New
#11
Hello and Welcome !
Are you Overclocking your PC ? If so reset your BIOS settings to default settings.
Install Process Explorer and expand svchost service and tell us what services is running under it.Code:Start | CMD | Right Click and Run as administrator | SFC /SCANNOW
If you didn't find anything Right Click on svchost.exe and Click on Create MiniDump and post the files here.
Bugcheck:
Hope this helps,Code:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8800835f040, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff80002c734b0, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ab00e0 fffff8800835f040 FAULTING_IP: nt!PfpFileBuildReadList+f0 fffff800`02c734b0 f6404002 test byte ptr [rax+40h],2 MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0x50 PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff88009af3460 -- (.trap 0xfffff88009af3460) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8800835f000 rbx=0000000000000000 rcx=0000000000336800 rdx=0000000000000660 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002c734b0 rsp=fffff88009af35f0 rbp=fffff88009af3840 r8=fffff8a00837b8c8 r9=0000000000335800 r10=fffffa8003c7a288 r11=fffff8a0083fe4e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac po cy nt!PfpFileBuildReadList+0xf0: fffff800`02c734b0 f6404002 test byte ptr [rax+40h],2 ds:d7d0:fffff880`0835f040=?? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800028f8f14 to fffff80002878740 STACK_TEXT: fffff880`09af32f8 fffff800`028f8f14 : 00000000`00000050 fffff880`0835f040 00000000`00000000 fffff880`09af3460 : nt!KeBugCheckEx fffff880`09af3300 fffff800`0287682e : 00000000`00000000 00000000`00000066 fffff880`09af3500 fffff800`0287693d : nt! ?? ::FNODOBFM::`string'+0x42837 fffff880`09af3460 fffff800`02c734b0 : 00000000`00000002 00000000`00000000 fffff880`09af3618 00000000`000007ff : nt!KiPageFault+0x16e fffff880`09af35f0 fffff800`02cd5a55 : 00000000`00000000 fffff880`09af3840 fffff8a0`08361c58 00000000`00000001 : nt!PfpFileBuildReadList+0xf0 fffff880`09af3620 fffff800`02cd5fb1 : ffffffff`8000092c fffff8a0`08361c58 fffffa80`06dcbb50 fffff880`00000060 : nt!PfpFileBuildReadSupport+0x195 fffff880`09af3710 fffff800`02cde0ce : fffff8a0`00000000 fffff8a0`00000005 fffff8a0`000000a1 00000000`00000001 : nt!PfpPrefetchFilesTrickle+0x121 fffff880`09af3810 fffff800`02cdec67 : 00000000`00000000 fffff880`09af3ca0 fffff880`09af3a08 fffff8a0`01bff6b0 : nt!PfpPrefetchRequestPerform+0x30e fffff880`09af3960 fffff800`02ceb23e : fffff880`09af3a08 00000000`00000001 fffffa80`070782f0 00000000`00000000 : nt!PfpPrefetchRequest+0x176 fffff880`09af39d0 fffff800`02cef96e : 00000000`00000000 00000000`01b7f9f0 00000000`0000004f fffff800`0287e701 : nt!PfSetSuperfetchInformation+0x1ad fffff880`09af3ab0 fffff800`02877993 : fffffa80`04cac060 00000000`00000000 00000000`080a0770 00000000`080a1598 : nt!NtSetSystemInformation+0xb91 fffff880`09af3c20 00000000`76f2144a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`01b7f9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f2144a STACK_COMMAND: kb FOLLOWUP_IP: nt!PfpFileBuildReadList+f0 fffff800`02c734b0 f6404002 test byte ptr [rax+40h],2 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!PfpFileBuildReadList+f0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0x50_VRF_nt!PfpFileBuildReadList+f0 BUCKET_ID: X64_0x50_VRF_nt!PfpFileBuildReadList+f0 Followup: MachineOwner ---------
Captain