Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.



Windows 7: BSOD Issues

16 May 2011   #1

Windows 7 Home Premium 64 bit
 
 
BSOD Issues

I'm having a consistent BSOD problem. Every few days or so My pc just bsod's. Sometimes when it's just sitting idle. sometimes when I'm playing a game or surfing the web. I thought it was winamp at one point so I uninstalled it but it continues to happen. I just have no idea what is causing it. I'm uncluding my detailed info in a .zip file.
thanks,
Dan

My System SpecsSystem Spec
17 May 2011   #2

Windows 7 x64
 
 

1. Update drivers:

Realtek
RTKVHD64.sys Mon Oct 13 06:29:18 2008

Check for nForce updates
nvmf6264.sys Wed Nov 11 18:16:48 2009


2. Replace AVG with MSE,

AVG Worldwide - Download tools

Virus, Spyware & Malware Protection | Microsoft Security Essentials


3. Check your hardware settings, make sure nothing is overclocked and up to its recommended stock values. These freeware ID tools will help you see your hardware status:

- cpuz memory tab snip
- cpuz CPU tab snip
- Passmark RAMMon HTML.zip



CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\043011-23593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c5c000 PsLoadedModuleList = 0xfffff800`02e99e50
Debug session time: Sat Apr 30 14:52:34.803 2011 (UTC - 4:00)
System Uptime: 0 days 14:58:03.377
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff88006e6b650, 0, 0}

*** ERROR: Module load completed but symbols could not be loaded for tdx.sys
Unable to load image \SystemRoot\system32\DRIVERS\nvmf6264.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvmf6264.sys
*** ERROR: Module load completed but symbols could not be loaded for nvmf6264.sys
Probably caused by : tdx.sys ( tdx+e3a2 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006e6b650, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+3131373832353134
fffff880`06e6b650 68c5e60680      push    0FFFFFFFF8006E6C5h

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f040e0
 0000000000000000 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88006e6c568 -- (.exr 0xfffff88006e6c568)
ExceptionAddress: fffff88000dec3a2 (tdx+0x000000000000e3a2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88006e6c610 -- (.trap 0xfffff88006e6c610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880017485b0 rbx=0000000000000000 rcx=fffffa80046e8200
rdx=fffff88006e6c7e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dec3a2 rsp=fffff88006e6c7a0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000007
r11=fffff88000de77b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
tdx+0xe3a2:
fffff880`00dec3a2 ff5020          call    qword ptr [rax+20h] ds:aa02:fffff880`017485d0=000a000900060008
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002d5ebdb to fffff80002ccc740

STACK_TEXT:  
fffff880`06e6b598 fffff800`02d5ebdb : 00000000`0000001e ffffffff`c0000005 fffff880`06e6b650 00000000`00000000 : nt!KeBugCheckEx
fffff880`06e6b5a0 fffff800`02d1dd30 : fffff880`06e6b730 fffff880`0158bc5a fffff880`06e6b790 fffff880`0158bc5a : nt!KipFatalFilter+0x1b
fffff880`06e6b5e0 fffff800`02cfad1c : fffff880`06e6b640 fffff880`0158d901 fffff880`06e6b668 fffff880`06e6b660 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`06e6b620 fffff800`02cf240d : fffff800`02e18be4 fffff880`06e6d420 00000000`00000000 fffff800`02c5c000 : nt!_C_specific_handler+0x8c
fffff880`06e6b690 fffff800`02cf9a90 : fffff800`02e18be4 fffff880`06e6b708 fffff880`06e6c568 fffff800`02c5c000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`06e6b6c0 fffff800`02d069ef : fffff880`06e6c568 fffff880`06e6bdd0 fffff880`00000000 fffffa80`0468f9e0 : nt!RtlDispatchException+0x410
fffff880`06e6bda0 fffff800`02ccbd82 : fffff880`06e6c568 fffffa80`044aaa30 fffff880`06e6c610 fffffa80`0468fa58 : nt!KiDispatchException+0x16f
fffff880`06e6c430 fffff800`02cca68a : 00000000`00000000 fffffa80`05c06050 00000000`00000036 fffffa80`05004160 : nt!KiExceptionDispatch+0xc2
fffff880`06e6c610 fffff880`00dec3a2 : fffffa80`044aaa30 00000000`00000000 fffff880`06e6c880 fffff880`03cb070b : nt!KiGeneralProtectionFault+0x10a
fffff880`06e6c7a0 fffff880`00ded0cc : 00000000`c0000016 00000000`00000820 fffff880`06e6cb38 00000000`c000021b : tdx+0xe3a2
fffff880`06e6c840 fffff880`0167b44e : fffffa80`07e8b001 fffff880`0164b2e0 00000000`00000000 fffffa80`07e8b0e0 : tdx+0xf0cc
fffff880`06e6c980 fffff880`0167f13b : 0000000c`8c018f4b fffffa80`046e8360 fffffa80`046e8200 00000000`00000000 : tcpip!TcpIndicateData+0xfe
fffff880`06e6ca80 fffff880`0167fa99 : fffffa80`046e8200 fffffa80`046e8200 00000000`00000586 fffffa80`06146a30 : tcpip!TcpDeliverDataToClient+0x2bb
fffff880`06e6cc00 fffff880`01679298 : fffffa80`049c3260 fffffa80`046e8200 fffffa80`049c3260 fffffa80`042bfaf0 : tcpip!TcpDeliverReceive+0xa9
fffff880`06e6cd00 fffff880`01679e95 : 00000000`00000000 fffffa80`04a30e50 fffffa80`060fbe14 00000000`00000010 : tcpip!TcpTcbFastDatagram+0x208
fffff880`06e6cec0 fffff880`0167e86a : fffffa80`04a69e80 fffff800`02c14900 fffffa80`04a2c701 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
fffff880`06e6d070 fffff880`0167e3b7 : fffffa80`0622202c fffffa80`04a6f008 00000000`00000000 fffffa80`04a0ed00 : tcpip!TcpMatchReceive+0x1fa
fffff880`06e6d1c0 fffff880`01680191 : fffffa80`07e51180 00000000`00000010 fffffa80`06145000 00000000`00000009 : tcpip!TcpPreValidatedReceive+0x177
fffff880`06e6d270 fffff880`01677e22 : fffffa80`05bc3150 fffffa80`06716010 fffffa80`06540006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x4a1
fffff880`06e6d3d0 fffff800`02cdbe5a : 00000000`00000000 fffff880`06e68000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`06e6d420 fffff880`01677882 : fffff880`01677d80 fffff880`06e6d530 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`06e6d500 fffff880`014be0eb : fffffa80`067168d0 00000000`00000000 fffffa80`05c061a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`06e6d570 fffff880`01487fc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`06e6d5e0 fffff880`01401ef1 : fffffa80`05c061a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`06e6da60 fffff880`042d5f08 : fffffa80`05d01000 fffffa80`0621f370 fffff880`06e6dc18 fffff880`06e6db60 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`06e6dab0 fffffa80`05d01000 : fffffa80`0621f370 fffff880`06e6dc18 fffff880`06e6db60 00000000`00000001 : nvmf6264+0xbf08
fffff880`06e6dab8 fffffa80`0621f370 : fffff880`06e6dc18 fffff880`06e6db60 00000000`00000001 00000000`00000000 : 0xfffffa80`05d01000
fffff880`06e6dac0 fffff880`06e6dc18 : fffff880`06e6db60 00000000`00000001 00000000`00000000 00000000`00000000 : 0xfffffa80`0621f370
fffff880`06e6dac8 fffff880`06e6db60 : 00000000`00000001 00000000`00000000 00000000`00000000 fffffa80`062a0428 : 0xfffff880`06e6dc18
fffff880`06e6dad0 00000000`00000001 : 00000000`00000000 00000000`00000000 fffffa80`062a0428 fffff880`042d1bc0 : 0xfffff880`06e6db60
fffff880`06e6dad8 00000000`00000000 : 00000000`00000000 fffffa80`062a0428 fffff880`042d1bc0 00000000`00000000 : 0x1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tdx+e3a2
fffff880`00dec3a2 ff5020          call    qword ptr [rax+20h]

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  tdx+e3a2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tdx

IMAGE_NAME:  tdx.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc16b

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_tdx+e3a2

BUCKET_ID:  X64_0x1E_c0000005_tdx+e3a2

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041611-38500-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c1a000 PsLoadedModuleList = 0xfffff800`02e57e50
Debug session time: Sat Apr 16 23:17:57.104 2011 (UTC - 4:00)
System Uptime: 1 days 8:38:59.166
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffff88000cdcc29, 2, 0, fffff88000cccaa8}

*** ERROR: Module load completed but symbols could not be loaded for tdx.sys
Probably caused by : tdx.sys ( tdx+caa8 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88000cdcc29, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88000cccaa8, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec20e0
 fffff88000cdcc29 

CURRENT_IRQL:  2

FAULTING_IP: 
tdx+caa8
fffff880`00cccaa8 80792904        cmp     byte ptr [rcx+29h],4

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88008488940 -- (.trap 0xfffff88008488940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88000cd8110 rbx=0000000000000000 rcx=fffff88000cdcc00
rdx=fffff88008488b02 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000cccaa8 rsp=fffff88008488ad0 rbp=0000000000000000
 r8=00000000c0000201  r9=0000000000000000 r10=fffffa8004a0ea50
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
tdx+0xcaa8:
fffff880`00cccaa8 80792904        cmp     byte ptr [rcx+29h],4 ds:0001:fffff880`00cdcc29=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c89ca9 to fffff80002c8a740

STACK_TEXT:  
fffff880`084887f8 fffff800`02c89ca9 : 00000000`0000000a fffff880`00cdcc29 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08488800 fffff800`02c88920 : fffff880`08488bc0 fffffa80`05b186d0 fffff880`08488b50 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`08488940 fffff880`00cccaa8 : fffff880`0848d2d2 fffff880`03d165c5 fffffa80`062cbe20 00000000`00000000 : nt!KiPageFault+0x260
fffff880`08488ad0 fffff880`00ccce8f : fffffa80`05b186d0 fffff880`00cd8400 00000000`c000020d fffffa80`0503f810 : tdx+0xcaa8
fffff880`08488b20 fffff880`00ccf393 : 00000000`00000004 fffff880`08488bc0 fffffa80`05b186d0 fffff880`08488bf0 : tdx+0xce8f
fffff880`08488b50 fffff880`01843be5 : fffffa80`0503f810 00000000`00000004 fffffa80`04a0ec10 fffffa80`0503f810 : tdx+0xf393
fffff880`08488bc0 fffff880`01868ff3 : 00000000`00000003 00000000`00000004 fffffa80`04a0ec10 00000000`00000000 : tcpip!TcpNotifyAbortDelivery+0x45
fffff880`08488bf0 fffff880`01843b02 : fffffa80`062c2674 fffffa80`08722e30 fffffa80`0503f810 fffff880`01877474 : tcpip!TcpShutdownTcb+0x603
fffff880`08488ce0 fffff880`0186b953 : 00000000`00000000 fffff880`08488e68 fffffa80`062c2674 00000000`00000037 : tcpip!TcpAbortTcbDelivery+0x32
fffff880`08488d10 fffff880`01878334 : fffffa80`054962f0 00000000`00000000 fffffa80`04a53008 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0xbe3
fffff880`08488ec0 fffff880`0187c86a : fffffa80`04a35900 00000000`00000000 fffffa80`04a0ec01 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`08489070 fffff880`0187c3b7 : fffffa80`062bf02c fffffa80`04a53008 00000000`00000000 fffffa80`062c0300 : tcpip!TcpMatchReceive+0x1fa
fffff880`084891c0 fffff880`0187e191 : fffffa80`062c0370 00000000`00000001 fffff880`084885fd 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`08489270 fffff880`01875e22 : fffffa80`06109220 fffffa80`065f88a0 fffffa80`065f0006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x4a1
fffff880`084893d0 fffff800`02c99e5a : 00000000`00000000 fffff880`08484000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`08489420 fffff880`01875882 : fffff880`01875d80 fffff880`08489530 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`08489500 fffff880`015970eb : fffffa80`065f9010 00000000`00000000 fffffa80`05abc1a0 fffff800`02c92de7 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`08489570 fffff880`01560fc6 : fffff880`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`084895e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tdx+caa8
fffff880`00cccaa8 80792904        cmp     byte ptr [rcx+29h],4

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  tdx+caa8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tdx

IMAGE_NAME:  tdx.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc16b

FAILURE_BUCKET_ID:  X64_0xD1_tdx+caa8

BUCKET_ID:  X64_0xD1_tdx+caa8

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050211-23921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c60000 PsLoadedModuleList = 0xfffff800`02e9de50
Debug session time: Mon May  2 19:38:31.391 2011 (UTC - 4:00)
System Uptime: 0 days 21:27:10.469
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {10, 2, 0, fffff8800feb0fff}

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+6dfff )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800feb0fff, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f080e0
 0000000000000010 

CURRENT_IRQL:  2

FAULTING_IP: 
nvlddmkm+6dfff
fffff880`0feb0fff 48              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  fffff88008977fd0 -- (.trap 0xfffff88008977fd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8008373120 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800feb0fff rsp=fffff88008978160 rbp=00000000807d0000
 r8=fffff88008978180  r9=0000000000000000 r10=0000000000000000
r11=fffff880009e7180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nvlddmkm+0x6dfff:
fffff880`0feb0fff 48              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ccfca9 to fffff80002cd0740

STACK_TEXT:  
fffff880`08977e88 fffff800`02ccfca9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08977e90 fffff800`02cce920 : fffffa80`00000000 00000000`00000000 00000000`00000400 fffff800`02dd69b1 : nt!KiBugCheckDispatch+0x69
fffff880`08977fd0 fffff880`0feb0fff : 00000000`00000000 00000000`00000000 fffffa80`0834b600 fffff880`08978410 : nt!KiPageFault+0x260
fffff880`08978160 00000000`00000000 : 00000000`00000000 fffffa80`0834b600 fffff880`08978410 00000000`00000000 : nvlddmkm+0x6dfff


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nvlddmkm+6dfff
fffff880`0feb0fff 48              ???

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nvlddmkm+6dfff

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d27c6da

FAILURE_BUCKET_ID:  X64_0xD1_nvlddmkm+6dfff

BUCKET_ID:  X64_0xD1_nvlddmkm+6dfff

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050811-26171-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c16000 PsLoadedModuleList = 0xfffff800`02e53e50
Debug session time: Sun May  8 09:06:53.766 2011 (UTC - 4:00)
System Uptime: 0 days 15:22:20.844
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {8c, 2, 0, fffff80002c91e13}

Probably caused by : ntkrnlmp.exe ( nt!KiProcessExpiredTimerList+103 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000008c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c91e13, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ebe0e0
 000000000000008c 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiProcessExpiredTimerList+103
fffff800`02c91e13 0fb6432b        movzx   eax,byte ptr [rbx+2Bh]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f1b450 -- (.trap 0xfffff88002f1b450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=fffffa80045ffc58
rdx=fffffa80045b2488 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c91e13 rsp=fffff88002f1b5e0 rbp=fffffa80045b2428
 r8=0000000000000002  r9=0000000000000000 r10=0000000000000036
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!KiProcessExpiredTimerList+0x103:
fffff800`02c91e13 0fb6432b        movzx   eax,byte ptr [rbx+2Bh] ds:00000000`0000002b=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c85ca9 to fffff80002c86740

STACK_TEXT:  
fffff880`02f1b308 fffff800`02c85ca9 : 00000000`0000000a 00000000`0000008c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1b310 fffff800`02c84920 : 00000000`00000000 00000000`00000061 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f1b450 fffff800`02c91e13 : fffffa80`045b2ce0 fffffa80`048b7168 fffffa80`048b7168 00000000`00000000 : nt!KiPageFault+0x260
fffff880`02f1b5e0 fffff800`02c924be : 00000080`d9b6c321 fffff880`02f1bc58 00000000`00360b36 fffff880`009e9c48 : nt!KiProcessExpiredTimerList+0x103
fffff880`02f1bc30 fffff800`02c91cb7 : 0000002e`2071f8c1 0000002e`00360b36 0000002e`2071f8e2 00000000`00000036 : nt!KiTimerExpiration+0x1be
fffff880`02f1bcd0 fffff800`02c8eeea : fffff880`009e7180 fffff880`009f1f40 00000000`00000000 fffff880`03e4adb0 : nt!KiRetireDpcList+0x277
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiProcessExpiredTimerList+103
fffff800`02c91e13 0fb6432b        movzx   eax,byte ptr [rbx+2Bh]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiProcessExpiredTimerList+103

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0xA_nt!KiProcessExpiredTimerList+103

BUCKET_ID:  X64_0xA_nt!KiProcessExpiredTimerList+103

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051211-25781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02c4b000 PsLoadedModuleList = 0xfffff800`02e88e50
Debug session time: Thu May 12 21:19:53.000 2011 (UTC - 4:00)
System Uptime: 1 days 3:18:27.078
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80002cc53d5}

Probably caused by : ntkrnlmp.exe ( nt!KiTimerWaitTest+2a5 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cc53d5, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef30e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiTimerWaitTest+2a5
fffff800`02cc53d5 488b6d00        mov     rbp,qword ptr [rbp]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff8000407e3d0 -- (.trap 0xfffff8000407e3d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cc53d5 rsp=fffff8000407e560 rbp=0000000000000000
 r8=fffffa8004b28810  r9=0000000000000005 r10=fffff80002c4b000
r11=fffffa8005d6d500 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!KiTimerWaitTest+0x2a5:
fffff800`02cc53d5 488b6d00        mov     rbp,qword ptr [rbp] ss:0018:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cbac69 to fffff80002cbb700

STACK_TEXT:  
fffff800`0407e288 fffff800`02cbac69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`0407e290 fffff800`02cb98e0 : 00000000`00000000 fffffa80`04b287f8 00000000`00000000 fffffa80`05d6d520 : nt!KiBugCheckDispatch+0x69
fffff800`0407e3d0 fffff800`02cc53d5 : ffffffff`ff676980 fffff800`02cc72ae fffff800`0407e600 fffffa80`00000000 : nt!KiPageFault+0x260
fffff800`0407e560 fffff800`02cc6d8d : fffffa80`04b287f0 fffffa80`05b58168 00000000`00000000 00000000`00000000 : nt!KiTimerWaitTest+0x2a5
fffff800`0407e5e0 fffff800`02cc74ce : 000000e4`e395af42 fffff800`0407ec58 00000000`006000c5 fffff800`02e39b28 : nt!KiProcessExpiredTimerList+0x6d
fffff800`0407ec30 fffff800`02cc6cc7 : 00000051`f05862c3 00000051`006000c5 00000051`f058626f 00000000`000000c5 : nt!KiTimerExpiration+0x1be
fffff800`0407ecd0 fffff800`02cc3eea : fffff800`02e35e80 fffff800`02e43c40 00000000`00000000 fffff880`0fe4a684 : nt!KiRetireDpcList+0x277
fffff800`0407ed80 00000000`00000000 : fffff800`0407f000 fffff800`04079000 fffff800`0407ed40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiTimerWaitTest+2a5
fffff800`02cc53d5 488b6d00        mov     rbp,qword ptr [rbp]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiTimerWaitTest+2a5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34

FAILURE_BUCKET_ID:  X64_0xA_nt!KiTimerWaitTest+2a5

BUCKET_ID:  X64_0xA_nt!KiTimerWaitTest+2a5

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`03eaf000 fffff880`03eed000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00e0f000 fffff880`00e66000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03d46000 fffff880`03dd0000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fe00000 fffff880`0fe16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03e26000 fffff880`03e3d000   amdk8    amdk8.sys    Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0117f000 fffff880`0118a000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0737d000 fffff880`07388000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00f70000 fffff880`00f79000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f79000 fffff880`00fa3000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00930000 fffff960`00991000   ATMFD    ATMFD.DLL    unavailable (00000000)
fffff880`06d22000 fffff880`06d4d000   AVGIDSDriver AVGIDSDriver.Sys Thu Apr 14 13:11:05 2011 (4DA72AA9)
fffff880`01949000 fffff880`01953000   AVGIDSEH AVGIDSEH.Sys Tue Feb 22 00:23:04 2011 (4D634838)
fffff880`06600000 fffff880`0660b000   AVGIDSFilter AVGIDSFilter.Sys Wed Feb 09 23:59:37 2011 (4D5370B9)
fffff880`03f94000 fffff880`03fe3000   avgldx64 avgldx64.sys Thu Jan 06 23:36:39 2011 (4D269857)
fffff880`019e7000 fffff880`019f6000   avgmfx64 avgmfx64.sys Tue Mar 01 07:25:15 2011 (4D6CE5AB)
fffff880`0193d000 fffff880`01949000   avgrkx64 avgrkx64.sys Wed Mar 16 10:06:34 2011 (4D80C3EA)
fffff880`03ca1000 fffff880`03d01000   avgtdia  avgtdia.sys  Mon Apr 04 17:54:35 2011 (4D9A3E1B)
fffff880`01800000 fffff880`01807000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f83000 fffff880`03f94000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06725000 fffff880`06743000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`006e0000 fffff960`00707000   cdd      cdd.dll      unavailable (00000000)
fffff880`019bd000 fffff880`019e7000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d31000 fffff880`00df1000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0190d000 fffff880`0193d000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cd3000 fffff880`00d31000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0105e000 fffff880`010d1000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`10bea000 fffff880`10bfa000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04953000 fffff880`04961000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`073af000 fffff880`073bb000   dc3d     dc3d.sys     Tue Nov 03 21:55:41 2009 (4AF0ED2D)
fffff880`03f65000 fffff880`03f83000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03f56000 fffff880`03f65000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`018f7000 fffff880`0190d000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04dca000 fffff880`04dec000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04961000 fffff880`0496b000   dump_diskdump dump_diskdump.sys Mon Jul 13 20:01:00 2009 (4A5BCABC)
fffff880`049aa000 fffff880`049bd000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0496b000 fffff880`049aa000   dump_nvstor64 dump_nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`048e5000 fffff880`048f1000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10a87000 fffff880`10b7b000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`10b7b000 fffff880`10bc1000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`011d6000 fffff880`011ea000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0118a000 fffff880`011d6000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013e0000 fffff880`013ea000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018bd000 fffff880`018f7000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02c02000 fffff800`02c4b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0424f000 fffff880`04273000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`048be000 fffff880`048d7000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04df4000 fffff880`04dfc080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`048b0000 fffff880`048be000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0665d000 fffff880`06725000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`018b4000 fffff880`018bd000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04370000 fffff880`0437f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`048d7000 fffff880`048e5000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba5000 fffff800`00baf000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`04200000 fffff880`04243000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013b5000 fffff880`013cf000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015bc000 fffff880`015e7000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04dec000 fffff880`04df1200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`049e4000 fffff880`049f9000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04800000 fffff880`04823000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`0438e000 fffff880`043ca880   mcdbus   mcdbus.sys   Tue Feb 24 05:34:07 2009 (49A3CD1F)
fffff880`00cb2000 fffff880`00cbf000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`048f1000 fffff880`048ff000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0437f000 fffff880`0438e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`073bb000 fffff880`073c8000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00f56000 fffff880`00f70000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`06743000 fffff880`0675b000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0675b000 fffff880`06788000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`06788000 fffff880`067d6000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`067d6000 fffff880`067f9000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`013ea000 fffff880`013f5000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e6f000 fffff880`00e79000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03f4b000 fffff880`03f56000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`018a2000 fffff880`018b4000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0146a000 fffff880`0155c000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fe16000 fffff880`0fe22000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`042eb000 fffff880`0431a000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04880000 fffff880`04895000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03c00000 fffff880`03c0f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03d01000 fffff880`03d46000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0155c000 fffff880`015bc000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0660b000 fffff880`0661a000   npf      npf.sys      Tue Oct 20 14:00:19 2009 (4ADDFAB3)
fffff880`01200000 fffff880`01211000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03f3f000 fffff880`03f4b000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c4b000 fffff800`03227000   nt       ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
fffff880`01212000 fffff880`013b5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`019f6000 fffff880`019ff000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10a85000 fffff880`10a86180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`0fe2a000 fffff880`10a84d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`04273000 fffff880`042c6600   nvmf6264 nvmf6264.sys Wed Nov 11 18:16:48 2009 (4AFB45E0)
fffff880`00fa3000 fffff880`00fce000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
fffff880`01140000 fffff880`0117f000   nvstor64 nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`03dd9000 fffff880`03dff000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`10bcd000 fffff880`10bea000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00eb9000 fffff880`00ece000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e79000 fffff880`00eac000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f3f000 fffff880`00f46000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f46000 fffff880`00f56000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013cf000 fffff880`013e0000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06c32000 fffff880`06cd8000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`073c8000 fffff880`073d6000   point64k point64k.sys Tue Nov 03 21:55:38 2009 (4AF0ED2A)
fffff880`04d8d000 fffff880`04dca000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cbf000 fffff880`00cd3000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`042c7000 fffff880`042eb000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0431a000 fffff880`04335000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04335000 fffff880`04356000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04356000 fffff880`04370000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03eee000 fffff880`03f3f000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01807000 fffff880`01810000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015e7000 fffff880`015f0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015f0000 fffff880`015f9000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01868000 fffff880`018a2000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03c5b000 fffff880`03c73000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04c1e000 fffff880`04d8c680   RTKVHD64 RTKVHD64.sys Mon Oct 13 06:29:18 2008 (48F322FE)
fffff880`043cb000 fffff880`043fa000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`06cd8000 fffff880`06ce3000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`10bc1000 fffff880`10bcd000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03c0f000 fffff880`03c2c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01860000 fffff880`01868000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07277000 fffff880`0730c000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`06d4d000 fffff880`06db4000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`06ce3000 fffff880`06d10000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`010de000 fffff880`01140000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`0fe22000 fffff880`0fe23480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06d10000 fffff880`06d22000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`03c94000 fffff880`03ca1000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`03c76000 fffff880`03c94000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03c47000 fffff880`03c5b000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00560000 fffff960`0056a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03e00000 fffff880`03e26000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`048ff000 fffff880`04953000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`03fe3000 fffff880`03ff5000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04c00000 fffff880`04c1d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04df2000 fffff880`04df3f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03e9e000 fffff880`03eaf000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04826000 fffff880`04880000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03e3d000 fffff880`03e48000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e48000 fffff880`03e9e000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04895000 fffff880`048b0000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00eac000 fffff880`00eb9000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0144a000 fffff880`01458000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`00fce000 fffff880`00ff3000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00ece000 fffff880`00ee3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00ee3000 fffff880`00f3f000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01814000 fffff880`01860000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03c2c000 fffff880`03c47000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01458000 fffff880`01468000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00df1000 fffff880`00e00000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03dd0000 fffff880`03dd9000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00372000   win32k   win32k.sys   unavailable (00000000)
fffff880`00e66000 fffff880`00e6f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01953000 fffff880`01974000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`07388000 fffff880`07394000   dc3d.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`073a1000 fffff880`073af000   point64k.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`07394000 fffff880`073a1000   mouhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
fffff880`049bd000 fffff880`049c9000   dc3d.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`049d6000 fffff880`049e4000   point64k.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`049c9000 fffff880`049d6000   mouhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
fffff880`0730c000 fffff880`0737d000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01953000 fffff880`01961000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01961000 fffff880`0196b000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`0196b000 fffff880`019aa000   dump_nvstor6
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0003F000
fffff880`019aa000 fffff880`019bd000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
Reply

 BSOD Issues





Thread Tools



Similar help and support threads for2: BSOD Issues
Thread Forum
BSOD issues BSOD Help and Support
BSOD Issues BSOD Help and Support
BSOD Issues BSOD Help and Support
BSOD issues BSOD Help and Support
BSOD issues BSOD Help and Support
Been having BSOD issues, like many on here. BSOD Help and Support
Freezing issues and BSoD issues. Help please! BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 10:25 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33