Hello,
A while back I started to get trouble with my laptop. There was some sort of interference/weird noise out of the laptops speakers and there are stability issues with the USB ports (or at least, it looks this way). In the beginning of the problems it looked like pushing the body of the laptop (next to the sides of the touchpad, where USB-ports and soundcard is located I guess) would give a BSOD, but now it's always after the "interference/weird sound".
I do not understand this problem and I hope it is a softwareproblem and not hardware because that will suck since it is a laptop
.
I am running legal Windows 7 Professional x64, from MSDN, there was no OEM pre-installed OS when I bought it (bought it without OS to save money). There has never been another OS other then Windows 7 Professional on the system. The system is about two and a half years old and this particular install is about 6-7 months old.
If it is needed to reinstall the OS I will do that of course, but if it is a hardware malfunction that won't solve the problem I guess. The laptop is from Xxodd and never did weird things before all this started.
I included the files from the Windows_NT6_BSOD_jcgriff2-tool and the perfmonlog. I love that tool for real! I have spent ours on searching for all the files and downloading symbols, windbg and stuff. In my last attempt I found this forum, so you are my last hope haha
.
I really hope someone will find the problem and my second hope is that it is fixable!
Thanks in advance,
Chocola, The Netherlands
Hi and welcome
These started 3/30 with your Program Files (x86)\Line6\Tools\Driver Archive\TonePort\L6TPortB64.sys. being the cause. It quickly changed into hardware on 8/10 still caused by toneport and to date it remains toneport.
I would remove it. The driver is also old, if you are really lucky there MAY be a newer driver that works. I would remove it
Let us know if you need further assistance
Ken
Analysis
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\033010-23843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*C:\symbols;*http://msdl.microsoft.com/download/symbols ;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e57000 PsLoadedModuleList = 0xfffff800`03094e50
Debug session time: Tue Mar 30 16:22:20.420 2010 (GMT-4)
System Uptime: 0 days 1:48:48.530
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
.....
Unable to load image \SystemRoot\System32\Drivers\L6TPortB64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for L6TPortB64.sys
*** ERROR: Module load completed but symbols could not be loaded for L6TPortB64.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff88004924dc1, fffff88002ee79d8, fffff88002ee7230}
Probably caused by : L6TPortB64.sys ( L6TPortB64+19dc1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004924dc1, The address that the exception occurred at
Arg3: fffff88002ee79d8, Exception Record Address
Arg4: fffff88002ee7230, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
L6TPortB64+19dc1
fffff880`04924dc1 66814b0a0020 or word ptr [rbx+0Ah],2000h
EXCEPTION_RECORD: fffff88002ee79d8 -- (.exr 0xfffff88002ee79d8)
ExceptionAddress: fffff88004924dc1 (L6TPortB64+0x0000000000019dc1)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 000000000000000a
Attempt to write to address 000000000000000a
CONTEXT: fffff88002ee7230 -- (.cxr 0xfffff88002ee7230)
rax=fffffa80040e12d0 rbx=0000000000000000 rcx=fffffa80061be3a8
rdx=0000000000000000 rsi=fffffa80040e12d0 rdi=fffffa80061be0b8
rip=fffff88004924dc1 rsp=fffff88002ee7c10 rbp=fffff880054a1fac
r8=fffffa80080ced00 r9=0000000000000000 r10=00a7004300bb0061
r11=0000000000000000 r12=fffffa8005b81d30 r13=0000000000000000
r14=0000000000000000 r15=fffff880009f3ec0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010282
L6TPortB64+0x19dc1:
fffff880`04924dc1 66814b0a0020 or word ptr [rbx+0Ah],2000h ds:002b:00000000`0000000a=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 000000000000000a
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff0e0
000000000000000a
FOLLOWUP_IP:
L6TPortB64+19dc1
fffff880`04924dc1 66814b0a0020 or word ptr [rbx+0Ah],2000h
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from fffffa8008224ca0 to fffff88004924dc1
STACK_TEXT:
fffff880`02ee7c10 fffffa80`08224ca0 : fffff880`054a1fac fffffa80`084c2010 fffffa80`061be0b8 fffff880`02ee7c40 : L6TPortB64+0x19dc1
fffff880`02ee7c18 fffff880`054a1fac : fffffa80`084c2010 fffffa80`061be0b8 fffff880`02ee7c40 fffffa80`06db3040 : 0xfffffa80`08224ca0
fffff880`02ee7c20 fffffa80`084c2010 : fffffa80`061be0b8 fffff880`02ee7c40 fffffa80`06db3040 fffffa80`000001b9 : 0xfffff880`054a1fac
fffff880`02ee7c28 fffffa80`061be0b8 : fffff880`02ee7c40 fffffa80`06db3040 fffffa80`000001b9 00000000`00000000 : 0xfffffa80`084c2010
fffff880`02ee7c30 fffff880`02ee7c40 : fffffa80`06db3040 fffffa80`000001b9 00000000`00000000 00000000`00000000 : 0xfffffa80`061be0b8
fffff880`02ee7c38 fffffa80`06db3040 : fffffa80`000001b9 00000000`00000000 00000000`00000000 fffff800`02ed21af : 0xfffff880`02ee7c40
fffff880`02ee7c40 fffffa80`000001b9 : 00000000`00000000 00000000`00000000 fffff800`02ed21af fffff880`009f3ec0 : 0xfffffa80`06db3040
fffff880`02ee7c48 00000000`00000000 : 00000000`00000000 fffff800`02ed21af fffff880`009f3ec0 00000000`00000000 : 0xfffffa80`000001b9
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: L6TPortB64+19dc1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L6TPortB64
IMAGE_NAME: L6TPortB64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49ecb020
STACK_COMMAND: .cxr 0xfffff88002ee7230 ; kb
FAILURE_BUCKET_ID: X64_0x7E_L6TPortB64+19dc1
BUCKET_ID: X64_0x7E_L6TPortB64+19dc1
Followup: MachineOwner
---------
Code:
080710-30250-01.dmp 8/7/2010 19:13:52 DRIVER_POWER_STATE_FAILURE 0x0000009f 00000000`00000003 fffffa80`059ab060 fffff800`00b9c518 fffffa80`0434d010 ntoskrnl.exe ntoskrnl.exe+70600 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\080710-30250-01.dmp 2 15 7600
080810-28296-01.dmp 8/8/2010 18:40:26 DRIVER_POWER_STATE_FAILURE 0x0000009f 00000000`00000003 fffffa80`04fe4060 fffff800`0455a518 fffffa80`0463b830 ntoskrnl.exe ntoskrnl.exe+70600 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\080810-28296-01.dmp 2 15 7600
081910-24484-01.dmp 8/19/2010 03:31:56 DRIVER_POWER_STATE_FAILURE 0x0000009f 00000000`00000003 fffffa80`04ff5060 fffff800`00b9c518 fffffa80`04e96bf0 ntoskrnl.exe ntoskrnl.exe+70740 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\081910-24484-01.dmp 2 15 7600
082410-23906-01.dmp 8/24/2010 03:48:14 DRIVER_POWER_STATE_FAILURE 0x0000009f 00000000`00000003 fffffa80`0573f060 fffff800`00b9c518 fffffa80`06b89270 ntoskrnl.exe ntoskrnl.exe+70740 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\082410-23906-01.dmp 2 15 7600
minidump2.dmp 9/6/2010 10:50:42 DRIVER_POWER_STATE_FAILURE 0x0000009f 00000000`00000003 fffffa80`05038060 fffff800`00b9c518 fffffa80`06b83d30 ntoskrnl.exe ntoskrnl.exe+70740 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\minidump2.dmp 2 15 7600
081010-23093-01.dmp 8/10/2010 12:33:22 0x00000124 00000000`00000000 fffffa80`05063038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\081010-23093-01.dmp 2 15 7600
081010-25640-01.dmp 8/10/2010 22:31:06 0x00000124 00000000`00000000 fffffa80`04fe4038 00000000`b2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\081010-25640-01.dmp 2 15 7600
081610-25390-01.dmp 8/16/2010 22:21:20 0x00000124 00000000`00000000 fffffa80`04f69038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\081610-25390-01.dmp 2 15 7600
081610-25640-01.dmp 8/16/2010 22:02:36 0x00000124 00000000`00000000 fffffa80`0501f038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\081610-25640-01.dmp 2 15 7600
081610-25734-01.dmp 8/16/2010 21:59:40 0x00000124 00000000`00000000 fffffa80`04fb9038 00000000`b2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\081610-25734-01.dmp 2 15 7600
081610-26750-01.dmp 8/16/2010 21:07:30 0x00000124 00000000`00000000 fffffa80`04f99038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\081610-26750-01.dmp 2 15 7600
082110-25562-01.dmp 8/21/2010 02:26:16 0x00000124 00000000`00000000 fffffa80`04fe6038 00000000`b2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\082110-25562-01.dmp 2 15 7600
082110-27890-01.dmp 8/21/2010 23:31:54 0x00000124 00000000`00000000 fffffa80`05015038 00000000`b2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\082110-27890-01.dmp 2 15 7600
082210-23375-01.dmp 8/22/2010 22:48:24 0x00000124 00000000`00000000 fffffa80`04ff7038 00000000`b2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\082210-23375-01.dmp 2 15 7600
082210-23625-01.dmp 8/22/2010 18:51:24 0x00000124 00000000`00000000 fffffa80`04f63038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\082210-23625-01.dmp 2 15 7600
082210-24515-01.dmp 8/22/2010 16:32:50 0x00000124 00000000`00000000 fffffa80`04f8c038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\082210-24515-01.dmp 2 15 7600
082510-23859-01.dmp 8/25/2010 03:10:28 0x00000124 00000000`00000000 fffffa80`04f831d8 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\082510-23859-01.dmp 2 15 7600
082610-25156-01.dmp 8/26/2010 00:02:50 0x00000124 00000000`00000000 fffffa80`04f7f038 00000000`b2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\082610-25156-01.dmp 2 15 7600
090210-23843-01.dmp 9/2/2010 21:24:48 0x00000124 00000000`00000000 fffffa80`04fe9038 00000000`b2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\090210-23843-01.dmp 2 15 7600
090410-25703-01.dmp 9/4/2010 00:02:56 0x00000124 00000000`00000000 fffffa80`04fda038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\090410-25703-01.dmp 2 15 7600
090510-24781-01.dmp 9/5/2010 15:54:04 0x00000124 00000000`00000000 fffffa80`04f93038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\090510-24781-01.dmp 2 15 7600
090510-24859-01.dmp 9/5/2010 17:47:46 0x00000124 00000000`00000000 fffffa80`04fc2038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\090510-24859-01.dmp 2 15 7600
091110-21937-01.dmp 9/11/2010 22:26:38 0x00000124 00000000`00000000 fffffa80`04ff1038 00000000`b2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\091110-21937-01.dmp 2 15 7600
091110-22515-01.dmp 9/11/2010 22:21:06 0x00000124 00000000`00000000 fffffa80`04ffb038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\091110-22515-01.dmp 2 15 7600
091110-25109-01.dmp 9/11/2010 12:24:36 0x00000124 00000000`00000000 fffffa80`04f97038 00000000`f2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\091110-25109-01.dmp 2 15 7600
minidump.dmp 9/11/2010 22:26:38 0x00000124 00000000`00000000 fffffa80`04ff1038 00000000`b2000040 00000000`00000800 hal.dll hal.dll+12903 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\minidump.dmp 2 15 7600
033010-23843-01.dmp 3/30/2010 22:24:12 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`04924dc1 fffff880`02ee79d8 fffff880`02ee7230 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\033010-23843-01.dmp 2 15 7600
040310-26984-01.dmp 4/3/2010 21:22:58 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`01e8edc1 fffff880`037db9d8 fffff880`037db230 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\040310-26984-01.dmp 2 15 7600
040610-29375-01.dmp 4/6/2010 23:27:50 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`09019dc1 fffff880`060c49d8 fffff880`060c4230 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\040610-29375-01.dmp 2 15 7600
041010-25781-01.dmp 4/10/2010 19:01:30 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`04819dc1 fffff880`0453a9d8 fffff880`0453a230 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\041010-25781-01.dmp 2 15 7600
050710-29453-01.dmp 5/7/2010 22:35:50 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`0614ddc1 fffff880`08f749d8 fffff880`08f74240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\050710-29453-01.dmp 2 15 7600
051010-26765-01.dmp 5/10/2010 19:36:40 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`01e19dc1 fffff880`045b89d8 fffff880`045b8240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\051010-26765-01.dmp 2 15 7600
051010-26859-01.dmp 5/10/2010 22:03:22 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`048c2dc1 fffff880`045579d8 fffff880`04557240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\051010-26859-01.dmp 2 15 7600
051010-30406-01.dmp 5/10/2010 23:45:06 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`01f0fdc1 fffff880`045629d8 fffff880`04562240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\051010-30406-01.dmp 2 15 7600
051310-24046-01.dmp 5/13/2010 13:16:24 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`01f4cdc1 fffff880`0455c9d8 fffff880`0455c240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\051310-24046-01.dmp 2 15 7600
051610-30140-01.dmp 5/16/2010 00:55:10 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`04938dc1 fffff880`0379f9d8 fffff880`0379f240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\051610-30140-01.dmp 2 15 7600
052410-29828-01.dmp 5/24/2010 18:48:08 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`03511dc1 fffff880`037cd9d8 fffff880`037cd240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\052410-29828-01.dmp 2 15 7600
060510-45359-01.dmp 6/5/2010 16:28:04 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`04819dc1 fffff880`0331e9d8 fffff880`0331e240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\060510-45359-01.dmp 2 15 7600
060610-34328-01.dmp 6/6/2010 22:13:44 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`01edadc1 fffff880`045b89d8 fffff880`045b8240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\060610-34328-01.dmp 2 15 7600
062210-26593-01.dmp 6/22/2010 00:48:06 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`02050dc1 fffff880`045349d8 fffff880`04534240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\062210-26593-01.dmp 2 15 7600
070410-31187-01.dmp 7/4/2010 16:06:16 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`01eb5dc1 fffff880`033179d8 fffff880`03317240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\070410-31187-01.dmp 2 15 7600
070810-30421-01.dmp 7/8/2010 21:48:18 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`056e2dc1 fffff880`045229d8 fffff880`04522240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\070810-30421-01.dmp 2 15 7600
071010-23625-01.dmp 7/10/2010 19:56:56 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`04916dc1 fffff880`096439d8 fffff880`09643240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\071010-23625-01.dmp 2 15 7600
080210-25109-01.dmp 8/2/2010 13:34:58 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`048ffdc1 fffff880`045a29d8 fffff880`045a2240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\080210-25109-01.dmp 2 15 7600
080310-25156-01.dmp 8/3/2010 19:56:38 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`01e31dc1 fffff880`045ec9d8 fffff880`045ec240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\080310-25156-01.dmp 2 15 7600
080910-30671-01.dmp 8/9/2010 17:21:28 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`01e22dc1 fffff880`06f489d8 fffff880`06f48240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\080910-30671-01.dmp 2 15 7600
081310-29968-01.dmp 8/13/2010 11:20:56 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`05a24dc1 fffff880`05eae9d8 fffff880`05eae240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\081310-29968-01.dmp 2 15 7600
081910-22593-01.dmp 8/19/2010 14:17:22 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`04897dc1 fffff880`0457a9d8 fffff880`0457a240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\081910-22593-01.dmp 2 15 7600
082710-23390-01.dmp 8/27/2010 00:34:12 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`01eacdc1 fffff880`05e439d8 fffff880`05e43240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\082710-23390-01.dmp 2 15 7600
083010-24156-01.dmp 8/30/2010 20:46:20 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`04819dc1 fffff880`0a1229d8 fffff880`0a122240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\083010-24156-01.dmp 2 15 7600
090610-26046-01.dmp 9/6/2010 19:12:44 SYSTEM_THREAD_EXCEPTION_NOT_HANDLED 0x1000007e ffffffff`c0000005 fffff880`038fcdc1 fffff880`07d4a9d8 fffff880`07d4a240 L6TPortB64.sys L6TPortB64.sys+3320 x64 C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\090610-26046-01.dmp 2 15 7600
OLD DRIVERS NEEDING UPDATE
Code:
PxHlpa64.sys fffff880`00e1f000 fffff880`00e2aae0 0x0000bae0 0x475dd06d 12/10/2007 19:49:01
Code:
SiSG664.sys fffff880`0fe00000 fffff880`0fe13000 0x00013000 0x47cba517 3/3/2008 03:13:27
BisonC07.sys fffff880`034b6000 fffff880`03581200 0x000cb200 0x4816fcaa 4/29/2008 06:47:06
tcusb.sys fffff880`048f6000 fffff880`04909000 0x00013000 0x481f1f7b 5/5/2008 10:53:47
adfs.SYS fffff880`05000000 fffff880`05018000 0x00018000 0x490f2b4e 11/3/2008 12:48:14
arn6aeu9.SYS fffff880`0fe57000 fffff880`0fe9b000 0x00044000 0x49c4fe40 3/21/2009 10:48:32
sptd.sys fffff880`010be000 fffff880`011f2000 0x00134000 0x49c63097 3/22/2009 08:35:35
L6TPortB64.sys L6TPortB64.sys+3320 fffff880`0490b000 fffff880`049d6480 0x000cb480 0x49ecb020 4/20/2009 13:25:52
spldr.sys fffff880`017dc000 fffff880`017e4000 0x00008000 0x4a0858bb 5/11/2009 12:56:27
amdxata.sys fffff880`00e00000 fffff880`00e0b000 0x0000b000 0x4a12f2eb 5/19/2009 13:56:59
purendis.sys fffff880`03472000 fffff880`0347e000 0x0000c000 0x4a29f146 6/6/2009 00:32:06
pnarp.sys fffff880`03466000 fffff880`03472000 0x0000c000 0x4a2a0774 6/6/2009 02:06:44