Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD while watching anime...

16 May 2011   #1
shootinglemon

windows 7 home premium 64 bit OS
 
 
BSOD while watching anime...

I have a ASUS K52JC-A1 laptop running on win 7 64bit. I've had it since October of 2010. Not much trouble until recently, started watching anime and it crashes when the video played. I only use for school work, moderate gaming, and watching videos. Only crashes on some videos.

Thanks for your time.


My System SpecsSystem Spec
.
16 May 2011   #2
cybercore

Windows 7 x64
 
 

The summary of your crash dumps:

Quote:

051311-37206-01.dmp
BugCheck C2, {7, 1097, 650064, fffff8a00f55a460}
BAD_POOL_CALLER (c2)
GetPointerFromAddress: unable to read from fffff80003abb0e0
GetUlongFromAddress: unable to read from fffff80003a291b0
GetUlongFromAddress: unable to read from fffff80003a291b0
Probably caused by : memory_corruption ( nt!MiProcessDereferenceList+23b )

051311-20685-01.dmp
BugCheck 24, {1904fb, fffff8800bdcb508, fffff8800bdcad70, fffff8800163680e}
NTFS_FILE_SYSTEM (24)
Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireSharedFcb+4e )

051511-20170-01.dmp]
BugCheck 24, {1904fb, fffff8800acf1c68, fffff8800acf14d0, fffff880016add07}
NTFS_FILE_SYSTEM (24)
Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+1fe )

051611-20514-01.dmp
BugCheck 1, {770cf72a, 0, ffff, fffff88008189ca0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs.
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )


1. Command Prompt >> chkdsk /f

2. Uninstall Lavasoft.

3. Replace AVG with MSE:

AVG Worldwide - Download tools

Virus, Spyware & Malware Protection | Microsoft Security Essentials


4. Uninstall Daemon Tools if crashes persist
DuplexSecure - FAQ

5. Uninstall Intel Turbo Boost since there's a lot of memory corruption spotted in your crash dumps.

6. Update your notebook drivers:

USB 2.0 Webcam
sncduvc.SYS Mon Dec 29 04:14:26 2008

ATK Hotkey ATK0101 ACPI UTILITY
ASMMAP64.sys Thu Jul 02 05:13:26 2009
ATK64AMD.sys Tue May 12 21:04:54 2009

Conexant High Definition SmartAudio
CHDRT64.sys Fri Oct 30 13:50:02 2009

Intel Management Engine
HECIx64.sys Thu Sep 17 15:54:16 2009

JMicron JMB38X Memory Card Reader
jmcr.sys Tue Aug 18 04:23:06 2009

Dritek Keyboard
kbfiltr.sys Mon Jul 20 05:21:42 2009


7. Scan your hard drive with S.M.A.R.T. and other tests

HDDScan

http://www.passmark.com/products/diskcheckup.htm

http://www.carrona.org/hddiag.html


8. Keep us updated.




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051311-20685-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`0380d000 PsLoadedModuleList = 0xfffff800`03a4ae50
Debug session time: Fri May 13 13:07:32.453 2011 (UTC - 4:00)
System Uptime: 0 days 0:15:39.592
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff8800bdcb508, fffff8800bdcad70, fffff8800163680e}

Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireSharedFcb+4e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff8800bdcb508
Arg3: fffff8800bdcad70
Arg4: fffff8800163680e

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff8800bdcb508 -- (.exr 0xfffff8800bdcb508)
ExceptionAddress: fffff8800163680e (Ntfs!NtfsAcquireSharedFcb+0x000000000000004e)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff8800bdcad70 -- (.cxr 0xfffff8800bdcad70)
rax=fffffa8003f95bb0 rbx=0045003300460032 rcx=fffffa8007f982c0
rdx=0045003300460001 rsi=0000000000000000 rdi=fffff8a000217bc0
rip=fffff8800163680e rsp=fffff8800bdcb740 rbp=0000000000000000
 r8=fffff8a000217bc0  r9=0000000000000000 r10=0000000000000400
r11=0000000000000052 r12=fffffa8007f982c0 r13=00000000c00000d8
r14=0000000000000702 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
Ntfs!NtfsAcquireSharedFcb+0x4e:
fffff880`0163680e 66443b33        cmp     r14w,word ptr [rbx] ds:002b:00450033`00460032=????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab50e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsAcquireSharedFcb+4e
fffff880`0163680e 66443b33        cmp     r14w,word ptr [rbx]

FAULTING_IP: 
Ntfs!NtfsAcquireSharedFcb+4e
fffff880`0163680e 66443b33        cmp     r14w,word ptr [rbx]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff8800169f1b5 to fffff8800163680e

STACK_TEXT:  
fffff880`0bdcb740 fffff880`0169f1b5 : 00000000`00000000 fffffa80`04233930 fffffa80`04e20180 00000000`00000000 : Ntfs!NtfsAcquireSharedFcb+0x4e
fffff880`0bdcb790 fffff880`016a021d : fffffa80`07f982c0 fffffa80`04e20180 fffffa80`04233930 00000000`00000000 : Ntfs!NtfsCacheSharedSecurityBySecurityId+0xad
fffff880`0bdcb810 fffff880`016a270f : fffffa80`07f982c0 fffff8a0`0e4c9010 fffffa80`07f98200 fffff8a0`0e4c9010 : Ntfs!NtfsUpdateFcbInfoFromDisk+0x4fe
fffff880`0bdcb960 fffff880`016c5be4 : fffff880`08e8c350 fffffa80`04233930 fffffa80`07f982c0 00000000`00000000 : Ntfs!NtfsOpenFile+0x2cf
fffff880`0bdcbb50 fffff880`0163198d : fffffa80`07f982c0 fffffa80`04233930 fffff880`08e8c350 fffffa80`0c5ce000 : Ntfs!NtfsCommonCreate+0xc54
fffff880`0bdcbd30 fffff800`03875587 : fffff880`08e8c2c0 00000000`00000000 00000000`7efd5000 00000000`0502ff88 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`0bdcbd60 fffff800`03875541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`08e8c190 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsAcquireSharedFcb+4e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d79996d

STACK_COMMAND:  .cxr 0xfffff8800bdcad70 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireSharedFcb+4e

BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireSharedFcb+4e

Followup: MachineOwner
---------






Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051311-37206-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`03813000 PsLoadedModuleList = 0xfffff800`03a50e50
Debug session time: Fri May 13 04:03:46.001 2011 (UTC - 4:00)
System Uptime: 0 days 16:07:13.515
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
.......................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C2, {7, 1097, 650064, fffff8a00f55a460}

GetPointerFromAddress: unable to read from fffff80003abb0e0
GetUlongFromAddress: unable to read from fffff80003a291b0
GetUlongFromAddress: unable to read from fffff80003a291b0
Probably caused by : memory_corruption ( nt!MiProcessDereferenceList+23b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000000650064, Memory contents of the pool block
Arg4: fffff8a00f55a460, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff80003a291b0
GetUlongFromAddress: unable to read from fffff80003a291b0

POOL_ADDRESS:  fffff8a00f55a460 

BUGCHECK_STR:  0xc2_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800039b660e to fffff80003883700

STACK_TEXT:  
fffff880`035fcb48 fffff800`039b660e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`00650064 : nt!KeBugCheckEx
fffff880`035fcb50 fffff800`039aafeb : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000631 : nt!ExDeferredFreePool+0x11eb
fffff880`035fcc00 fffff800`039ab65d : 00000000`00000000 00000000`00000080 fffffa80`03e54040 fa009e29`00000012 : nt!MiProcessDereferenceList+0x23b
fffff880`035fccc0 fffff800`03b26bc6 : ff7ffefb`feffffff 01000000`00246300 f9ffffdf`ffffffef 01802c00`00000900 : nt!MiDereferenceSegmentThread+0x10d
fffff880`035fcd40 fffff800`03861bc6 : fffff880`009e9180 fffffa80`03e78a10 fffff880`009f3fc0 34894a80`503115a8 : nt!PspSystemThreadStartup+0x5a
fffff880`035fcd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiProcessDereferenceList+23b
fffff800`039aafeb 450f20c6        mov     r14,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!MiProcessDereferenceList+23b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0xc2_7_nt!MiProcessDereferenceList+23b

BUCKET_ID:  X64_0xc2_7_nt!MiProcessDereferenceList+23b

Followup: MachineOwner
---------





Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051511-20170-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`03857000 PsLoadedModuleList = 0xfffff800`03a94e50
Debug session time: Sun May 15 21:15:22.402 2011 (UTC - 4:00)
System Uptime: 0 days 2:25:31.916
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff8800acf1c68, fffff8800acf14d0, fffff880016add07}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+1fe )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff8800acf1c68
Arg3: fffff8800acf14d0
Arg4: fffff880016add07

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff8800acf1c68 -- (.exr 0xfffff8800acf1c68)
ExceptionAddress: fffff880016add07 (Ntfs!NtfsFindPrefixHashEntry+0x00000000000001fe)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff8800acf14d0 -- (.cxr 0xfffff8800acf14d0)
rax=fffff8a00ba4a000 rbx=0076007200630063 rcx=0000000000000240
rdx=0000000000000003 rsi=fffff8a000243640 rdi=fffffa8004f05358
rip=fffff880016add07 rsp=fffff8800acf1ea0 rbp=000000000000e890
 r8=0000000010bfad20  r9=0000000000000000 r10=0000000000000003
r11=fffff8800acf1ee8 r12=fffff8800acf21b0 r13=fffff8800acf2450
r14=0000000000000120 r15=0000000000000d20
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
Ntfs!NtfsFindPrefixHashEntry+0x1fe:
fffff880`016add07 44394310        cmp     dword ptr [rbx+10h],r8d ds:002b:00760072`00630073=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003aff0e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`016add07 44394310        cmp     dword ptr [rbx+10h],r8d

FAULTING_IP: 
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`016add07 44394310        cmp     dword ptr [rbx+10h],r8d

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880016aedc2 to fffff880016add07

STACK_TEXT:  
fffff880`0acf1ea0 fffff880`016aedc2 : fffffa80`051fc7b0 fffffa80`04f05358 fffff8a0`00243640 00000000`00000801 : Ntfs!NtfsFindPrefixHashEntry+0x1fe
fffff880`0acf1fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFindStartingNode+0x452


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsFindPrefixHashEntry+1fe

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d79996d

STACK_COMMAND:  .cxr 0xfffff8800acf14d0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe

BUCKET_ID:  X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051611-20514-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`0380a000 PsLoadedModuleList = 0xfffff800`03a47e50
Debug session time: Mon May 16 01:10:10.486 2011 (UTC - 4:00)
System Uptime: 0 days 3:53:55.000
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1, {770cf72a, 0, ffff, fffff88008189ca0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->KernelApcDisable field. A negative value indicates that a driver
has disabled APC calls without re-enabling them.  A positive value indicates
that the reverse is true. This check is made on exit from a system call.
Arguments:
Arg1: 00000000770cf72a, address of system function (system call)
Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
Arg3: 000000000000ffff, Thread->KernelApcDisable
Arg4: fffff88008189ca0, Previous KernelApcDisable

Debugging Details:
------------------


FAULTING_IP: 
+3030353763613965
00000000`770cf72a ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80003879c69 to fffff8000387a700

STACK_TEXT:  
fffff880`08189a68 fffff800`03879c69 : 00000000`00000001 00000000`770cf72a 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff880`08189a70 fffff800`03879ba0 : 00000000`00000001 00000000`000f2c8e 00000000`0358ace0 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`08189bb0 00000000`770cf72a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`02efaf38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770cf72a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceExit+245
fffff800`03879ba0 4883ec50        sub     rsp,50h

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceExit+245

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34

FAILURE_BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245

BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02eff000 fffff880`02f89000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`045a6000 fffff880`045bc000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0147b000 fffff880`01486000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`014e6000 fffff880`014f3000   AsDsm    AsDsm.sys    Fri Feb 13 01:14:26 2009 (49950FC2)
fffff880`08818000 fffff880`08820000   ASMMAP64 ASMMAP64.sys Thu Jul 02 05:13:26 2009 (4A4C7A36)
fffff880`0143d000 fffff880`01446000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01446000 fffff880`01470000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`07038000 fffff880`071c1000   athrx    athrx.sys    Tue Mar 02 19:45:21 2010 (4B8DB121)
fffff880`07ff7000 fffff880`07fff000   ATK64AMD ATK64AMD.sys Tue May 12 21:04:54 2009 (4A0A1CB6)
fffff960`00910000 fffff960`00971000   ATMFD    ATMFD.DLL    Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`04000000 fffff880`04047000   avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
fffff880`043f0000 fffff880`043f7080   avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
fffff880`01809000 fffff880`018150c0   avgrkx64 avgrkx64.sys Wed Feb 10 22:52:44 2010 (4B737F0C)
fffff880`0435a000 fffff880`043ab000   avgtdia  avgtdia.sys  Wed Apr 27 03:34:54 2011 (4DB7C71E)
fffff880`00fd8000 fffff880`00fe4000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`042ae000 fffff880`042b5000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02ee9000 fffff880`02efa000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03dc6000 fffff880`03de4000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00610000 fffff960`00637000   cdd      cdd.dll      unavailable (00000000)
fffff880`0427b000 fffff880`042a5000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`08517000 fffff880`085c8000   CHDRT64  CHDRT64.sys  Fri Oct 30 13:50:02 2009 (4AEB274A)
fffff880`00cc6000 fffff880`00d86000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c68000 fffff880`00cc6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`071f5000 fffff880`071f9500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`0156f000 fffff880`015e2000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`011f3000 fffff880`011fc000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`04596000 fffff880`045a6000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`08897000 fffff880`088a5000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`088e3000 fffff880`088f5000   dc3d     dc3d.sys     Thu Jul 01 06:07:45 2010 (4C2C68F1)
fffff880`02fdd000 fffff880`02ffb000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02eda000 fffff880`02ee9000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`017de000 fffff880`017f4000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0843d000 fffff880`0845f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`02e00000 fffff880`02e43000   dtsoftbus01 dtsoftbus01.sys Wed Dec 22 05:19:28 2010 (4D11D0B0)
fffff880`088a5000 fffff880`088b8000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04047000 fffff880`04251000   dump_iaStor dump_iaStor.sys Wed Mar 03 21:51:31 2010 (4B8F2033)
fffff880`088b8000 fffff880`088c4000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`07e9b000 fffff880`07f8f000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`07f8f000 fffff880`07fd5000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`04518000 fffff880`0453d000   ETD      ETD.sys      Mon Jan 18 07:37:56 2010 (4B545624)
fffff880`08f89000 fffff880`08fbf000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`014d2000 fffff880`014e6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01486000 fffff880`014d2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`017d4000 fffff880`017de000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00dc0000 fffff880`00dfa000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01998000 fffff880`019e2000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`0454c000 fffff880`04559000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03de6000 fffff800`03e2f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`07456000 fffff880`0747a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`07fd5000 fffff880`07fe6000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
fffff880`0890c000 fffff880`08925000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`088f5000 fffff880`088fd080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`088fe000 fffff880`0890c000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`03cfe000 fffff880`03dc6000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01800000 fffff880`01809000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`044fa000 fffff880`04518000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01233000 fffff880`0143d000   iaStor   iaStor.sys   Wed Mar 03 21:51:31 2010 (4B8F2033)
fffff880`0747c000 fffff880`07e9ab60   igdkmd64 igdkmd64.sys Wed Aug 25 15:35:58 2010 (4C75709E)
fffff880`04559000 fffff880`0457fd00   Impcd    Impcd.sys    Fri Feb 26 18:32:11 2010 (4B8859FB)
fffff880`08850000 fffff880`08897000   IntcDAud IntcDAud.sys Wed Feb 03 08:38:31 2010 (4B697C57)
fffff880`04580000 fffff880`04596000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`071ce000 fffff880`071f5000   jmcr     jmcr.sys     Tue Aug 18 04:23:06 2009 (4A8A64EA)
fffff880`07000000 fffff880`0701f000   JME      JME.sys      Wed Feb 24 22:26:53 2010 (4B85EDFD)
fffff880`0453d000 fffff880`0454c000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`08925000 fffff880`08933000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`0702e000 fffff880`07036000   kbfiltr  kbfiltr.sys  Mon Jul 20 05:21:42 2009 (4A643726)
fffff800`00bb4000 fffff800`00bbe000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`04485000 fffff880`044c8000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`017a9000 fffff880`017c3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0196d000 fffff880`01998000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0845f000 fffff880`08464200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`014f3000 fffff880`01508000   Lbd      Lbd.sys      Tue May 25 03:45:36 2010 (4BFB8020)
fffff880`02217000 fffff880`0222c000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`08950000 fffff880`08973000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`01508000 fffff880`01511000   lullaby  lullaby.sys  Wed Jun 17 22:45:32 2009 (4A39AA4C)
fffff880`00c10000 fffff880`00c54000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`02209000 fffff880`02217000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0701f000 fffff880`0702e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`08933000 fffff880`08940000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e73000 fffff880`00e8d000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03de4000 fffff880`03dfc000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03c00000 fffff880`03c2d000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`03c2d000 fffff880`03c7b000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`03c7b000 fffff880`03c9e000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`01470000 fffff880`0147b000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04313000 fffff880`0431e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011c7000 fffff880`011d1000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01511000 fffff880`0156f000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02ecf000 fffff880`02eda000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`019ea000 fffff880`019fc000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0181b000 fffff880`0190d000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`045e0000 fffff880`045ec000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`089e7000 fffff880`089fa000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`04400000 fffff880`0442f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`08502000 fffff880`08517000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02fce000 fffff880`02fdd000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`043ab000 fffff880`043f0000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0190d000 fffff880`0196d000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0431e000 fffff880`0432f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02ec3000 fffff880`02ecf000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0380a000 fffff800`03de6000   nt       ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
fffff880`01607000 fffff880`017a9000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`042a5000 fffff880`042ae000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`08994000 fffff880`089e7000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02f92000 fffff880`02fb8000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`011de000 fffff880`011f3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fa5000 fffff880`00fd8000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`017c3000 fffff880`017d4000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`08c63000 fffff880`08d09000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`08940000 fffff880`08950000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
fffff880`08400000 fffff880`0843d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c54000 fffff880`00c68000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`045bc000 fffff880`045e0000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0442f000 fffff880`0444a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0444a000 fffff880`0446b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0446b000 fffff880`04485000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02e72000 fffff880`02ec3000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`042f8000 fffff880`04301000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`04301000 fffff880`0430a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0430a000 fffff880`04313000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`00d86000 fffff880`00dc0000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`08800000 fffff880`08818000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01198000 fffff880`011c7000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`08d09000 fffff880`08d14000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`02200000 fffff880`02208a80   sncduvc  sncduvc.SYS  Mon Dec 29 04:14:26 2008 (495894F2)
fffff880`02237000 fffff880`023ee600   snp2uvc  snp2uvc.sys  Wed May 20 04:11:05 2009 (4A13BB19)
fffff880`019e2000 fffff880`019ea000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0105b000 fffff880`0118f000   sptd     sptd.sys     Sun Mar 22 08:35:35 2009 (49C63097)
fffff880`08ef4000 fffff880`08f89000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`08d53000 fffff880`08dba000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`08d14000 fffff880`08d41000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`023ef000 fffff880`023ffd00   STREAM   STREAM.SYS   Mon Jul 13 20:06:18 2009 (4A5BCBFA)
fffff880`071fa000 fffff880`071fb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01a02000 fffff880`01bff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`08d41000 fffff880`08d53000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0434d000 fffff880`0435a000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0432f000 fffff880`0434d000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02e5e000 fffff880`02e72000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004e0000 fffff960`004ea000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`044d4000 fffff880`044fa000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0222c000 fffff880`02233000   TurboB   TurboB.sys   Thu Aug 06 17:17:31 2009 (4A7B486B)
fffff880`045ec000 fffff880`045fe000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`088c4000 fffff880`088e1000   usbccgp  usbccgp.sys  Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`088e1000 fffff880`088e2f00   USBD     USBD.SYS     Thu Mar 24 23:22:51 2011 (4D8C0A8B)
fffff880`07fe6000 fffff880`07ff7000   usbehci  usbehci.sys  Thu Mar 24 23:22:57 2011 (4D8C0A91)
fffff880`084a8000 fffff880`08502000   usbhub   usbhub.sys   Thu Mar 24 23:23:22 2011 (4D8C0AAA)
fffff880`07400000 fffff880`07456000   USBPORT  USBPORT.SYS  Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`011d1000 fffff880`011de000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`042b5000 fffff880`042c3000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`042c3000 fffff880`042e8000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fe4000 fffff880`00ff9000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`00e8d000 fffff880`00ed9000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`071c1000 fffff880`071ce000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02fb8000 fffff880`02fce000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02e43000 fffff880`02e5e000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`042e8000 fffff880`042f8000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ef2000 fffff880`00f96000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f96000 fffff880`00fa5000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02f89000 fffff880`02f92000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`003a2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`0118f000 fffff880`01198000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`08973000 fffff880`08994000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`08e71000 fffff880`08e79000   lvupdtio.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
fffff880`08e00000 fffff880`08e71000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`015e2000 fffff880`015f0000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0405e000 fffff880`04268000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0020A000
fffff880`04268000 fffff880`0427b000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
16 May 2011   #3
shootinglemon

windows 7 home premium 64 bit OS
 
 

thank you so much i will do those things and get back to you.
My System SpecsSystem Spec
.

16 May 2011   #4
shootinglemon

windows 7 home premium 64 bit OS
 
 

might you tell me where i can find these updates? i tried going to devise manager and manually update each but it reports that the drivers are already up to date, which is obviously false. Also the crashes continued and happened once when i was shutting down and once when i plugged in my iphone. I've done 2,4, and 5 of the above. Thanks again.

Heres a recent dump
My System SpecsSystem Spec
17 May 2011   #5
cybercore

Windows 7 x64
 
 

You are getting the same stop codes again. Follow my 1st post.

1. Uninstall Turbo Boost.
2. Go to your PC support to update drivers, including Asus Data Security Manager.
AsDsm.sys Fri Feb 13 01:14:26 2009

~~~~~~~~~

CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051611-21106-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`0381b000 PsLoadedModuleList = 0xfffff800`03a58e50
Debug session time: Mon May 16 02:24:03.485 2011 (UTC - 4:00)
System Uptime: 0 days 1:13:23.625
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800039bf000, fffff8800b537030, 0}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+174 )

Followup: Pool_corruption
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800039bf000, Address of the instruction which caused the bugcheck
Arg3: fffff8800b537030, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExDeferredFreePool+174
fffff800`039bf000 4c395008        cmp     qword ptr [rax+8],r10

CONTEXT:  fffff8800b537030 -- (.cxr 0xfffff8800b537030)
rax=0065006400690076 rbx=0000000000000001 rcx=fffffa8003adc680
rdx=fffff8a00031cbc0 rsi=0000000000000000 rdi=fffff8a0011bf1c0
rip=fffff800039bf000 rsp=fffff8800b537a00 rbp=0000000000000000
 r8=fffff8a00cee75a0  r9=fffff8a00031c990 r10=fffff8a00031c9a0
r11=0000000000000001 r12=fffffa8003adc140 r13=0000000000000000
r14=0000000000000006 r15=0000000000000001
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!ExDeferredFreePool+0x174:
fffff800`039bf000 4c395008        cmp     qword ptr [rax+8],r10 ds:002b:00650064`0069007e=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800039c04c1 to fffff800039bf000

STACK_TEXT:  
fffff880`0b537a00 fffff800`039c04c1 : fffff8a0`0c93fa40 fffff8a0`0c93fa40 fffffa80`0bcfeb30 00000000`00000000 : nt!ExDeferredFreePool+0x174
fffff880`0b537a90 fffff800`03b342bc : 00000000`00000400 fffff8a0`0c93fa50 fffff880`50777445 00000000`00000000 : nt!ExFreePoolWithTag+0x411
fffff880`0b537b40 fffff800`0388a953 : fffffa80`0c732b60 00000000`0250fdc8 00000000`00000000 0000007f`ffffffff : nt!NtTraceControl+0x208
fffff880`0b537bb0 00000000`76ff0efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0250fda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76ff0efa


FOLLOWUP_IP: 
nt!ExDeferredFreePool+174
fffff800`039bf000 4c395008        cmp     qword ptr [rax+8],r10

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExDeferredFreePool+174

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff8800b537030 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+174

BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+174

Followup: Pool_corruption
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051611-18548-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`03813000 PsLoadedModuleList = 0xfffff800`03a50e50
Debug session time: Mon May 16 20:08:59.800 2011 (UTC - 4:00)
System Uptime: 0 days 4:23:19.314
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {20, fffff8a000abe870, fffff8a000abec80, 5410109}

Unable to load image \SystemRoot\System32\Drivers\AsDsm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AsDsm.sys
*** ERROR: Module load completed but symbols could not be loaded for AsDsm.sys
Probably caused by : AsDsm.sys ( AsDsm+7f8a )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a000abe870, The pool entry we were looking for within the page.
Arg3: fffff8a000abec80, The next pool entry.
Arg4: 0000000005410109, (reserved)

Debugging Details:
------------------


BUGCHECK_STR:  0x19_20

POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80003abb0e0
 fffff8a000abe870 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800039b66d3 to fffff80003883700

STACK_TEXT:  
fffff880`08395978 fffff800`039b66d3 : 00000000`00000019 00000000`00000020 fffff8a0`00abe870 fffff8a0`00abec80 : nt!KeBugCheckEx
fffff880`08395980 fffff880`01508f8a : fffff8a0`00abe880 00000000`00000000 fffffa80`6e705341 fffffa80`046c79e0 : nt!ExDeferredFreePool+0x12c4
fffff880`08395a30 fffff8a0`00abe880 : 00000000`00000000 fffffa80`6e705341 fffffa80`046c79e0 fffff880`08395ad8 : AsDsm+0x7f8a
fffff880`08395a38 00000000`00000000 : fffffa80`6e705341 fffffa80`046c79e0 fffff880`08395ad8 00000000`00000000 : 0xfffff8a0`00abe880


STACK_COMMAND:  kb

FOLLOWUP_IP: 
AsDsm+7f8a
fffff880`01508f8a ??              ???

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  AsDsm+7f8a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: AsDsm

IMAGE_NAME:  AsDsm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  49950fc2

FAILURE_BUCKET_ID:  X64_0x19_20_AsDsm+7f8a

BUCKET_ID:  X64_0x19_20_AsDsm+7f8a

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051611-20514-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`0380a000 PsLoadedModuleList = 0xfffff800`03a47e50
Debug session time: Mon May 16 01:10:10.486 2011 (UTC - 4:00)
System Uptime: 0 days 3:53:55.000
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1, {770cf72a, 0, ffff, fffff88008189ca0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->KernelApcDisable field. A negative value indicates that a driver
has disabled APC calls without re-enabling them.  A positive value indicates
that the reverse is true. This check is made on exit from a system call.
Arguments:
Arg1: 00000000770cf72a, address of system function (system call)
Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
Arg3: 000000000000ffff, Thread->KernelApcDisable
Arg4: fffff88008189ca0, Previous KernelApcDisable

Debugging Details:
------------------


FAULTING_IP: 
+3030353763613965
00000000`770cf72a ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80003879c69 to fffff8000387a700

STACK_TEXT:  
fffff880`08189a68 fffff800`03879c69 : 00000000`00000001 00000000`770cf72a 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff880`08189a70 fffff800`03879ba0 : 00000000`00000001 00000000`000f2c8e 00000000`0358ace0 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`08189bb0 00000000`770cf72a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`02efaf38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770cf72a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceExit+245
fffff800`03879ba0 4883ec50        sub     rsp,50h

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceExit+245

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34

FAILURE_BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245

BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051611-24960-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`0385a000 PsLoadedModuleList = 0xfffff800`03a97e50
Debug session time: Mon May 16 15:45:12.562 2011 (UTC - 4:00)
System Uptime: 0 days 1:59:49.076
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88004e6a718, fffff88004e69f80, fffff880016ded07}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+1fe )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88004e6a718
Arg3: fffff88004e69f80
Arg4: fffff880016ded07

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88004e6a718 -- (.exr 0xfffff88004e6a718)
ExceptionAddress: fffff880016ded07 (Ntfs!NtfsFindPrefixHashEntry+0x00000000000001fe)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88004e69f80 -- (.cxr 0xfffff88004e69f80)
rax=fffff8a00d624000 rbx=0037003800310033 rcx=000000000000007a
rdx=0000000000000002 rsi=fffff8a00037a4f0 rdi=fffffa8004e24358
rip=fffff880016ded07 rsp=fffff88004e6a950 rbp=00000000000062c0
 r8=00000000094f9c3d  r9=0000000000000000 r10=0000000000000007
r11=fffff88004e6a998 r12=fffff88004e6ac60 r13=fffff8800b5e8a60
r14=000000000000003d r15=0000000000001c3d
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
Ntfs!NtfsFindPrefixHashEntry+0x1fe:
fffff880`016ded07 44394310        cmp     dword ptr [rbx+10h],r8d ds:002b:00370038`00310043=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003b020e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`016ded07 44394310        cmp     dword ptr [rbx+10h],r8d

FAULTING_IP: 
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`016ded07 44394310        cmp     dword ptr [rbx+10h],r8d

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880016dfdc2 to fffff880016ded07

STACK_TEXT:  
fffff880`04e6a950 fffff880`016dfdc2 : fffffa80`047ef2f0 fffffa80`04e24358 fffff8a0`0037a4f0 00000000`00000701 : Ntfs!NtfsFindPrefixHashEntry+0x1fe
fffff880`04e6aa80 fffff880`016da36d : fffffa80`047ef2f0 fffffa80`04ebb010 fffff880`04e6ac60 fffff880`04e6aca8 : Ntfs!NtfsFindStartingNode+0x452
fffff880`04e6ab50 fffff880`0164698d : fffffa80`047ef2f0 fffffa80`04ebb010 fffff880`0b5e8a60 fffffa80`04404b00 : Ntfs!NtfsCommonCreate+0x3dd
fffff880`04e6ad30 fffff800`038c2587 : fffff880`0b5e89d0 00000000`00454030 00000000`76f95270 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`04e6ad60 fffff800`038c2541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`0b5e88a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsFindPrefixHashEntry+1fe

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d79996d

STACK_COMMAND:  .cxr 0xfffff88004e69f80 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe

BUCKET_ID:  X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`0102f000 fffff880`01086000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`01c6a000 fffff880`01cf4000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03000000 fffff880`03016000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0146a000 fffff880`01475000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`014d5000 fffff880`014e2000   AsDsm    AsDsm.sys    Fri Feb 13 01:14:26 2009 (49950FC2)
fffff880`089eb000 fffff880`089f3000   ASMMAP64 ASMMAP64.sys Thu Jul 02 05:13:26 2009 (4A4C7A36)
fffff880`0142c000 fffff880`01435000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01435000 fffff880`0145f000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`07054000 fffff880`071dd000   athrx    athrx.sys    Tue Mar 02 19:45:21 2010 (4B8DB121)
fffff880`031dc000 fffff880`031e4000   ATK64AMD ATK64AMD.sys Tue May 12 21:04:54 2009 (4A0A1CB6)
fffff960`00990000 fffff960`009f1000   ATMFD    ATMFD.DLL    Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`030d3000 fffff880`0311a000   avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
fffff880`04499000 fffff880`044a0080   avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
fffff880`01c4f000 fffff880`01c5b0c0   avgrkx64 avgrkx64.sys Wed Feb 10 22:52:44 2010 (4B737F0C)
fffff880`0479f000 fffff880`047f0000   avgtdia  avgtdia.sys  Wed Apr 27 03:34:54 2011 (4DB7C71E)
fffff880`00fb2000 fffff880`00fbe000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`046f3000 fffff880`046fa000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`01def000 fffff880`01e00000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`04163000 fffff880`04181000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`046c0000 fffff880`046ea000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`07318000 fffff880`073c9000   CHDRT64  CHDRT64.sys  Fri Oct 30 13:50:02 2009 (4AEB274A)
fffff880`00e0c000 fffff880`00ecc000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01c1f000 fffff880`01c4f000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d06000 fffff880`00d64000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0704e000 fffff880`07052500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01549000 fffff880`015bc000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`011f2000 fffff880`011fb000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`031e4000 fffff880`031f4000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0887b000 fffff880`08889000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02400000 fffff880`02412000   dc3d     dc3d.sys     Thu Jul 01 06:07:45 2010 (4C2C68F1)
fffff880`01dd1000 fffff880`01def000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`01dc2000 fffff880`01dd1000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0161b000 fffff880`01631000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`073c9000 fffff880`073eb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`08889000 fffff880`0889c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`044a1000 fffff880`046ab000   dump_iaStor dump_iaStor.sys Wed Mar 03 21:51:31 2010 (4B8F2033)
fffff880`0886f000 fffff880`0887b000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0807b000 fffff880`0816f000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`0816f000 fffff880`081b5000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0315e000 fffff880`03183000   ETD      ETD.sys      Mon Jan 18 07:37:56 2010 (4B545624)
fffff880`08f57000 fffff880`08f8d000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`014c1000 fffff880`014d5000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01475000 fffff880`014c1000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01611000 fffff880`0161b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00c4c000 fffff880`00c86000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0188b000 fffff880`018d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03192000 fffff880`0319f000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03811000 fffff800`0385a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`081d7000 fffff880`081fb000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`081b5000 fffff880`081c6000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
fffff880`088c9000 fffff880`088e2000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`02412000 fffff880`0241a080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0241b000 fffff880`02429000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0409b000 fffff880`04163000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`019e8000 fffff880`019f1000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03140000 fffff880`0315e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01222000 fffff880`0142c000   iaStor   iaStor.sys   Wed Mar 03 21:51:31 2010 (4B8F2033)
fffff880`0765c000 fffff880`0807ab60   igdkmd64 igdkmd64.sys Wed Aug 25 15:35:58 2010 (4C75709E)
fffff880`0319f000 fffff880`031c5d00   Impcd    Impcd.sys    Fri Feb 26 18:32:11 2010 (4B8859FB)
fffff880`08828000 fffff880`0886f000   IntcDAud IntcDAud.sys Wed Feb 03 08:38:31 2010 (4B697C57)
fffff880`031c6000 fffff880`031dc000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`07000000 fffff880`07027000   jmcr     jmcr.sys     Tue Aug 18 04:23:06 2009 (4A8A64EA)
fffff880`07027000 fffff880`07046000   JME      JME.sys      Wed Feb 24 22:26:53 2010 (4B85EDFD)
fffff880`03183000 fffff880`03192000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`088e2000 fffff880`088f0000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`07046000 fffff880`0704e000   kbfiltr  kbfiltr.sys  Mon Jul 20 05:21:42 2009 (4A643726)
fffff800`00bc9000 fffff800`00bd3000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`07254000 fffff880`07297000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`017d7000 fffff880`017f1000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01860000 fffff880`0188b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`073eb000 fffff880`073f0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`08951000 fffff880`08966000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0890d000 fffff880`08930000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`014e2000 fffff880`014eb000   lullaby  lullaby.sys  Wed Jun 17 22:45:32 2009 (4A39AA4C)
fffff880`00cae000 fffff880`00cf2000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0889c000 fffff880`088aa000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`071ea000 fffff880`071f9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`088f0000 fffff880`088fd000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dc0000 fffff880`00dda000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04181000 fffff880`04199000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`04199000 fffff880`041c6000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`04000000 fffff880`0404e000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`0404e000 fffff880`04071000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`0145f000 fffff880`0146a000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04758000 fffff880`04763000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01086000 fffff880`01090000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`014eb000 fffff880`01549000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`01db7000 fffff880`01dc2000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`018dd000 fffff880`018ef000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`018f6000 fffff880`019e8000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0303a000 fffff880`03046000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`089b9000 fffff880`089cc000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`03046000 fffff880`03075000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`07303000 fffff880`07318000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`0448a000 fffff880`04499000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04400000 fffff880`04445000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01800000 fffff880`01860000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`04763000 fffff880`04774000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`047f0000 fffff880`047fc000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0385a000 fffff800`03e36000   nt       ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
fffff880`01635000 fffff880`017d7000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`046ea000 fffff880`046f3000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`08966000 fffff880`089b9000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`0444e000 fffff880`04474000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`0109d000 fffff880`010b2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f7f000 fffff880`00fb2000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fd3000 fffff880`00fda000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fda000 fffff880`00fea000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01600000 fffff880`01611000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`08c83000 fffff880`08d29000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`088fd000 fffff880`0890d000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
fffff880`07200000 fffff880`0723d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf2000 fffff880`00d06000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03016000 fffff880`0303a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03075000 fffff880`03090000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03090000 fffff880`030b1000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`030b1000 fffff880`030cb000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`01d66000 fffff880`01db7000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0473d000 fffff880`04746000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`04746000 fffff880`0474f000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0474f000 fffff880`04758000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015bc000 fffff880`015f6000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`089cc000 fffff880`089e4000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`08d29000 fffff880`08d34000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`025f7000 fffff880`025ffa80   sncduvc  sncduvc.SYS  Mon Dec 29 04:14:26 2008 (495894F2)
fffff880`0242e000 fffff880`025e5600   snp2uvc  snp2uvc.sys  Wed May 20 04:11:05 2009 (4A13BB19)
fffff880`018d5000 fffff880`018dd000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`010b5000 fffff880`011e9000   sptd     sptd.sys     Sun Mar 22 08:35:35 2009 (49C63097)
fffff880`08ec2000 fffff880`08f57000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`08d73000 fffff880`08dda000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`08d34000 fffff880`08d61000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`025e6000 fffff880`025f6d00   STREAM   STREAM.SYS   Mon Jul 13 20:06:18 2009 (4A5BCBFA)
fffff880`071f9000 fffff880`071fa480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01a00000 fffff880`01bfd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`08d61000 fffff880`08d73000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`04792000 fffff880`0479f000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`04774000 fffff880`04792000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`01d52000 fffff880`01d66000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00410000 fffff960`0041a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`0311a000 fffff880`03140000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`089e4000 fffff880`089eb000   TurboB   TurboB.sys   Thu Aug 06 17:17:31 2009 (4A7B486B)
fffff880`07297000 fffff880`072a9000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`088aa000 fffff880`088c7000   usbccgp  usbccgp.sys  Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`088c7000 fffff880`088c8f00   USBD     USBD.SYS     Thu Mar 24 23:22:51 2011 (4D8C0A8B)
fffff880`081c6000 fffff880`081d7000   usbehci  usbehci.sys  Thu Mar 24 23:22:57 2011 (4D8C0A91)
fffff880`072a9000 fffff880`07303000   usbhub   usbhub.sys   Thu Mar 24 23:23:22 2011 (4D8C0AAA)
fffff880`07600000 fffff880`07656000   USBPORT  USBPORT.SYS  Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`01090000 fffff880`0109d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`046fa000 fffff880`04708000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04708000 fffff880`0472d000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fbe000 fffff880`00fd3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d64000 fffff880`00dc0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`00c00000 fffff880`00c4c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`071dd000 fffff880`071ea000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`04474000 fffff880`0448a000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`01d37000 fffff880`01d52000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0472d000 fffff880`0473d000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ecc000 fffff880`00f70000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f70000 fffff880`00f7f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04445000 fffff880`0444e000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000c0000 fffff960`003d2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`011e9000 fffff880`011f2000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`08930000 fffff880`08951000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`08e08000 fffff880`08e10000   lvupdtio.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
fffff880`08e00000 fffff880`08e08000   lvupdtio.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
fffff880`08f8d000 fffff880`08ffe000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01cf4000 fffff880`01d37000   dtsoftbus01.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00043000
fffff880`01c5c000 fffff880`01c6a000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`044a3000 fffff880`046ad000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0020A000
fffff880`046ad000 fffff880`046c0000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
22 May 2011   #6
shootinglemon

windows 7 home premium 64 bit OS
 
 

Thank you, i haven't had a crash since so i assume it is okay now. Thank you so much.
My System SpecsSystem Spec
14 Jul 2011   #7
shootinglemon

windows 7 home premium 64 bit OS
 
 

Hey there, the crash seem to re appear recently and i updated most of the drivers via driver genius. here are the attached info thank you very much. it happens very much like it used to, which i start watching something in the browser, after a while it crashes.
My System SpecsSystem Spec
17 Jul 2011   #8
shootinglemon

windows 7 home premium 64 bit OS
 
 

help please?
My System SpecsSystem Spec
17 Jul 2011   #9
wish

Windows 7 Ultimate x64 SP1
 
 

Uninstall all Asus Utility Programs for a while and see if the BSOD problem would stop.

Code:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0xfffff800`03814000 PsLoadedModuleList = 0xfffff800`03a59650
Debug session time: Thu Jul 14 10:58:01.286 2011 (GMT-8)
System Uptime: 0 days 1:39:17.332
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880091f5168, fffff880091f49c0, fffff8800162e2a8}

Unable to load image \SystemRoot\System32\Drivers\AsDsm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AsDsm.sys
*** ERROR: Module load completed but symbols could not be loaded for AsDsm.sys
Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireExclusiveFcb+58 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880091f5168
Arg3: fffff880091f49c0
Arg4: fffff8800162e2a8

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880091f5168 -- (.exr 0xfffff880091f5168)
ExceptionAddress: fffff8800162e2a8 (Ntfs!NtfsAcquireExclusiveFcb+0x0000000000000058)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880091f49c0 -- (.cxr 0xfffff880091f49c0)
rax=fffff880091f5301 rbx=0045003300460032 rcx=fffffa8004531660
rdx=0045003300460001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800162e2a8 rsp=fffff880091f53a0 rbp=fffffa8004531660
 r8=fffff8a0003d6bc0  r9=0000000000000000 r10=0000000000000000
r11=fffff880091f53f0 r12=fffff8a0003d6bc0 r13=00000000c00000d8
r14=0000000000000702 r15=fffff8a00ba103a8
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210202
Ntfs!NtfsAcquireExclusiveFcb+0x58:
fffff880`0162e2a8 66443b33        cmp     r14w,word ptr [rbx] ds:002b:00450033`00460032=????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  rundll32.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ac3100
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsAcquireExclusiveFcb+58
fffff880`0162e2a8 66443b33        cmp     r14w,word ptr [rbx]

FAULTING_IP: 
Ntfs!NtfsAcquireExclusiveFcb+58
fffff880`0162e2a8 66443b33        cmp     r14w,word ptr [rbx]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff88001636763 to fffff8800162e2a8

STACK_TEXT:  
fffff880`091f53a0 fffff880`01636763 : fffff8a0`003d6bc0 fffff880`091f59c0 00000000`00000000 fffffa80`04531660 : Ntfs!NtfsAcquireExclusiveFcb+0x58
fffff880`091f53f0 fffff880`01696a08 : fffff8a0`0ba10010 fffff8a0`0ba10010 00000000`00000000 00000000`000007ff : Ntfs!NtfsAcquireExclusiveScb+0x1f
fffff880`091f5420 fffff880`016baaf3 : fffff8a0`0ba10330 fffff880`091f59c0 00000000`0000000a 00000000`00000701 : Ntfs!NtfsSetRenameInfo+0xc74
fffff880`091f5810 fffff880`0162c574 : fffffa80`04531660 fffffa80`048cc010 fffff880`091f5901 fffff880`091f5900 : Ntfs!NtfsCommonSetInformation+0x7e3
fffff880`091f58f0 fffff880`00e1cbcf : fffffa80`048cc3f8 fffffa80`048cc010 fffffa80`04531660 fffff880`091f5918 : Ntfs!NtfsFsdSetInformation+0x11c
fffff880`091f5970 fffff880`00e1b6df : fffffa80`04e14040 fffffa80`048cc010 fffffa80`04e14000 fffffa80`048cc010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`091f5a00 fffff880`0124135a : 00000000`000000ec 00000000`0000000a 00000000`00000000 fffffa80`048cc010 : fltmgr!FltpDispatch+0xcf
fffff880`091f5a60 00000000`000000ec : 00000000`0000000a 00000000`00000000 fffffa80`048cc010 fffff880`091f5ca0 : AsDsm+0x135a
fffff880`091f5a68 00000000`0000000a : 00000000`00000000 fffffa80`048cc010 fffff880`091f5ca0 fffff800`03b72743 : 0xec
fffff880`091f5a70 00000000`00000000 : fffffa80`048cc010 fffff880`091f5ca0 fffff800`03b72743 00000000`000000ec : 0xa


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsAcquireExclusiveFcb+58

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d79997b

STACK_COMMAND:  .cxr 0xfffff880091f49c0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+58

BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+58

Followup: MachineOwner
---------
My System SpecsSystem Spec
Reply

 BSOD while watching anime...




Thread Tools




Similar help and support threads
Thread Forum
BSOD while watching anime online.
So I have ran into some problem with me watching anime online, my pc seems to bosd when watching it like this website. http://watchsao2.com/2014/03/sword-art-online-episode-01/ It doesn't crash when watching youtube though, neither does playing game, only crash when watching anime online. ...
BSOD Help and Support
BSOD When watching vine or Watching videos through steam, Atikpag.sys
I've had this for a yea now. Still haven't found anything that will help me. When I watch vine or when I would go to buy a steam game, the video that pops up gives me BSOD. So I always have to buy my games through Windows Safe Mode. The error I get is the following: Stop: 0x000000000116 (I...
BSOD Help and Support
BSOD when opening .mkv(10-bit anime) file with Windows Media Player
hello there, can anyone help me identify and fix my bsod problem ? I could not get comfortable in watching anime (anime with .mkv format) with this bsod:cry:, this happens only recently, whenever i double-click my file, it is by default using Windows Media Player (wmplayer), it immediately got into...
BSOD Help and Support
Suggest me an Anime
Hello! Any anime watchers out there..? Suggest me an anime to watch. i've completed(am watching) these-- 1. Death Note 2. Bleach 3. Naruto 4. One Piece 5. Full Metal Alchemist
Chillout Room
Anime
Hi, I am looking for a list of some good anime shows out there that I probably have not heard of. Basically I am looking for some good anime series to watch. If you have any that you would like to share that would be great :)!
Chillout Room
Bluescreen while watching anime in animeshippuuden
The bluescreen came up for awhile and my PC will auto-restart. I also experienced crashes while playing Warcraft 3 Frozen Throne. I have no issues crashing my PC while playing other games such as NBA 2K10, Heroes of Newerth, MW2. I will post my memory dump here and my pc spec can be viewed at my...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 15:41.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App