Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSoD on startup.

18 Dec 2010   #1
Anaxim

Windows 7 Home Premium 64bit
 
 
BSoD on startup.

I've run into a lot of BSoDs lately, all on startup and usually before boot finishes.

I'm running a Windows 7 Home Premium 64bit OS, about 3 and a half months old install (Reinstalled October 1st)
The hardware is about 13 months old.
The OS is also full retail.

Attached is the file produced by the program in the guideline for BSoD topics topic - inside I saw were the minidumps.
There are several from today since I tried seeing if it was a memory issues by removing one stick at a time and trying to boot.

Couldn't create a perfmon report since it couldn't find the file specified.

EDIT: updated the zip with minidumps 27003 and 27253/


My System SpecsSystem Spec
.
18 Dec 2010   #2
cybercore

Windows 7 x64
 
 

1. Uninstall SUPERAntiSpyware:

SASDIFSV64.SYS Mon Feb 08 19:11:52 2010


2. Remove Daemon Tools/Alcohol:

sptd.sys Sun Oct 11 16:55:14 2009

DuplexSecure - FAQ



3. Uninstall ALL ASUS utilities such as Probe, or update them to the latest:

AsIO.sys Mon Dec 17 04:11:49 2007



4. Update Jmicron driver:

jraid.sys Wed May 27 01:39:35 2009
JMicron JMB36X RAID


5. Update Realtek Audio:

RTKVHD64.sys Fri May 22 14:04:20 2009


6. Update Wacom Mouse:

wacommousefilter.sys Fri Feb 16 13:12:17 2007






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121810-21684-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02e9ae50
Debug session time: Sat Dec 18 02:05:46.259 2010 (UTC - 5:00)
System Uptime: 0 days 0:02:19.258
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {dc, 2, 1, fffff80002ca9055}

Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000dc, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ca9055, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f050e0
 00000000000000dc 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeStackAttachProcess+115
fffff800`02ca9055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff880029b64a0 -- (.trap 0xfffff880029b64a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=fffffa800837bbc0
rdx=fffff880029b67a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ca9055 rsp=fffff880029b6630 rbp=fffff880029b67a0
 r8=fffffa800837bbb0  r9=fffff880029b6a80 r10=fffff80002c5d000
r11=fffffa800837bb60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeStackAttachProcess+0x115:
fffff800`02ca9055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax ds:00000000`000000dc=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cccca9 to fffff80002ccd740

STACK_TEXT:  
fffff880`029b6358 fffff800`02cccca9 : 00000000`0000000a 00000000`000000dc 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`029b6360 fffff800`02ccb920 : fffff880`029b6c00 fffffa80`0837bb60 fffffa80`086a1020 fffff8a0`01187ff0 : nt!KiBugCheckDispatch+0x69
fffff880`029b64a0 fffff800`02ca9055 : fffff880`029b6648 fffff880`029b6a28 fffff880`029b67b8 fffffa80`06beaac6 : nt!KiPageFault+0x260
fffff880`029b6630 fffffa80`06be7a93 : fffff880`029b67b0 00000000`0000029f 00000000`00440042 fffffa80`06bf00f0 : nt!KeStackAttachProcess+0x115
fffff880`029b66b0 fffff880`029b67b0 : 00000000`0000029f 00000000`00440042 fffffa80`06bf00f0 00000000`00000000 : 0xfffffa80`06be7a93
fffff880`029b66b8 00000000`0000029f : 00000000`00440042 fffffa80`06bf00f0 00000000`00000000 00000000`0000029f : 0xfffff880`029b67b0
fffff880`029b66c0 00000000`00440042 : fffffa80`06bf00f0 00000000`00000000 00000000`0000029f 00000000`00000000 : 0x29f
fffff880`029b66c8 fffffa80`06bf00f0 : 00000000`00000000 00000000`0000029f 00000000`00000000 00000000`00000000 : 0x440042
fffff880`029b66d0 00000000`00000000 : 00000000`0000029f 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`06bf00f0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KeStackAttachProcess+115
fffff800`02ca9055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KeStackAttachProcess+115

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115

BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121810-22339-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e86e50
Debug session time: Sat Dec 18 01:55:02.029 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:01.028
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80002cbd8b6}

Probably caused by : ntkrnlmp.exe ( nt!KeSetEvent+226 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cbd8b6, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef10e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeSetEvent+226
fffff800`02cbd8b6 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88007bb6810 -- (.trap 0xfffff88007bb6810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88007c29918 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cbd8b6 rsp=fffff88007bb69a0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000001 r10=0000000000000000
r11=fffffa80087d1b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!KeSetEvent+0x226:
fffff800`02cbd8b6 488b09          mov     rcx,qword ptr [rcx] ds:e390:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cb8ca9 to fffff80002cb9740

STACK_TEXT:  
fffff880`07bb66c8 fffff800`02cb8ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07bb66d0 fffff800`02cb7920 : fffffa80`087d1b60 fffff880`07c29910 00000000`000006e4 fffffa80`05535040 : nt!KiBugCheckDispatch+0x69
fffff880`07bb6810 fffff800`02cbd8b6 : fffffa80`00000001 00000000`00000000 fffff880`07c298d0 fffff880`07c298d0 : nt!KiPageFault+0x260
fffff880`07bb69a0 fffffa80`06bcb0fd : fffff880`00000000 fffffa80`00000000 fffffa80`00000000 ffffffff`80000688 : nt!KeSetEvent+0x226
fffff880`07bb6a10 fffff880`00000000 : fffffa80`00000000 fffffa80`00000000 ffffffff`80000688 00000000`00000000 : 0xfffffa80`06bcb0fd
fffff880`07bb6a18 fffffa80`00000000 : fffffa80`00000000 ffffffff`80000688 00000000`00000000 00000000`00000000 : 0xfffff880`00000000
fffff880`07bb6a20 fffffa80`00000000 : ffffffff`80000688 00000000`00000000 00000000`00000000 00000000`0000061c : 0xfffffa80`00000000
fffff880`07bb6a28 ffffffff`80000688 : 00000000`00000000 00000000`00000000 00000000`0000061c 00000000`00000000 : 0xfffffa80`00000000
fffff880`07bb6a30 00000000`00000000 : 00000000`00000000 00000000`0000061c 00000000`00000000 00000000`00000030 : 0xffffffff`80000688


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KeSetEvent+226
fffff800`02cbd8b6 488b09          mov     rcx,qword ptr [rcx]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KeSetEvent+226

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!KeSetEvent+226

BUCKET_ID:  X64_0xA_nt!KeSetEvent+226

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121810-21902-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4c000 PsLoadedModuleList = 0xfffff800`02e89e50
Debug session time: Sat Dec 18 02:21:23.236 2010 (UTC - 5:00)
System Uptime: 0 days 0:03:53.251
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000096, fffff80002c980fa, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+1ba )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff80002c980fa, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {

FAULTING_IP: 
nt!KeStackAttachProcess+1ba
fffff800`02c980fa 0f22d8          mov     cr3,rax

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0xc0000096 - {

BUGCHECK_STR:  0x1E_c0000096

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff8800337e3f8 -- (.exr 0xfffff8800337e3f8)
ExceptionAddress: fffff80002c980fa (nt!KeStackAttachProcess+0x00000000000001ba)
   ExceptionCode: c0000096
  ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME:  fffff8800337e4a0 -- (.trap 0xfffff8800337e4a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8008670a30 rbx=0000000000000000 rcx=0000000000000004
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c980fa rsp=fffff8800337e630 rbp=fffff8800337e7a0
 r8=0000000000000004  r9=fffffa8005534040 r10=0000000000000010
r11=fffff80002ebcb60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeStackAttachProcess+0x1ba:
fffff800`02c980fa 0f22d8          mov     cr3,rax
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cf6a39 to fffff80002cbc740

STACK_TEXT:  
fffff880`0337dc28 fffff800`02cf6a39 : 00000000`0000001e ffffffff`c0000096 fffff800`02c980fa 00000000`00000000 : nt!KeBugCheckEx
fffff880`0337dc30 fffff800`02cbbd82 : fffff880`0337e3f8 fffffa80`0554fb60 fffff880`0337e4a0 fffffa80`08670a10 : nt!KiDispatchException+0x1b9
fffff880`0337e2c0 fffff800`02cba68a : 00000000`00000000 fffffa80`05534040 fffffa80`09056b20 fffff8a0`030f5940 : nt!KiExceptionDispatch+0xc2
fffff880`0337e4a0 fffff800`02c980fa : fffff880`0337e648 fffff880`0337ea28 fffff880`0337e7b8 fffffa80`06bebac6 : nt!KiGeneralProtectionFault+0x10a
fffff880`0337e630 fffffa80`06be8a93 : fffff880`0337e7b0 00000000`0000029f 00000000`00000000 fffffa80`00000000 : nt!KeStackAttachProcess+0x1ba
fffff880`0337e6b0 fffff880`0337e7b0 : 00000000`0000029f 00000000`00000000 fffffa80`00000000 00000000`00000000 : 0xfffffa80`06be8a93
fffff880`0337e6b8 00000000`0000029f : 00000000`00000000 fffffa80`00000000 00000000`00000000 00000000`0000029f : 0xfffff880`0337e7b0
fffff880`0337e6c0 00000000`00000000 : fffffa80`00000000 00000000`00000000 00000000`0000029f 00000000`00000000 : 0x29f


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KeStackAttachProcess+1ba
fffff800`02c980fa 0f22d8          mov     cr3,rax

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KeStackAttachProcess+1ba

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_c0000096_nt!KeStackAttachProcess+1ba

BUCKET_ID:  X64_0x1E_c0000096_nt!KeStackAttachProcess+1ba

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121810-26894-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c0a000 PsLoadedModuleList = 0xfffff800`02e47e50
Debug session time: Sat Dec 18 02:37:14.408 2010 (UTC - 5:00)
System Uptime: 0 days 0:03:28.423
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002c5a7e7, 0, 7fffffa0000}

Probably caused by : ntkrnlmp.exe ( nt!RtlImageNtHeaderEx+3f )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002c5a7e7, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000007fffffa0000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!RtlImageNtHeaderEx+3f
fffff800`02c5a7e7 66390a          cmp     word ptr [rdx],cx

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000007fffffa0000

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb20e0
 000007fffffa0000 

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff8800a8f1438 -- (.exr 0xfffff8800a8f1438)
ExceptionAddress: fffff80002c5a7e7 (nt!RtlImageNtHeaderEx+0x000000000000003f)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000007fffffa0000
Attempt to read from address 000007fffffa0000

TRAP_FRAME:  fffff8800a8f14e0 -- (.trap 0xfffff8800a8f14e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000005a4d
rdx=000007fffffa0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c5a7e7 rsp=fffff8800a8f1678 rbp=fffff8800a8f17b0
 r8=0000000000000000  r9=fffff8800a8f16b8 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlImageNtHeaderEx+0x3f:
fffff800`02c5a7e7 66390a          cmp     word ptr [rdx],cx ds:0001:000007ff`fffa0000=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cb4a39 to fffff80002c7a740

STACK_TEXT:  
fffff880`0a8f0c68 fffff800`02cb4a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02c5a7e7 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a8f0c70 fffff800`02c79d82 : fffff880`0a8f1438 fffff880`039f68d0 fffff880`0a8f14e0 00000000`00000000 : nt!KiDispatchException+0x1b9
fffff880`0a8f1300 fffff800`02c788fa : 00000000`00000000 fffff880`039f68d0 fffffa80`07692000 fffff800`02f90d2e : nt!KiExceptionDispatch+0xc2
fffff880`0a8f14e0 fffff800`02c5a7e7 : fffff800`02c5a872 00000000`00000010 00000000`00000082 fffff880`0a8f16a8 : nt!KiPageFault+0x23a
fffff880`0a8f1678 fffff800`02c5a872 : 00000000`00000010 00000000`00000082 fffff880`0a8f16a8 fffffa80`0837ba60 : nt!RtlImageNtHeaderEx+0x3f
fffff880`0a8f1680 fffffa80`06be9bc6 : fffff880`0a8f17b0 00000000`00000000 fffffa80`06bee260 fffffa80`06bf2300 : nt!RtlImageNtHeader+0x1e
fffff880`0a8f16b0 fffff880`0a8f17b0 : 00000000`00000000 fffffa80`06bee260 fffffa80`06bf2300 00000000`00000000 : 0xfffffa80`06be9bc6
fffff880`0a8f16b8 00000000`00000000 : fffffa80`06bee260 fffffa80`06bf2300 00000000`00000000 00000000`00000000 : 0xfffff880`0a8f17b0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!RtlImageNtHeaderEx+3f
fffff800`02c5a7e7 66390a          cmp     word ptr [rdx],cx

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!RtlImageNtHeaderEx+3f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f

BUCKET_ID:  X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f

Followup: MachineOwner
---------


Drivers:

Code:
start             end                 module name
fffff880`05506000 fffff880`05544000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`0554c000 fffff880`05591000   ad09zx9o ad09zx9o.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`03e56000 fffff880`03ee0000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`055c6000 fffff880`055dc000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00e50000 fffff880`00e5b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`05544000 fffff880`0554c000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`03ff7000 fffff880`03ffe000   AsIO     AsIO.sys     Mon Dec 17 04:11:49 2007 (47663D55)
fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e09000 fffff880`00e33000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`05b6d000 fffff880`05b8d000   AtihdW76 AtihdW76.sys Mon Aug 16 06:41:02 2010 (4C6915BE)
fffff880`04a08000 fffff880`051fd000   atikmdag atikmdag.sys Tue Oct 26 22:29:53 2010 (4CC78EA1)
fffff880`01a95000 fffff880`01ae0000   atikmpag atikmpag.sys Tue Oct 26 22:14:23 2010 (4CC78AFF)
fffff960`008b0000 fffff960`00911000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
fffff880`01bab000 fffff880`01bb2000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03e44000 fffff880`03e55000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`08525000 fffff880`08543000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`007b0000 fffff960`007d7000   cdd      cdd.dll      unavailable (00000000)
fffff880`0700c000 fffff880`07029000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`01b47000 fffff880`01b71000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01ae1000 fffff880`01b11000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d45000 fffff880`00da3000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0137a000 fffff880`013ed000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`05591000 fffff880`055a1000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`08400000 fffff880`08409000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`05a10000 fffff880`05a1e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`07029000 fffff880`0703b000   dc3d     dc3d.sys     Thu Jul 01 06:07:45 2010 (4C2C68F1)
fffff880`03e26000 fffff880`03e44000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03e17000 fffff880`03e26000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01435000 fffff880`0144b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05bca000 fffff880`05bec000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05a2a000 fffff880`05a33000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05a1e000 fffff880`05a2a000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05a33000 fffff880`05a46000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`07000000 fffff880`0700c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0407e000 fffff880`04172000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04172000 fffff880`041b8000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00e5b000 fffff880`00e6f000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00da3000 fffff880`00def000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0142b000 fffff880`01435000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01286000 fffff880`012c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0179d000 fffff880`017e7000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`031e6000 fffff800`0322f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`041b8000 fffff880`041dc000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`055a4000 fffff880`055bd000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`055bd000 fffff880`055c5080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0703b000 fffff880`07049000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0845d000 fffff880`08525000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01612000 fffff880`0161b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01a7f000 fffff880`01a95000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e33000 fffff880`00e50000   jraid    jraid.sys    Wed May 27 01:39:35 2009 (4A1CD217)
fffff880`05491000 fffff880`054a0000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04069000 fffff880`04077000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc3000 fffff800`00bc6000   kdcom    kdcom.dll    Fri Oct 08 07:17:09 2010 (4CAEFDB5)
fffff880`05a94000 fffff880`05ad7000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01400000 fffff880`0141a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01772000 fffff880`0179d000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05bec000 fffff880`05bf1200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`00e6f000 fffff880`00e84000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`012c0000 fffff880`012e3000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ced000 fffff880`00d31000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`041e9000 fffff880`041f7000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`054a0000 fffff880`054af000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05b43000 fffff880`05b50000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fdf000 fffff880`00ff9000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`01b71000 fffff880`01ba2000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`09dde000 fffff880`09dee000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`08543000 fffff880`0855b000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0855b000 fffff880`08588000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`08588000 fffff880`085d6000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`085d6000 fffff880`085f9000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01a12000 fffff880`01a1d000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01057000 fffff880`01061000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0131c000 fffff880`0137a000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03e0c000 fffff880`03e17000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01600000 fffff880`01612000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01620000 fffff880`01712000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`05400000 fffff880`0540c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0540c000 fffff880`0543b000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05b58000 fffff880`05b6d000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03f54000 fffff880`03f63000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03ee0000 fffff880`03f25000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01712000 fffff880`01772000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`0a37a000 fffff880`0a38f000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`01a1d000 fffff880`01a2e000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03e00000 fffff880`03e0c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c0a000 fffff800`031e6000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01459000 fffff880`015fc000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`05bf2000 fffff880`05bfe000   NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
fffff880`01ba2000 fffff880`01bab000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`05a63000 fffff880`05a70000   nx6000   nx6000.sys   Wed Jan 27 18:36:09 2010 (4B60CDE9)
fffff880`03f2e000 fffff880`03f54000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`0106e000 fffff880`01083000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`012e5000 fffff880`0131c000   PCGenFAM PCGenFAM.sys Wed Sep 22 05:52:12 2010 (4C99D1CC)
fffff880`00f40000 fffff880`00f73000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011f6000 fffff880`011fd000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fcf000 fffff880`00fdf000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0141a000 fffff880`0142b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`09c87000 fffff880`09d2d000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05a00000 fffff880`05a10000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
fffff880`05b8d000 fffff880`05bca000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d31000 fffff880`00d45000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`055dc000 fffff880`05600000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0543b000 fffff880`05456000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`05456000 fffff880`05477000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`05477000 fffff880`05491000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03fa6000 fffff880`03ff7000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01bf5000 fffff880`01bfe000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01a00000 fffff880`01a09000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01a09000 fffff880`01a12000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0124c000 fffff880`01286000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`08445000 fffff880`0845d000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`054b0000 fffff880`05506000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`07052000 fffff880`071fe900   RTKVHD64 RTKVHD64.sys Fri May 22 14:04:20 2009 (4A16E924)
fffff880`03f9c000 fffff880`03fa6000   SASDIFSV64 SASDIFSV64.SYS Mon Feb 08 19:11:52 2010 (4B70A848)
fffff880`03f92000 fffff880`03f9c000   SASKUTIL64 SASKUTIL64.SYS Tue Feb 09 17:27:34 2010 (4B71E156)
fffff880`011c7000 fffff880`011f6000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`09d2d000 fffff880`09d38000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`017e7000 fffff880`017ef000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01098000 fffff880`011be000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`0a2e4000 fffff880`0a37a000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`09d77000 fffff880`09dde000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`09d38000 fffff880`09d65000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`04067000 fffff880`04068480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`09d65000 fffff880`09d77000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01a4c000 fffff880`01a59000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01a2e000 fffff880`01a4c000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03f7e000 fffff880`03f92000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00400000 fffff960`0040a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01a59000 fffff880`01a7f000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05ad7000 fffff880`05ae9000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05a70000 fffff880`05a8ac00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05a46000 fffff880`05a63000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`07049000 fffff880`0704af00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04056000 fffff880`04067000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05ae9000 fffff880`05b43000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`041dc000 fffff880`041e9000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`01b11000 fffff880`01b3e200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`01061000 fffff880`0106e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01bb2000 fffff880`01bc0000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01bc0000 fffff880`01be5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01083000 fffff880`01098000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f73000 fffff880`00fcf000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01200000 fffff880`0124c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`05b50000 fffff880`05b58000   wacommousefilter wacommousefilter.sys Fri Feb 16 13:12:17 2007 (45D5F401)
fffff880`055a1000 fffff880`055a3800   wacomvhid wacomvhid.sys Wed May 20 15:53:55 2009 (4A145FD3)
fffff880`03f63000 fffff880`03f7e000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01be5000 fffff880`01bf5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e8d000 fffff880`00f31000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f31000 fffff880`00f40000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03f25000 fffff880`03f2e000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000f0000 fffff960`00400000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`011be000 fffff880`011c7000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00cc0000 fffff880`00ce1000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`01b11000 fffff880`01b1f000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01b1f000 fffff880`01b2b000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01b2b000 fffff880`01b34000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01b34000 fffff880`01b47000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
18 Dec 2010   #3
Anaxim

Windows 7 Home Premium 64bit
 
 

These are instructions on what to do to get read of the BSoD?
If so, will I be able to reinstall Daemon Tools or Alcohol?
My System SpecsSystem Spec
.

18 Dec 2010   #4
cybercore

Windows 7 x64
 
 

Quote   Quote: Originally Posted by Anaxim View Post
These are instructions on what to do to get read of the BSoD?
If so, will I be able to reinstall Daemon Tools or Alcohol?
Yes, those are the troubleshooting steps. Later when your system gets stable and you're getting no more BSOD's during a few days, feel free to install the latest version of Daemon Tools. But for now uninstall it.
My System SpecsSystem Spec
18 Dec 2010   #5
Anaxim

Windows 7 Home Premium 64bit
 
 

Well. I was largely unable to do more than the top 2, as they other 4 I couldn't locate properly.

I was able to run a single clean boot that lasted for 3 and a half hours before the comp froze and followed by 2 BSoD boots.

Currently compiling a new zip with the program from the aforementioned topic with the 2 new minidumps, although I'm already at peace with formatting.
My System SpecsSystem Spec
18 Dec 2010   #6
Anaxim

Windows 7 Home Premium 64bit
 
 

Pardon the double post, since I'd like to figure out what is causing this and I'm adding new info.

I've attached a zip with the minidumps and updated the OP.

27003 and 27253 are recent and consecutive (the prior being after trying to boot in last known good config)

As far as instructions go this time, I'd appreciate if they were a bit more detailed. I wasn't able to find the RealTek, JMicron or Asus ones.
My System SpecsSystem Spec
18 Dec 2010   #7
cybercore

Windows 7 x64
 
 

Code:
KMODE_EXCEPTION_NOT_HANDLED (1e)
BugCheck 1E, {ffffffffc0000096, fffff8000346b0fa, 0, 0}
Probably caused by : ntkrnlmp.exe - system kernel file )
So far according to your most recent crash dump - 121810-27003-01.dmp:

Uninstalled Superantispyware and Daemon tools - good.




Update these old drivers:

Wacom Mouse has never been updated, please do so:
wacommousefilter.sys Fri Feb 16 13:12:17 2007
Wacom Downloads

Update Realtek Audio:
RTKVHD64.sys Fri May 22 14:04:20 2009
Realtek

JMicron JMB36X RAID
jraid.sys Wed May 27 01:39:35 2009
Driver

AsIO.sys Mon Dec 17 04:11:49 2007
ASUS Probe and other ASUS utilities as listed in your Control Panel > Programs and Components - uninstall them or update to the latest versions
www.support.asus.com
My System SpecsSystem Spec
18 Dec 2010   #8
Anaxim

Windows 7 Home Premium 64bit
 
 

I can't find the JMicron one (Though I was able to find multiple files with the same naming pattern) and still not sure what ASUS utilities you are speaking about. I don't have Probe or any other, except maybe Express Gate.
My System SpecsSystem Spec
18 Dec 2010   #9
cybercore

Windows 7 x64
 
 

Update ASUS Express Gate.
My System SpecsSystem Spec
18 Dec 2010   #10
richc46

Microsoft Community Contributor Award Recipient

Windows 10, Home Clean Install
 
 

Members of the BSOD squad suggest not reinstalling SPTD. Use this replacement instead
Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview
My System SpecsSystem Spec
Reply

 BSoD on startup.




Thread Tools




Similar help and support threads
Thread Forum
BSOD during windows startup; can't safe mode; startup repair can't fix
Consistent BSOD during Windows startup for both normal mode and safe mode. BSOD problem started shortly after buggy installations of Microsoft Visual C++ 2005 x64, Microsoft .Net Framework 1.1, and AMD Catalyst Drivers 13.9; and turning off Microsoft .Net Framework 3.5.1. Startup Repair is...
BSOD Help and Support
Brief BSOD on Startup, Startup Recovery Hangs
I have Win 7 Home and in the last couple of days I have been trying to do a backup onto an external drive. The problem comes in when I attempt to start my laptop so that I can begin the backup process, the screen flickers a BSOD, says startup failed and do I want to run Startup Recovery. If I say...
BSOD Help and Support
BSOD on startup, unknown error, startup repair running too long
As the title suggests, my Acer Aspire has been running startup repair for over 20 hours following a BSOD yesterday. I'm not sure if it's worth the wait so maybe you all can shed some light. Yesterday I was stressfully trying to search for something (using Chrome) and the website I was on froze;...
BSOD Help and Support
BSOD on Startup - Startup Reapir not working
On Startup, after POST, I get this BSOD: STOP: c000021a {Fatal System Error} The verification of a knownDLL failed. system process terminated unexpectedly with a status of 0xc000012f (0x00360bf0 0x00000000). The system has shut down. Upon Reboot, I am advised to go to the startup repair....
BSOD Help and Support
BSOD at startup, cant repair startup
i had a bsod 3 days ago with no reason when its at Welcome screen and my startup items are not loaded at all(all drivers programs etc.). i tried to reboot and my pc gone wild. it cant even see welcome screen cuz of bsods. also i am having black screens when booting up. sometimes its just freezes...
BSOD Help and Support
BSOD on startup , error 0x000000f4 . startup takes half an hour
so everything was fine when my laptop started to become very slow and i used to get the BSOD very often so i decided to recover the system to the initial state . i did that and everything was fine , then i updated the windows 7 service pack 1 and finished the installation and rebooted my computer ,...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 16:36.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App