Code:
-
Loading Dump File [F:\BSODDmpFiles\garthrs\Windows_NT6_BSOD_jcgriff2\021312-20950-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c17000 PsLoadedModuleList = 0xfffff800`02e5c670
Debug session time: Mon Feb 13 14:18:13.726 2012 (GMT-7)
System Uptime: 0 days 0:50:22.412
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, 10, fffff880089a3870, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000010, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880089a3870, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+0
00000000`00000010 ?? ???
CONTEXT: fffff880089a3870 -- (.cxr 0xfffff880089a3870)
rax=fffffa80051ef020 rbx=0000000000000000 rcx=fffffa80080b4000
rdx=0000000000000550 rsi=fffff9801b970f00 rdi=fffff880089a4430
rip=0000000000000010 rsp=fffff880089a4258 rbp=fffff88009510000
r8=0000000026f80000 r9=0000000000000000 r10=0000000000000550
r11=fffff8a0093c0000 r12=fffffa80062a0000 r13=000000000001ffa4
r14=ffffffffc000000d r15=fffffa80081e0000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
00000000`00000010 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x3B
PROCESS_NAME: DunDefGame.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to 0000000000000010
STACK_TEXT:
fffff880`089a2fa8 fffff800`02c931e9 : 00000000`0000003b 00000000`c0000005 00000000`00000010 fffff880`089a3870 : nt!KeBugCheckEx
fffff880`089a2fb0 fffff800`02c92b3c : fffff880`089a4018 fffff880`089a3870 00000000`00000000 fffff880`052fbdec : nt!KiBugCheckDispatch+0x69
fffff880`089a30f0 fffff800`02cbf4fd : fffff960`0034f930 fffff960`0031575c fffff960`00060000 fffff880`089a4018 : nt!KiSystemServiceHandler+0x7c
fffff880`089a3130 fffff800`02cbe2d5 : fffff800`02dde788 fffff880`089a31a8 fffff880`089a4018 fffff800`02c17000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`089a3160 fffff800`02ccf361 : fffff880`089a4018 fffff880`089a3870 fffff880`00000000 fffff880`089a4430 : nt!RtlDispatchException+0x415
fffff880`089a3840 fffff800`02c932c2 : fffff880`089a4018 00000000`00000000 fffff880`089a40c0 fffff980`1b970f00 : nt!KiDispatchException+0x135
fffff880`089a3ee0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`02c92b3c b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x3B_VRF_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_VRF_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
---------
-
Loading Dump File [F:\BSODDmpFiles\garthrs\Windows_NT6_BSOD_jcgriff2\021112-22854-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c5f000 PsLoadedModuleList = 0xfffff800`02ea4670
Debug session time: Sat Feb 11 05:16:41.275 2012 (GMT-7)
System Uptime: 0 days 1:43:33.867
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff80000000000, 0, fffff800030f8ffc, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!PfTCreateTraceDump+37c )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff80000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800030f8ffc, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0e100
fffff80000000000
FAULTING_IP:
nt!PfTCreateTraceDump+37c
fffff800`030f8ffc 4c3b36 cmp r14,qword ptr [rsi]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880097db940 -- (.trap 0xfffff880097db940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a011dd5918 rbx=0000000000000000 rcx=000000000000ffff
rdx=000000000000027c rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030f8ffc rsp=fffff880097dbad8 rbp=0000000000000001
r8=0000000000000010 r9=fffff8a0041dd000 r10=000000000000827c
r11=fffff880097dbb00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!PfTCreateTraceDump+0x37c:
fffff800`030f8ffc 4c3b36 cmp r14,qword ptr [rsi] ds:0002:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c879fc to fffff80002cdbc40
STACK_TEXT:
fffff880`097db7d8 fffff800`02c879fc : 00000000`00000050 fffff800`00000000 00000000`00000000 fffff880`097db940 : nt!KeBugCheckEx
fffff880`097db7e0 fffff800`02cd9d6e : 00000000`00000000 fffff800`00000000 00000000`00008000 fffff8a0`041ba908 : nt! ?? ::FNODOBFM::`string'+0x4611f
fffff880`097db940 fffff800`030f8ffc : fffff800`030f8fdd fffff8a0`041ba8f8 00000000`00000001 fffff8a0`11dd58f8 : nt!KiPageFault+0x16e
fffff880`097dbad8 fffffa80`0aa0bb01 : fffff800`031480b0 fffff880`097dbc10 fffff8a0`041b8018 fffff8a0`11dcb000 : nt!PfTCreateTraceDump+0x37c
fffff880`097dbbd8 fffff800`031480b0 : fffff880`097dbc10 fffff8a0`041b8018 fffff8a0`11dcb000 fffff8a0`11dca000 : 0xfffffa80`0aa0bb01
fffff880`097dbbe0 fffff800`0314dca3 : fffffa80`0aa0bb01 00000000`00000080 fffffa80`099e39e0 fffff800`02e63da8 : nt!PfTGenerateTrace+0x10
fffff880`097dbc10 fffff800`02f76fee : ffffffff`ff676980 fffffa80`0aa0bb60 fffff880`097dbdb0 fffffa80`0aa0bb60 : nt!PfTLoggingWorker+0x113
fffff880`097dbd40 fffff800`02ccd5e6 : fffff880`02fd5180 fffffa80`0aa0bb60 fffff880`02fdffc0 fffff880`0102dcb0 : nt!PspSystemThreadStartup+0x5a
fffff880`097dbd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PfTCreateTraceDump+37c
fffff800`030f8ffc 4c3b36 cmp r14,qword ptr [rsi]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PfTCreateTraceDump+37c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x50_nt!PfTCreateTraceDump+37c
BUCKET_ID: X64_0x50_nt!PfTCreateTraceDump+37c
Followup: MachineOwner
---------
-
Loading Dump File [F:\BSODDmpFiles\garthrs\Windows_NT6_BSOD_jcgriff2\020912-19905-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c0d000 PsLoadedModuleList = 0xfffff800`02e52670
Debug session time: Thu Feb 9 18:16:39.666 2012 (GMT-7)
System Uptime: 1 days 4:42:10.352
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {403, fffff680000d3518, 862000006161b847, fffff6800001a048}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+330bc )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff680000d3518
Arg3: 862000006161b847
Arg4: fffff6800001a048
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002c313f6 to fffff80002c89c40
STACK_TEXT:
fffff880`06ecf7a8 fffff800`02c313f6 : 00000000`0000001a 00000000`00000403 fffff680`000d3518 86200000`6161b847 : nt!KeBugCheckEx
fffff880`06ecf7b0 fffff800`02cbbbb7 : fffff700`01080000 fffff680`000d3ff8 fffffa80`051d9990 996f9e52`52faa500 : nt! ?? ::FNODOBFM::`string'+0x330bc
fffff880`06ecf960 fffff800`02c770ff : fffffa80`00000000 00000000`1b9f1fff 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x41f
fffff880`06ecfb20 fffff800`02c88ed3 : ffffffff`ffffffff 00000000`0501e810 00000000`0501e808 00000000`00008000 : nt!NtFreeVirtualMemory+0x61f
fffff880`06ecfc20 00000000`76ec14fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0501e7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76ec14fa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+330bc
fffff800`02c313f6 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+330bc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc
BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc
Followup: MachineOwner
---------
- Possible causes are Memory problems... Corrupted hard disk file system... Corrupted System Files... Graphics Driver... Drivers...
- Possible causes are Memory problems... Graphics card memory problems... BIOS... Corrupted hard disk file system... Corrupted System Files... Missing Windows Updates... Drivers...
- Possible causes are Memory problems... Drivers...
Thanks to Dave76 for help understanding possible causes.
Do you have the full versions of Malwarebytes and Microsoft Security Essentials running at the same time? Two full security systems that accomplish the same tasks running at once is known to cause stability problems.
Please remove the program that uses this driver. AMD Overdrive or AMD Vision Engine Control Center are the most likely candidates.
Code:
AODDriver2 fffff880`07c31000 fffff880`07c62000 Wed Jun 15 02:38:35 2011 (4df86f8b) 00012df4 AODDriver2.sys
We will start with the common problems first (see bold possible causes). Do the following steps and test after each to see if stability increases (the memory tests you can run concurrently as they will not increase stability unless you are forced to move modules around). Post back your results after each step, and if you get a blue screen crash, upload the files again and await further instructions after we are able to analyze the crash.
- If you are overclocking any hardware, please stop.
- Run the boot version of Memtest86+ paying close attention to Parts 2 and 3 of the tutorial. Also, in case Memtest86+ misses anything and comes up with no errors, run the extended version of the Windows Memory Diagnostics Tool for at least five passes. These you may want to run overnight since they take a long time to complete (run them an hour before bed each of the next two nights and check before going to sleep that they are still running).
If you swap any memory components, follow these steps for ESD safety:
- Shut down and turn off your computer.
- Unplug all power supplies to the computer (AC Power then battery for laptops, AC power for desktops)
- Hold down the power button for 30 seconds to close the circuit and ensure all power drains from components.
- Make sure you are grounded by using proper grounding techniques, i.e. work on an anti-static workbench, anti-static desk, or an anti-static pad. Hold something metallic while touching it to the anti-static surface, or use an anti-static wristband to attach to the anti-static material while working.
Once these steps have been followed, it is safe to remove and replace components within your computer.
- An underlying driver may be incompatible\conflicting with your system. Run Driver Verifier to find any issues. To run Driver Verifier, do the following:
a.
Backup your system and user files
b.
Create a system restore point
c. If you do not have a Windows 7 DVD,
Create a system repair disc
d. Run
Driver Verifier
If Windows cannot start in normal mode with driver verifier running, start in safe mode. If it cannot start in safe mode or normal mode, restore the system restore point using
System Restore OPTION TWO.
Thanks to zigzag3143 for contributing to the Verifier steps.
If you are unable to start Windows with all drivers being verified or if the blue screen crashes fail to create .dmp files, run them in groups of 5 or 10 until you find a group that causes blue screen crashes and stores the blue screen .dmp files.