BSoD on startup.

Page 1 of 3 123 LastLast

  1. Posts : 51
    Windows 7 Home Premium 64bit
       #1

    BSoD on startup.


    I've run into a lot of BSoDs lately, all on startup and usually before boot finishes.

    I'm running a Windows 7 Home Premium 64bit OS, about 3 and a half months old install (Reinstalled October 1st)
    The hardware is about 13 months old.
    The OS is also full retail.

    Attached is the file produced by the program in the guideline for BSoD topics topic - inside I saw were the minidumps.
    There are several from today since I tried seeing if it was a memory issues by removing one stick at a time and trying to boot.

    Couldn't create a perfmon report since it couldn't find the file specified.

    EDIT: updated the zip with minidumps 27003 and 27253/
    Last edited by Anaxim; 18 Dec 2010 at 13:24.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    1. Uninstall SUPERAntiSpyware:

    SASDIFSV64.SYS Mon Feb 08 19:11:52 2010


    2. Remove Daemon Tools/Alcohol:

    sptd.sys Sun Oct 11 16:55:14 2009

    DuplexSecure - FAQ



    3. Uninstall ALL ASUS utilities such as Probe, or update them to the latest:

    AsIO.sys Mon Dec 17 04:11:49 2007



    4. Update Jmicron driver:

    jraid.sys Wed May 27 01:39:35 2009
    JMicron JMB36X RAID


    5. Update Realtek Audio:

    RTKVHD64.sys Fri May 22 14:04:20 2009


    6. Update Wacom Mouse:

    wacommousefilter.sys Fri Feb 16 13:12:17 2007






    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121810-21684-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02e9ae50
    Debug session time: Sat Dec 18 02:05:46.259 2010 (UTC - 5:00)
    System Uptime: 0 days 0:02:19.258
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {dc, 2, 1, fffff80002ca9055}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000000dc, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ca9055, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f050e0
     00000000000000dc 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02ca9055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880029b64a0 -- (.trap 0xfffff880029b64a0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000008 rbx=0000000000000000 rcx=fffffa800837bbc0
    rdx=fffff880029b67a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ca9055 rsp=fffff880029b6630 rbp=fffff880029b67a0
     r8=fffffa800837bbb0  r9=fffff880029b6a80 r10=fffff80002c5d000
    r11=fffffa800837bb60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeStackAttachProcess+0x115:
    fffff800`02ca9055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax ds:00000000`000000dc=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cccca9 to fffff80002ccd740
    
    STACK_TEXT:  
    fffff880`029b6358 fffff800`02cccca9 : 00000000`0000000a 00000000`000000dc 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`029b6360 fffff800`02ccb920 : fffff880`029b6c00 fffffa80`0837bb60 fffffa80`086a1020 fffff8a0`01187ff0 : nt!KiBugCheckDispatch+0x69
    fffff880`029b64a0 fffff800`02ca9055 : fffff880`029b6648 fffff880`029b6a28 fffff880`029b67b8 fffffa80`06beaac6 : nt!KiPageFault+0x260
    fffff880`029b6630 fffffa80`06be7a93 : fffff880`029b67b0 00000000`0000029f 00000000`00440042 fffffa80`06bf00f0 : nt!KeStackAttachProcess+0x115
    fffff880`029b66b0 fffff880`029b67b0 : 00000000`0000029f 00000000`00440042 fffffa80`06bf00f0 00000000`00000000 : 0xfffffa80`06be7a93
    fffff880`029b66b8 00000000`0000029f : 00000000`00440042 fffffa80`06bf00f0 00000000`00000000 00000000`0000029f : 0xfffff880`029b67b0
    fffff880`029b66c0 00000000`00440042 : fffffa80`06bf00f0 00000000`00000000 00000000`0000029f 00000000`00000000 : 0x29f
    fffff880`029b66c8 fffffa80`06bf00f0 : 00000000`00000000 00000000`0000029f 00000000`00000000 00000000`00000000 : 0x440042
    fffff880`029b66d0 00000000`00000000 : 00000000`0000029f 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`06bf00f0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02ca9055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeStackAttachProcess+115
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121810-22339-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e86e50
    Debug session time: Sat Dec 18 01:55:02.029 2010 (UTC - 5:00)
    System Uptime: 0 days 0:01:01.028
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...............
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 0, fffff80002cbd8b6}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeSetEvent+226 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002cbd8b6, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef10e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeSetEvent+226
    fffff800`02cbd8b6 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88007bb6810 -- (.trap 0xfffff88007bb6810)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88007c29918 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002cbd8b6 rsp=fffff88007bb69a0 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000001 r10=0000000000000000
    r11=fffffa80087d1b60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po cy
    nt!KeSetEvent+0x226:
    fffff800`02cbd8b6 488b09          mov     rcx,qword ptr [rcx] ds:e390:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cb8ca9 to fffff80002cb9740
    
    STACK_TEXT:  
    fffff880`07bb66c8 fffff800`02cb8ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`07bb66d0 fffff800`02cb7920 : fffffa80`087d1b60 fffff880`07c29910 00000000`000006e4 fffffa80`05535040 : nt!KiBugCheckDispatch+0x69
    fffff880`07bb6810 fffff800`02cbd8b6 : fffffa80`00000001 00000000`00000000 fffff880`07c298d0 fffff880`07c298d0 : nt!KiPageFault+0x260
    fffff880`07bb69a0 fffffa80`06bcb0fd : fffff880`00000000 fffffa80`00000000 fffffa80`00000000 ffffffff`80000688 : nt!KeSetEvent+0x226
    fffff880`07bb6a10 fffff880`00000000 : fffffa80`00000000 fffffa80`00000000 ffffffff`80000688 00000000`00000000 : 0xfffffa80`06bcb0fd
    fffff880`07bb6a18 fffffa80`00000000 : fffffa80`00000000 ffffffff`80000688 00000000`00000000 00000000`00000000 : 0xfffff880`00000000
    fffff880`07bb6a20 fffffa80`00000000 : ffffffff`80000688 00000000`00000000 00000000`00000000 00000000`0000061c : 0xfffffa80`00000000
    fffff880`07bb6a28 ffffffff`80000688 : 00000000`00000000 00000000`00000000 00000000`0000061c 00000000`00000000 : 0xfffffa80`00000000
    fffff880`07bb6a30 00000000`00000000 : 00000000`00000000 00000000`0000061c 00000000`00000000 00000000`00000030 : 0xffffffff`80000688
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeSetEvent+226
    fffff800`02cbd8b6 488b09          mov     rcx,qword ptr [rcx]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeSetEvent+226
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeSetEvent+226
    
    BUCKET_ID:  X64_0xA_nt!KeSetEvent+226
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121810-21902-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c4c000 PsLoadedModuleList = 0xfffff800`02e89e50
    Debug session time: Sat Dec 18 02:21:23.236 2010 (UTC - 5:00)
    System Uptime: 0 days 0:03:53.251
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000096, fffff80002c980fa, 0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+1ba )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000096, The exception code that was not handled
    Arg2: fffff80002c980fa, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {
    
    FAULTING_IP: 
    nt!KeStackAttachProcess+1ba
    fffff800`02c980fa 0f22d8          mov     cr3,rax
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    ERROR_CODE: (NTSTATUS) 0xc0000096 - {
    
    BUGCHECK_STR:  0x1E_c0000096
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff8800337e3f8 -- (.exr 0xfffff8800337e3f8)
    ExceptionAddress: fffff80002c980fa (nt!KeStackAttachProcess+0x00000000000001ba)
       ExceptionCode: c0000096
      ExceptionFlags: 00000000
    NumberParameters: 0
    
    TRAP_FRAME:  fffff8800337e4a0 -- (.trap 0xfffff8800337e4a0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8008670a30 rbx=0000000000000000 rcx=0000000000000004
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002c980fa rsp=fffff8800337e630 rbp=fffff8800337e7a0
     r8=0000000000000004  r9=fffffa8005534040 r10=0000000000000010
    r11=fffff80002ebcb60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeStackAttachProcess+0x1ba:
    fffff800`02c980fa 0f22d8          mov     cr3,rax
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cf6a39 to fffff80002cbc740
    
    STACK_TEXT:  
    fffff880`0337dc28 fffff800`02cf6a39 : 00000000`0000001e ffffffff`c0000096 fffff800`02c980fa 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0337dc30 fffff800`02cbbd82 : fffff880`0337e3f8 fffffa80`0554fb60 fffff880`0337e4a0 fffffa80`08670a10 : nt!KiDispatchException+0x1b9
    fffff880`0337e2c0 fffff800`02cba68a : 00000000`00000000 fffffa80`05534040 fffffa80`09056b20 fffff8a0`030f5940 : nt!KiExceptionDispatch+0xc2
    fffff880`0337e4a0 fffff800`02c980fa : fffff880`0337e648 fffff880`0337ea28 fffff880`0337e7b8 fffffa80`06bebac6 : nt!KiGeneralProtectionFault+0x10a
    fffff880`0337e630 fffffa80`06be8a93 : fffff880`0337e7b0 00000000`0000029f 00000000`00000000 fffffa80`00000000 : nt!KeStackAttachProcess+0x1ba
    fffff880`0337e6b0 fffff880`0337e7b0 : 00000000`0000029f 00000000`00000000 fffffa80`00000000 00000000`00000000 : 0xfffffa80`06be8a93
    fffff880`0337e6b8 00000000`0000029f : 00000000`00000000 fffffa80`00000000 00000000`00000000 00000000`0000029f : 0xfffff880`0337e7b0
    fffff880`0337e6c0 00000000`00000000 : fffffa80`00000000 00000000`00000000 00000000`0000029f 00000000`00000000 : 0x29f
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeStackAttachProcess+1ba
    fffff800`02c980fa 0f22d8          mov     cr3,rax
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!KeStackAttachProcess+1ba
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000096_nt!KeStackAttachProcess+1ba
    
    BUCKET_ID:  X64_0x1E_c0000096_nt!KeStackAttachProcess+1ba
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121810-26894-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c0a000 PsLoadedModuleList = 0xfffff800`02e47e50
    Debug session time: Sat Dec 18 02:37:14.408 2010 (UTC - 5:00)
    System Uptime: 0 days 0:03:28.423
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff80002c5a7e7, 0, 7fffffa0000}
    
    Probably caused by : ntkrnlmp.exe ( nt!RtlImageNtHeaderEx+3f )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002c5a7e7, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 000007fffffa0000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!RtlImageNtHeaderEx+3f
    fffff800`02c5a7e7 66390a          cmp     word ptr [rdx],cx
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  000007fffffa0000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb20e0
     000007fffffa0000 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff8800a8f1438 -- (.exr 0xfffff8800a8f1438)
    ExceptionAddress: fffff80002c5a7e7 (nt!RtlImageNtHeaderEx+0x000000000000003f)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 000007fffffa0000
    Attempt to read from address 000007fffffa0000
    
    TRAP_FRAME:  fffff8800a8f14e0 -- (.trap 0xfffff8800a8f14e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000005a4d
    rdx=000007fffffa0000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002c5a7e7 rsp=fffff8800a8f1678 rbp=fffff8800a8f17b0
     r8=0000000000000000  r9=fffff8800a8f16b8 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    nt!RtlImageNtHeaderEx+0x3f:
    fffff800`02c5a7e7 66390a          cmp     word ptr [rdx],cx ds:0001:000007ff`fffa0000=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cb4a39 to fffff80002c7a740
    
    STACK_TEXT:  
    fffff880`0a8f0c68 fffff800`02cb4a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02c5a7e7 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0a8f0c70 fffff800`02c79d82 : fffff880`0a8f1438 fffff880`039f68d0 fffff880`0a8f14e0 00000000`00000000 : nt!KiDispatchException+0x1b9
    fffff880`0a8f1300 fffff800`02c788fa : 00000000`00000000 fffff880`039f68d0 fffffa80`07692000 fffff800`02f90d2e : nt!KiExceptionDispatch+0xc2
    fffff880`0a8f14e0 fffff800`02c5a7e7 : fffff800`02c5a872 00000000`00000010 00000000`00000082 fffff880`0a8f16a8 : nt!KiPageFault+0x23a
    fffff880`0a8f1678 fffff800`02c5a872 : 00000000`00000010 00000000`00000082 fffff880`0a8f16a8 fffffa80`0837ba60 : nt!RtlImageNtHeaderEx+0x3f
    fffff880`0a8f1680 fffffa80`06be9bc6 : fffff880`0a8f17b0 00000000`00000000 fffffa80`06bee260 fffffa80`06bf2300 : nt!RtlImageNtHeader+0x1e
    fffff880`0a8f16b0 fffff880`0a8f17b0 : 00000000`00000000 fffffa80`06bee260 fffffa80`06bf2300 00000000`00000000 : 0xfffffa80`06be9bc6
    fffff880`0a8f16b8 00000000`00000000 : fffffa80`06bee260 fffffa80`06bf2300 00000000`00000000 00000000`00000000 : 0xfffff880`0a8f17b0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!RtlImageNtHeaderEx+3f
    fffff800`02c5a7e7 66390a          cmp     word ptr [rdx],cx
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!RtlImageNtHeaderEx+3f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
    
    BUCKET_ID:  X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
    
    Followup: MachineOwner
    ---------


    Drivers:

    Code:
    start             end                 module name
    fffff880`05506000 fffff880`05544000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`0554c000 fffff880`05591000   ad09zx9o ad09zx9o.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
    fffff880`03e56000 fffff880`03ee0000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`055c6000 fffff880`055dc000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00e50000 fffff880`00e5b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`05544000 fffff880`0554c000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
    fffff880`03ff7000 fffff880`03ffe000   AsIO     AsIO.sys     Mon Dec 17 04:11:49 2007 (47663D55)
    fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e09000 fffff880`00e33000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`05b6d000 fffff880`05b8d000   AtihdW76 AtihdW76.sys Mon Aug 16 06:41:02 2010 (4C6915BE)
    fffff880`04a08000 fffff880`051fd000   atikmdag atikmdag.sys Tue Oct 26 22:29:53 2010 (4CC78EA1)
    fffff880`01a95000 fffff880`01ae0000   atikmpag atikmpag.sys Tue Oct 26 22:14:23 2010 (4CC78AFF)
    fffff960`008b0000 fffff960`00911000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
    fffff880`01bab000 fffff880`01bb2000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03e44000 fffff880`03e55000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`08525000 fffff880`08543000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`007b0000 fffff960`007d7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0700c000 fffff880`07029000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
    fffff880`01b47000 fffff880`01b71000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01ae1000 fffff880`01b11000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d45000 fffff880`00da3000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0137a000 fffff880`013ed000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`05591000 fffff880`055a1000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`08400000 fffff880`08409000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
    fffff880`05a10000 fffff880`05a1e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`07029000 fffff880`0703b000   dc3d     dc3d.sys     Thu Jul 01 06:07:45 2010 (4C2C68F1)
    fffff880`03e26000 fffff880`03e44000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`03e17000 fffff880`03e26000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01435000 fffff880`0144b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05bca000 fffff880`05bec000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05a2a000 fffff880`05a33000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05a1e000 fffff880`05a2a000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05a33000 fffff880`05a46000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`07000000 fffff880`0700c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`0407e000 fffff880`04172000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`04172000 fffff880`041b8000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`00e5b000 fffff880`00e6f000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`00da3000 fffff880`00def000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0142b000 fffff880`01435000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01286000 fffff880`012c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0179d000 fffff880`017e7000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`031e6000 fffff800`0322f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`041b8000 fffff880`041dc000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`055a4000 fffff880`055bd000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`055bd000 fffff880`055c5080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`0703b000 fffff880`07049000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0845d000 fffff880`08525000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01612000 fffff880`0161b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`01a7f000 fffff880`01a95000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00e33000 fffff880`00e50000   jraid    jraid.sys    Wed May 27 01:39:35 2009 (4A1CD217)
    fffff880`05491000 fffff880`054a0000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`04069000 fffff880`04077000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bc3000 fffff800`00bc6000   kdcom    kdcom.dll    Fri Oct 08 07:17:09 2010 (4CAEFDB5)
    fffff880`05a94000 fffff880`05ad7000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01400000 fffff880`0141a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01772000 fffff880`0179d000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05bec000 fffff880`05bf1200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`00e6f000 fffff880`00e84000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`012c0000 fffff880`012e3000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00ced000 fffff880`00d31000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`041e9000 fffff880`041f7000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`054a0000 fffff880`054af000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05b43000 fffff880`05b50000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fdf000 fffff880`00ff9000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`01b71000 fffff880`01ba2000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`09dde000 fffff880`09dee000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`08543000 fffff880`0855b000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0855b000 fffff880`08588000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`08588000 fffff880`085d6000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`085d6000 fffff880`085f9000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01a12000 fffff880`01a1d000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01057000 fffff880`01061000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0131c000 fffff880`0137a000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03e0c000 fffff880`03e17000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01600000 fffff880`01612000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01620000 fffff880`01712000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`05400000 fffff880`0540c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`0540c000 fffff880`0543b000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`05b58000 fffff880`05b6d000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03f54000 fffff880`03f63000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03ee0000 fffff880`03f25000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01712000 fffff880`01772000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`0a37a000 fffff880`0a38f000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`01a1d000 fffff880`01a2e000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03e00000 fffff880`03e0c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c0a000 fffff800`031e6000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01459000 fffff880`015fc000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`05bf2000 fffff880`05bfe000   NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
    fffff880`01ba2000 fffff880`01bab000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`05a63000 fffff880`05a70000   nx6000   nx6000.sys   Wed Jan 27 18:36:09 2010 (4B60CDE9)
    fffff880`03f2e000 fffff880`03f54000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`0106e000 fffff880`01083000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`012e5000 fffff880`0131c000   PCGenFAM PCGenFAM.sys Wed Sep 22 05:52:12 2010 (4C99D1CC)
    fffff880`00f40000 fffff880`00f73000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`011f6000 fffff880`011fd000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fcf000 fffff880`00fdf000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0141a000 fffff880`0142b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`09c87000 fffff880`09d2d000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05a00000 fffff880`05a10000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
    fffff880`05b8d000 fffff880`05bca000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d31000 fffff880`00d45000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`055dc000 fffff880`05600000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0543b000 fffff880`05456000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`05456000 fffff880`05477000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`05477000 fffff880`05491000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03fa6000 fffff880`03ff7000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`01bf5000 fffff880`01bfe000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01a00000 fffff880`01a09000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01a09000 fffff880`01a12000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0124c000 fffff880`01286000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`08445000 fffff880`0845d000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`054b0000 fffff880`05506000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`07052000 fffff880`071fe900   RTKVHD64 RTKVHD64.sys Fri May 22 14:04:20 2009 (4A16E924)
    fffff880`03f9c000 fffff880`03fa6000   SASDIFSV64 SASDIFSV64.SYS Mon Feb 08 19:11:52 2010 (4B70A848)
    fffff880`03f92000 fffff880`03f9c000   SASKUTIL64 SASKUTIL64.SYS Tue Feb 09 17:27:34 2010 (4B71E156)
    fffff880`011c7000 fffff880`011f6000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`09d2d000 fffff880`09d38000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`017e7000 fffff880`017ef000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`01098000 fffff880`011be000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
    fffff880`0a2e4000 fffff880`0a37a000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`09d77000 fffff880`09dde000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`09d38000 fffff880`09d65000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`04067000 fffff880`04068480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`09d65000 fffff880`09d77000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01a4c000 fffff880`01a59000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01a2e000 fffff880`01a4c000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03f7e000 fffff880`03f92000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00400000 fffff960`0040a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01a59000 fffff880`01a7f000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`05ad7000 fffff880`05ae9000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05a70000 fffff880`05a8ac00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05a46000 fffff880`05a63000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`07049000 fffff880`0704af00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04056000 fffff880`04067000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`05ae9000 fffff880`05b43000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`041dc000 fffff880`041e9000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`01b11000 fffff880`01b3e200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
    fffff880`01061000 fffff880`0106e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01bb2000 fffff880`01bc0000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01bc0000 fffff880`01be5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01083000 fffff880`01098000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00f73000 fffff880`00fcf000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01200000 fffff880`0124c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`05b50000 fffff880`05b58000   wacommousefilter wacommousefilter.sys Fri Feb 16 13:12:17 2007 (45D5F401)
    fffff880`055a1000 fffff880`055a3800   wacomvhid wacomvhid.sys Wed May 20 15:53:55 2009 (4A145FD3)
    fffff880`03f63000 fffff880`03f7e000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01be5000 fffff880`01bf5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e8d000 fffff880`00f31000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f31000 fffff880`00f40000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03f25000 fffff880`03f2e000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000f0000 fffff960`00400000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`011be000 fffff880`011c7000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00cc0000 fffff880`00ce1000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`01b11000 fffff880`01b1f000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01b1f000 fffff880`01b2b000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01b2b000 fffff880`01b34000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01b34000 fffff880`01b47000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


  3. Posts : 51
    Windows 7 Home Premium 64bit
    Thread Starter
       #3

    These are instructions on what to do to get read of the BSoD?
    If so, will I be able to reinstall Daemon Tools or Alcohol?
      My Computer


  4. Posts : 670
    Windows 7 x64
       #4

    Anaxim said:
    These are instructions on what to do to get read of the BSoD?
    If so, will I be able to reinstall Daemon Tools or Alcohol?
    Yes, those are the troubleshooting steps. Later when your system gets stable and you're getting no more BSOD's during a few days, feel free to install the latest version of Daemon Tools. But for now uninstall it.
      My Computer


  5. Posts : 51
    Windows 7 Home Premium 64bit
    Thread Starter
       #5

    Well. I was largely unable to do more than the top 2, as they other 4 I couldn't locate properly.

    I was able to run a single clean boot that lasted for 3 and a half hours before the comp froze and followed by 2 BSoD boots.

    Currently compiling a new zip with the program from the aforementioned topic with the 2 new minidumps, although I'm already at peace with formatting.
      My Computer


  6. Posts : 51
    Windows 7 Home Premium 64bit
    Thread Starter
       #6

    Pardon the double post, since I'd like to figure out what is causing this and I'm adding new info.

    I've attached a zip with the minidumps and updated the OP.

    27003 and 27253 are recent and consecutive (the prior being after trying to boot in last known good config)

    As far as instructions go this time, I'd appreciate if they were a bit more detailed. I wasn't able to find the RealTek, JMicron or Asus ones.
      My Computer


  7. Posts : 670
    Windows 7 x64
       #7

    Code:
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    BugCheck 1E, {ffffffffc0000096, fffff8000346b0fa, 0, 0}
    Probably caused by : ntkrnlmp.exe - system kernel file )
    So far according to your most recent crash dump - 121810-27003-01.dmp:

    Uninstalled Superantispyware and Daemon tools - good.




    Update these old drivers:

    Wacom Mouse has never been updated, please do so:
    wacommousefilter.sys Fri Feb 16 13:12:17 2007
    Wacom Downloads

    Update Realtek Audio:
    RTKVHD64.sys Fri May 22 14:04:20 2009
    Realtek

    JMicron JMB36X RAID
    jraid.sys Wed May 27 01:39:35 2009
    Driver

    AsIO.sys Mon Dec 17 04:11:49 2007
    ASUS Probe and other ASUS utilities as listed in your Control Panel > Programs and Components - uninstall them or update to the latest versions
    www.support.asus.com
      My Computer


  8. Posts : 51
    Windows 7 Home Premium 64bit
    Thread Starter
       #8

    I can't find the JMicron one (Though I was able to find multiple files with the same naming pattern) and still not sure what ASUS utilities you are speaking about. I don't have Probe or any other, except maybe Express Gate.
      My Computer


  9. Posts : 670
    Windows 7 x64
       #9

    Update ASUS Express Gate.
      My Computer


  10. Posts : 17,796
    Windows 10, Home Clean Install
       #10

    Members of the BSOD squad suggest not reinstalling SPTD. Use this replacement instead
    Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview
      My Computer


 
Page 1 of 3 123 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 22:32.
Find Us