Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Incessant BOSDs

15 Oct 2010   #1
artfuldodger

Windows 7 Home Premium 64bit
 
 
Incessant BOSDs

The blue screens seem to be endless at this point.

I have managed to make a few changes to my PC that should have fixed the problems. I found an update to my asus mobo that updated a 5 year old .sys file and pulled the one ram stick that showed any errors on memtest86 (even though it was only 105 errors over 26 passes). Each ram stick was tested individually in the slot that I normally have them seated in. I have run prime95 twice the first time it found no errors for 7.5 hrs and the second time it only found one error in one core after 6ish. I have also updated my graphics card (evga gtx460) to the current beta driver (260.something).

Here is my current dump list: Attachment 104892


My System SpecsSystem Spec
.
15 Oct 2010   #2
cybercore

Windows 7 x64
 
 

One of your crashes was caused by Creative SB Audigy LS, and another one was caused by NTFS_FILE_SYSTEM (24). You have a few outdated drivers. Update them and check your hard drive for errors.



1. Update:

P17.sys Fri Oct 16 09:44:53 2009
Creative SB Audigy LS (I guess this one is the latest, but still check for updates)

nvm62x64.sys Sat Oct 18 00:01:06 2008
NVIDIA Networking Driver

nvsmu.sys Mon Jun 29 10:36:37 2009
NVIDIA nForce

Check for updates for ASUS utilities, such as ASUS Probe:
AsUpIO.sys Mon Jul 06 05:21:38 2009
AsIO.sys Mon Aug 03 10:03:16 2009

SaiH80C1.sys Tue Oct 02 12:47:32 2007
Saitek Configuration Software

mcdbus.sys Tue Feb 24 12:34:07 2009
MagicISO

wpsdrvnt.sys Fri Sep 18 04:09:26 2009
Sygate Technologies, Inc.




2. Replace Symantec with its latest version, or if crashes persist install MSE instead:

SRTSP64.SYS Tue Aug 11 06:30:48 2009
SRTSPX64.SYS Tue Aug 11 06:31:44 2009
SYMEVENT64x86 SYMEVENT64x86.SYS Wed Jun 24 23:19:12 2009

Removal Tool | Norton Support

http://www.microsoft.com/security_essentials/




3. If crashes reoccur, check your hdd for errors:

cmd -> chkdsk /r

HD Diagnostic





Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101510-22885-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e5f000 PsLoadedModuleList = 0xfffff800`0309ce50
Debug session time: Fri Oct 15 12:42:02.357 2010 (GMT-5)
System Uptime: 0 days 0:47:32.432
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fff95f84, 2, 0, fffff880048564c1}

Unable to load image \SystemRoot\system32\drivers\P17.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for P17.sys
*** ERROR: Module load completed but symbols could not be loaded for P17.sys
Probably caused by : P17.sys ( P17+34c1 )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000fff95f84, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880048564c1, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031070e0
 00000000fff95f84 

CURRENT_IRQL:  2

FAULTING_IP: 
P17+34c1
fffff880`048564c1 743b            je      P17+0x34fe (fffff880`048564fe)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002eb0aa0 -- (.trap 0xfffff88002eb0aa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000400 rbx=0000000000000000 rcx=0000000000000001
rdx=fffff88002eb0c48 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880048564c1 rsp=fffff88002eb0c30 rbp=0000000000000001
 r8=0000000000000000  r9=0000000000000000 r10=fdd2f9bb0118fd20
r11=0000000000000400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
P17+0x34c1:
fffff880`048564c1 743b            je      P17+0x34fe (fffff880`048564fe) [br=1]
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ececa9 to fffff80002ecf740

STACK_TEXT:  
fffff880`02eb0958 fffff800`02ececa9 : 00000000`0000000a 00000000`fff95f84 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02eb0960 fffff800`02ecd920 : fffffa80`07a0e020 00000000`00000400 fffffa80`07a0e960 fffffa80`07a0ee00 : nt!KiBugCheckDispatch+0x69
fffff880`02eb0aa0 fffff880`048564c1 : 00000000`00000100 00000000`00000001 00000000`00000000 fffffa80`078a2002 : nt!KiPageFault+0x260
fffff880`02eb0c30 00000000`00000100 : 00000000`00000001 00000000`00000000 fffffa80`078a2002 fffff880`02e88100 : P17+0x34c1
fffff880`02eb0c38 00000000`00000001 : 00000000`00000000 fffffa80`078a2002 fffff880`02e88100 fffff880`02e8cfc0 : 0x100
fffff880`02eb0c40 00000000`00000000 : fffffa80`078a2002 fffff880`02e88100 fffff880`02e8cfc0 00000000`00000022 : 0x1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
P17+34c1
fffff880`048564c1 743b            je      P17+0x34fe (fffff880`048564fe)

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  P17+34c1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: P17

IMAGE_NAME:  P17.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ad81665

FAILURE_BUCKET_ID:  X64_0xD1_P17+34c1

BUCKET_ID:  X64_0xD1_P17+34c1


start             end                 module name
fffff880`04853000 fffff880`049d8000   P17      T (no symbols)           
    Loaded symbol image file: P17.sys
    Image path: \SystemRoot\system32\drivers\P17.sys
    Image name: P17.sys
    Timestamp:        Fri Oct 16 09:44:53 2009 (4AD81665)
    CheckSum:         0013FE04
    ImageSize:        00185000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4























Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101510-34710-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c1c000 PsLoadedModuleList = 0xfffff800`02e59e50
Debug session time: Fri Oct 15 08:05:55.489 2010 (GMT-5)
System Uptime: 0 days 0:46:15.925
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880053c7578, fffff880053c6de0, fffff880012ccb69}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushVolume+449 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880053c7578
Arg3: fffff880053c6de0
Arg4: fffff880012ccb69

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880053c7578 -- (.exr 0xfffff880053c7578)
ExceptionAddress: fffff880012ccb69 (Ntfs!NtfsFlushVolume+0x0000000000000449)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 0000000076467462
Attempt to write to address 0000000076467462

CONTEXT:  fffff880053c6de0 -- (.cxr 0xfffff880053c6de0)
rax=000000007646744e rbx=0000000000000000 rcx=0000000000000000
rdx=fffff880053c7840 rsi=0000000000000001 rdi=fffffa8007955840
rip=fffff880012ccb69 rsp=fffff880053c77b0 rbp=fffff880053c7a80
 r8=0000000000000000  r9=fffff8a005705318 r10=fffff880053c7840
r11=0000000000000000 r12=fffff8a004fee010 r13=0000000000000000
r14=fffffa8006285180 r15=0000000000000702
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
Ntfs!NtfsFlushVolume+0x449:
fffff880`012ccb69 f0017014        lock add dword ptr [rax+14h],esi ds:002b:00000000`76467462=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  STRING_DEREFERENCE

PROCESS_NAME:  VSSVC.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000076467462

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec40e0
 0000000076467462 

FOLLOWUP_IP: 
Ntfs!NtfsFlushVolume+449
fffff880`012ccb69 f0017014        lock add dword ptr [rax+14h],esi

FAULTING_IP: 
Ntfs!NtfsFlushVolume+449
fffff880`012ccb69 f0017014        lock add dword ptr [rax+14h],esi

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff8800131dbbd to fffff880012ccb69

STACK_TEXT:  
fffff880`053c77b0 fffff880`0131dbbd : fffffa80`07955840 fffffa80`06285180 00000000`00000001 0000000f`ffffff00 : Ntfs!NtfsFlushVolume+0x449
fffff880`053c78e0 fffff880`0131e5f0 : fffffa80`07955840 fffffa80`0552f810 fffffa80`055e13f0 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459
fffff880`053c79c0 fffff880`00db123f : fffffa80`0552fbb0 fffffa80`0552f810 fffffa80`07955840 fffff880`053c79e8 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`053c7a30 fffff880`00daf6df : fffffa80`051bc2c0 00000000`00000000 fffffa80`051bc200 fffffa80`0552f810 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`053c7ac0 fffff800`02fa2ca9 : 00000000`00000002 fffffa80`055e13f0 00000000`00000000 fffffa80`0552f810 : fltmgr!FltpDispatch+0xcf
fffff880`053c7b20 fffff800`02f2f331 : fffffa80`0552f810 fffffa80`05430060 fffffa80`055e13f0 fffff800`02e06e80 : nt!IopSynchronousServiceTail+0xf9
fffff880`053c7b90 fffff800`02c8b993 : fffffa80`05430060 00000000`ff7b2270 fffffa80`051bc2c0 fffffa80`055e13f0 : nt!NtFlushBuffersFile+0x171
fffff880`053c7c20 00000000`7743020a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`033cf108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7743020a


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsFlushVolume+449

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff880053c6de0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushVolume+449

BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushVolume+449

fffff800`00b97000 fffff800`00ba1000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02c1c000 fffff800`031f8000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`031f8000 fffff800`03241000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00cc0000 fffff880`00cd0000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00cd0000 fffff880`00cea000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00cfa000 fffff880`00d07000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00d07000 fffff880`00d1b000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00d1b000 fffff880`00d79000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d79000 fffff880`00da3000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00da3000 fffff880`00dae000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00dae000 fffff880`00dfa000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00e7f000 fffff880`00f23000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f23000 fffff880`00f32000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f32000 fffff880`00f89000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00f89000 fffff880`00f92000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f92000 fffff880`00f9c000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00f9c000 fffff880`00fcf000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fcf000 fffff880`00fdc000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00fdc000 fffff880`00ff1000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00ff1000 fffff880`00ffa000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`0103a000 fffff880`01074000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01074000 fffff880`010a4000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`010ab000 fffff880`010bf000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`010bf000 fffff880`0111d000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`0111d000 fffff880`01190000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`01190000 fffff880`011dc000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01235000 fffff880`0124b000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01252000 fffff880`013f5000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0144a000 fffff880`01452000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`0145a000 fffff880`0154c000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0154c000 fffff880`015ac000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`015ac000 fffff880`015d7000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`015d7000 fffff880`015e9000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`015e9000 fffff880`015f2000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`02a00000 fffff880`02a10000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02a10000 fffff880`02a19000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02a19000 fffff880`02a22000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02a22000 fffff880`02a2b000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`02a2b000 fffff880`02a36000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02a36000 fffff880`02a47000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`02a47000 fffff880`02a65000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`02a65000 fffff880`02a72000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`02a72000 fffff880`02a85000   wpsdrvnt wpsdrvnt.sys Fri Sep 18 04:09:26 2009 (4AB2DDC6)
fffff880`02a85000 fffff880`02ac8000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`02ac8000 fffff880`02aeb000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`02aec000 fffff880`02b16000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02b16000 fffff880`02b8a000   SRTSP64  SRTSP64.SYS  Tue Aug 11 06:30:48 2009 (4A80E5E8)
fffff880`02b8a000 fffff880`02baa000   ENG64    ENG64.SYS    Wed Sep 15 13:25:35 2010 (4C909F1F)
fffff880`02baa000 fffff880`02bbe000   SRTSPX64 SRTSPX64.SYS Tue Aug 11 06:31:44 2009 (4A80E620)
fffff880`02bbe000 fffff880`02bc7000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`02bc7000 fffff880`02bd5000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`02bd5000 fffff880`02bfa000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`03a00000 fffff880`03a36000   SYMEVENT64x86 SYMEVENT64x86.SYS Wed Jun 24 23:19:12 2009 (4A428A40)
fffff880`03a36000 fffff880`03a3d000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`03a3e000 fffff880`03bfc000   EX64     EX64.SYS     Wed Sep 15 13:33:41 2010 (4C90A105)
fffff880`04000000 fffff880`04051000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`04051000 fffff880`0405d000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`0405d000 fffff880`04068000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`04087000 fffff880`04111000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`04111000 fffff880`04156000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`04156000 fffff880`0415f000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`0415f000 fffff880`04185000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`04185000 fffff880`04194000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`04194000 fffff880`041b1000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`041b1000 fffff880`041cc000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`041cc000 fffff880`041e0000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`04200000 fffff880`04256000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`04256000 fffff880`04267000   usbehci  usbehci.sys  Sat Oct 24 07:27:33 2009 (4AE28235)
fffff880`04267000 fffff880`0428b000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0428b000 fffff880`042a3000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`042a7000 fffff880`0431d000   eeCtrl64 eeCtrl64.sys Sat May 22 00:44:45 2010 (4BF6FECD)
fffff880`0431d000 fffff880`04342000   EraserUtilRebootDrv EraserUtilRebootDrv.sys Sat May 22 00:44:45 2010 (4BF6FECD)
fffff880`04342000 fffff880`04351000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`04351000 fffff880`0436f000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`0436f000 fffff880`04380000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`04380000 fffff880`04386000   AsUpIO   AsUpIO.sys   Mon Jul 06 05:21:38 2009 (4A515FB2)
fffff880`04386000 fffff880`0438c000   AsIO     AsIO.sys     Mon Aug 03 10:03:16 2009 (4A768BB4)
fffff880`0438c000 fffff880`043b2000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`043b2000 fffff880`043c7000   amdppm   amdppm.sys   Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`043c7000 fffff880`043cf000   ASACPI   ASACPI.sys   Thu May 14 04:25:17 2009 (4A0B72FD)
fffff880`043cf000 fffff880`043db000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`043db000 fffff880`043e6000   nvsmu    nvsmu.sys    Mon Jun 29 10:36:37 2009 (4A486F05)
fffff880`043e6000 fffff880`043f1000   usbohci  usbohci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`04600000 fffff880`0463d000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`0463d000 fffff880`04652000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`04652000 fffff880`047d7000   P17      P17.sys      Fri Oct 16 09:44:53 2009 (4AD81665)
fffff880`047d7000 fffff880`047f9000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`047f9000 fffff880`047fe200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`04800000 fffff880`0481a000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`0481a000 fffff880`04829000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04829000 fffff880`04838000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04838000 fffff880`04874880   mcdbus   mcdbus.sys   Tue Feb 24 12:34:07 2009 (49A3CD1F)
fffff880`04875000 fffff880`048a4000   SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`048a4000 fffff880`048b2000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`048bd000 fffff880`048fb000   1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`048fb000 fffff880`0495ed80   nvm62x64 nvm62x64.sys Sat Oct 18 00:01:06 2008 (48F8FD12)
fffff880`0495f000 fffff880`04983000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04983000 fffff880`0498f000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`0498f000 fffff880`049be000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`049be000 fffff880`049d9000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`049d9000 fffff880`049fa000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`04c00000 fffff880`04c09000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`04c09000 fffff880`04c1c000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`04c1c000 fffff880`04c2a000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`04c2a000 fffff880`04c43000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`04c43000 fffff880`04c4b080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`04c4c000 fffff880`04c4df00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`04c4e000 fffff880`04c5b000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`04c5b000 fffff880`04c78000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`04c78000 fffff880`04c86000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`04c86000 fffff880`04cb0100   SaiH80C1 SaiH80C1.sys Tue Oct 02 12:47:32 2007 (470213B4)
fffff880`04cb1000 fffff880`04cbd000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`04cbe000 fffff880`04ce4000   teefer2  teefer2.sys  Wed May 13 22:25:52 2009 (4A0B1EC0)
fffff880`04ce4000 fffff880`04ce5480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`04ce6000 fffff880`04cf8000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`04cf8000 fffff880`04d52000   usbhub   usbhub.sys   Sat Oct 24 07:28:24 2009 (4AE28268)
fffff880`04d52000 fffff880`04d67000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`04d67000 fffff880`04dc3000   HdAudio  HdAudio.sys  Tue Jul 14 03:06:59 2009 (4A5BCC23)
fffff880`04dc3000 fffff880`04de0000   cdfs     cdfs.sys     Tue Jul 14 02:19:46 2009 (4A5BC112)
fffff880`04de0000 fffff880`04dee000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`04dee000 fffff880`04dfa000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`0583b000 fffff880`05903000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`05903000 fffff880`05921000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`05921000 fffff880`05939000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`05939000 fffff880`05966000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`05966000 fffff880`059b4000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`059b4000 fffff880`059d7000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`05c00000 fffff880`05c67000   srv2     srv2.sys     Fri Aug 27 06:37:46 2010 (4C77330A)
fffff880`05cd7000 fffff880`05d7d000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`05d7d000 fffff880`05d88000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`05d88000 fffff880`05db5000   srvnet   srvnet.sys   Fri Aug 27 06:37:24 2010 (4C7732F4)
fffff880`05db5000 fffff880`05dc7000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`06071000 fffff880`0607c000   asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff880`060c0000 fffff880`06156000   srv      srv.sys      Fri Aug 27 06:38:00 2010 (4C773318)
fffff880`06191000 fffff880`061cc000   WpsHelper WpsHelper.sys Fri Sep 03 04:15:06 2010 (4C804C1A)
fffff880`0fc00000 fffff880`0fc46000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`0fc46000 fffff880`0fc4f000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`0fc4f000 fffff880`0fc5f000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0fc5f000 fffff880`0fc75000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`0fc77000 fffff880`10908e00   nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
fffff880`10909000 fffff880`1090a180   nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
fffff880`1090b000 fffff880`109ff000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff960`00040000 fffff960`0034f000   win32k   win32k.sys   Wed Sep 01 05:58:04 2010 (4C7DC13C)
fffff960`00450000 fffff960`0045a000   TSDDD    TSDDD.dll    Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff960`00750000 fffff960`00777000   cdd      cdd.dll      unavailable (00000000)

Unloaded modules:
fffff880`06000000 fffff880`06071000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`061cc000 fffff880`061d2000   RTCore64.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`06156000 fffff880`06191000   WpsHelper.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`015f2000 fffff880`01600000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`011dc000 fffff880`011e8000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`013f5000 fffff880`013fe000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`011e8000 fffff880`011fb000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
15 Oct 2010   #3
artfuldodger

Windows 7 Home Premium 64bit
 
 

I was unable to find an update for nvm62x64.sys. The Creative driver is the most up to date thing out there as far as I've seen. When I looked through my driver folder I was totally unable to find AsUpIO.sys & AsIO.sys. I don't think Saitek has updated anything for my cyborg command unit in forever. I installed magic iso to try and mount a cd image to fix my crashes and I haven't experienced a new one since it's been installed and it's also the most up to date version. The only reason I have symantec installed at all is because it is required for access to my university's network and it's up to date with what they will provide me.

Also I don't see how asus probe is supposed to help me.

Things did seem to be going well until I was playing the just cause 2 demo and got a 3b blue screen.

Here are my new dumps (2 new ones): Attachment 105042
My System SpecsSystem Spec
.

16 Oct 2010   #4
DT Roberts

XP x86, Vista x86, Windows 7 x64, Ubuntu 9.10
 
 

I agree with checking your hard drive for consistency. It seems like the probable cause here. From an elevated command prompt (Start>type cmd>right-click>Run as administrator) and enter the command chkdsk /r /f. It can take 1-2 hours to complete, so let it run whenever you won't need to be using it the computer.
My System SpecsSystem Spec
17 Oct 2010   #5
artfuldodger

Windows 7 Home Premium 64bit
 
 

Check disks come back clean. I've run about 3 on this install. What makes me sad is that it takes like 6 hours for me because of how big my hard drive is.
My System SpecsSystem Spec
17 Oct 2010   #6
artfuldodger

Windows 7 Home Premium 64bit
 
 

Ok so I ran memtest86 again and I think I may have paired my sticks wrong somehow. Also there was a bit of gunk on one of them so I cleaned that off. Still got a BSOD 000000d1.

Updated dumps (5 New): Attachment 105528
My System SpecsSystem Spec
19 Oct 2010   #7
cybercore

Windows 7 x64
 
 

ASUS Probe is notorious for causing crashes and hangs, especially its earlier versions.


Your latest crash dumps:

101710-51277-01.dmp
BugCheck D1, {20, 2, 8, 20}
Probably caused by : nvlddmkm.sys ( nvlddmkm+10e523 )

101710-48641-01.dmp
BugCheck D1, {fffffffffffffe8a, 2, 0, fffff880050a4c49}
Probably caused by : HIDPARSE.SYS ( HIDPARSE!HidP_GetUsages+265 )

101610-48953-01.dmp
BugCheck 3B, {c0000005, fffff880049c353a, fffff88006e18b80, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+10e )

101610-45677-01.dmp
BugCheck BE, {fffff88001291c88, 8000000003b47121, fffff88009ebcfb0, b}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4237e )

101710-55302-01.dmp
BugCheck 50, {fffff8a0091582b0, 0, fffff88004d572eb, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+39b )


````````````````````````

1. Replace Symantec with MSE:

SRTSP64.SYS Tue Aug 11 06:30:48 2009
SRTSPX64.SYS Tue Aug 11 06:31:44 2009
SYMEVENT64x86.SYS Wed Jun 24 23:19:12 2009

2. Outdted drivers are still all in place, do your best to update them:

nvsmu.sys Mon Jun 29 10:36:37 2009
NVIDIA nForce
Drivers - Download NVIDIA Drivers

SaiH80C1.sys Tue Oct 02 12:47:32 2007
Saitek Configuration Software
Download drivers and software for Saitek products

mcdbus.sys Tue Feb 24 12:34:07 2009
MagicISO
MagicISO - Convert BIN to ISO, Create, Edit, Burn, Extract ISO file, ISO/BIN converter/extractor/editor

wpsdrvnt.sys Fri Sep 18 04:09:26 2009
Sygate Technologies, Inc. - I guess this one doesn't exist anymore


3. Test your hardware:

memtest, run it overnight again, untill it shows 0 errors. You may want to run them separately and test in different slots.
RAM - Test with Memtest86+

hdd
Disk Check
HD Diagnostic

Code:
fffff880`09ebce48 fffff800`02f3aae2 : 00000000`000000be fffff880`01291c88 80000000`03b47121 fffff880`09ebcfb0 : nt!KeBugCheckEx
fffff880`09ebce50 fffff800`02eb882e : 00000000`00000001 fffff8a0`094ac7e0 fffffa80`06107d00 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4237e
fffff880`09ebcfb0 fffff880`012efc80 : 00000000`00000000 fffff8a0`094ac7e0 fffff880`09ebd980 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`09ebd140 fffff880`0125caa9 : 00000980`00000000 0000007f`fffffff8 fffff880`09ebd690 fffff880`09eac000 : Ntfs!NtfsCommonCleanup+0x264d
fffff880`09ebd550 fffff800`02ec9e5a : fffff880`09ebd690 00003000`00000f01 fffff880`00003000 00000000`00082000 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`09ebd580 fffff880`0125c662 : fffff880`0125ca90 fffff880`09ebd690 fffff880`09ebd900 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`09ebd660 fffff880`012fe244 : fffff880`09ebd730 fffff880`09ebd730 fffff880`09ebd730 00000000`00000000 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
fffff880`09ebd6d0 fffff880`010da23f : fffff880`09ebd730 fffffa80`094e6010 fffffa80`094e63b0 fffffa80`06215b00 : Ntfs!NtfsFsdCleanup+0x144
fffff880`09ebd940 fffff880`010d86df : fffffa80`0614cde0 00000000`00000000 fffffa80`05f28c00 fffffa80`094e6010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`09ebd9d0 fffff800`031d0a0f : fffffa80`094e6010 fffffa80`08a5b060 00000000`00000000 fffffa80`053d3390 : fltmgr!FltpDispatch+0xcf
fffff880`09ebda30 fffff800`031b6a24 : 00000000`00000000 fffffa80`08a5b060 00000000`00000000 fffff800`02ebf8bc : nt!IopCloseFile+0x11f
fffff880`09ebdac0 fffff800`031d0501 : fffffa80`08a5b060 fffffa80`00000001 fffff8a0`08f410a0 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
fffff880`09ebdb40 fffff800`031d0414 : 00000000`000000d8 fffffa80`08a5b060 fffff8a0`08f410a0 00000000`000000d8 : nt!ObpCloseHandleTableEntry+0xb1
fffff880`09ebdbd0 fffff800`02eb9993 : fffffa80`05299b60 fffff880`09ebdca0 00000000`7efdb000 fffff900`00000000 : nt!ObpCloseHandle+0x94
fffff880`09ebdc20 00000000`76d4fe4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d4fe4a

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101610-45677-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4a000 PsLoadedModuleList = 0xfffff800`03087e50
Debug session time: Sat Oct 16 10:22:16.928 2010 (UTC - 5:00)
System Uptime: 0 days 0:02:40.364
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck BE, {fffff88001291c88, 8000000003b47121, fffff88009ebcfb0, b}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4237e )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff88001291c88, Virtual address for the attempted write.
Arg2: 8000000003b47121, PTE contents.
Arg3: fffff88009ebcfb0, (reserved)
Arg4: 000000000000000b, (reserved)

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xBE

PROCESS_NAME:  TurboV.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88009ebcfb0 -- (.trap 0xfffff88009ebcfb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000702 rbx=0000000000000000 rcx=fffffa8008977a58
rdx=fffffa80053d3301 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012efc80 rsp=fffff88009ebd140 rbp=fffff88009ebd980
 r8=0000000000000001  r9=0000000000000002 r10=fffffa80062a5180
r11=fffff88009ebd548 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Ntfs!NtfsCommonCleanup+0x264d:
fffff880`012efc80 ff150220faff    call    qword ptr [Ntfs!_imp_ExAcquireResourceExclusiveLite (fffff880`01291c88)] ds:fffff880`01291c88={nt!ExAcquireResourceExclusiveLite (fffff800`02ec2460)}
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002f3aae2 to fffff80002eba740

STACK_TEXT:  
fffff880`09ebce48 fffff800`02f3aae2 : 00000000`000000be fffff880`01291c88 80000000`03b47121 fffff880`09ebcfb0 : nt!KeBugCheckEx
fffff880`09ebce50 fffff800`02eb882e : 00000000`00000001 fffff8a0`094ac7e0 fffffa80`06107d00 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4237e
fffff880`09ebcfb0 fffff880`012efc80 : 00000000`00000000 fffff8a0`094ac7e0 fffff880`09ebd980 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`09ebd140 fffff880`0125caa9 : 00000980`00000000 0000007f`fffffff8 fffff880`09ebd690 fffff880`09eac000 : Ntfs!NtfsCommonCleanup+0x264d
fffff880`09ebd550 fffff800`02ec9e5a : fffff880`09ebd690 00003000`00000f01 fffff880`00003000 00000000`00082000 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`09ebd580 fffff880`0125c662 : fffff880`0125ca90 fffff880`09ebd690 fffff880`09ebd900 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`09ebd660 fffff880`012fe244 : fffff880`09ebd730 fffff880`09ebd730 fffff880`09ebd730 00000000`00000000 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
fffff880`09ebd6d0 fffff880`010da23f : fffff880`09ebd730 fffffa80`094e6010 fffffa80`094e63b0 fffffa80`06215b00 : Ntfs!NtfsFsdCleanup+0x144
fffff880`09ebd940 fffff880`010d86df : fffffa80`0614cde0 00000000`00000000 fffffa80`05f28c00 fffffa80`094e6010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`09ebd9d0 fffff800`031d0a0f : fffffa80`094e6010 fffffa80`08a5b060 00000000`00000000 fffffa80`053d3390 : fltmgr!FltpDispatch+0xcf
fffff880`09ebda30 fffff800`031b6a24 : 00000000`00000000 fffffa80`08a5b060 00000000`00000000 fffff800`02ebf8bc : nt!IopCloseFile+0x11f
fffff880`09ebdac0 fffff800`031d0501 : fffffa80`08a5b060 fffffa80`00000001 fffff8a0`08f410a0 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
fffff880`09ebdb40 fffff800`031d0414 : 00000000`000000d8 fffffa80`08a5b060 fffff8a0`08f410a0 00000000`000000d8 : nt!ObpCloseHandleTableEntry+0xb1
fffff880`09ebdbd0 fffff800`02eb9993 : fffffa80`05299b60 fffff880`09ebdca0 00000000`7efdb000 fffff900`00000000 : nt!ObpCloseHandle+0x94
fffff880`09ebdc20 00000000`76d4fe4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d4fe4a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+4237e
fffff800`02f3aae2 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4237e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xBE_nt!_??_::FNODOBFM::_string_+4237e

BUCKET_ID:  X64_0xBE_nt!_??_::FNODOBFM::_string_+4237e

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101610-48953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e61000 PsLoadedModuleList = 0xfffff800`0309ee50
Debug session time: Sat Oct 16 10:18:57.383 2010 (UTC - 5:00)
System Uptime: 0 days 6:02:16.819
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff880049c353a, fffff88006e18b80, 0}

Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+10e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880049c353a, Address of the instruction which caused the bugcheck
Arg3: fffff88006e18b80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+10e
fffff880`049c353a 488b28          mov     rbp,qword ptr [rax]

CONTEXT:  fffff88006e18b80 -- (.cxr 0xfffff88006e18b80)
rax=000100000001e513 rbx=000000000000000c rcx=fffffa8006fec4d0
rdx=0000000000000000 rsi=fffffa8006fec520 rdi=fffff8a011cde390
rip=fffff880049c353a rsp=fffff88006e19550 rbp=fffff8a001cc8e50
 r8=fffff88006e19528  r9=0000000000000000 r10=fffff8a0059c8140
r11=fffff880048bba08 r12=fffffa80087f7690 r13=0000000000000000
r14=fffff8a0113388e0 r15=fffff8a011cde3b8
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+0x10e:
fffff880`049c353a 488b28          mov     rbp,qword ptr [rax] ds:002b:00010000`0001e513=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff880049c353a

STACK_TEXT:  
fffff880`06e19550 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+0x10e


FOLLOWUP_IP: 
dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+10e
fffff880`049c353a 488b28          mov     rbp,qword ptr [rax]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+10e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

STACK_COMMAND:  .cxr 0xfffff88006e18b80 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+10e

BUCKET_ID:  X64_0x3B_dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+10e

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101710-48641-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e18000 PsLoadedModuleList = 0xfffff800`03055e50
Debug session time: Mon Oct 18 05:34:43.941 2010 (UTC - 5:00)
System Uptime: 0 days 1:24:26.001
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffffffffffffe8a, 2, 0, fffff880050a4c49}

Probably caused by : HIDPARSE.SYS ( HIDPARSE!HidP_GetUsages+265 )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffffffffffe8a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880050a4c49, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c00e0
 fffffffffffffe8a 

CURRENT_IRQL:  2

FAULTING_IP: 
HIDPARSE!HidP_GetUsages+265
fffff880`050a4c49 0f828afeffff    jb      HIDPARSE!HidP_GetUsages+0xf5 (fffff880`050a4ad9)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880009ff5b0 -- (.trap 0xfffff880009ff5b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000008
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880050a4c49 rsp=fffff880009ff740 rbp=fffffa80094a6530
 r8=000000000000000f  r9=0000000000000000 r10=0000000000000001
r11=0000000000000009 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
HIDPARSE!HidP_GetUsages+0x265:
fffff880`050a4c49 0f828afeffff    jb      HIDPARSE!HidP_GetUsages+0xf5 (fffff880`050a4ad9) [br=1]
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e87ca9 to fffff80002e88740

STACK_TEXT:  
fffff880`009ff468 fffff800`02e87ca9 : 00000000`0000000a ffffffff`fffffe8a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009ff470 fffff800`02e86920 : fffff880`009b2180 fffffa80`094a655c fffffa80`0702cb60 00000000`00000008 : nt!KiBugCheckDispatch+0x69
fffff880`009ff5b0 fffff880`050a4c49 : 088808a4`08a408c0 fffff880`009ff7b0 fffffa80`088ca6a0 00000000`00000007 : nt!KiPageFault+0x260
fffff880`009ff740 fffff880`064396f1 : 00000000`00000000 00000000`00000009 fffffa80`07680000 fffffa80`094a64e8 : HIDPARSE!HidP_GetUsages+0x265
fffff880`009ff7c0 fffff800`02e8ad26 : fffffa80`094adc2b fffff880`05095a33 fffffa80`00000000 00000000`00000008 : mouhid!MouHid_ReadComplete+0x115
fffff880`009ff840 fffff880`0508eacc : fffffa80`095e49b0 fffffa80`095e4906 fffffa80`095e5c00 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`009ff920 fffff880`0508ed35 : fffffa80`095f0a02 fffffa80`095f0a40 fffffa80`095e5cb0 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x130
fffff880`009ff9b0 fffff800`02e8ad26 : fffffa80`0949e95b 00000000`00000000 fffffa80`095e5b01 fffffa80`0949e720 : HIDCLASS!HidpInterruptReadComplete+0x235
fffff880`009ffa40 fffff880`042135d9 : fffffa80`088c9050 fffffa80`0a61ea00 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`009ffb20 fffff880`04213ab7 : fffffa80`07226c02 fffffa80`0949e720 00000000`ffffffff fffffa80`088c9ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`009ffc00 fffff880`0421164f : fffffa80`088c9ea8 fffffa80`088c91a0 fffffa80`088ca040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`009ffc60 fffff880`04202f89 : fffffa80`088c9050 00000000`00000000 fffffa80`088c9e02 fffffa80`088c9ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`009ffca0 fffff800`02e93bfc : fffff880`009b2180 fffffa80`088c9ea8 fffffa80`088c9ec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`009ffcd0 fffff800`02e90eea : fffff880`009b2180 fffff880`009bd040 00000000`00000000 fffff880`04202db0 : nt!KiRetireDpcList+0x1bc
fffff880`009ffd80 00000000`00000000 : fffff880`00a00000 fffff880`009fa000 fffff880`009ffd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
HIDPARSE!HidP_GetUsages+265
fffff880`050a4c49 0f828afeffff    jb      HIDPARSE!HidP_GetUsages+0xf5 (fffff880`050a4ad9)

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  HIDPARSE!HidP_GetUsages+265

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: HIDPARSE

IMAGE_NAME:  HIDPARSE.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcbf9

FAILURE_BUCKET_ID:  X64_0xD1_HIDPARSE!HidP_GetUsages+265

BUCKET_ID:  X64_0xD1_HIDPARSE!HidP_GetUsages+265

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101710-51277-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e14000 PsLoadedModuleList = 0xfffff800`03051e50
Debug session time: Sun Oct 17 16:16:25.058 2010 (UTC - 5:00)
System Uptime: 0 days 0:39:02.118
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {20, 2, 8, 20}

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+10e523 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000020, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bc0e0
 0000000000000020 

CURRENT_IRQL:  2

FAULTING_IP: 
+3264633038333165
00000000`00000020 ??              ???

PROCESS_NAME:  System

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

TRAP_FRAME:  fffff880027f74b0 -- (.trap 0xfffff880027f74b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88005b72a30 rbx=0000000000000000 rcx=fffffa8009a22000
rdx=fffff880027f7940 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000020 rsp=fffff880027f7648 rbp=fffffa8007708010
 r8=fffffa8006d12170  r9=fffffa8007190650 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
00000000`00000020 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e83ca9 to fffff80002e84740

FAILED_INSTRUCTION_ADDRESS: 
+3264633038333165
00000000`00000020 ??              ???

STACK_TEXT:  
fffff880`027f7368 fffff800`02e83ca9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff880`027f7370 fffff800`02e82920 : fffff880`05515595 fffffa80`06d12170 fffffa80`08d2ac20 00000000`000000ba : nt!KiBugCheckDispatch+0x69
fffff880`027f74b0 00000000`00000020 : fffff880`05518523 00000000`00000064 fffffa80`07708010 fffffa80`09a22000 : nt!KiPageFault+0x260
fffff880`027f7648 fffff880`05518523 : 00000000`00000064 fffffa80`07708010 fffffa80`09a22000 fffffa80`06d12170 : 0x20
fffff880`027f7650 00000000`00000064 : fffffa80`07708010 fffffa80`09a22000 fffffa80`06d12170 fffffa80`07708010 : nvlddmkm+0x10e523
fffff880`027f7658 fffffa80`07708010 : fffffa80`09a22000 fffffa80`06d12170 fffffa80`07708010 fffffa80`09a2bfe0 : 0x64
fffff880`027f7660 fffffa80`09a22000 : fffffa80`06d12170 fffffa80`07708010 fffffa80`09a2bfe0 fffffa80`0009ee9e : 0xfffffa80`07708010
fffff880`027f7668 fffffa80`06d12170 : fffffa80`07708010 fffffa80`09a2bfe0 fffffa80`0009ee9e fffffa80`00000004 : 0xfffffa80`09a22000
fffff880`027f7670 fffffa80`07708010 : fffffa80`09a2bfe0 fffffa80`0009ee9e fffffa80`00000004 00000000`00000000 : 0xfffffa80`06d12170
fffff880`027f7678 fffffa80`09a2bfe0 : fffffa80`0009ee9e fffffa80`00000004 00000000`00000000 00000000`00000000 : 0xfffffa80`07708010
fffff880`027f7680 fffffa80`0009ee9e : fffffa80`00000004 00000000`00000000 00000000`00000000 00000000`0009ee9d : 0xfffffa80`09a2bfe0
fffff880`027f7688 fffffa80`00000004 : 00000000`00000000 00000000`00000000 00000000`0009ee9d 00000000`0009ee9d : 0xfffffa80`0009ee9e
fffff880`027f7690 00000000`00000000 : 00000000`00000000 00000000`0009ee9d 00000000`0009ee9d 00000000`0009ee9e : 0xfffffa80`00000004


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nvlddmkm+10e523
fffff880`05518523 ??              ???

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nvlddmkm+10e523

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c8b048a

FAILURE_BUCKET_ID:  X64_0xD1_CODE_AV_BAD_IP_nvlddmkm+10e523

BUCKET_ID:  X64_0xD1_CODE_AV_BAD_IP_nvlddmkm+10e523

Followup: MachineOwner
---------
















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101710-55302-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e19000 PsLoadedModuleList = 0xfffff800`03056e50
Debug session time: Sun Oct 17 02:18:00.164 2010 (UTC - 5:00)
System Uptime: 0 days 0:27:24.600
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8a0091582b0, 0, fffff88004d572eb, 0}


Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+39b )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a0091582b0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88004d572eb, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c10e0
 fffff8a0091582b0 

FAULTING_IP: 
dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+39b
fffff880`04d572eb 488b38          mov     rdi,qword ptr [rax]

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  Wow.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800b17c0a0 -- (.trap 0xfffff8800b17c0a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0091582b0 rbx=0000000000000000 rcx=000000000000016d
rdx=0000000000d80848 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004d572eb rsp=fffff8800b17c230 rbp=fffff8800b17ca40
 r8=fffffa8009ab6848  r9=0000000000000003 r10=0000000000000035
r11=00000000c0005b40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x39b:
fffff880`04d572eb 488b38          mov     rdi,qword ptr [rax] ds:9000:fffff8a0`091582b0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002f09f14 to fffff80002e89740

STACK_TEXT:  
fffff880`0b17bf38 fffff800`02f09f14 : 00000000`00000050 fffff8a0`091582b0 00000000`00000000 fffff880`0b17c0a0 : nt!KeBugCheckEx
fffff880`0b17bf40 fffff800`02e8782e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`0b17c0a0 fffff880`04d572eb : fffffa80`08429638 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0b17c230 fffff880`04d3d3e7 : fffffa80`059dcc01 fffffa80`05794450 00000000`00d80848 fffff880`0000012c : dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x39b
fffff880`0b17c320 fffff880`04cb5d6a : 00000000`00000000 00000000`00000200 fffff880`0b17ca40 00000000`00000000 : dxgmms1!VidMmReferenceDmaBuffer+0x43
fffff880`0b17c370 fffff880`04cb552f : fffff8a0`00000001 fffff8a0`0ebd9980 fffff880`0b17c9f0 00000000`00000000 : dxgkrnl!DXGCONTEXT::Render+0x326
fffff880`0b17c980 fffff960`001bbb16 : 00000000`00d3de20 fffff880`0b17cca0 00000000`00d3e8e0 00000000`00d3fd20 : dxgkrnl!DxgkRender+0x3e7
fffff880`0b17cbf0 fffff800`02e88993 : 00000000`07337d00 fffff880`0b17cca0 00000000`00001fff 00000000`7efdb000 : win32k!NtGdiDdDDIRender+0x12
fffff880`0b17cc20 00000000`74fa143a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00d3ddf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74fa143a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+39b
fffff880`04d572eb 488b38          mov     rdi,qword ptr [rax]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+39b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

FAILURE_BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+39b

BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+39b

Followup: MachineOwner
---------

3: kd> lmtn
start             end                 module name
fffff800`00bc7000 fffff800`00bd1000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02e19000 fffff800`033f5000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`033f5000 fffff800`0343e000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c3a000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`00c43000 fffff880`00c50000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00c50000 fffff880`00c64000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00c64000 fffff880`00cc2000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00cc2000 fffff880`00d82000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00d82000 fffff880`00d92000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00d92000 fffff880`00dac000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00dac000 fffff880`00dd6000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00dd6000 fffff880`00de1000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00e78000 fffff880`00e81000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00e84000 fffff880`00f28000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f28000 fffff880`00f37000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f37000 fffff880`00f8e000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00f8e000 fffff880`00f97000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f97000 fffff880`00fa1000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00fa1000 fffff880`00fd4000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fd4000 fffff880`00fe1000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00fe1000 fffff880`00ff6000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01000000 fffff880`0104a000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0104a000 fffff880`01096000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`010b9000 fffff880`01105000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`01105000 fffff880`01119000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01119000 fffff880`01177000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01177000 fffff880`011ea000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`0120f000 fffff880`013b2000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013b2000 fffff880`013cc000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`013cc000 fffff880`013dd000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`013dd000 fffff880`013e7000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`01412000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`01412000 fffff880`0141b000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`0141b000 fffff880`01431000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`0143b000 fffff880`0152d000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0152d000 fffff880`0158d000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`0158d000 fffff880`015b8000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`015b8000 fffff880`015c0000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`015c0000 fffff880`015fa000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`01800000 fffff880`01813000   wpsdrvnt wpsdrvnt.sys Fri Sep 18 04:09:26 2009 (4AB2DDC6)
fffff880`0181b000 fffff880`0184b000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01881000 fffff880`018ab000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`018ab000 fffff880`0191f000   SRTSP64  SRTSP64.SYS  Tue Aug 11 06:30:48 2009 (4A80E5E8)
fffff880`0191f000 fffff880`0193f000   ENG64    ENG64.SYS    Wed Sep 15 13:25:35 2010 (4C909F1F)
fffff880`0193f000 fffff880`01953000   SRTSPX64 SRTSPX64.SYS Tue Aug 11 06:31:44 2009 (4A80E620)
fffff880`01953000 fffff880`0195a000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`0195a000 fffff880`01968000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`01968000 fffff880`0198d000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`0198d000 fffff880`0199d000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`0199d000 fffff880`019a6000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`019a6000 fffff880`019af000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`019af000 fffff880`019b8000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`019b8000 fffff880`019c3000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`019c3000 fffff880`019d4000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`019d4000 fffff880`019f2000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`019f2000 fffff880`019ff000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`02c00000 fffff880`02c36000   SYMEVENT64x86 SYMEVENT64x86.SYS Wed Jun 24 23:19:12 2009 (4A428A40)
fffff880`02c36000 fffff880`02df4000   EX64     EX64.SYS     Wed Sep 15 13:33:41 2010 (4C90A105)
fffff880`02df4000 fffff880`02dfd000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`04000000 fffff880`04051000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`04051000 fffff880`0405d000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`04066000 fffff880`040f0000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`040f0000 fffff880`04135000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`04135000 fffff880`0413e000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`0413e000 fffff880`04164000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`04164000 fffff880`04173000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`04173000 fffff880`04190000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`04190000 fffff880`041ab000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`041ab000 fffff880`041bf000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`041bf000 fffff880`041ca000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`04200000 fffff880`04256000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`04256000 fffff880`04267000   usbehci  usbehci.sys  Sat Oct 24 07:27:33 2009 (4AE28235)
fffff880`04267000 fffff880`042dd000   eeCtrl64 eeCtrl64.sys Sat May 22 00:44:45 2010 (4BF6FECD)
fffff880`042dd000 fffff880`04302000   EraserUtilRebootDrv EraserUtilRebootDrv.sys Sat May 22 00:44:45 2010 (4BF6FECD)
fffff880`04302000 fffff880`04311000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`04311000 fffff880`0432f000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`0432f000 fffff880`04340000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`04340000 fffff880`04346000   AsUpIO   AsUpIO.sys   Mon Jul 06 05:21:38 2009 (4A515FB2)
fffff880`04346000 fffff880`0434c000   AsIO     AsIO.sys     Thu Apr 22 14:18:03 2010 (4BD0306B)
fffff880`0434c000 fffff880`04372000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`04372000 fffff880`04387000   amdppm   amdppm.sys   Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`04387000 fffff880`0438f000   ASACPI   ASACPI.sys   Thu Jul 16 06:31:29 2009 (4A5E9F11)
fffff880`0438f000 fffff880`0439b000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0439b000 fffff880`043a6000   nvsmu    nvsmu.sys    Mon Jun 29 10:36:37 2009 (4A486F05)
fffff880`043a6000 fffff880`043b1000   usbohci  usbohci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`043b1000 fffff880`043be000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`043be000 fffff880`043e2000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0441b000 fffff880`045a0000   P17      P17.sys      Fri Oct 16 09:44:53 2009 (4AD81665)
fffff880`045a0000 fffff880`045dd000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`045dd000 fffff880`045ff000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`04800000 fffff880`0483c880   mcdbus   mcdbus.sys   Tue Feb 24 12:34:07 2009 (49A3CD1F)
fffff880`0483d000 fffff880`0486c000   SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`0486c000 fffff880`04892000   teefer2  teefer2.sys  Wed May 13 22:25:52 2009 (4A0B1EC0)
fffff880`04892000 fffff880`048a2000   nvoclk64 nvoclk64.sys Wed Sep 16 00:59:25 2009 (4AB00E3D)
fffff880`048a2000 fffff880`048b4000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`048b5000 fffff880`048f8000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`048f8000 fffff880`048fd200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`048fe000 fffff880`0493c000   1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`0493c000 fffff880`0498d500   nvmf6264 nvmf6264.sys Fri Jul 31 02:48:18 2009 (4A723142)
fffff880`0498e000 fffff880`049af000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`049af000 fffff880`049c9000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`04c00000 fffff880`04c2f000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04c2f000 fffff880`04c3e000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04c3e000 fffff880`04c3f480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`04c46000 fffff880`04d3a000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`04d3a000 fffff880`04d80000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`04d80000 fffff880`04d89000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`04d89000 fffff880`04d99000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`04d99000 fffff880`04daf000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`04daf000 fffff880`04dd3000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04dd3000 fffff880`04ddf000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04ddf000 fffff880`04dfa000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`05010000 fffff880`0506a000   usbhub   usbhub.sys   Sat Oct 24 07:28:24 2009 (4AE28268)
fffff880`0506a000 fffff880`0507f000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`0507f000 fffff880`05082e80   SaiMini  SaiMini.sys  Wed Jun 03 13:09:18 2009 (4A264BCE)
fffff880`05083000 fffff880`0509c000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`0509c000 fffff880`050a4080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`050a5000 fffff880`050c2000   cdfs     cdfs.sys     Tue Jul 14 02:19:46 2009 (4A5BC112)
fffff880`050c2000 fffff880`050d0000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`050d0000 fffff880`050dc000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`050dc000 fffff880`050ef000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`050ef000 fffff880`050fd000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`050fd000 fffff880`05127100   SaiH80C1 SaiH80C1.sys Tue Oct 02 12:47:32 2007 (470213B4)
fffff880`05128000 fffff880`05145000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`05145000 fffff880`05151000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`05151000 fffff880`05154180   dadder   dadder.sys   Thu Aug 02 12:33:03 2007 (46B1A4CF)
fffff880`05155000 fffff880`05163000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`05163000 fffff880`05186000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`05186000 fffff880`0519b000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0519b000 fffff880`051b3000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`05600000 fffff880`0560a900   SaiBus   SaiBus.sys   Wed Jun 03 13:09:19 2009 (4A264BCF)
fffff880`05616000 fffff880`061e6f00   nvlddmkm nvlddmkm.sys Sat Sep 11 07:24:42 2010 (4C8B048A)
fffff880`061e7000 fffff880`061e8180   nvBridge nvBridge.kmd Sat Sep 11 07:21:30 2010 (4C8B03CA)
fffff880`061e9000 fffff880`061f8000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`06400000 fffff880`06401f00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`06404000 fffff880`065b2000   viahduaa viahduaa.sys Mon Jan 11 12:05:18 2010 (4B4AF7DE)
fffff880`065b2000 fffff880`065db000   nvhda64v nvhda64v.sys Tue Sep 07 23:08:40 2010 (4C869BC8)
fffff880`065db000 fffff880`065e9000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`065e9000 fffff880`065f6000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`065f6000 fffff880`065ff000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`08a00000 fffff880`08a3b000   WpsHelper WpsHelper.sys Fri Sep 03 04:15:06 2010 (4C804C1A)
fffff880`08a3b000 fffff880`08a53000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`08a53000 fffff880`08a80000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`08a80000 fffff880`08ace000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`08ace000 fffff880`08af1000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`08af8000 fffff880`08bc0000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`08bc0000 fffff880`08bde000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`09c26000 fffff880`09ccc000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`09ccc000 fffff880`09cd7000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`09cd7000 fffff880`09d04000   srvnet   srvnet.sys   Fri Aug 27 06:37:24 2010 (4C7732F4)
fffff880`09d04000 fffff880`09d16000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`09d16000 fffff880`09d7d000   srv2     srv2.sys     Fri Aug 27 06:37:46 2010 (4C77330A)
fffff880`0a0a4000 fffff880`0a13a000   srv      srv.sys      Fri Aug 27 06:38:00 2010 (4C773318)
fffff880`0a1b1000 fffff880`0a1bc000   asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff960`00030000 fffff960`0033f000   win32k   win32k.sys   Wed Sep 01 05:58:04 2010 (4C7DC13C)
fffff960`00550000 fffff960`0055a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00690000 fffff960`006b7000   cdd      cdd.dll      Wed May 19 22:48:26 2010 (4BF4408A)

Unloaded modules:
fffff880`0a000000 fffff880`0a071000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`0a140000 fffff880`0a1b1000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`0a13a000 fffff880`0a140000   RTCore64.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00006000
fffff880`0184b000 fffff880`01859000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01859000 fffff880`01865000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01865000 fffff880`0186e000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`0186e000 fffff880`01881000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
Reply

 Incessant BOSDs




Thread Tools




Similar help and support threads
Thread Forum
different BOSDs, it occur often when i play games online
Hi, since two months i get different BOSD for example, usb_driver error or driver_less or not equal. my last BOSD looked like this: stop: 0x000000c5 (0x0c000205, 0x00000002, 0x00000000, 0x82f2687b) I have the .dmp file (081812-45599-01.dmp) winzipped
BSOD Help and Support
0x0000001E BOSDs, dxgmms1.sys BSODs, but no memory dumps
Hi, all For a while now i have been getting a 0x0000001E BSOD and I have no idea what is causing it. I've run memory tests, updated drivers for my GPU and ran a bunch of other tests, but the problem persists. My pc is only 3 months old and it has been having this problem for over 2 months,...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 19:34.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App