Antivirus Software:
Code:
avastsvc.exe c:\program files\avast software\avast\avastsvc.exe 1748 8 200 1380 03/03/2012 20:57 7.0.1407.0 43.72 KB (44,768 bytes) 03/03/2012 04:22
avastui.exe c:\program files\avast software\avast\avastui.exe 3564 8 200 1380 03/03/2012 20:57 7.0.1407.0 3.84 MB (4,031,368 bytes) 03/03/2012 04:22
Possible out of date drivers:
Code:
JmtFltr fffff880`075bf000 fffff880`075ca580 Fri Sep 28 11:04:57 2007 (46fd3439) 0001641e JmtFltr.sys
vhidmini fffff880`0555b000 fffff880`0555e680 Fri Sep 28 11:21:57 2007 (46fd3835) 0000ddea vhidmini.sys
JmtFltr
vhidmini.sys
These are probably not related to the crashes, but still a good idea to try to update if you can.
Code:
-
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Kingston\BSODDmpFiles\Sywade\Windows_NT6_BSOD_jcgriff2\030312-28111-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16841.amd64fre.win7_gdr.110622-1503
Machine Name:
Kernel base = 0xfffff800`03017000 PsLoadedModuleList = 0xfffff800`03254e70
Debug session time: Sat Mar 3 13:55:44.800 2012 (UTC - 7:00)
System Uptime: 0 days 2:23:24.719
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff8800515e9bf, fffff880067f7938, fffff880067f71a0}
Probably caused by : hardware ( dxgmms1!VidSchiCheckGPUTimeout+7b )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800515e9bf, The address that the exception occurred at
Arg3: fffff880067f7938, Exception Record Address
Arg4: fffff880067f71a0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VidSchiCheckGPUTimeout+7b
fffff880`0515e9bf 85a500000048 test dword ptr [rbp+48000000h],esp
EXCEPTION_RECORD: fffff880067f7938 -- (.exr 0xfffff880067f7938)
ExceptionAddress: fffff8800515e9bf (dxgmms1!VidSchiCheckGPUTimeout+0x000000000000007b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000048000000
Attempt to read from address 0000000048000000
CONTEXT: fffff880067f71a0 -- (.cxr 0xfffff880067f71a0)
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8009717410
rdx=fffff880067f7c00 rsi=fffffa800968d000 rdi=fffffa8009717410
rip=fffff8800515e9bf rsp=fffff880067f7b70 rbp=0000000000000000
r8=fffff880067f7bf8 r9=0000000000000000 r10=0000000000018fb6
r11=fffff880067f7bd0 r12=fffff880067f7c00 r13=fffffa8009717500
r14=fffffa8009717410 r15=fffff880067f7bf8
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgmms1!VidSchiCheckGPUTimeout+0x7b:
fffff880`0515e9bf 85a500000048 test dword ptr [rbp+48000000h],esp ss:0018:00000000`48000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000048000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bf0e0
0000000048000000
FOLLOWUP_IP:
dxgmms1!VidSchiCheckGPUTimeout+7b
fffff880`0515e9bf 85a500000048 test dword ptr [rbp+48000000h],esp
BUGCHECK_STR: 0x7E
MISALIGNED_IP:
dxgmms1!VidSchiCheckGPUTimeout+7b
fffff880`0515e9bf 85a500000048 test dword ptr [rbp+48000000h],esp
LAST_CONTROL_TRANSFER: from fffff8800515eb59 to fffff8800515e9bf
STACK_TEXT:
fffff880`067f7b70 fffff880`0515eb59 : fffffa80`09717d60 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiCheckGPUTimeout+0x7b
fffff880`067f7bc0 fffff880`051302d5 : fffffa80`09717410 fffffa80`09717410 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x55
fffff880`067f7bf0 fffff880`0515ce7a : 00000000`00000000 fffffa80`076fb230 00000000`00000080 fffffa80`09717410 : dxgmms1!VidSchiScheduleCommandToRun+0x1e9
fffff880`067f7d00 fffff800`033276fa : 00000000`05766abf fffffa80`09684b60 fffffa80`069ab9e0 fffffa80`09684b60 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`067f7d40 fffff800`03065b46 : fffff880`02ea4180 fffffa80`09684b60 fffff880`02eaf040 fffff880`012182b4 : nt!PspSystemThreadStartup+0x5a
fffff880`067f7d80 00000000`00000000 : fffff880`067f8000 fffff880`067f2000 fffff880`067f7690 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VidSchiCheckGPUTimeout+7b
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff880067f71a0 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED_dxgmms1.sys
BUCKET_ID: X64_IP_MISALIGNED_dxgmms1.sys
Followup: MachineOwner
---------
-
Loading Dump File [D:\Kingston\BSODDmpFiles\Sywade\Windows_NT6_BSOD_jcgriff2\030312-28953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16841.amd64fre.win7_gdr.110622-1503
Machine Name:
Kernel base = 0xfffff800`0300f000 PsLoadedModuleList = 0xfffff800`0324ce70
Debug session time: Sat Mar 3 11:31:33.874 2012 (UTC - 7:00)
System Uptime: 0 days 3:09:03.169
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
......................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8804b2c7590, 0, fffff8000307e839, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+1e )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8804b2c7590, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8000307e839, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b70e0
fffff8804b2c7590
FAULTING_IP:
nt!KiSystemServiceExit+1e
fffff800`0307e839 f685f000000001 test byte ptr [rbp+0F0h],1
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800aa46a90 -- (.trap 0xfffff8800aa46a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000307e839 rsp=fffff8800aa46c20 rbp=fffff8800aa46ca0
r8=fffffa800aa540e8 r9=0000000000000000 r10=ffffffffffffffef
r11=fffffa800aa18b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiSystemServiceExit+0x1e:
fffff800`0307e839 f685f000000001 test byte ptr [rbp+0F0h],1 ss:0018:fffff880`0aa46d90=33
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030fe7a1 to fffff8000307f5c0
STACK_TEXT:
fffff880`0aa46928 fffff800`030fe7a1 : 00000000`00000050 fffff880`4b2c7590 00000000`00000000 fffff880`0aa46a90 : nt!KeBugCheckEx
fffff880`0aa46930 fffff800`0307d6ae : 00000000`00000000 00000000`05a60749 0000000b`00000000 fffff880`02ea4180 : nt! ?? ::FNODOBFM::`string'+0x40d4b
fffff880`0aa46a90 fffff800`0307e839 : fffffa80`0aa18b60 00000000`0000013c ffffffff`ffffd8f0 fffffa80`0abd2220 : nt!KiPageFault+0x16e
fffff880`0aa46c20 00000000`74d12dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x1e
00000000`04bdf098 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74d12dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceExit+1e
fffff800`0307e839 f685f000000001 test byte ptr [rbp+0F0h],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSystemServiceExit+1e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44
FAILURE_BUCKET_ID: X64_0x50_nt!KiSystemServiceExit+1e
BUCKET_ID: X64_0x50_nt!KiSystemServiceExit+1e
Followup: MachineOwner
---------
- Points to your DirectX/graphics card/graphics card driver. Other possible causes are Memory problems... BIOS... Corrupted hard disk file system... Corrupted System Files... Lack of Windows updates... Drivers...
- Possible causes are Memory problems... Graphics card memory problems... BIOS... Corrupted hard disk file system... Corrupted System Files... Missing Windows Updates... Drivers...
Thanks to Dave76 for help understanding possible causes.
We will start with the common problems first (see bold possible causes). Do the following steps and test by doing your normal routine after each step to see if stability increases (the memory tests you can run concurrently as they will not increase stability unless you are forced to move modules around). Post back your results after each step, and if you get a blue screen crash, upload the files again and await further instructions after we are able to analyze the crash.
If you can do your normal routine for a few weeks without a crash, and your crashes are usually more frequent than that, then the problem is likely solved.