Unexpected Shutdowns in Win7


  1. Posts : 7
    Windows 7 Ultimate x64
       #1

    Unexpected Shutdowns in Win7


    Hi all:

    It's been some almost a month after I installed Windows 7 and I occasionally get "unexpected shutdowns". Since I was not able to identify the cause I apply to the Forum Community for Help. System Description:

    System Manufacturer/Model Number :OEM, OS: Windows 7, Ultimate x64 , CPU: Intel Core 2 Duo 2,40 GHz, Motherboard:ECS- 650 SLI, Memory: Kingston 800, 6.00 GB, Graphics Card(s): Gainward , NVIDIA GeForce 7300 GT, 256MB, Sound Card: Realtek HD Audio Device (on M/B), Monitor(s) Displays: Philips 190s TFT, Screen Resolution: 1280x1024,

    Hard Drives:
    Samsung 1 TB
    Samsung 500 GB
    Samsung 300GB
    Samsung 300GB
    PSU: Thermaltake PurePower 420W, Cooling: Powersuply 2 Fans, CPU Fan,
    I attach hereto the minidump files and thank you in advance for your attention

    Yours sincerely

    Panosgk
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    I am looking at your three most recent dumps and they point to a hardware issue, memory corruption.

    Error code D1, DRIVER_IRQL_NOT_LESS_OR_EQUAL - usual causes are a device driver.

    Error code 3B, SYSTEM_SERVICE_EXCEPTION - usual causes are System service, Device driver, graphics driver, ?memory

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\A-Rar\082410-20061-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a56e50
    Debug session time: Tue Aug 24 09:33:54.691 2010 (GMT-4)
    System Uptime: 0 days 17:37:46.640
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff880041312db, fffff8800642eb10, 0}
    
    Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGDEVICE::DestroyResource+6f )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff880041312db, Address of the exception record for the exception that caused the bugcheck
    Arg3: fffff8800642eb10, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    dxgkrnl!DXGDEVICE::DestroyResource+6f
    fffff880`041312db 4c8b4b18        mov     r9,qword ptr [rbx+18h]
    
    CONTEXT:  fffff8800642eb10 -- (.cxr 0xfffff8800642eb10)
    rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8007546e10
    rdx=0000000000000000 rsi=0000000000000000 rdi=fffff8a002aa6000
    rip=fffff880041312db rsp=fffff8800642f4e0 rbp=fffff8a002aa7300
     r8=0000000000000000  r9=0000000000000000 r10=fffff880009e6660
    r11=fffff8a0090332c0 r12=fffff8a009033201 r13=fffff8a002833d00
    r14=0000000000000000 r15=0000000000000001
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    dxgkrnl!DXGDEVICE::DestroyResource+0x6f:
    fffff880`041312db 4c8b4b18        mov     r9,qword ptr [rbx+18h] ds:002b:00000000`00000018=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  dwm.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff880041312db
    
    STACK_TEXT:  
    fffff880`0642f4e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyResource+0x6f
    
    
    FOLLOWUP_IP: 
    dxgkrnl!DXGDEVICE::DestroyResource+6f
    fffff880`041312db 4c8b4b18        mov     r9,qword ptr [rbx+18h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  dxgkrnl!DXGDEVICE::DestroyResource+6f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgkrnl
    
    IMAGE_NAME:  dxgkrnl.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ac5509e
    
    STACK_COMMAND:  .cxr 0xfffff8800642eb10 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_dxgkrnl!DXGDEVICE::DestroyResource+6f
    
    BUCKET_ID:  X64_0x3B_dxgkrnl!DXGDEVICE::DestroyResource+6f
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\A-Rar\082310-27908-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a56e50
    Debug session time: Mon Aug 23 15:51:53.197 2010 (GMT-4)
    System Uptime: 1 days 10:57:47.608
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {fffff8800801a3a0, 2, 0, fffff88003c65102}
    
    Probably caused by : tcpip.sys ( tcpip!IppSendDatagramsCommon+732 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: fffff8800801a3a0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88003c65102, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    OVERLAPPED_MODULE: Address regions for 'cdfs' and 'AAMW_IFS64.s' overlap
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac10e0
     fffff8800801a3a0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    tcpip!IppSendDatagramsCommon+732
    fffff880`03c65102 440fb68424f0020000 movzx r8d,byte ptr [rsp+2F0h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880073a9f20 -- (.trap 0xfffff880073a9f20)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000010 rbx=0000000000000000 rcx=fffffa80092cefd0
    rdx=0000000000000060 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88003c65102 rsp=fffff880073aa0b0 rbp=0000000000000000
     r8=00000000000029bc  r9=0000000000000012 r10=0000000000000000
    r11=fffffa80092cefd0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    tcpip!IppSendDatagramsCommon+0x732:
    fffff880`03c65102 440fb68424f0020000 movzx r8d,byte ptr [rsp+2F0h] ss:0018:fffff880`073aa3a0=00
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002888ca9 to fffff80002889740
    
    STACK_TEXT:  
    fffff880`073a9dd8 fffff800`02888ca9 : 00000000`0000000a fffff880`0801a3a0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`073a9de0 fffff800`02887920 : 00000000`0023c380 00000000`00000010 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`073a9f20 fffff880`03c65102 : fffffa80`093351d0 00000000`00005000 fffffa80`07a264c0 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`073aa0b0 fffff880`03c76815 : fffff880`073aa760 fffff880`03ac4f07 fffff880`03d6c9a0 fffffa80`093351d0 : tcpip!IppSendDatagramsCommon+0x732
    fffff880`073aa380 fffff880`03c5cccb : fffffa80`05f56cf0 00000000`00000001 fffffa80`00000022 fffffa80`06e3b640 : tcpip!IpNlpFastSendDatagram+0x775
    fffff880`073aa710 fffff880`03cbb41a : 00000000`0000f016 fffff880`00000001 00000000`d4020002 00000000`00000010 : tcpip!TcpTcbHeaderSend+0x48b
    fffff880`073aa8c0 fffff880`03c78334 : 00000000`ae238000 00000000`0ea41001 fffffa80`06e36860 fffff880`051726eb : tcpip! ?? ::FNODOBFM::`string'+0x3d728
    fffff880`073aaa70 fffff880`03c7c86a : fffffa80`06767e80 fffffa80`06b28d00 fffffa80`06667e01 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`073aac20 fffff880`03c7c3b7 : fffffa80`06e3b662 fffffa80`06759000 00000000`00000000 fffff880`03c5f700 : tcpip!TcpMatchReceive+0x1fa
    fffff880`073aad70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tcpip!IppSendDatagramsCommon+732
    fffff880`03c65102 440fb68424f0020000 movzx r8d,byte ptr [rsp+2F0h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  tcpip!IppSendDatagramsCommon+732
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tcpip
    
    IMAGE_NAME:  tcpip.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c15a458
    
    FAILURE_BUCKET_ID:  X64_0xD1_tcpip!IppSendDatagramsCommon+732
    
    BUCKET_ID:  X64_0xD1_tcpip!IppSendDatagramsCommon+732
    
    Followup: MachineOwner
    ---------
    
    ******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {18, 2, 0, fffff88003a593f6}
    
    Unable to load image \SystemRoot\System32\Drivers\Mpfp.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Mpfp.sys
    *** ERROR: Module load completed but symbols could not be loaded for Mpfp.sys
    Probably caused by : Mpfp.sys ( Mpfp+f3f6 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000018, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88003a593f6, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002afa0e0
     0000000000000018 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    Mpfp+f3f6
    fffff880`03a593f6 48394818        cmp     qword ptr [rax+18h],rcx
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002dda780 -- (.trap 0xfffff88002dda780)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80078f6f20
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88003a593f6 rsp=fffff88002dda910 rbp=0000000000000001
     r8=fffffa8005558f00  r9=0000000000000000 r10=fffffa800523dd30
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe cy
    Mpfp+0xf3f6:
    fffff880`03a593f6 48394818        cmp     qword ptr [rax+18h],rcx ds:d6b0:00000000`00000018=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800028c1ca9 to fffff800028c2740
    
    STACK_TEXT:  
    fffff880`02dda638 fffff800`028c1ca9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02dda640 fffff800`028c0920 : 00000000`00000000 fffffa80`078f6f20 00000000`00000000 00000000`00000003 : nt!KiBugCheckDispatch+0x69
    fffff880`02dda780 fffff880`03a593f6 : fffffa80`05220000 fffffa80`05558e10 01cb4519`0209a2e0 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`02dda910 fffffa80`05220000 : fffffa80`05558e10 01cb4519`0209a2e0 00000000`00000001 00000000`00000000 : Mpfp+0xf3f6
    fffff880`02dda918 fffffa80`05558e10 : 01cb4519`0209a2e0 00000000`00000001 00000000`00000000 00000000`00000000 : 0xfffffa80`05220000
    fffff880`02dda920 01cb4519`0209a2e0 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`05558e10
    fffff880`02dda928 00000000`00000001 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`03a5956d : 0x1cb4519`0209a2e0
    fffff880`02dda930 00000000`00000000 : 00000000`00000000 00000000`00000001 fffff880`03a5956d fffffa80`078f6f20 : 0x1
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Mpfp+f3f6
    fffff880`03a593f6 48394818        cmp     qword ptr [rax+18h],rcx
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  Mpfp+f3f6
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Mpfp
    
    IMAGE_NAME:  Mpfp.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c3f641b
    
    FAILURE_BUCKET_ID:  X64_0xD1_Mpfp+f3f6
    
    BUCKET_ID:  X64_0xD1_Mpfp+f3f6
    
    Followup: MachineOwner
    --------
    My first recommendation is immediately uninstall McAfee using this tool > Info > Tool. McAfee is a known cause of BSOD's on some Win 7 systems. One of your dumps pointed to a driver that McAfee interferes with. Download and install Microsoft Security Essentials and make sure Windows Firewall is turned on.

    Are you running
    Ashampoo Anti-Malware or Ashshampoo Tune up? The driver, AAMW_IFS64.sys, was indicated in one of your dumps. Uninstall this program using Revo (free) uninstaller.

    I find the following older drivers on your system. Win 7 does not like older drivers. They can and do cause memory corruption. Update these drivers from the manufacturers websites rather than using Windows Update or Device Manager.

    ISODrv64.sys Tue Feb 10 04:22:18 2009
    nvlddmkm.sys Thu May 14 16:48:07 2009
    nvm62x64.sys Fri Oct 17 17:01:06 2008
    nvstor.sys Wed May 20 02:45:37 2009


    How To Find Drivers:
    - I have listed links to most of the drivers in the code box below. Please use the links there to see what info I've found about those drivers.
    - search Google for the name of the driver
    - compare the Google results with what's installed on your system to figure out which device/program it belongs to
    - visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
    - if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.


    - - The most common drivers are listed on this page: Driver Reference
    - - Driver manufacturer links are on this page:
    Drivers and Downloads

    Last edited by CarlTR6; 26 Aug 2010 at 10:01.
      My Computer


  3. Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #3

    Thx a lot.
    Looking forward to hearing from you.
      My Computer


  4. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #4

    Refresh your page. I have posted more information. :)
      My Computer


  5. Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #5

    Thx a lot. On my way to apply your recommendations.
    I'll let you know about results.
      My Computer


  6. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #6

    Good luck. We will be here. If you need help with the drivers, please feel free to ask.

    Here are some words of advice:

    For security, use MSE and Windows Firewall. Download and install Malwarebytes (free). Use it as an on demand scanner. Update it and run it once a week, once a day - whatever you are comfortable with.

    Don't use any tuneup utility, registry cleaner or registry defragger. Win 7 is remarkably self maintaining and such programs can actually degrade Win 7's performance and even damage your system. Win 7 is totally different from XP. There is no tuneup utility out there that can increase Win 7's performance.
      My Computer


  7. Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #7

    Having applied all recommendations I had a period of 36 hours with no crash. This morning I have had a new one. (Please note that last night I installed Nero Multimedia Suite 10). Her is my last dump file (together with the previous three for easy reference).
    Thx a lot
      My Computer


  8. Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #8

    Unexpected Shutdowns in Win7


    Having applied all recommendations I had a period of 36 hours with no crash. This morning I have had a new one. (Please note that last night I installed Nero Multimedia Suite 10). Her is my last dump file (together with the previous three for easy reference).
    Thx a lot
      My Computer


  9. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #9

    The latest dump is error code 50, PAGE_FAULT_IN_NONPAGED_AREA - usual causes are defective hardware (particularly memory - but not just RAM), Faulty system service, Antivirus, Device driver, NTFS corruption, BIOS.
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\A-Rar\082910-21793-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`01861000 PsLoadedModuleList = 0xfffff800`01a9ee50
    Debug session time: Sun Aug 29 00:32:12.205 2010 (GMT-4)
    System Uptime: 0 days 13:06:40.568
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffffa7ff9d66e8f, 0, fffff88002f200c0, 7}
    
    
    Could not read faulting driver name
    Probably caused by : afd.sys ( afd!AfdWskDereferenceClient <PERF> (afd+0xc0)+0 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffffa7ff9d66e8f, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff88002f200c0, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000007, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001b090e0
     fffffa7ff9d66e8f 
    
    FAULTING_IP: 
    afd!AfdWskDereferenceClient <PERF> (afd+0xc0)+0
    fffff880`02f200c0 6b8bcf7063f35e  imul    ecx,dword ptr [rbx-0C9C8F31h],5Eh
    
    MM_INTERNAL_CODE:  7
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  myiHome-server
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880087f8690 -- (.trap 0xfffff880087f8690)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000004 rbx=0000000000000000 rcx=fffffa8006820c10
    rdx=fffffa800672fdc0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88002f200c0 rsp=fffff880087f8828 rbp=fffff880087f8ca0
     r8=0000000000000100  r9=0000000000000000 r10=fffff880087f7b10
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    afd!AfdWskDereferenceClient <PERF> (afd+0xc0):
    fffff880`02f200c0 6b8bcf7063f35e  imul    ecx,dword ptr [rbx-0C9C8F31h],5Eh ds:88e0:ffffffff`f36370cf=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80001950849 to fffff800018d1740
    
    STACK_TEXT:  
    fffff880`087f8528 fffff800`01950849 : 00000000`00000050 fffffa7f`f9d66e8f 00000000`00000000 fffff880`087f8690 : nt!KeBugCheckEx
    fffff880`087f8530 fffff800`018cf82e : 00000000`00000000 fffffa80`0672fdc0 fffffa80`08a2e700 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e0b
    fffff880`087f8690 fffff880`02f200c0 : fffff880`02f6705e fffffa80`07d6bd00 fffff880`087f8ca0 fffffa80`07bb82e0 : nt!KiPageFault+0x16e
    fffff880`087f8828 fffff880`02f6705e : fffffa80`07d6bd00 fffff880`087f8ca0 fffffa80`07bb82e0 fffffa80`07796c30 : afd!AfdWskDereferenceClient <PERF> (afd+0xc0)
    fffff880`087f8830 fffff800`01bec707 : fffffa80`07796c30 fffff880`087f8c00 fffffa80`07796e20 fffffa80`07bb82e0 : afd!AfdConnect+0x7be
    fffff880`087f8a10 fffff800`01becf66 : fffff880`087f8bf8 00000000`000007d4 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x607
    fffff880`087f8b40 fffff800`018d0993 : fffff880`087f8ca0 fffffa80`0686b360 fffff880`087f8bf8 fffff800`01be7401 : nt!NtDeviceIoControlFile+0x56
    fffff880`087f8bb0 00000000`739b2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`142cf0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739b2dd9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    afd!AfdWskDereferenceClient <PERF> (afd+0xc0)+0
    fffff880`02f200c0 6b8bcf7063f35e  imul    ecx,dword ptr [rbx-0C9C8F31h],5Eh
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  afd!AfdWskDereferenceClient <PERF> (afd+0xc0)+0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: afd
    
    IMAGE_NAME:  afd.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc184
    
    FAILURE_BUCKET_ID:  X64_0x50_afd!AfdWskDereferenceClient__PERF__(afd+0xc0)+0
    
    BUCKET_ID:  X64_0x50_afd!AfdWskDereferenceClient__PERF__(afd+0xc0)+0
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmtsmn
    start             end                 module name
    fffff880`00f98000 fffff880`00fef000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02f20000 fffff880`02faa000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`043c8000 fffff880`043de000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`01183000 fffff880`0118e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`07da4000 fffff880`07daf000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00c86000 fffff880`00c8f000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00c8f000 fffff880`00cb9000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`01636000 fffff880`0163d000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`031db000 fffff880`031ec000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`07149000 fffff880`07167000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00740000 fffff960`00767000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`017d5000 fffff880`017ff000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00e25000 fffff880`00ee5000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`0173b000 fffff880`0176b000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d17000 fffff880`00d75000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0105e000 fffff880`010d1000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`043b8000 fffff880`043c8000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`045b6000 fffff880`045c4000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0313a000 fffff880`031bd000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`031bd000 fffff880`031db000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`0312b000 fffff880`0313a000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01725000 fffff880`0173b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0176b000 fffff880`01793000   Dot4     Dot4.sys     Mon Jul 13 20:00:16 2009 (4A5BCA90)
    fffff880`042d1000 fffff880`042db000   Dot4Prt  Dot4Prt.sys  Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`04400000 fffff880`04410000   dot4usb  dot4usb.sys  Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`0458e000 fffff880`045b0000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`045c4000 fffff880`045ce000   dump_diskdump dump_diskdump.sys Mon Jul 13 20:01:00 2009 (4A5BCABC)
    fffff880`045ce000 fffff880`045e1000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`03065000 fffff880`030a4000   dump_nvstor64 dump_nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
    fffff880`045e1000 fffff880`045ed000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03eb0000 fffff880`03fa4000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03fa4000 fffff880`03fea000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`03fea000 fffff880`03ff7000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`011da000 fffff880`011ee000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0447b000 fffff880`04486000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`0118e000 fffff880`011da000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`016eb000 fffff880`01725000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`02eab000 fffff880`02ef5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`01818000 fffff800`01861000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`07834000 fffff880`07840000   hcmon    hcmon.sys    Sun Aug 01 13:52:52 2010 (4C55B474)
    fffff880`04342000 fffff880`04366000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`044f5000 fffff880`04551000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`01793000 fffff880`017ac000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`03ff7000 fffff880`03fff080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`031ec000 fffff880`031fa000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`07000000 fffff880`070c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`016e2000 fffff880`016eb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`0303c000 fffff880`0305a000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03026000 fffff880`0303c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`0310d000 fffff880`0312b000   ISODrv64 ISODrv64.sys Thu Jan 28 22:39:02 2010 (4B625856)
    fffff880`042c0000 fffff880`042cf000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`017ac000 fffff880`017ba000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`01782000 fffff800`0178c000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04414000 fffff880`04457000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`0156a000 fffff880`01595000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`045b0000 fffff880`045b5200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0711c000 fffff880`07131000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`070c8000 fffff880`070eb000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`07d9a000 fffff880`07da4000   mbam     mbam.sys     Thu Apr 29 13:16:04 2010 (4BD9BED4)
    fffff880`00cbf000 fffff880`00d03000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`017c5000 fffff880`017d3000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0320c000 fffff880`0321b000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`00c6c000 fffff880`00c86000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`01600000 fffff880`0162d000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
    fffff880`07d59000 fffff880`07d69000   MpNWMon  MpNWMon.sys  Sat Mar 20 01:58:00 2010 (4BA463E8)
    fffff880`07167000 fffff880`0717f000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0717f000 fffff880`071ac000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`071ac000 fffff880`071fa000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`07811000 fffff880`07834000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01409000 fffff880`01414000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03102000 fffff880`0310d000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`016d0000 fffff880`016e2000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01418000 fffff880`0150a000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04224000 fffff880`04230000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`04230000 fffff880`0425f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`044e0000 fffff880`044f5000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02e2f000 fffff880`02e3e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02faa000 fffff880`02fef000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0150a000 fffff880`0156a000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01235000 fffff880`01246000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`030f6000 fffff880`03102000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`01861000 fffff800`01e3d000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`0125c000 fffff880`013ff000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0162d000 fffff880`01636000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03eae000 fffff880`03eaf180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
    fffff880`0321c000 fffff880`03eade00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
    fffff880`04366000 fffff880`043b7500   nvmf6264 nvmf6264.sys Thu Jul 30 19:48:18 2009 (4A723142)
    fffff880`00dd2000 fffff880`00dfd000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
    fffff880`01144000 fffff880`01183000   nvstor64 nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
    fffff880`02e09000 fffff880`02e2f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00da8000 fffff880`00dbd000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d75000 fffff880`00da8000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e17000 fffff880`00e1e000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00c5c000 fffff880`00c6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`0792e000 fffff880`079d4000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`04551000 fffff880`0458e000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d03000 fffff880`00d17000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`04200000 fffff880`04224000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0425f000 fffff880`0427a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0427a000 fffff880`0429b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`0429b000 fffff880`042b5000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`030a5000 fffff880`030f6000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`042b5000 fffff880`042c0000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01680000 fffff880`01689000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01689000 fffff880`01692000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01400000 fffff880`01409000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01696000 fffff880`016d0000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`07131000 fffff880`07149000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`079d4000 fffff880`079df000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`03200000 fffff880`0320c000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02e3e000 fffff880`02e5b000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`015f1000 fffff880`015f9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`07cc3000 fffff880`07d59000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
    fffff880`07c5b000 fffff880`07cc3000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
    fffff880`07c06000 fffff880`07c33000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
    fffff880`010e2000 fffff880`01144000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
    fffff880`042cf000 fffff880`042d0480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`02c01000 fffff880`02dfe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`07c33000 fffff880`07c45000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`02f13000 fffff880`02f20000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`02ef5000 fffff880`02f13000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02e76000 fffff880`02e8a000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005e0000 fffff960`005ea000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03000000 fffff880`03026000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04457000 fffff880`04469000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`043de000 fffff880`043fb000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`045ed000 fffff880`045eef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04331000 fffff880`04342000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`04486000 fffff880`044e0000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
    fffff880`0305a000 fffff880`03065000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`042db000 fffff880`04331000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`045ef000 fffff880`045fb000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
    fffff880`02e8a000 fffff880`02ea5000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00e0a000 fffff880`00e17000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`0163d000 fffff880`0164b000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`0164b000 fffff880`01670000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`07840000 fffff880`07858000   vmci     vmci.sys     Sun Aug 01 13:21:17 2010 (4C55AD0D)
    fffff880`017ba000 fffff880`017c5000   VMkbd    VMkbd.sys    Sun Aug 01 14:42:49 2010 (4C55C029)
    fffff880`04471000 fffff880`0447b000   VMNET    VMNET.SYS    Mon Aug 10 08:04:50 2009 (4A800CE2)
    fffff880`04469000 fffff880`04471000   vmnetadapter vmnetadapter.sys Mon Aug 10 08:04:53 2009 (4A800CE5)
    fffff880`0710c000 fffff880`0711c000   vmnetbridge vmnetbridge.sys Mon Aug 10 08:05:58 2009 (4A800D26)
    fffff880`07c45000 fffff880`07c4f000   vmnetuserif vmnetuserif.sys Sun Aug 01 14:07:24 2010 (4C55B7DC)
    fffff880`01595000 fffff880`015a5000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`07858000 fffff880`0792e000   vmx86    vmx86.sys    Sun Aug 01 15:30:08 2010 (4C55CB40)
    fffff880`00dbd000 fffff880`00dd2000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`015a5000 fffff880`015f1000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`07c4f000 fffff880`07c5b000   vstor2_ws60 vstor2-ws60.sys Tue Apr 27 19:16:25 2010 (4BD77049)
    fffff880`02e5b000 fffff880`02e76000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01670000 fffff880`01680000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ee5000 fffff880`00f89000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f89000 fffff880`00f98000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02e00000 fffff880`02e09000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00050000 fffff960`0035f000   win32k   win32k.sys   Sat Jun 19 00:31:59 2010 (4C1C483F)
    fffff880`00fef000 fffff880`00ff8000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02fef000 fffff880`02ffa000   ws2ifsl  ws2ifsl.sys  Mon Jul 13 20:10:33 2009 (4A5BCCF9)
    fffff880`070eb000 fffff880`0710c000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`07d69000 fffff880`07d9a000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`094e5000 fffff880`09556000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`09434000 fffff880`094a5000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0176b000 fffff880`01779000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01779000 fffff880`01783000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01783000 fffff880`017c2000   dump_nvstor6
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`017c2000 fffff880`017d5000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    This driver is slightly out of date and is implicated in your dump.

    nvstor.sys Wed May 20 02:45:37 2009 - nVidia Storage Drivers Drivers - Download NVIDIA Drivers. There is an updated version of this driver, I believe.

    Enable Driver Verifier. here is a tutorial. Follow those instructions. Upload any dumps generated by Driver Verifier. Use your computer normally while Driver Verifier is running.

    Driver Verifier - Enable and Disable
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 08:10.
Find Us