BSOD with recent hardware upgrades


  1. Posts : 1
    Windows 7 Home Premium x64 bit
       #1

    BSOD with recent hardware upgrades


    Recently after some new hardware upgrades I have been having trouble starting my system up, and when it does decide to start up, it often will blue screen after startup. After a few restarts it seems to be stable for a while.

    System:
    Windows 7 Home Premium 64x
    AMD Phenom II x4 965 Processor 3.40 GHz
    8.00GB RAM
    ATI Radeon HD 5750
    Asus M4A79XTD Motherboard


    This is the log after a BSOD:

    Problem signature:
    Problem Event Name: BlueScreen
    OS Version: 6.1.7600.2.0.0.768.3
    Locale ID: 1033

    Additional information about the problem:
    BCCode: 1e
    BCP1: FFFFFFFFC0000005
    BCP2: FFFFF80002CC09CF
    BCP3: 0000000000000000
    BCP4: 0000000000000000
    OS Version: 6_1_7600
    Service Pack: 0_0
    Product: 768_1

    The minidump files are attached.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    BugCheck 1E, {ffffffffc0000005
    BugCheck D1, {0
    BugCheck 50, {fffff8a00a216c88
    BugCheck 124, X64_0x124_AuthenticAMD_PROCESSOR_BUS_PRV




    1. Stop 0x124 - what it means and what to try

    2. prime95 https://www.sevenforums.com/tutorials...t-prime95.html

    3. memtest RAM - Test with Memtest86+




    4. Replace AVG with MSE:

    AVG Worldwide - Download tools

    http://www.microsoft.com/security_essentials/




    5. Update:

    AsIO.sys Mon Dec 17 11:11:49 2007
    ASUS (Probe)

    Rt64win7.sys Thu Nov 05 16:15:41 2009
    Realtek 8136/8168/8169

    mv61xx.sys Fri Mar 20 05:48:21 2009
    Marvell Thor

    viahduaa.sys Tue Jun 02 11:55:21 2009
    VIA HD Audio





    Code:
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100210-22620-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50
    
    ..................................................
    Loading User Symbols
    Mini Kernel Dump does not contain unloaded driver list
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 124, {0, fffffa800831f8f8, 0, 0}
    
    Probably caused by : hardware
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    WHEA_UNCORRECTABLE_ERROR (124)
    A fatal hardware error has occurred. Parameter 1 identifies the type of error
    source that reported the error. Parameter 2 holds the address of the
    WHEA_ERROR_RECORD structure that describes the error conditon.
    Arguments:
    Arg1: 0000000000000000, Machine Check Exception
    Arg2: fffffa800831f8f8, Address of the WHEA_ERROR_RECORD structure.
    Arg3: 0000000000000000, High order 32-bits of the MCi_STATUS value.
    Arg4: 0000000000000000, Low order 32-bits of the MCi_STATUS value.
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x124_AuthenticAMD
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    STACK_TEXT:  
    fffff880`031bd6f0 fffff800`02f0da89 : fffffa80`0831f8d0 fffffa80`06d38680 00000000`00000004 00000000`00000001 : nt!WheapCreateLiveTriageDump+0x6c
    fffff880`031bdc10 fffff800`02def667 : fffffa80`0831f8d0 fffff800`02e685f8 fffffa80`06d38680 00000002`00000005 : nt!WheapCreateTriageDumpFromPreviousSession+0x49
    fffff880`031bdc40 fffff800`02d57c45 : fffff800`02eca360 fffffa80`082b8158 fffffa80`082b8150 fffffa80`06d38680 : nt!WheapProcessWorkQueueItem+0x57
    fffff880`031bdc80 fffff800`02cd0961 : fffff880`0113ae00 fffff800`02d57c20 fffffa80`06d38680 00000554`00000000 : nt!WheapWorkQueueWorkerRoutine+0x25
    fffff880`031bdcb0 fffff800`02f67c06 : 00000554`00000000 fffffa80`06d38680 00000000`00000080 fffffa80`06d27040 : nt!ExpWorkerThread+0x111
    fffff880`031bdd40 fffff800`02ca1c26 : fffff880`02f64180 fffffa80`06d38680 fffff880`02f6efc0 00000554`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`031bdd80 00000000`00000000 : fffff880`031be000 fffff880`031b8000 fffff880`037ef540 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: hardware
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    FAILURE_BUCKET_ID:  X64_0x124_AuthenticAMD_PROCESSOR_BUS_PRV
    
    BUCKET_ID:  X64_0x124_AuthenticAMD_PROCESSOR_BUS_PRV
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100310-22729-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50
    .......
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8a00a216c88, 0, fffff880019dbb4e, 0}
    
    
    Could not read faulting driver name
    Probably caused by : luafv.sys ( luafv!LuafvFindTableNode+182 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8a00a216c88, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff880019dbb4e, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb0e0
     fffff8a00a216c88 
    
    FAULTING_IP: 
    luafv!LuafvFindTableNode+182
    fffff880`019dbb4e 6641837d005c    cmp     word ptr [r13],5Ch
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  DungeonSiege2.
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88008f12080 -- (.trap 0xfffff88008f12080)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000219 rbx=0000000000000000 rcx=fffff8a006d17458
    rdx=fffff88008f12300 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880019dbb4e rsp=fffff88008f12210 rbp=0000000000001068
     r8=0000000000000001  r9=0000000000000002 r10=0064007200610048
    r11=fffffa8007835b60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    luafv!LuafvFindTableNode+0x182:
    fffff880`019dbb4e 6641837d005c    cmp     word ptr [r13],5Ch ds:0001:00000000`00000000=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002d43f14 to fffff80002cc3740
    
    STACK_TEXT:  
    fffff880`08f11f18 fffff800`02d43f14 : 00000000`00000050 fffff8a0`0a216c88 00000000`00000000 fffff880`08f12080 : nt!KeBugCheckEx
    fffff880`08f11f20 fffff800`02cc182e : 00000000`00000000 fffff8a0`06d17458 fffff8a0`06d17400 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x42837
    fffff880`08f12080 fffff880`019dbb4e : fffff8a0`0a391438 00000000`00000022 fffff8a0`0a4eed08 fffff8a0`0222ac38 : nt!KiPageFault+0x16e
    fffff880`08f12210 fffff880`019e2c0e : 00000000`00000000 fffff8a0`0a391400 fffffa80`00000004 fffff880`08f123b8 : luafv!LuafvFindTableNode+0x182
    fffff880`08f12320 fffff880`019df10c : 00000000`00000000 fffff880`08f12500 fffffa80`0a30bd60 00000000`00000000 : luafv!LuafvQueryStoreFile+0x452
    fffff880`08f12490 fffff880`0110c027 : fffffa80`0a30be80 00000000`0000004e fffff880`08f125b0 fffffa80`0a30bc00 : luafv!LuafvPreCreate+0x360
    fffff880`08f12560 fffff880`0110e8ca : fffffa80`0788bb00 fffffa80`0788bb00 fffffa80`08657900 fffffa80`08651000 : fltmgr!FltpPerformPreCallbacks+0x2f7
    fffff880`08f12660 fffff880`0112c2a3 : fffffa80`07aae350 fffffa80`07aae350 fffffa80`07aae350 fffffa80`6d4e6f49 : fltmgr!FltpPassThroughInternal+0x4a
    fffff880`08f12690 fffff800`02fc6807 : 00000000`00000005 fffff800`02fc6260 fffffa80`070a0480 00000000`00000000 : fltmgr!FltpCreate+0x293
    fffff880`08f12740 fffff800`02fbce84 : fffffa80`07c40cd0 00000000`00000000 fffffa80`071bf6d0 fffffa80`06d35801 : nt!IopParseDevice+0x5a7
    fffff880`08f128d0 fffff800`02fc1e4d : fffffa80`071bf6d0 fffff880`08f12a30 00000000`00000040 fffffa80`06d358a0 : nt!ObpLookupObjectName+0x585
    fffff880`08f129d0 fffff800`02fc8917 : 00000000`00000000 00000000`00000001 00000000`00ce2501 fffffa80`091e6278 : nt!ObOpenObjectByName+0x1cd
    fffff880`08f12a80 fffff800`02fd2520 : 00000000`0008e2d8 fffff800`80100080 00000000`00000000 00000000`0008e2f0 : nt!IopCreateFile+0x2b7
    fffff880`08f12b20 fffff800`02cc2993 : fffffa80`07835b60 00000000`0008e2f8 fffffa80`07835b60 fffff800`02fd93f0 : nt!NtCreateFile+0x78
    fffff880`08f12bb0 00000000`7760040a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0008e268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7760040a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    luafv!LuafvFindTableNode+182
    fffff880`019dbb4e 6641837d005c    cmp     word ptr [r13],5Ch
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  luafv!LuafvFindTableNode+182
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: luafv
    
    IMAGE_NAME:  luafv.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc295
    
    FAILURE_BUCKET_ID:  X64_0x50_luafv!LuafvFindTableNode+182
    
    BUCKET_ID:  X64_0x50_luafv!LuafvFindTableNode+182
    
    Followup: MachineOwner
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100310-23883-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c03000 PsLoadedModuleList = 0xfffff800`02e40e50
    
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 8, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
    Arg4: 0000000000000000, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eab0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    +0
    00000000`00000000 ??              ???
    
    PROCESS_NAME:  System
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    TRAP_FRAME:  fffff88003329680 -- (.trap 0xfffff88003329680)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80076baf6a
    rdx=fffffdfffbc6e77e rsi=0000000000000000 rdi=0000000000000000
    rip=0000000000000000 rsp=fffff88003329810 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
    r11=fffffa80076baf6a r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    00000000`00000000 ??              ???
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c72ca9 to fffff80002c73740
    
    FAILED_INSTRUCTION_ADDRESS: 
    +0
    00000000`00000000 ??              ???
    
    STACK_TEXT:  
    fffff880`03329538 fffff800`02c72ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
    fffff880`03329540 fffff800`02c71920 : 00000000`00000000 fffff880`02f64180 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`03329680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiPageFault+260
    fffff800`02c71920 440f20c0        mov     rax,cr8
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiPageFault+260
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260
    
    BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100110-21824-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c05000 PsLoadedModuleList = 0xfffff800`02e42e50
    
    ...............................................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 1, fffff8800412ef28}
    
    Probably caused by : ntkrnlmp.exe ( nt!PoIdle+53a )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff8800412ef28, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ead0e0
     0000000000000000 
    
    CURRENT_IRQL:  0
    
    FAULTING_IP: 
    +0
    fffff880`0412ef28 ??              ???
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    LAST_CONTROL_TRANSFER:  from fffff80002c8324a to fffff88003f017f2
    
    STACK_TEXT:  
    fffff800`00b9cc98 fffff800`02c8324a : 00000000`0032aa1f fffffa80`085d6548 fffff800`02dfdc40 00000000`00000001 : 0xfffff880`03f017f2
    fffff800`00b9cca0 fffff800`02c7debc : fffff800`02defe80 fffff800`00000000 00000000`00000000 fffff880`01420c50 : nt!PoIdle+0x53a
    fffff800`00b9cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!PoIdle+53a
    fffff800`02c8324a 0fba25f61318000f bt      dword ptr [nt!PerfGlobalGroupMask+0x8 (fffff800`02e04648)],0Fh
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!PoIdle+53a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xD1_nt!PoIdle+53a
    
    BUCKET_ID:  X64_0xD1_nt!PoIdle+53a
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100810-30435- 01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50
    
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff80002cc09cf, 0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KxNmiInterrupt+f )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002cc09cf, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!KxNmiInterrupt+f
    fffff800`02cc09cf 0f29742430      movaps  xmmword ptr [rsp+30h],xmm6
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb0e0
     0000000000000000 
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x1E
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88006b03838 -- (.exr 0xfffff88006b03838)
    ExceptionAddress: fffff80002cc09cf (nt!KxNmiInterrupt+0x000000000000000f)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 0000000000000000
    Attempt to read from address 0000000000000000
    
    TRAP_FRAME:  fffff88006b038e0 -- (.trap 0xfffff88006b038e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88006b03b78 rbx=0000000000000000 rcx=fffffa8009b3c011
    rdx=fffffa800952e701 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002cc09cf rsp=fffff88006b03a78 rbp=fffff88006b03ca0
     r8=fffffa800952e700  r9=0000000000000000 r10=fffffa8006a25dc0
    r11=fffff88006b03ba0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz ac po nc
    nt!KxNmiInterrupt+0xf:
    fffff800`02cc09cf 0f29742430      movaps  xmmword ptr [rsp+30h],xmm6 ss:0018:fffff880`06b03aa8=fffffa80092cd790fffffa80092cd3d0
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cfda39 to fffff80002cc3740
    
    STACK_TEXT:  
    fffff880`06b03068 fffff800`02cfda39 : 00000000`0000001e ffffffff`c0000005 fffff800`02cc09cf 00000000`00000000 : nt!KeBugCheckEx
    fffff880`06b03070 fffff800`02cc2d82 : fffff880`06b03838 fffffa80`092cd3d0 fffff880`06b038e0 00000000`00b4f998 : nt!KiDispatchException+0x1b9
    fffff880`06b03700 fffff800`02cc168a : fffffa80`0877f001 00000000`00000000 fffffa80`092cd3d0 fffff800`02cc95da : nt!KiExceptionDispatch+0xc2
    fffff880`06b038e0 fffff800`02cc09cf : fffff800`02cc81fa 00000000`00000000 fffffa80`092cd4d8 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
    fffff880`06b03a78 fffffa80`092cd3d0 : 00000000`00b4f998 fffff880`06b03bc8 fffff8a0`02800060 00000000`00000000 : nt!KxNmiInterrupt+0xf
    fffff880`06b03bb8 00000000`00b4f998 : fffff880`06b03bc8 fffff8a0`02800060 00000000`00000000 0000007f`fffffff8 : 0xfffffa80`092cd3d0
    fffff880`06b03bc0 fffff880`06b03bc8 : fffff8a0`02800060 00000000`00000000 0000007f`fffffff8 00000000`00000000 : 0xb4f998
    fffff880`06b03bc8 fffff8a0`02800060 : 00000000`00000000 0000007f`fffffff8 00000000`00000000 00000000`00000000 : 0xfffff880`06b03bc8
    fffff880`06b03bd0 00000000`00000000 : 0000007f`fffffff8 00000000`00000000 00000000`00000000 00000000`00000644 : 0xfffff8a0`02800060
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KxNmiInterrupt+f
    fffff800`02cc09cf 0f29742430      movaps  xmmword ptr [rsp+30h],xmm6
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!KxNmiInterrupt+f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_nt!KxNmiInterrupt+f
    
    BUCKET_ID:  X64_0x1E_nt!KxNmiInterrupt+f
    
    Followup: MachineOwner
    ---------
    
    3: kd> lmtn
    start             end                 module name
    fffff800`00bd1000 fffff800`00bdb000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
    fffff800`02c0a000 fffff800`02c53000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
    fffff800`02c53000 fffff800`0322f000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
    fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00cda000 fffff880`00ce3000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`00ce6000 fffff880`00cf3000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
    fffff880`00cf3000 fffff880`00d07000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
    fffff880`00d07000 fffff880`00d65000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`00d65000 fffff880`00d8f000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
    fffff880`00d8f000 fffff880`00dd5000   mv61xx   mv61xx.sys   Fri Mar 20 05:48:21 2009 (49C31205)
    fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
    fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
    fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
    fffff880`00ed0000 fffff880`00ed7000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
    fffff880`00ed7000 fffff880`00ee7000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
    fffff880`00eea000 fffff880`00f8e000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
    fffff880`00f8e000 fffff880`00f9d000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00f9d000 fffff880`00ff4000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
    fffff880`00ff4000 fffff880`00ffd000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
    fffff880`0105c000 fffff880`0108b000   SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
    fffff880`0108b000 fffff880`01096000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
    fffff880`01096000 fffff880`010e2000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
    fffff880`010e2000 fffff880`010f6000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
    fffff880`010f6000 fffff880`01154000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
    fffff880`01154000 fffff880`011c7000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
    fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
    fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
    fffff880`01241000 fffff880`013e4000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
    fffff880`013e4000 fffff880`013fe000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`01408000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
    fffff880`01408000 fffff880`01426000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
    fffff880`01426000 fffff880`01433000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
    fffff880`01439000 fffff880`0152b000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`0152b000 fffff880`0158b000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
    fffff880`0158b000 fffff880`015b6000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
    fffff880`015b6000 fffff880`01600000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
    fffff880`01800000 fffff880`0180e000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
    fffff880`0180e000 fffff880`01833000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
    fffff880`01833000 fffff880`01843000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
    fffff880`01843000 fffff880`0184c000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`0184c000 fffff880`01855000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`01855000 fffff880`0185e000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
    fffff880`0185e000 fffff880`01869000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`01869000 fffff880`0187a000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
    fffff880`01886000 fffff880`018c0000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
    fffff880`018c0000 fffff880`018d2000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
    fffff880`018d2000 fffff880`018db000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
    fffff880`018db000 fffff880`01915000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
    fffff880`01915000 fffff880`0192b000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`0192b000 fffff880`0195b000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`0195b000 fffff880`01965000   avgrkx64 avgrkx64.sys Tue Sep 07 03:49:37 2010 (4C858C21)
    fffff880`01965000 fffff880`0196f000   AVGIDSEH AVGIDSEH.Sys Tue Sep 14 01:46:38 2010 (4C8EA9CE)
    fffff880`0196f000 fffff880`01977000   AtiPcie  AtiPcie.sys  Tue May 05 18:00:22 2009 (4A005486)
    fffff880`019ad000 fffff880`019d7000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`019d7000 fffff880`019e6000   avgmfx64 avgmfx64.sys Tue Sep 07 03:49:14 2010 (4C858C0A)
    fffff880`019e6000 fffff880`019ef000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
    fffff880`019ef000 fffff880`019f6000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
    fffff880`02c00000 fffff880`02c8a000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`02c8a000 fffff880`02c93000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`02c93000 fffff880`02cb9000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
    fffff880`02cb9000 fffff880`02cc8000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`02cc8000 fffff880`02ce5000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
    fffff880`02cf6000 fffff880`02d57000   avgtdia  avgtdia.sys  Tue Sep 07 03:52:11 2010 (4C858CBB)
    fffff880`02d57000 fffff880`02d9c000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
    fffff880`02d9c000 fffff880`02db7000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
    fffff880`02db7000 fffff880`02dcb000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
    fffff880`03a19000 fffff880`03ae1000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
    fffff880`03ae1000 fffff880`03aff000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
    fffff880`03aff000 fffff880`03b17000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
    fffff880`03b17000 fffff880`03b44000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
    fffff880`03b44000 fffff880`03b92000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
    fffff880`03b92000 fffff880`03bb5000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
    fffff880`03bb5000 fffff880`03bc1000   AVGIDSFilter AVGIDSFilter.Sys Wed Aug 04 01:23:21 2010 (4C5896D9)
    fffff880`03e3a000 fffff880`03e8b000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
    fffff880`03e8b000 fffff880`03e97000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
    fffff880`03e97000 fffff880`03ea2000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
    fffff880`03ea2000 fffff880`03eb1000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
    fffff880`03eb1000 fffff880`03ecf000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
    fffff880`03ecf000 fffff880`03ee0000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
    fffff880`03ee0000 fffff880`03f2f000   avgldx64 avgldx64.sys Tue Sep 07 03:49:29 2010 (4C858C19)
    fffff880`03f2f000 fffff880`03f36000   AsIO     AsIO.sys     Mon Dec 17 11:11:49 2007 (47663D55)
    fffff880`03f36000 fffff880`03f5c000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
    fffff880`03f5c000 fffff880`03f71000   amdppm   amdppm.sys   Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    fffff880`03f71000 fffff880`03fbb000   atikmpag atikmpag.sys Thu Aug 26 04:20:56 2010 (4C75C178)
    fffff880`03fbb000 fffff880`03ff9000   1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
    fffff880`04000000 fffff880`04046000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
    fffff880`04046000 fffff880`0406a000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
    fffff880`0406a000 fffff880`040b5000   Rt64win7 Rt64win7.sys Thu Nov 05 16:15:41 2009 (4AF2DE0D)
    fffff880`040b5000 fffff880`040c0000   usbohci  usbohci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
    fffff880`040cf000 fffff880`041c3000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
    fffff880`04400000 fffff880`04412000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
    fffff880`04437000 fffff880`0448d000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
    fffff880`0448d000 fffff880`0449e000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
    fffff880`0449e000 fffff880`044a6000   ASACPI   ASACPI.sys   Thu May 14 04:25:17 2009 (4A0B72FD)
    fffff880`044a6000 fffff880`044b2000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
    fffff880`044b2000 fffff880`044bb000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:31:02 2009 (4A5BC3B6)
    fffff880`044bb000 fffff880`044cb000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
    fffff880`044cb000 fffff880`044e1000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
    fffff880`044e1000 fffff880`04505000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`04505000 fffff880`04511000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
    fffff880`04511000 fffff880`04540000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`04540000 fffff880`0455b000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
    fffff880`0455b000 fffff880`0457c000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
    fffff880`0457c000 fffff880`04596000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
    fffff880`04596000 fffff880`045a5000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff880`045a5000 fffff880`045b4000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff880`045b4000 fffff880`045b5480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
    fffff880`045b6000 fffff880`045f9000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
    fffff880`04832000 fffff880`04fed000   atikmdag atikmdag.sys Thu Aug 26 04:47:22 2010 (4C75C7AA)
    fffff880`05a00000 fffff880`05a0e000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
    fffff880`05a0e000 fffff880`05a31000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
    fffff880`05a31000 fffff880`05a52000   WudfPf   WudfPf.sys   Tue Jul 14 03:05:37 2009 (4A5BCBD1)
    fffff880`05a52000 fffff880`05a67000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
    fffff880`05a67000 fffff880`05a7f000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
    fffff880`05aa7000 fffff880`05b01000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
    fffff880`05b01000 fffff880`05b16000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
    fffff880`05b16000 fffff880`05b36000   AtihdW76 AtihdW76.sys Thu Jul 15 15:46:49 2010 (4C3F0339)
    fffff880`05b36000 fffff880`05b73000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
    fffff880`05b73000 fffff880`05b95000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
    fffff880`05b95000 fffff880`05b9a200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
    fffff880`05b9b000 fffff880`05bb6000   USBSTOR  USBSTOR.SYS  Tue Jul 14 03:06:34 2009 (4A5BCC0A)
    fffff880`05bb6000 fffff880`05bc4000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
    fffff880`05bc4000 fffff880`05bd0000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`05bd0000 fffff880`05bd9000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`05bd9000 fffff880`05bec000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    fffff880`05bec000 fffff880`05bf8000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
    fffff880`06400000 fffff880`06419000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
    fffff880`06419000 fffff880`06421080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
    fffff880`06422000 fffff880`06430000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
    fffff880`06430000 fffff880`0643d000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
    fffff880`06441000 fffff880`065d2000   viahduaa viahduaa.sys Tue Jun 02 11:55:21 2009 (4A24E8F9)
    fffff880`065d2000 fffff880`065ef000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
    fffff880`065ef000 fffff880`065f0f00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
    fffff880`065f1000 fffff880`065ff000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
    fffff880`06c00000 fffff880`06c34000   AVGIDSDriver AVGIDSDriver.Sys Wed Aug 04 01:24:45 2010 (4C58972D)
    fffff880`06c34000 fffff880`06c9c000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
    fffff880`06cfa000 fffff880`06da0000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
    fffff880`06da0000 fffff880`06dab000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
    fffff880`06dab000 fffff880`06dd8000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
    fffff880`06dd8000 fffff880`06dea000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
    fffff880`08a74000 fffff880`08b0a000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
    fffff880`08b0a000 fffff880`08b3b000   WUDFRd   WUDFRd.sys   Tue Jul 14 03:06:06 2009 (4A5BCBEE)
    fffff960`000a0000 fffff960`003af000   win32k   win32k.sys   Sat Jun 19 07:31:59 2010 (4C1C483F)
    fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff960`00720000 fffff960`00747000   cdd      cdd.dll      unavailable (00000000)
    
    Unloaded modules:
    fffff880`01977000 fffff880`01985000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01985000 fffff880`01991000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01991000 fffff880`0199a000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0199a000 fffff880`019ad000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  3. Posts : 670
    Windows 7 x64
       #3

    Recently after some new hardware upgrades I have been having trouble starting my system up, and when it does decide to start up, it often will blue screen after startup. After a few restarts it seems to be stable for a while.
    BugCheck 124 (AuthenticAMD_PROCESSOR_BUS_PRV), if prime95 and memtest86 (overnight) do not detect any errors, consider bios upgrade (if you haven't done it yet).
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 03:25.
Find Us