffff880`04cf6000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
    fffff880`04d16000 fffff880`04d29000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`04cf6000 fffff880`04d16000   dump_JRAID dump_JRAID.sys Wed Jan 27 03:58:17 2010 (4B600029)
    fffff880`04d9f000 fffff880`04dab000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03e9f000 fffff880`03f93000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03f93000 fffff880`03fd9000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`00c00000 fffff880`00c14000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`00da7000 fffff880`00df3000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`015df000 fffff880`015e9000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01496000 fffff880`014d0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`05d89000 fffff880`05d92000   gdrv     gdrv.sys     Thu Mar 12 23:22:29 2009 (49B9D175)
    fffff880`03e85000 fffff880`03e92000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`039ee000 fffff800`03a37000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03fd9000 fffff880`03ffd000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04617000 fffff880`04673000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`03e00000 fffff880`03e11000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
    fffff880`04d54000 fffff880`04d6d000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`04d6d000 fffff880`04d75080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`04d46000 fffff880`04d54000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`046d8000 fffff880`047a0000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01be2000 fffff880`01beb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`0459a000 fffff880`045b0000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`010a0000 fffff880`010c0000   jraid    jraid.sys    Wed Jan 27 03:58:17 2010 (4B600029)
    fffff880`0fff1000 fffff880`10000000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`04d76000 fffff880`04d84000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bc9000 fffff800`00bd3000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04429000 fffff880`0446c000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01541000 fffff880`0155b000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`046d2000 fffff880`046d7200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`04a44000 fffff880`04a59000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04a00000 fffff880`04a23000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c31000 fffff880`00c75000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`04dda000 fffff880`04de8000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0441a000 fffff880`04429000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`04dbd000 fffff880`04dca000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e58000 fffff880`00e72000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04a71000 fffff880`04a89000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`047be000 fffff880`047eb000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`05628000 fffff880`05676000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`05676000 fffff880`05699000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`00e9c000 fffff880`00ea7000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01117000 fffff880`01122000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fd6000 fffff880`00fe0000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`014e3000 fffff880`01541000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02e5d000 fffff880`02e68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01bd0000 fffff880`01be2000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`016d1000 fffff880`017c3000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0f294000 fffff880`0f2a0000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`0f2a0000 fffff880`0f2cf000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04495000 fffff880`044aa000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02f61000 fffff880`02f70000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02eed000 fffff880`02f32000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01122000 fffff880`01133000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02e51000 fffff880`02e5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`03412000 fffff800`039ee000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`0124f000 fffff880`013f2000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`014da000 fffff880`014e3000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`0447e000 fffff880`04495000   nusb3hub nusb3hub.sys Mon Oct 26 10:19:44 2009 (4AE5B000)
    fffff880`0ff6b000 fffff880`0ff9a000   nusb3xhc nusb3xhc.sys Mon Oct 26 10:19:48 2009 (4AE5B004)
    fffff880`0ff69000 fffff880`0ff6a180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
    fffff880`0f2d7000 fffff880`0ff68e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
    fffff880`02f3b000 fffff880`02f61000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00e33000 fffff880`00e48000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`010c0000 fffff880`010c7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00e48000 fffff880`00e58000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`015ce000 fffff880`015df000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`056f0000 fffff880`05796000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`04dca000 fffff880`04dda000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
    fffff880`04673000 fffff880`046b0000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c75000 fffff880`00c89000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`00eb2000 fffff880`00ebdd00   PxHlpa64 PxHlpa64.sys Wed Mar 12 21:58:17 2008 (47D88A39)
    fffff880`0f270000 fffff880`0f294000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`045b0000 fffff880`045cb000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`045cb000 fffff880`045ec000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04400000 fffff880`0441a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02e00000 fffff880`02e51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`03e94000 fffff880`03e9f000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`010fc000 fffff880`01105000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01105000 fffff880`0110e000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0110e000 fffff880`01117000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`017c3000 fffff880`017fd000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`04a59000 fffff880`04a71000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0ff9a000 fffff880`0fff1000   Rt64win7 Rt64win7.sys Thu Mar 04 08:42:52 2010 (4B8FB8DC)
    fffff880`04a8a000 fffff880`04cdd700   RTKVHD64 RTKVHD64.sys Wed Jul 28 06:01:36 2010 (4C500000)
    fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`05796000 fffff880`057a1000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`0f23e000 fffff880`0f24a000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02f70000 fffff880`02f8d000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01b8a000 fffff880`01bd0000   snapman  snapman.sys  Sat Apr 10 05:16:30 2010 (4BC041EE)
    fffff880`01b82000 fffff880`01b8a000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05cf3000 fffff880`05d89000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`05c8c000 fffff880`05cf3000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`057a1000 fffff880`057ce000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`03ffd000 fffff880`03ffe480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`057ce000 fffff880`057e0000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01151000 fffff880`0115e000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01a1c000 fffff880`01b82000   tdrpm251 tdrpm251.sys Fri Jul 31 09:59:53 2009 (4A72F8D9)
    fffff880`01133000 fffff880`01151000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02fa8000 fffff880`02fbc000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00500000 fffff960`0050a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`04574000 fffff880`0459a000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`0446c000 fffff880`0447e000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`04d29000 fffff880`04d46000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`03e92000 fffff880`03e93f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03e74000 fffff880`03e85000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`02e77000 fffff880`02ed1000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03e1e000 fffff880`03e74000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`04d84000 fffff880`04d9f000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`03e11000 fffff880`03e1e000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00fe0000 fffff880`00fed000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`013f2000 fffff880`01400000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`010c7000 fffff880`010ec000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`0168b000 fffff880`0169b000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`0102f000 fffff880`01044000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01044000 fffff880`010a0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`0144a000 fffff880`01496000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02f8d000 fffff880`02fa8000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`010ec000 fffff880`010fc000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ec3000 fffff880`00f67000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f67000 fffff880`00f76000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02f32000 fffff880`02f3b000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000b0000 fffff960`003c0000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`00fcd000 fffff880`00fd6000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`04a23000 fffff880`04a44000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`05c00000 fffff880`05c71000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01beb000 fffff880`01bf9000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`014d0000 fffff880`014da000   dump_scsipor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01200000 fffff880`01220000   dump_JRAID.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`015e9000 fffff880`015fc000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`010ce000 fffff880`011f4000   sptd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    Last edited by CarlTR6; 17 Dec 2010 at 16:10.
      My Computer


  3. Posts : 4
    Windows 7 Professional x64
    Thread Starter
       #3

    Thank you for your quick and informative reply.

    I have taken all of the steps that you outlined in your post, but sadly the blue screens are still present.

    I have uploaded another Minidump / Performance Monitor output log and attached it to this post.

    Thanks for your help :).

    Edit:
    I just got a blue screen from this file:
    nvlddmkm.sys

    From what I've been able to find online, this is a NVidia driver. However, I have re-installed my drivers MANY times and I am still getting these blue screens. This is the first time I've ever gotten a blue screen from this specific file, most of them are from win32k.sys.
    This was a "Page fault in nonpaged area" blue screen.

    (This may be a completely unrelated blue screen, I think it was because I had flash running and I had hardware acceleration enabled. The other blue screens are still happening, so I still need assistance. Thank you.)
    Last edited by dustty1818; 18 Dec 2010 at 03:32.
      My Computer


  4. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #4

    I looked at your six most recent dumps. Five of them blame various Windows system drivers, very unlikely to be the real cause. I did not see a dump blaming nvlddmkm.sys. Your most recent dump blames tdrpm251.sys, an Acronis driver. I suggest that you completely uninstall Acronis for the time being. I have seen a few instances where Acronis has caused crashes. It is possible that something else is interfering; but we have to use a process of elimination.

    Next, please test your RAM with Memtest86 following the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off for a while. Let it run for at least 7 passes; this will take 6-8 hours. Post back with your results.

    If you get no errors with Memtest, enable Driver Verifier closely following the instructions in this tutorial: Driver Verifier - Enable and Disable. If Driver Verifier finds a faulty driver, it will trigger a BSOD. Upload any and all Driver Verifier enabled dumps.
    Code:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03466000 PsLoadedModuleList = 0xfffff800`036a3e50
    Debug session time: Sat Dec 18 02:01:33.281 2010 (GMT-5)
    System Uptime: 0 days 0:01:54.732
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41284, fffff9800b00d001, 3e0b, fffff780c0000000}
    
    Unable to load image \SystemRoot\system32\DRIVERS\tdrpm251.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tdrpm251.sys
    *** ERROR: Module load completed but symbols could not be loaded for tdrpm251.sys
    Probably caused by : tdrpm251.sys ( tdrpm251+52b6d )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041284, A PTE or the working set list is corrupt.
    Arg2: fffff9800b00d001
    Arg3: 0000000000003e0b
    Arg4: fffff780c0000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41284
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  CamtasiaStudio
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff8000352b3b3 to fffff800034d6740
    
    STACK_TEXT:  
    fffff880`08dba078 fffff800`0352b3b3 : 00000000`0000001a 00000000`00041284 fffff980`0b00d001 00000000`00003e0b : nt!KeBugCheckEx
    fffff880`08dba080 fffff800`0347a157 : 00000000`00003e0b fffff880`08dba1b8 fffffa80`0171cc30 fffff880`08dba1b0 : nt! ?? ::FNODOBFM::`string'+0x4a83
    fffff880`08dba0c0 fffff800`037ed1b5 : fffff980`0b00d000 fffff8a0`02d19810 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2be88
    fffff880`08dba3a0 fffff800`034ef567 : 00000000`00940000 fffffa80`0373c920 00000000`00000000 00000000`00a00000 : nt!CcUnmapVacb+0x5d
    fffff880`08dba3e0 fffff800`034f53b5 : fffff980`00000001 00000000`00200000 fffffa80`045f3a80 00000000`00000001 : nt!CcUnmapVacbArray+0x1b7
    fffff880`08dba470 fffff800`037f3922 : 00000000`00200000 00000000`00a00000 fffff880`08dba540 fffff880`08dba5d0 : nt!CcGetVirtualAddress+0x2c5
    fffff880`08dba500 fffff880`012e4c48 : fffff880`00000000 00000000`00000005 fffffa80`000004af fffffa80`00000501 : nt!CcCopyRead+0x132
    fffff880`08dba5c0 fffff880`010ef0c8 : fffffa80`068c63d0 fffffa80`05fb60d8 00000000`00000000 fffffa80`068c6401 : Ntfs!NtfsCopyReadA+0x1a8
    fffff880`08dba790 fffff880`010f2c2a : fffff880`08dba860 00000000`0b161603 00000000`0b161600 fffffa80`068c6300 : fltmgr!FltpPerformFastIoCall+0x88
    fffff880`08dba7f0 fffff880`011105f0 : fffffa80`068c63d0 00000000`00000000 fffffa80`05f34818 00000000`000005a4 : fltmgr!FltpPassThroughFastIo+0xda
    fffff880`08dba830 fffff880`018cfb6d : 00000000`10000004 fffff880`010f0160 fffffa80`05f348a0 00000000`000005a4 : fltmgr!FltpFastIoRead+0x1d0
    fffff880`08dba8d0 00000000`10000004 : fffff880`010f0160 fffffa80`05f348a0 00000000`000005a4 fffff880`00000000 : tdrpm251+0x52b6d
    fffff880`08dba8d8 fffff880`010f0160 : fffffa80`05f348a0 00000000`000005a4 fffff880`00000000 00000000`0b1616c8 : 0x10000004
    fffff880`08dba8e0 fffff880`010f2c2a : fffff880`08dbaa50 00000000`0b161603 00000000`0b161600 fffffa80`068c6300 : fltmgr!FltpPerformPreCallbacks+0x430
    fffff880`08dba9e0 fffff880`011105f0 : fffffa80`068c63d0 00000000`00000000 fffff880`08dbab40 00000000`000005a4 : fltmgr!FltpPassThroughFastIo+0xda
    fffff880`08dbaa20 fffff800`037f4289 : fffffa80`068c63d0 fffffa80`00000001 fffffa80`036e54b0 fffffa80`068c63d0 : fltmgr!FltpFastIoRead+0x1d0
    fffff880`08dbaac0 fffff800`034d5993 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
    fffff880`08dbabb0 00000000`738f2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0ffcf0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x738f2dd9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tdrpm251+52b6d
    fffff880`018cfb6d ??              ???
    
    SYMBOL_STACK_INDEX:  b
    
    SYMBOL_NAME:  tdrpm251+52b6d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tdrpm251
    
    IMAGE_NAME:  tdrpm251.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a72f8d9
    
    FAILURE_BUCKET_ID:  X64_0x1a_41284_tdrpm251+52b6d
    
    BUCKET_ID:  X64_0x1a_41284_tdrpm251+52b6d
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmtsmn
    start             end                 module name
    fffff880`10057000 fffff880`10095000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00eee000 fffff880`00f45000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`06423000 fffff880`06462000   afcdp    afcdp.sys    Fri Sep 11 12:19:38 2009 (4AAA789A)
    fffff880`02ebc000 fffff880`02f46000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`043e2000 fffff880`043f8000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`010e3000 fffff880`010ee000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`010a5000 fffff880`010ae000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`010ae000 fffff880`010d8000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff960`00830000 fffff960`00891000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
    fffff880`01bb5000 fffff880`01bbc000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`0413e000 fffff880`0414f000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`06539000 fffff880`06557000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00630000 fffff960`00657000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`01b51000 fffff880`01b7b000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01ad6000 fffff880`01b06000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d2d000 fffff880`00d8b000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`043d2000 fffff880`043e2000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05ccd000 fffff880`05cdb000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0409d000 fffff880`04120000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`05da8000 fffff880`05dba000   dc3d     dc3d.sys     Thu Jul 01 06:07:45 2010 (4C2C68F1)
    fffff880`04120000 fffff880`0413e000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02e97000 fffff880`02ea6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01ac0000 fffff880`01ad6000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04d47000 fffff880`04d69000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05cdb000 fffff880`05ce5000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
    fffff880`05d05000 fffff880`05d18000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05ce5000 fffff880`05d05000   dump_JRAID dump_JRAID.sys Wed Jan 27 03:58:17 2010 (4B600029)
    fffff880`05d18000 fffff880`05d24000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`042d2000 fffff880`043c6000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`04200000 fffff880`04246000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`0113a000 fffff880`0114e000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010ee000 fffff880`0113a000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01a86000 fffff880`01ac0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`0341d000 fffff800`03466000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04246000 fffff880`0426a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04cae000 fffff880`04d0a000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`0426a000 fffff880`0427b000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
    fffff880`05d4f000 fffff880`05d68000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05d68000 fffff880`05d70080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05d41000 fffff880`05d4f000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`06471000 fffff880`06539000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01a7d000 fffff880`01a86000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04175000 fffff880`0418b000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00fc2000 fffff880`00fe2000   jraid    jraid.sys    Wed Jan 27 03:58:17 2010 (4B600029)
    fffff880`041e1000 fffff880`041f0000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05d71000 fffff880`05d7f000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00ba9000 fffff800`00bb3000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04000000 fffff880`04043000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`04d69000 fffff880`04d6e200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`05a21000 fffff880`05a36000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05dd7000 fffff880`05dfa000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00cd5000 fffff880`00d19000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`05d9a000 fffff880`05da8000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`041f0000 fffff880`041ff000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05dba000 fffff880`05dc7000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`0108b000 fffff880`010a5000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`01b7b000 fffff880`01bac000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`06557000 fffff880`0656f000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0656f000 fffff880`0659c000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0659c000 fffff880`065ea000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`06400000 fffff880`06423000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`010d8000 fffff880`010e3000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01a1b000 fffff880`01a26000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f4e000 fffff880`00f58000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0114e000 fffff880`011ac000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02e8c000 fffff880`02e97000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01a6b000 fffff880`01a7d000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014dd000 fffff880`015cf000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`100b9000 fffff880`100c5000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`10dba000 fffff880`10de9000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04c99000 fffff880`04cae000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02fba000 fffff880`02fc9000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02f46000 fffff880`02f8b000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`06cb3000 fffff880`06cc8000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`01846000 fffff880`01857000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02e80000 fffff880`02e8c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`03466000 fffff800`03a42000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01249000 fffff880`013ec000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01bac000 fffff880`01bb5000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`04c82000 fffff880`04c99000   nusb3hub nusb3hub.sys Mon Oct 26 10:19:44 2009 (4AE5B000)
    fffff880`04299000 fffff880`042c8000   nusb3xhc nusb3xhc.sys Mon Oct 26 10:19:48 2009 (4AE5B004)
    fffff880`10d62000 fffff880`10d63180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
    fffff880`100d0000 fffff880`10d61e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
    fffff880`02f94000 fffff880`02fba000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f98000 fffff880`00fad000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f65000 fffff880`00f98000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e2f000 fffff880`00e36000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fe2000 fffff880`00ff2000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06abd000 fffff880`06b63000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05dc7000 fffff880`05dd7000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
    fffff880`04d0a000 fffff880`04d47000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d19000 fffff880`00d2d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`10095000 fffff880`100b9000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0418b000 fffff880`041a6000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`041a6000 fffff880`041c7000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`041c7000 fffff880`041e1000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02e2f000 fffff880`02e80000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`10de9000 fffff880`10df4000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01a00000 fffff880`01a09000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01a09000 fffff880`01a12000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01a12000 fffff880`01a1b000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01a31000 fffff880`01a6b000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05a36000 fffff880`05a4e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`10000000 fffff880`10057000   Rt64win7 Rt64win7.sys Thu Mar 04 08:42:52 2010 (4B8FB8DC)
    fffff880`05a79000 fffff880`05ccc700   RTKVHD64 RTKVHD64.sys Wed Jul 28 06:01:36 2010 (4C500000)
    fffff880`00e00000 fffff880`00e2f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`06b63000 fffff880`06b6e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`043c6000 fffff880`043d2000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02fc9000 fffff880`02fe6000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01800000 fffff880`01846000   snapman  snapman.sys  Sat Apr 10 05:16:30 2010 (4BC041EE)
    fffff880`019e3000 fffff880`019eb000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`06c1d000 fffff880`06cb3000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`06a00000 fffff880`06a67000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`06b6e000 fffff880`06b9b000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`043f8000 fffff880`043f9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`06b9b000 fffff880`06bad000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`019eb000 fffff880`019f8000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0187d000 fffff880`019e3000   tdrpm251 tdrpm251.sys Fri Jul 31 09:59:53 2009 (4A72F8D9)
    fffff880`01857000 fffff880`01875000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02e1b000 fffff880`02e2f000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`0414f000 fffff880`04175000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04043000 fffff880`04055000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05d24000 fffff880`05d41000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`042c8000 fffff880`042c9f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04288000 fffff880`04299000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04c28000 fffff880`04c82000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`10d64000 fffff880`10dba000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05d7f000 fffff880`05d9a000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`0427b000 fffff880`04288000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00f58000 fffff880`00f65000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01bbc000 fffff880`01bca000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01bca000 fffff880`01bef000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`015cf000 fffff880`015df000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00fad000 fffff880`00fc2000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00d8b000 fffff880`00de7000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`011ac000 fffff880`011f8000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02e00000 fffff880`02e1b000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01bef000 fffff880`01bff000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e3b000 fffff880`00edf000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00edf000 fffff880`00eee000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02f8b000 fffff880`02f94000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00090000 fffff960`003a0000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`00f45000 fffff880`00f4e000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`05a00000 fffff880`05a21000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`01b06000 fffff880`01b14000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01b14000 fffff880`01b1e000   dump_scsipor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01b1e000 fffff880`01b3e000   dump_JRAID.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01b3e000 fffff880`01b51000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    
    Debug session time: Sat Dec 18 02:09:11.122 2010 (GMT-5)
    System Uptime: 0 days 0:01:42.106
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff840001233a8, 0, fffff880012c006b, 5}
    
    
    Could not read faulting driver name
    Probably caused by : Ntfs.sys ( Ntfs!NtfsCreateScb+eb )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff840001233a8, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff880012c006b, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800037100e0
     fffff840001233a8 
    
    FAULTING_IP: 
    Ntfs!NtfsCreateScb+eb
    fffff880`012c006b 488b4858        mov     rcx,qword ptr [rax+58h]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88006b40470 -- (.trap 0xfffff88006b40470)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff84000123350 rbx=0000000000000000 rcx=fffffa8004d906e8
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880012c006b rsp=fffff88006b40600 rbp=fffffa80055796b0
     r8=fffffa8004d906e8  r9=fffff88006b40ca8 r10=fffffa80055796b0
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    Ntfs!NtfsCreateScb+0xeb:
    fffff880`012c006b 488b4858        mov     rcx,qword ptr [rax+58h] ds:aa60:fffff840`001233a8=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800035578c1 to fffff800034d8740
    
    STACK_TEXT:  
    fffff880`06b40308 fffff800`035578c1 : 00000000`00000050 fffff840`001233a8 00000000`00000000 fffff880`06b40470 : nt!KeBugCheckEx
    fffff880`06b40310 fffff800`034d682e : 00000000`00000000 fffff8a0`00123480 fffffa80`0574aa00 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x40e8b
    fffff880`06b40470 fffff880`012c006b : fffff880`06e59920 fffff880`06e59920 fffff8a0`00c545b8 fffffa80`0574af20 : nt!KiPageFault+0x16e
    fffff880`06b40600 fffff880`012b6ad3 : fffffa80`055796b0 fffff8a0`00123350 fffff880`06e59920 00000000`00000000 : Ntfs!NtfsCreateScb+0xeb
    fffff880`06b406c0 fffff880`012b4eb5 : fffff880`06e598b0 00000000`00000000 00000000`00000002 fffff8a0`00c545b8 : Ntfs!NtfsBreakBatchOplock+0x93
    fffff880`06b40740 fffff880`012b178b : fffff880`06e598b0 fffffa80`055796b0 fffff8a0`001236e8 fffff8a0`00000024 : Ntfs!NtfsOpenExistingAttr+0x1b5
    fffff880`06b40800 fffff880`012b1eff : fffffa80`055796b0 fffffa80`05869500 fffff8a0`001236e8 fffff880`00000024 : Ntfs!NtfsOpenAttributeInExistingFile+0x5ab
    fffff880`06b40990 fffff880`012c2e76 : fffffa80`055796b0 fffffa80`05869500 fffff8a0`001236e8 00000000`00000701 : Ntfs!NtfsOpenExistingPrefixFcb+0x1ef
    fffff880`06b40a80 fffff880`012bd28d : fffffa80`055796b0 fffffa80`05869500 fffff880`06b40c60 fffff880`06b40ca8 : Ntfs!NtfsFindStartingNode+0x5e6
    fffff880`06b40b50 fffff880`01226c0d : fffffa80`055796b0 fffffa80`05869500 fffff880`06e598b0 fffffa80`05daeb00 : Ntfs!NtfsCommonCreate+0x3dd
    fffff880`06b40d30 fffff800`034d05c7 : fffff880`06e59820 00000000`003826b0 00000000`76fc4270 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
    fffff880`06b40d60 fffff800`034d0581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
    fffff880`06e596f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Ntfs!NtfsCreateScb+eb
    fffff880`012c006b 488b4858        mov     rcx,qword ptr [rax+58h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  Ntfs!NtfsCreateScb+eb
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsCreateScb+eb
    
    BUCKET_ID:  X64_0x50_Ntfs!NtfsCreateScb+eb
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Fri Dec 18 12:26:11.590 2009 (GMT-5)
    System Uptime: 0 days 0:38:40.574
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffff8ac05a98520, 2, 0, fffff80003486097}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeWaitForMultipleObjects+5c2 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffff8ac05a98520, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003486097, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ba0e0
     fffff8ac05a98520 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeWaitForMultipleObjects+5c2
    fffff800`03486097 498b4cc500      mov     rcx,qword ptr [r13+rax*8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  CamtasiaStudio
    
    TRAP_FRAME:  fffff88005a98050 -- (.trap 0xfffff88005a98050)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80050471e0
    rdx=fffff88005a98530 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003486097 rsp=fffff88005a981e0 rbp=fffff88005a98250
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000002
    r11=fffffa8005047168 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeWaitForMultipleObjects+0x5c2:
    fffff800`03486097 498b4cc500      mov     rcx,qword ptr [r13+rax*8] ds:0003:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003481ca9 to fffff80003482740
    
    STACK_TEXT:  
    fffff880`05a97f08 fffff800`03481ca9 : 00000000`0000000a fffff8ac`05a98520 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`05a97f10 fffff800`03480920 : 00000000`00000000 fffffa80`05047168 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`05a98050 fffff800`03486097 : 00000000`00000000 fffff880`05a98250 fffffa80`00000000 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`05a981e0 fffff818`0377e2ef : fffff841`00000002 fffff8ac`05a98520 00000081`00000000 0000001c`00000006 : nt!KeWaitForMultipleObjects+0x5c2
    fffff880`05a98490 fffff841`00000002 : fffff8ac`05a98520 00000081`00000000 0000001c`00000006 135b5c89`00000001 : 0xfffff818`0377e2ef
    fffff880`05a98498 fffff8ac`05a98520 : 00000081`00000000 0000001c`00000006 135b5c89`00000001 00000030`00000000 : 0xfffff841`00000002
    fffff880`05a984a0 00000081`00000000 : 0000001c`00000006 135b5c89`00000001 00000030`00000000 00000000`00000000 : 0xfffff8ac`05a98520
    fffff880`05a984a8 0000001c`00000006 : 135b5c89`00000001 00000030`00000000 00000000`00000000 fffffa80`05047168 : 0x81`00000000
    fffff880`05a984b0 135b5c89`00000001 : 00000030`00000000 00000000`00000000 fffffa80`05047168 fffff880`05a98600 : 0x1c`00000006
    fffff880`05a984b8 00000030`00000000 : 00000000`00000000 fffffa80`05047168 fffff880`05a98600 00000000`00000000 : 0x135b5c89`00000001
    fffff880`05a984c0 00000000`00000000 : fffffa80`05047168 fffff880`05a98600 00000000`00000000 fffffa80`00000000 : 0x30`00000000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeWaitForMultipleObjects+5c2
    fffff800`03486097 498b4cc500      mov     rcx,qword ptr [r13+rax*8]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeWaitForMultipleObjects+5c2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeWaitForMultipleObjects+5c2
    
    BUCKET_ID:  X64_0xA_nt!KeWaitForMultipleObjects+5c2
    
    Followup: MachineOwner
    ---------
      My Computer


  5. Posts : 4
    Windows 7 Professional x64
    Thread Starter
       #5

    I waited a few days to see if the any of these changes had any effect and for awhile I went without having any blue screens. However, recently I have been having blue screens again and I haven't changed anything between the time they stopped and the time they started.

    Please note: There may be a blue screen related to my Hauppauge TV Tuner which has already been removed from my system (This happened when I ran the driver verifier). Even after removing this device I am still getting blue screens. This TV Tuner was installed long after the blue screens started, so it is not the direct cause of the blue screens.

    I have run MemTest86+ twice and both times it ran for at least 7 passes and no issues were detected (before posting this topic I had already run the test too and it came up with nothing).

    Thank you very much for your help.
      My Computer


  6. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #6

    Did you run Memtest from a cold boot after your computer had been for for an hour or two? If not, try it again from a cold boot. Do you get these BSOD's running in the Safe mode? You can also try testing your CPU and your RAM with Prime95. Follow the instructions in this tutorial: https://www.sevenforums.com/tutorials...t-prime95.html. Run 3 separate tests, one on each of the settings (Blend, Small FFTs, Large FFTs). Post back with your results.

    I looked at your four most recent dumps. Each of them is bugcheck error code A, a hardware or hardware related error code. Each of them blames something different. One of them blames HECIx64.sys, which is an Intel Management Engine Interface driver. Two others blame Windows system files and one blames memory corruption.

    I noticed that your uptimes before the crashes are short. Three of them show uptimes of 11 seconds and one shows 20 seconds. This can indicate a power supply problem. Make sure all of your cables and connections are secure. Do you have another known good PSU you can try?
    Code:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`0340b000 PsLoadedModuleList = 0xfffff800`03648e50
    Debug session time: Wed Dec 22 04:12:49.702 2010 (GMT-5)
    System Uptime: 0 days 0:00:11.169
    Loading Kernel Symbols
    ...............................................................
    .........................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {293, 2, 0, fffff8000349b436}
    
    Unable to load image \SystemRoot\system32\DRIVERS\HECIx64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for HECIx64.sys
    *** ERROR: Module load completed but symbols could not be loaded for HECIx64.sys
    Probably caused by : HECIx64.sys ( HECIx64+28f0 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000293, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff8000349b436, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036b30e0
     0000000000000293 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+c73
    fffff800`0349b436 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    IRP_ADDRESS:  ffffffffffffff88
    
    TRAP_FRAME:  fffff880031a7f20 -- (.trap 0xfffff880031a7f20)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880031a7f80 rbx=0000000000000000 rcx=0000000000000293
    rdx=0000000000000293 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8000349b436 rsp=fffff880031a80b0 rbp=fffff880031a8200
     r8=fffff880031a81b8  r9=fffff880031a81b0 r10=0000000000000002
    r11=fffff8000349a7d0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe cy
    nt!IopCompleteRequest+0xc73:
    fffff800`0349b436 488b09          mov     rcx,qword ptr [rcx] ds:0040:00000000`00000293=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000347aca9 to fffff8000347b740
    
    STACK_TEXT:  
    fffff880`031a7dd8 fffff800`0347aca9 : 00000000`0000000a 00000000`00000293 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`031a7de0 fffff800`03479920 : 00000000`00000000 fffff980`027e0ee0 00000000`00000000 fffff800`034a8668 : nt!KiBugCheckDispatch+0x69
    fffff880`031a7f20 fffff800`0349b436 : 00000000`00000003 00000000`00000001 fffffa80`00000000 00000000`0000000a : nt!KiPageFault+0x260
    fffff880`031a80b0 fffff800`034580c7 : 00000000`00000000 fffffa80`044a6b60 fffff8a0`001d9400 00000000`00000000 : nt!IopCompleteRequest+0xc73
    fffff880`031a8180 fffff800`03458487 : fffff880`031a8430 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`031a8200 fffff800`0348ce5a : ffffffff`80000048 00000000`00000002 00000000`00000100 ffffffff`ffffffff : nt!KiApcInterrupt+0xd7
    fffff880`031a8390 fffff800`03583132 : 00000000`00000863 fffff880`031a8400 00000000`00000963 00000000`00000001 : nt!KeReleaseInStackQueuedSpinLock+0x5a
    fffff880`031a83c0 fffff800`034e3f22 : 00000000`00000018 fffff800`49434548 00000000`000000c0 00000000`00000000 : nt!MmAllocateSpecialPool+0x6a2
    fffff880`031a84d0 fffff800`03916f48 : 00000000`49434548 00000000`00000080 fffff880`031a8640 fffff880`031a8668 : nt! ?? ::FNODOBFM::`string'+0x22172
    fffff880`031a8560 fffff800`0391709d : 00000000`00000000 fffffa80`04463a20 00000000`49434548 fffff880`031a86f0 : nt!VeAllocatePoolWithTagPriority+0x1d8
    fffff880`031a85d0 fffff880`10bdf8f0 : 00000000`00000000 fffffa80`04463a20 fffff880`031a86f0 00000000`00000004 : nt!VerifierExAllocatePoolWithTag+0x1d
    fffff880`031a8610 00000000`00000000 : fffffa80`04463a20 fffff880`031a86f0 00000000`00000004 00000000`00000000 : HECIx64+0x28f0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    HECIx64+28f0
    fffff880`10bdf8f0 ??              ???
    
    SYMBOL_STACK_INDEX:  b
    
    SYMBOL_NAME:  HECIx64+28f0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: HECIx64
    
    IMAGE_NAME:  HECIx64.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ab293e8
    
    FAILURE_BUCKET_ID:  X64_0xA_VRF_HECIx64+28f0
    
    BUCKET_ID:  X64_0xA_VRF_HECIx64+28f0
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Thu Dec 23 22:57:04.954 2010 (GMT-5)
    System Uptime: 0 days 0:00:20.032
    Loading Kernel Symbols
    ...............................................................
    .......................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 0, fffff800034e32b3}
    
    Probably caused by : dxgkrnl.sys ( dxgkrnl!DpiQueryBusInterface+60 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800034e32b3, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036fb0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+ae3
    fffff800`034e32b3 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    IRP_ADDRESS:  ffffffffffffff89
    
    TRAP_FRAME:  fffff880031c35e0 -- (.trap 0xfffff880031c35e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880031c3f80 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800034e32b3 rsp=fffff880031c3770 rbp=fffff880031c38c0
     r8=fffff880031c3878  r9=fffff880031c3870 r10=0000000000000002
    r11=fffff800034e27d0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe cy
    nt!IopCompleteRequest+0xae3:
    fffff800`034e32b3 488b09          mov     rcx,qword ptr [rcx] ds:2910:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800034c2ca9 to fffff800034c3740
    
    STACK_TEXT:  
    fffff880`031c3498 fffff800`034c2ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`031c34a0 fffff800`034c1920 : 00000000`00000000 fffff980`016a4ee0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`031c35e0 fffff800`034e32b3 : fffff880`0ff19986 fffff880`031c3920 fffffa80`04006618 fffff880`031c3900 : nt!KiPageFault+0x260
    fffff880`031c3770 fffff800`034a00c7 : 00000000`00000001 fffff800`00003cad 00000000`00000000 fffff800`00000000 : nt!IopCompleteRequest+0xae3
    fffff880`031c3840 fffff800`034a0487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`031c38c0 fffff800`03463e77 : 00000000`0002f790 00000000`00000000 fffff880`031c3b70 00000000`0050933a : nt!KiApcInterrupt+0xd7
    fffff880`031c3a50 fffff800`03463967 : fffffa80`04006798 fffff880`00000011 fffff980`00000000 fffff800`00000004 : nt!RtlpWalkFrameChain+0x4ef
    fffff880`031c40f0 fffff800`03586c2b : 00000000`00000003 fffffa80`04006798 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x73
    fffff880`031c4120 fffff800`0395a0dc : fffffa80`04006780 00000000`00000160 00000000`00000080 fffff800`0394ddcc : nt!RtlCaptureStackBackTrace+0x4b
    fffff880`031c4150 fffff800`0395c33a : fffff880`031bf000 fffff880`031c5000 00000000`00000080 00000000`00000160 : nt!IovpLogStackCallout+0x1c
    fffff880`031c4180 fffff800`0395f026 : 00000000`00000000 00000000`00000028 fffff800`0372ffef fffff880`00fbaa11 : nt!ViPoolLogStackTrace+0x8a
    fffff880`031c41b0 fffff800`0395f160 : fffffa80`05c1e850 fffff800`0372ffef 00000000`2b707249 fffffa80`039e5f18 : nt!VeAllocatePoolWithTagPriority+0x2b6
    fffff880`031c4220 fffff800`039683a8 : 00000000`00000001 fffff800`0395a0dc fffffa80`039e5f00 fffff800`0372ffef : nt!ViIrpAllocate+0x40
    fffff880`031c4260 fffff800`039684c3 : fffffa80`05c1e850 fffff800`0372ffef fffffa80`039e5f18 fffffa80`054a1a20 : nt!ViIrpAllocateLockedPacket+0x28
    fffff880`031c42a0 fffff800`03968a92 : fffffa80`05c1e850 fffffa80`039e5f18 00000000`00000000 fffff800`03977640 : nt!VfIoAllocateIrp1+0x23
    fffff880`031c42d0 fffff800`034b89c6 : fffffa80`05c1e850 fffff880`040478b0 00000000`00000058 34fc1458`00000000 : nt!IovAllocateIrp+0x52
    fffff880`031c4320 fffff800`0372ffef : fffffa80`05c1e850 00000000`00807805 00000000`00000058 fffffa80`05c595d0 : nt!IoBuildAsynchronousFsdRequest+0x36
    fffff880`031c4370 fffff880`040b92a0 : 00000000`00000000 00000000`00000000 01140009`00000000 00000000`00000000 : nt!IoBuildSynchronousFsdRequest+0x1f
    fffff880`031c43b0 fffff880`040b0d90 : 00000000`00000503 00000000`00000000 fffffa80`05c595d0 ffffffff`00000014 : dxgkrnl!DpiQueryBusInterface+0x60
    fffff880`031c4430 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DpiAddDevice+0x670
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgkrnl!DpiQueryBusInterface+60
    fffff880`040b92a0 488bd0          mov     rdx,rax
    
    SYMBOL_STACK_INDEX:  12
    
    SYMBOL_NAME:  dxgkrnl!DpiQueryBusInterface+60
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgkrnl
    
    IMAGE_NAME:  dxgkrnl.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ac5509e
    
    FAILURE_BUCKET_ID:  X64_0xA_VRF_dxgkrnl!DpiQueryBusInterface+60
    
    BUCKET_ID:  X64_0xA_VRF_dxgkrnl!DpiQueryBusInterface+60
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Thu Dec 23 22:57:04.954 2010 (GMT-5)
    System Uptime: 0 days 0:00:20.032
    Loading Kernel Symbols
    ...............................................................
    .......................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 0, fffff800034e32b3}
    
    Probably caused by : dxgkrnl.sys ( dxgkrnl!DpiQueryBusInterface+60 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800034e32b3, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036fb0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+ae3
    fffff800`034e32b3 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    IRP_ADDRESS:  ffffffffffffff89
    
    TRAP_FRAME:  fffff880031c35e0 -- (.trap 0xfffff880031c35e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880031c3f80 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800034e32b3 rsp=fffff880031c3770 rbp=fffff880031c38c0
     r8=fffff880031c3878  r9=fffff880031c3870 r10=0000000000000002
    r11=fffff800034e27d0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe cy
    nt!IopCompleteRequest+0xae3:
    fffff800`034e32b3 488b09          mov     rcx,qword ptr [rcx] ds:2910:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800034c2ca9 to fffff800034c3740
    
    STACK_TEXT:  
    fffff880`031c3498 fffff800`034c2ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`031c34a0 fffff800`034c1920 : 00000000`00000000 fffff980`016a4ee0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`031c35e0 fffff800`034e32b3 : fffff880`0ff19986 fffff880`031c3920 fffffa80`04006618 fffff880`031c3900 : nt!KiPageFault+0x260
    fffff880`031c3770 fffff800`034a00c7 : 00000000`00000001 fffff800`00003cad 00000000`00000000 fffff800`00000000 : nt!IopCompleteRequest+0xae3
    fffff880`031c3840 fffff800`034a0487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`031c38c0 fffff800`03463e77 : 00000000`0002f790 00000000`00000000 fffff880`031c3b70 00000000`0050933a : nt!KiApcInterrupt+0xd7
    fffff880`031c3a50 fffff800`03463967 : fffffa80`04006798 fffff880`00000011 fffff980`00000000 fffff800`00000004 : nt!RtlpWalkFrameChain+0x4ef
    fffff880`031c40f0 fffff800`03586c2b : 00000000`00000003 fffffa80`04006798 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x73
    fffff880`031c4120 fffff800`0395a0dc : fffffa80`04006780 00000000`00000160 00000000`00000080 fffff800`0394ddcc : nt!RtlCaptureStackBackTrace+0x4b
    fffff880`031c4150 fffff800`0395c33a : fffff880`031bf000 fffff880`031c5000 00000000`00000080 00000000`00000160 : nt!IovpLogStackCallout+0x1c
    fffff880`031c4180 fffff800`0395f026 : 00000000`00000000 00000000`00000028 fffff800`0372ffef fffff880`00fbaa11 : nt!ViPoolLogStackTrace+0x8a
    fffff880`031c41b0 fffff800`0395f160 : fffffa80`05c1e850 fffff800`0372ffef 00000000`2b707249 fffffa80`039e5f18 : nt!VeAllocatePoolWithTagPriority+0x2b6
    fffff880`031c4220 fffff800`039683a8 : 00000000`00000001 fffff800`0395a0dc fffffa80`039e5f00 fffff800`0372ffef : nt!ViIrpAllocate+0x40
    fffff880`031c4260 fffff800`039684c3 : fffffa80`05c1e850 fffff800`0372ffef fffffa80`039e5f18 fffffa80`054a1a20 : nt!ViIrpAllocateLockedPacket+0x28
    fffff880`031c42a0 fffff800`03968a92 : fffffa80`05c1e850 fffffa80`039e5f18 00000000`00000000 fffff800`03977640 : nt!VfIoAllocateIrp1+0x23
    fffff880`031c42d0 fffff800`034b89c6 : fffffa80`05c1e850 fffff880`040478b0 00000000`00000058 34fc1458`00000000 : nt!IovAllocateIrp+0x52
    fffff880`031c4320 fffff800`0372ffef : fffffa80`05c1e850 00000000`00807805 00000000`00000058 fffffa80`05c595d0 : nt!IoBuildAsynchronousFsdRequest+0x36
    fffff880`031c4370 fffff880`040b92a0 : 00000000`00000000 00000000`00000000 01140009`00000000 00000000`00000000 : nt!IoBuildSynchronousFsdRequest+0x1f
    fffff880`031c43b0 fffff880`040b0d90 : 00000000`00000503 00000000`00000000 fffffa80`05c595d0 ffffffff`00000014 : dxgkrnl!DpiQueryBusInterface+0x60
    fffff880`031c4430 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DpiAddDevice+0x670
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgkrnl!DpiQueryBusInterface+60
    fffff880`040b92a0 488bd0          mov     rdx,rax
    
    SYMBOL_STACK_INDEX:  12
    
    SYMBOL_NAME:  dxgkrnl!DpiQueryBusInterface+60
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgkrnl
    
    IMAGE_NAME:  dxgkrnl.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ac5509e
    
    FAILURE_BUCKET_ID:  X64_0xA_VRF_dxgkrnl!DpiQueryBusInterface+60
    
    BUCKET_ID:  X64_0xA_VRF_dxgkrnl!DpiQueryBusInterface+60
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Tue Dec 21 14:46:54.484 2010 (GMT-5)
    System Uptime: 0 days 0:00:11.561
    Loading Kernel Symbols
    ...............................................................
    ........................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 0, fffff800034a7436}
    
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+126d )
    
    Followup: Pool_corruption
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800034a7436, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036bf0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+c73
    fffff800`034a7436 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    IRP_ADDRESS:  ffffffffffffff88
    
    TRAP_FRAME:  fffff880031a0040 -- (.trap 0xfffff880031a0040)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880031a0f80 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800034a7436 rsp=fffff880031a01d0 rbp=fffff880031a0320
     r8=fffff880031a02d8  r9=fffff880031a02d0 r10=0000000000000002
    r11=fffff800034a67d0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe cy
    nt!IopCompleteRequest+0xc73:
    fffff800`034a7436 488b09          mov     rcx,qword ptr [rcx] ds:0003:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003486ca9 to fffff80003487740
    
    STACK_TEXT:  
    fffff880`0319fef8 fffff800`03486ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0319ff00 fffff800`03485920 : 00000000`0000004b fffff980`02926ee0 fffff880`00ec16e4 fffffa80`05630fb0 : nt!KiBugCheckDispatch+0x69
    fffff880`031a0040 fffff800`034a7436 : 623b623a`62396238 623f623e`623d623c 00011808`40000005 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`031a01d0 fffff800`034640c7 : 00000000`00000000 fffff800`03427b16 00000000`0002f700 00000000`00000000 : nt!IopCompleteRequest+0xc73
    fffff880`031a02a0 fffff800`03464487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`031a0320 fffff800`034b5c5a : fffff800`036b4098 fffff800`036b4098 00000000`00000000 fffff880`00000001 : nt!KiApcInterrupt+0xd7
    fffff880`031a04b0 fffff800`03427af1 : 00000000`00000000 00000000`00000000 fffffa80`03f91598 00000000`00000000 : nt!RtlpIsFrameInBoundsEx+0x26
    fffff880`031a04f0 fffff800`03427967 : fffffa80`03f91598 fffff880`00000011 00000000`00000000 fffff800`00000004 : nt!RtlpWalkFrameChain+0x169
    fffff880`031a0b90 fffff800`0354ac2b : 00000000`00000003 fffffa80`03f91598 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x73
    fffff880`031a0bc0 fffff800`0391e0dc : fffffa80`03f91580 00000000`00000040 00000000`00000003 fffff800`0357e1d1 : nt!RtlCaptureStackBackTrace+0x4b
    fffff880`031a0bf0 fffff800`0392033a : fffff880`0319c000 fffff880`031a2000 00d40204`100000d5 40000000`00002020 : nt!IovpLogStackCallout+0x1c
    fffff880`031a0c20 fffff800`03922c9a : fffff8a0`005beeb0 00000000`00000004 00000000`00000001 00000000`00000003 : nt!ViPoolLogStackTrace+0x8a
    fffff880`031a0c50 fffff800`035ba67c : fffff8a0`005beea0 00000000`00000040 00000000`00000003 00000000`00000001 : nt!VfFreePoolNotification+0x4a
    fffff880`031a0c80 fffff800`03838d66 : fffff8a0`0057f340 00000000`00000000 fffffa80`0205ce90 00000000`000007ff : nt!ExDeferredFreePool+0x126d
    fffff880`031a0d30 fffff800`037d0357 : fffff8a0`00000019 fffff880`031a0e70 fffff8a0`005bb800 fffff980`00000019 : nt!CmpCallCallBacks+0x4f6
    fffff880`031a0e00 fffff800`0348c8b4 : 00000000`00000000 fffffa80`0448b130 fffffa80`044bd270 fffff8a0`005bb7d0 : nt! ?? ::NNGAKEGL::`string'+0x359b8
    fffff880`031a0ed0 fffff800`0379d514 : fffffa80`0448b130 00000000`00000000 fffffa80`044a9040 00000000`00000000 : nt!ObfDereferenceObject+0xd4
    fffff880`031a0f30 fffff800`0379d414 : 00000000`00000148 fffffa80`0448b130 fffff8a0`00001920 00000000`00000148 : nt!ObpCloseHandleTableEntry+0xc4
    fffff880`031a0fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCloseHandle+0x94
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+126d
    fffff800`035ba67c 90              nop
    
    SYMBOL_STACK_INDEX:  d
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+126d
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_VRF_nt!ExDeferredFreePool+126d
    
    BUCKET_ID:  X64_0xA_VRF_nt!ExDeferredFreePool+126d
    
    Followup: Pool_corruption
    ---------
    
    Debug session time: Thu Dec 23 16:25:28.686 2010 (GMT-5)
    System Uptime: 0 days 0:00:11.764
    Loading Kernel Symbols
    ...............................................................
    .......................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {6, 2, 0, fffff800034a02b3}
    
    Probably caused by : CI.dll ( CI!memcmp+93 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000006, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800034a02b3, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036b80e0
     0000000000000006 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+ae3
    fffff800`034a02b3 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    IRP_ADDRESS:  ffffffffffffff8e
    
    TRAP_FRAME:  fffff880031bc3d0 -- (.trap 0xfffff880031bc3d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=7cb1d27d1d7c7122 rbx=0000000000000000 rcx=fffff880031bc810
    rdx=0000001ffd324110 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88000c03aa3 rsp=fffff880031bc568 rbp=0000000000000188
     r8=0000000000000014  r9=0000000000000002 r10=0000000000000001
    r11=000000000000045c r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe cy
    CI!memcmp+0x93:
    fffff880`00c03aa3 483b040a        cmp     rax,qword ptr [rdx+rcx] ds:9068:fffff8a0`004e0920=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000347fca9 to fffff80003480740
    
    STACK_TEXT:  
    fffff880`031bbca8 fffff800`0347fca9 : 00000000`0000000a 00000000`00000006 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`031bbcb0 fffff800`0347e920 : 00000000`00000000 fffff980`02786ee0 fffffa80`044abb60 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`031bbdf0 fffff800`034a02b3 : fffff980`02786ee0 fffff880`031bc0d0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`031bbf80 fffff800`0345d0c7 : 00000000`00000006 fffff8a0`004e0920 fffffa80`0355e100 fffff781`00000000 : nt!IopCompleteRequest+0xae3
    fffff880`031bc050 fffff800`0345d487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`031bc0d0 fffff800`03433b92 : 00000000`00000000 fffff800`0349bc44 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0xd7
    fffff880`031bc260 fffff800`0349bc44 : 00000000`00000000 00000000`00000000 fffff880`031bc2a0 fffff800`0360cb40 : nt!KiCheckForKernelApcDelivery+0x2
    fffff880`031bc270 fffff800`0347e82e : 00000000`00000000 fffff8a0`004dea94 fffff880`031bc400 00001f80`00000000 : nt!MmAccessFault+0x1844
    fffff880`031bc3d0 fffff880`00c03aa3 : fffff800`0346717b 00000000`00000000 00000000`00000000 000139dc`c0000012 : nt!KiPageFault+0x16e
    fffff880`031bc568 fffff800`0346717b : 00000000`00000000 00000000`00000000 000139dc`c0000012 fffff880`031bc8f8 : CI!memcmp+0x93
    fffff880`031bc570 fffff880`00c0d48c : 00000000`c0000428 fffff880`031bc8f8 00000000`00000001 00000000`00000000 : nt!bsearch+0xaf
    fffff880`031bc5c0 fffff880`00c0b9cd : fffff880`031bc810 ffffffff`00000001 00000000`00000000 fffff880`00000000 : CI!I_FindFileOrHeaderHashInCatalogs+0x1b0
    fffff880`031bc660 fffff880`00c0c381 : fffffa80`05b64970 fffff880`031bc810 00000000`00008004 00000000`00000000 : CI!CipFindFileHash+0xf9
    fffff880`031bc730 fffff880`00c0afbb : 00000000`00000001 fffff880`031bc9f0 fffff880`031bc9f0 80000000`00000020 : CI!CipValidateFileHash+0x311
    fffff880`031bc8a0 fffff800`036eb68e : 00000000`00000024 00000000`000fffff fffffa80`05b64970 00000000`00000000 : CI!CiValidateImageHeader+0x213
    fffff880`031bc980 fffff800`036eb57c : 00000000`00000001 00000000`01000000 fffffa80`05b64410 00000000`00000000 : nt!SeValidateImageHeader+0x2e
    fffff880`031bc9c0 fffff800`0377bd95 : fffffa80`05b64970 fffffa80`05b64410 00000000`00000001 00000000`00000024 : nt!MiValidateImageHeader+0xa4
    fffff880`031bca80 fffff800`03771013 : fffff880`031bcce0 00000000`00000000 fffff880`031bcf98 00000000`00000000 : nt!MmCreateSection+0x8c9
    fffff880`031bcc90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x162
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    CI!memcmp+93
    fffff880`00c03aa3 483b040a        cmp     rax,qword ptr [rdx+rcx]
    
    SYMBOL_STACK_INDEX:  9
    
    SYMBOL_NAME:  CI!memcmp+93
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: CI
    
    IMAGE_NAME:  CI.dll
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5be01d
    
    FAILURE_BUCKET_ID:  X64_0xA_VRF_CI!memcmp+93
    
    BUCKET_ID:  X64_0xA_VRF_CI!memcmp+93
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmtsmn
    start             end                 module name
    fffff880`00f7e000 fffff880`00fd5000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c91000 fffff880`02d1b000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`01122000 fffff880`0112d000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`010e4000 fffff880`010ed000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`010ed000 fffff880`01117000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`01877000 fffff880`0187e000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03f80000 fffff880`03f91000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`01813000 fffff880`0183d000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01987000 fffff880`019b7000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d2f000 fffff880`00d8d000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`019b7000 fffff880`019c5000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03edf000 fffff880`03f62000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03f62000 fffff880`03f80000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`0121b000 fffff880`0122a000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01971000 fffff880`01987000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`019c5000 fffff880`019cf000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
    fffff880`01800000 fffff880`01813000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`019cf000 fffff880`019ef000   dump_JRAID dump_JRAID.sys Wed Jan 27 03:58:17 2010 (4B600029)
    fffff880`10ae9000 fffff880`10bdd000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`0fe00000 fffff880`0fe46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`01179000 fffff880`0118d000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0112d000 fffff880`01179000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01937000 fffff880`01971000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`039ec000 fffff800`03a35000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`0192e000 fffff880`01937000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03fb7000 fffff880`03fcd000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00d8d000 fffff880`00dad000   jraid    jraid.sys    Wed Jan 27 03:58:17 2010 (4B600029)
    fffff800`00bbc000 fffff800`00bc6000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`013d8000 fffff880`013f2000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`00cd7000 fffff880`00d1b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`010ca000 fffff880`010e4000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`0183d000 fffff880`0186e000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`01117000 fffff880`01122000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`019ef000 fffff880`019fa000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fde000 fffff880`00fe8000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0118d000 fffff880`011eb000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02dea000 fffff880`02df5000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`0191c000 fffff880`0192e000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014f9000 fffff880`015eb000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02d8f000 fffff880`02d9e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d1b000 fffff880`02d60000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`015eb000 fffff880`015fc000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`03410000 fffff800`039ec000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01235000 fffff880`013d8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0186e000 fffff880`01877000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`10ae7000 fffff880`10ae8180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
    fffff880`0fe55000 fffff880`10ae6e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
    fffff880`02d69000 fffff880`02d8f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00e33000 fffff880`00e48000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00eb9000 fffff880`00ec0000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00ddc000 fffff880`00dec000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`00d1b000 fffff880`00d2f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`018c1000 fffff880`018ca000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`018ca000 fffff880`018d3000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`018d3000 fffff880`018dc000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`018e2000 fffff880`0191c000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`00dad000 fffff880`00ddc000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`02d9e000 fffff880`02dbb000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`014e5000 fffff880`014ed000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`02c84000 fffff880`02c91000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`02c66000 fffff880`02c84000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02dd6000 fffff880`02dea000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`03f91000 fffff880`03fb7000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`00fe8000 fffff880`00ff5000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`0187e000 fffff880`0188c000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`0188c000 fffff880`018b1000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`014d5000 fffff880`014e5000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00e48000 fffff880`00e5d000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e5d000 fffff880`00eb9000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02dbb000 fffff880`02dd6000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`018b1000 fffff880`018c1000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ecb000 fffff880`00f6f000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f6f000 fffff880`00f7e000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d60000 fffff880`02d69000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`00fd5000 fffff880`00fde000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
      My Computer


  7. Posts : 4
    Windows 7 Professional x64
    Thread Starter
       #7

    CarlTR6 said:
    I looked at your four most recent dumps. Each of them is bugcheck error code A, a hardware or hardware related error code. Each of them blames something different. One of them blames HECIx64.sys, which is an Intel Management Engine Interface driver. Two others blame Windows system files and one blames memory corruption.
    I am running Prime95 right now and I will try MemTest from a cold boot as well.

    However, I just wanted to add that the reason I had so little uptime before some of the crashes is that here is what happens:
    1. My computer runs fine for X hours.
    2. I get a crash randomly somewhere along the way.
    3. I boot up and after the "Starting Windows" screen (the black one with the waving Windows logo) I get a crash (which would be the ones with little uptime).
    4. I have to put in my Windows 7 disk and "repair my computer" for it to boot.

    I don't know if that's relevant or not.

    Also, since you told me to run Prime95 in order to stress my computer (I'm assuming) I think it should also be mentioned that I also tried running 3DMark 11 Basic as a way of stressing my hardware as well and it did crash at the Physics test. I am running Prime95 (Small FFTs) right now and Workers 1 through 3 are on Test 4 and Worker 4 is on Test 3 and my Core temps are in the 73 degrees C range, which if I recall correctly is almost "too hot". Is this correct?
    ___________________
    EDIT:

    Prime95 UPDATE:

    So I ran the "Small FFTs" test, nothing came up so I decided to run one that also included my RAM, so I ran the "Large FFTs" test and my system crashed after about 10 - 12 minutes of running it with a blue screen which said "special pool detected memory corruption" (I have also attached another blue screen dump).

    HOWEVER, I do not think my memory is faulty and here's why:
    I simply cannot get any issues to occur in safe mode. I ran 3 Prime 95s at the same time all running "Large FFTs" maxing out all 4 GB of my memory and using 100% of my CPU and it didn't crash at all.

    Furthermore, after I got this blue screen my computer kept blue screening after the black "Starting Windows" screen (see above) and I simply could not get it to boot, so I booted into safe mode. After booting into safe mode, there were no blue screens and I was able to do everything perfectly fine.

    I have attached a newer minidump and performance monitor log.

    Thank you for the help.
    Last edited by dustty1818; 24 Dec 2010 at 18:08.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:00.
Find Us