Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD with recent hardware upgrades

08 Oct 2010   #1
janellembc

Windows 7 Home Premium x64 bit
 
 
BSOD with recent hardware upgrades

Recently after some new hardware upgrades I have been having trouble starting my system up, and when it does decide to start up, it often will blue screen after startup. After a few restarts it seems to be stable for a while.

System:
Windows 7 Home Premium 64x
AMD Phenom II x4 965 Processor 3.40 GHz
8.00GB RAM
ATI Radeon HD 5750
Asus M4A79XTD Motherboard


This is the log after a BSOD:

Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7600.2.0.0.768.3
Locale ID: 1033

Additional information about the problem:
BCCode: 1e
BCP1: FFFFFFFFC0000005
BCP2: FFFFF80002CC09CF
BCP3: 0000000000000000
BCP4: 0000000000000000
OS Version: 6_1_7600
Service Pack: 0_0
Product: 768_1

The minidump files are attached.


My System SpecsSystem Spec
.
08 Oct 2010   #2
cybercore

Windows 7 x64
 
 

BugCheck 1E, {ffffffffc0000005
BugCheck D1, {0
BugCheck 50, {fffff8a00a216c88
BugCheck 124, X64_0x124_AuthenticAMD_PROCESSOR_BUS_PRV




1. Stop 0x124 - what it means and what to try

2. prime95 https://www.sevenforums.com/tutorials...t-prime95.html

3. memtest RAM - Test with Memtest86+




4. Replace AVG with MSE:

AVG Worldwide - Download tools

http://www.microsoft.com/security_essentials/




5. Update:

AsIO.sys Mon Dec 17 11:11:49 2007
ASUS (Probe)

Rt64win7.sys Thu Nov 05 16:15:41 2009
Realtek 8136/8168/8169

mv61xx.sys Fri Mar 20 05:48:21 2009
Marvell Thor

viahduaa.sys Tue Jun 02 11:55:21 2009
VIA HD Audio





Code:

Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100210-22620-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50

..................................................
Loading User Symbols
Mini Kernel Dump does not contain unloaded driver list
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 124, {0, fffffa800831f8f8, 0, 0}

Probably caused by : hardware

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa800831f8f8, Address of the WHEA_ERROR_RECORD structure.
Arg3: 0000000000000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000000000, Low order 32-bits of the MCi_STATUS value.

Debugging Details:
------------------


BUGCHECK_STR:  0x124_AuthenticAMD

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

STACK_TEXT:  
fffff880`031bd6f0 fffff800`02f0da89 : fffffa80`0831f8d0 fffffa80`06d38680 00000000`00000004 00000000`00000001 : nt!WheapCreateLiveTriageDump+0x6c
fffff880`031bdc10 fffff800`02def667 : fffffa80`0831f8d0 fffff800`02e685f8 fffffa80`06d38680 00000002`00000005 : nt!WheapCreateTriageDumpFromPreviousSession+0x49
fffff880`031bdc40 fffff800`02d57c45 : fffff800`02eca360 fffffa80`082b8158 fffffa80`082b8150 fffffa80`06d38680 : nt!WheapProcessWorkQueueItem+0x57
fffff880`031bdc80 fffff800`02cd0961 : fffff880`0113ae00 fffff800`02d57c20 fffffa80`06d38680 00000554`00000000 : nt!WheapWorkQueueWorkerRoutine+0x25
fffff880`031bdcb0 fffff800`02f67c06 : 00000554`00000000 fffffa80`06d38680 00000000`00000080 fffffa80`06d27040 : nt!ExpWorkerThread+0x111
fffff880`031bdd40 fffff800`02ca1c26 : fffff880`02f64180 fffffa80`06d38680 fffff880`02f6efc0 00000554`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031bdd80 00000000`00000000 : fffff880`031be000 fffff880`031b8000 fffff880`037ef540 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  X64_0x124_AuthenticAMD_PROCESSOR_BUS_PRV

BUCKET_ID:  X64_0x124_AuthenticAMD_PROCESSOR_BUS_PRV

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100310-22729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50
.......
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8a00a216c88, 0, fffff880019dbb4e, 0}


Could not read faulting driver name
Probably caused by : luafv.sys ( luafv!LuafvFindTableNode+182 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a00a216c88, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880019dbb4e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb0e0
 fffff8a00a216c88 

FAULTING_IP: 
luafv!LuafvFindTableNode+182
fffff880`019dbb4e 6641837d005c    cmp     word ptr [r13],5Ch

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  DungeonSiege2.

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88008f12080 -- (.trap 0xfffff88008f12080)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000219 rbx=0000000000000000 rcx=fffff8a006d17458
rdx=fffff88008f12300 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880019dbb4e rsp=fffff88008f12210 rbp=0000000000001068
 r8=0000000000000001  r9=0000000000000002 r10=0064007200610048
r11=fffffa8007835b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
luafv!LuafvFindTableNode+0x182:
fffff880`019dbb4e 6641837d005c    cmp     word ptr [r13],5Ch ds:0001:00000000`00000000=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002d43f14 to fffff80002cc3740

STACK_TEXT:  
fffff880`08f11f18 fffff800`02d43f14 : 00000000`00000050 fffff8a0`0a216c88 00000000`00000000 fffff880`08f12080 : nt!KeBugCheckEx
fffff880`08f11f20 fffff800`02cc182e : 00000000`00000000 fffff8a0`06d17458 fffff8a0`06d17400 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`08f12080 fffff880`019dbb4e : fffff8a0`0a391438 00000000`00000022 fffff8a0`0a4eed08 fffff8a0`0222ac38 : nt!KiPageFault+0x16e
fffff880`08f12210 fffff880`019e2c0e : 00000000`00000000 fffff8a0`0a391400 fffffa80`00000004 fffff880`08f123b8 : luafv!LuafvFindTableNode+0x182
fffff880`08f12320 fffff880`019df10c : 00000000`00000000 fffff880`08f12500 fffffa80`0a30bd60 00000000`00000000 : luafv!LuafvQueryStoreFile+0x452
fffff880`08f12490 fffff880`0110c027 : fffffa80`0a30be80 00000000`0000004e fffff880`08f125b0 fffffa80`0a30bc00 : luafv!LuafvPreCreate+0x360
fffff880`08f12560 fffff880`0110e8ca : fffffa80`0788bb00 fffffa80`0788bb00 fffffa80`08657900 fffffa80`08651000 : fltmgr!FltpPerformPreCallbacks+0x2f7
fffff880`08f12660 fffff880`0112c2a3 : fffffa80`07aae350 fffffa80`07aae350 fffffa80`07aae350 fffffa80`6d4e6f49 : fltmgr!FltpPassThroughInternal+0x4a
fffff880`08f12690 fffff800`02fc6807 : 00000000`00000005 fffff800`02fc6260 fffffa80`070a0480 00000000`00000000 : fltmgr!FltpCreate+0x293
fffff880`08f12740 fffff800`02fbce84 : fffffa80`07c40cd0 00000000`00000000 fffffa80`071bf6d0 fffffa80`06d35801 : nt!IopParseDevice+0x5a7
fffff880`08f128d0 fffff800`02fc1e4d : fffffa80`071bf6d0 fffff880`08f12a30 00000000`00000040 fffffa80`06d358a0 : nt!ObpLookupObjectName+0x585
fffff880`08f129d0 fffff800`02fc8917 : 00000000`00000000 00000000`00000001 00000000`00ce2501 fffffa80`091e6278 : nt!ObOpenObjectByName+0x1cd
fffff880`08f12a80 fffff800`02fd2520 : 00000000`0008e2d8 fffff800`80100080 00000000`00000000 00000000`0008e2f0 : nt!IopCreateFile+0x2b7
fffff880`08f12b20 fffff800`02cc2993 : fffffa80`07835b60 00000000`0008e2f8 fffffa80`07835b60 fffff800`02fd93f0 : nt!NtCreateFile+0x78
fffff880`08f12bb0 00000000`7760040a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7760040a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
luafv!LuafvFindTableNode+182
fffff880`019dbb4e 6641837d005c    cmp     word ptr [r13],5Ch

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  luafv!LuafvFindTableNode+182

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: luafv

IMAGE_NAME:  luafv.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc295

FAILURE_BUCKET_ID:  X64_0x50_luafv!LuafvFindTableNode+182

BUCKET_ID:  X64_0x50_luafv!LuafvFindTableNode+182

Followup: MachineOwner


















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100310-23883-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c03000 PsLoadedModuleList = 0xfffff800`02e40e50

...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, 2, 8, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eab0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
+0
00000000`00000000 ??              ???

PROCESS_NAME:  System

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

TRAP_FRAME:  fffff88003329680 -- (.trap 0xfffff88003329680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80076baf6a
rdx=fffffdfffbc6e77e rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff88003329810 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
r11=fffffa80076baf6a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c72ca9 to fffff80002c73740

FAILED_INSTRUCTION_ADDRESS: 
+0
00000000`00000000 ??              ???

STACK_TEXT:  
fffff880`03329538 fffff800`02c72ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff880`03329540 fffff800`02c71920 : 00000000`00000000 fffff880`02f64180 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03329680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02c71920 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260

BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100110-21824-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c05000 PsLoadedModuleList = 0xfffff800`02e42e50

...............................................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, 2, 1, fffff8800412ef28}

Probably caused by : ntkrnlmp.exe ( nt!PoIdle+53a )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800412ef28, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ead0e0
 0000000000000000 

CURRENT_IRQL:  0

FAULTING_IP: 
+0
fffff880`0412ef28 ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

LAST_CONTROL_TRANSFER:  from fffff80002c8324a to fffff88003f017f2

STACK_TEXT:  
fffff800`00b9cc98 fffff800`02c8324a : 00000000`0032aa1f fffffa80`085d6548 fffff800`02dfdc40 00000000`00000001 : 0xfffff880`03f017f2
fffff800`00b9cca0 fffff800`02c7debc : fffff800`02defe80 fffff800`00000000 00000000`00000000 fffff880`01420c50 : nt!PoIdle+0x53a
fffff800`00b9cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!PoIdle+53a
fffff800`02c8324a 0fba25f61318000f bt      dword ptr [nt!PerfGlobalGroupMask+0x8 (fffff800`02e04648)],0Fh

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!PoIdle+53a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xD1_nt!PoIdle+53a

BUCKET_ID:  X64_0xD1_nt!PoIdle+53a

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100810-30435- 01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50

...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002cc09cf, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KxNmiInterrupt+f )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cc09cf, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!KxNmiInterrupt+f
fffff800`02cc09cf 0f29742430      movaps  xmmword ptr [rsp+30h],xmm6

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb0e0
 0000000000000000 

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff88006b03838 -- (.exr 0xfffff88006b03838)
ExceptionAddress: fffff80002cc09cf (nt!KxNmiInterrupt+0x000000000000000f)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

TRAP_FRAME:  fffff88006b038e0 -- (.trap 0xfffff88006b038e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88006b03b78 rbx=0000000000000000 rcx=fffffa8009b3c011
rdx=fffffa800952e701 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cc09cf rsp=fffff88006b03a78 rbp=fffff88006b03ca0
 r8=fffffa800952e700  r9=0000000000000000 r10=fffffa8006a25dc0
r11=fffff88006b03ba0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
nt!KxNmiInterrupt+0xf:
fffff800`02cc09cf 0f29742430      movaps  xmmword ptr [rsp+30h],xmm6 ss:0018:fffff880`06b03aa8=fffffa80092cd790fffffa80092cd3d0
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cfda39 to fffff80002cc3740

STACK_TEXT:  
fffff880`06b03068 fffff800`02cfda39 : 00000000`0000001e ffffffff`c0000005 fffff800`02cc09cf 00000000`00000000 : nt!KeBugCheckEx
fffff880`06b03070 fffff800`02cc2d82 : fffff880`06b03838 fffffa80`092cd3d0 fffff880`06b038e0 00000000`00b4f998 : nt!KiDispatchException+0x1b9
fffff880`06b03700 fffff800`02cc168a : fffffa80`0877f001 00000000`00000000 fffffa80`092cd3d0 fffff800`02cc95da : nt!KiExceptionDispatch+0xc2
fffff880`06b038e0 fffff800`02cc09cf : fffff800`02cc81fa 00000000`00000000 fffffa80`092cd4d8 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`06b03a78 fffffa80`092cd3d0 : 00000000`00b4f998 fffff880`06b03bc8 fffff8a0`02800060 00000000`00000000 : nt!KxNmiInterrupt+0xf
fffff880`06b03bb8 00000000`00b4f998 : fffff880`06b03bc8 fffff8a0`02800060 00000000`00000000 0000007f`fffffff8 : 0xfffffa80`092cd3d0
fffff880`06b03bc0 fffff880`06b03bc8 : fffff8a0`02800060 00000000`00000000 0000007f`fffffff8 00000000`00000000 : 0xb4f998
fffff880`06b03bc8 fffff8a0`02800060 : 00000000`00000000 0000007f`fffffff8 00000000`00000000 00000000`00000000 : 0xfffff880`06b03bc8
fffff880`06b03bd0 00000000`00000000 : 0000007f`fffffff8 00000000`00000000 00000000`00000000 00000000`00000644 : 0xfffff8a0`02800060


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KxNmiInterrupt+f
fffff800`02cc09cf 0f29742430      movaps  xmmword ptr [rsp+30h],xmm6

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KxNmiInterrupt+f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_nt!KxNmiInterrupt+f

BUCKET_ID:  X64_0x1E_nt!KxNmiInterrupt+f

Followup: MachineOwner
---------

3: kd> lmtn
start             end                 module name
fffff800`00bd1000 fffff800`00bdb000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02c0a000 fffff800`02c53000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02c53000 fffff800`0322f000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00cda000 fffff880`00ce3000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00ce6000 fffff880`00cf3000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00cf3000 fffff880`00d07000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00d07000 fffff880`00d65000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d65000 fffff880`00d8f000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00d8f000 fffff880`00dd5000   mv61xx   mv61xx.sys   Fri Mar 20 05:48:21 2009 (49C31205)
fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00ed0000 fffff880`00ed7000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00ed7000 fffff880`00ee7000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00eea000 fffff880`00f8e000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f8e000 fffff880`00f9d000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f9d000 fffff880`00ff4000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00ff4000 fffff880`00ffd000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0105c000 fffff880`0108b000   SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`0108b000 fffff880`01096000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`01096000 fffff880`010e2000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`010e2000 fffff880`010f6000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`010f6000 fffff880`01154000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01154000 fffff880`011c7000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01241000 fffff880`013e4000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013e4000 fffff880`013fe000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`01408000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01408000 fffff880`01426000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`01426000 fffff880`01433000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`01439000 fffff880`0152b000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0152b000 fffff880`0158b000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`0158b000 fffff880`015b6000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`015b6000 fffff880`01600000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`01800000 fffff880`0180e000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`0180e000 fffff880`01833000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`01833000 fffff880`01843000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`01843000 fffff880`0184c000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`0184c000 fffff880`01855000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01855000 fffff880`0185e000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`0185e000 fffff880`01869000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01869000 fffff880`0187a000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01886000 fffff880`018c0000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`018c0000 fffff880`018d2000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`018d2000 fffff880`018db000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`018db000 fffff880`01915000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01915000 fffff880`0192b000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`0192b000 fffff880`0195b000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`0195b000 fffff880`01965000   avgrkx64 avgrkx64.sys Tue Sep 07 03:49:37 2010 (4C858C21)
fffff880`01965000 fffff880`0196f000   AVGIDSEH AVGIDSEH.Sys Tue Sep 14 01:46:38 2010 (4C8EA9CE)
fffff880`0196f000 fffff880`01977000   AtiPcie  AtiPcie.sys  Tue May 05 18:00:22 2009 (4A005486)
fffff880`019ad000 fffff880`019d7000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`019d7000 fffff880`019e6000   avgmfx64 avgmfx64.sys Tue Sep 07 03:49:14 2010 (4C858C0A)
fffff880`019e6000 fffff880`019ef000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`019ef000 fffff880`019f6000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`02c00000 fffff880`02c8a000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02c8a000 fffff880`02c93000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02c93000 fffff880`02cb9000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02cb9000 fffff880`02cc8000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02cc8000 fffff880`02ce5000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`02cf6000 fffff880`02d57000   avgtdia  avgtdia.sys  Tue Sep 07 03:52:11 2010 (4C858CBB)
fffff880`02d57000 fffff880`02d9c000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02d9c000 fffff880`02db7000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`02db7000 fffff880`02dcb000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03a19000 fffff880`03ae1000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`03ae1000 fffff880`03aff000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`03aff000 fffff880`03b17000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`03b17000 fffff880`03b44000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`03b44000 fffff880`03b92000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`03b92000 fffff880`03bb5000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`03bb5000 fffff880`03bc1000   AVGIDSFilter AVGIDSFilter.Sys Wed Aug 04 01:23:21 2010 (4C5896D9)
fffff880`03e3a000 fffff880`03e8b000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03e8b000 fffff880`03e97000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03e97000 fffff880`03ea2000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03ea2000 fffff880`03eb1000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03eb1000 fffff880`03ecf000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03ecf000 fffff880`03ee0000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03ee0000 fffff880`03f2f000   avgldx64 avgldx64.sys Tue Sep 07 03:49:29 2010 (4C858C19)
fffff880`03f2f000 fffff880`03f36000   AsIO     AsIO.sys     Mon Dec 17 11:11:49 2007 (47663D55)
fffff880`03f36000 fffff880`03f5c000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`03f5c000 fffff880`03f71000   amdppm   amdppm.sys   Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`03f71000 fffff880`03fbb000   atikmpag atikmpag.sys Thu Aug 26 04:20:56 2010 (4C75C178)
fffff880`03fbb000 fffff880`03ff9000   1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`04000000 fffff880`04046000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`04046000 fffff880`0406a000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0406a000 fffff880`040b5000   Rt64win7 Rt64win7.sys Thu Nov 05 16:15:41 2009 (4AF2DE0D)
fffff880`040b5000 fffff880`040c0000   usbohci  usbohci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`040cf000 fffff880`041c3000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`04400000 fffff880`04412000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`04437000 fffff880`0448d000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`0448d000 fffff880`0449e000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`0449e000 fffff880`044a6000   ASACPI   ASACPI.sys   Thu May 14 04:25:17 2009 (4A0B72FD)
fffff880`044a6000 fffff880`044b2000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`044b2000 fffff880`044bb000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`044bb000 fffff880`044cb000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`044cb000 fffff880`044e1000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`044e1000 fffff880`04505000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04505000 fffff880`04511000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04511000 fffff880`04540000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04540000 fffff880`0455b000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`0455b000 fffff880`0457c000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`0457c000 fffff880`04596000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`04596000 fffff880`045a5000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`045a5000 fffff880`045b4000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`045b4000 fffff880`045b5480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`045b6000 fffff880`045f9000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`04832000 fffff880`04fed000   atikmdag atikmdag.sys Thu Aug 26 04:47:22 2010 (4C75C7AA)
fffff880`05a00000 fffff880`05a0e000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`05a0e000 fffff880`05a31000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`05a31000 fffff880`05a52000   WudfPf   WudfPf.sys   Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`05a52000 fffff880`05a67000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`05a67000 fffff880`05a7f000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`05aa7000 fffff880`05b01000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`05b01000 fffff880`05b16000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`05b16000 fffff880`05b36000   AtihdW76 AtihdW76.sys Thu Jul 15 15:46:49 2010 (4C3F0339)
fffff880`05b36000 fffff880`05b73000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`05b73000 fffff880`05b95000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`05b95000 fffff880`05b9a200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`05b9b000 fffff880`05bb6000   USBSTOR  USBSTOR.SYS  Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`05bb6000 fffff880`05bc4000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`05bc4000 fffff880`05bd0000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05bd0000 fffff880`05bd9000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05bd9000 fffff880`05bec000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`05bec000 fffff880`05bf8000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`06400000 fffff880`06419000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`06419000 fffff880`06421080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`06422000 fffff880`06430000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`06430000 fffff880`0643d000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`06441000 fffff880`065d2000   viahduaa viahduaa.sys Tue Jun 02 11:55:21 2009 (4A24E8F9)
fffff880`065d2000 fffff880`065ef000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`065ef000 fffff880`065f0f00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`065f1000 fffff880`065ff000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`06c00000 fffff880`06c34000   AVGIDSDriver AVGIDSDriver.Sys Wed Aug 04 01:24:45 2010 (4C58972D)
fffff880`06c34000 fffff880`06c9c000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`06cfa000 fffff880`06da0000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`06da0000 fffff880`06dab000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`06dab000 fffff880`06dd8000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`06dd8000 fffff880`06dea000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`08a74000 fffff880`08b0a000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`08b0a000 fffff880`08b3b000   WUDFRd   WUDFRd.sys   Tue Jul 14 03:06:06 2009 (4A5BCBEE)
fffff960`000a0000 fffff960`003af000   win32k   win32k.sys   Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff960`00720000 fffff960`00747000   cdd      cdd.dll      unavailable (00000000)

Unloaded modules:
fffff880`01977000 fffff880`01985000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01985000 fffff880`01991000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01991000 fffff880`0199a000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0199a000 fffff880`019ad000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
08 Oct 2010   #3
cybercore

Windows 7 x64
 
 

Quote:
Recently after some new hardware upgrades I have been having trouble starting my system up, and when it does decide to start up, it often will blue screen after startup. After a few restarts it seems to be stable for a while.
BugCheck 124 (AuthenticAMD_PROCESSOR_BUS_PRV), if prime95 and memtest86 (overnight) do not detect any errors, consider bios upgrade (if you haven't done it yet).
My System SpecsSystem Spec
.

Reply

 BSOD with recent hardware upgrades




Thread Tools




Similar help and support threads
Thread Forum
BSOD randomly, no recent hardware installs
Hey y'all! New member here looking for some help with random BSODs. It seems like it happens the most when I'm playing music on my computer, the music being stored on my primary hard drive. Sometimes it will happen as Windows is loading, before the computer has a chance to load the login...
BSOD Help and Support
Recent new hardware, now getting BCcode 3b and 50
I recently got a Radeon HD 7850 about two weeks ago and have been completely free of any issues. Less than a week ago I put in a small HDD for some extra storage space, a WD 120gb, just to hold some .iso backups and system backups. The HDD has a windows XP installation on it that I wasn't really...
BSOD Help and Support
3b win32k BSOD from hardware upgrades
Hi. I've been getting pretty constant BSOD's since I upgraded my mobo, CPU, and GPU. (ASUS to Gigabyte, Intel to AMD, AMD to AMD; respectively) I've been slowly fixing it with my limited knowledge and Google, and they've lessened somewhat. I've basically just been upgrading drivers and trying to...
BSOD Help and Support
Recent upgrades to homebuild- now frequent BSOD
I recently upgraded graphics, memory and went to dual SSD's. New install Win7 ultimate 64bit. Have checked for and updated everything I could think of. I run program on computer or am surfing on web. screen locks up get message :loading security settings: then blank screen then BSOD with message (...
BSOD Help and Support
Crashing Randomly after hardware upgrades
Hi - I recently upgraded my desktop. Original hardwares: ASUS M4A78-E CPU: AMD Phenom II X4 940 Black Edition 3.0GHZ I changed the following hardwares: 500GB WD 7200rpm > 120GB OCZ SSD 4x1024 DDR2 > 2x4096 DDR2
BSOD Help and Support
Vista x64 to Windows 7 X64 - Hardware upgrades???
Can anybody please tell answer the following query? I have the retail version of Vista X64 Ultimate which was installed originally. I then purchased the upgrade disc for Windows 7 ultimate and performed a clean install of win 7. It has been fine for nearly a year now, however I am now...
Installation & Setup


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 07:21.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App