BSOD while watching anime...


  1. Posts : 6
    windows 7 home premium 64 bit OS
       #1

    BSOD while watching anime...


    I have a ASUS K52JC-A1 laptop running on win 7 64bit. I've had it since October of 2010. Not much trouble until recently, started watching anime and it crashes when the video played. I only use for school work, moderate gaming, and watching videos. Only crashes on some videos.

    Thanks for your time.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    The summary of your crash dumps:


    051311-37206-01.dmp
    BugCheck C2, {7, 1097, 650064, fffff8a00f55a460}
    BAD_POOL_CALLER (c2)
    GetPointerFromAddress: unable to read from fffff80003abb0e0
    GetUlongFromAddress: unable to read from fffff80003a291b0
    GetUlongFromAddress: unable to read from fffff80003a291b0
    Probably caused by : memory_corruption ( nt!MiProcessDereferenceList+23b )

    051311-20685-01.dmp
    BugCheck 24, {1904fb, fffff8800bdcb508, fffff8800bdcad70, fffff8800163680e}
    NTFS_FILE_SYSTEM (24)
    Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireSharedFcb+4e )

    051511-20170-01.dmp]
    BugCheck 24, {1904fb, fffff8800acf1c68, fffff8800acf14d0, fffff880016add07}
    NTFS_FILE_SYSTEM (24)
    Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+1fe )

    051611-20514-01.dmp
    BugCheck 1, {770cf72a, 0, ffff, fffff88008189ca0}

    Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
    APC_INDEX_MISMATCH (1)
    This is a kernel internal error. The most common reason to see this
    bugcheck is when a filesystem or a driver has a mismatched number of
    calls to disable and re-enable APCs.
    Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )


    1. Command Prompt >> chkdsk /f

    2. Uninstall Lavasoft.

    3. Replace AVG with MSE:

    AVG Worldwide - Download tools

    Virus, Spyware & Malware Protection | Microsoft Security Essentials


    4. Uninstall Daemon Tools if crashes persist
    DuplexSecure - FAQ

    5. Uninstall Intel Turbo Boost since there's a lot of memory corruption spotted in your crash dumps.

    6. Update your notebook drivers:

    USB 2.0 Webcam
    sncduvc.SYS Mon Dec 29 04:14:26 2008

    ATK Hotkey ATK0101 ACPI UTILITY
    ASMMAP64.sys Thu Jul 02 05:13:26 2009
    ATK64AMD.sys Tue May 12 21:04:54 2009

    Conexant High Definition SmartAudio
    CHDRT64.sys Fri Oct 30 13:50:02 2009

    Intel Management Engine
    HECIx64.sys Thu Sep 17 15:54:16 2009

    JMicron JMB38X Memory Card Reader
    jmcr.sys Tue Aug 18 04:23:06 2009

    Dritek Keyboard
    kbfiltr.sys Mon Jul 20 05:21:42 2009


    7. Scan your hard drive with S.M.A.R.T. and other tests

    HDDScan

    http://www.passmark.com/products/diskcheckup.htm

    http://www.carrona.org/hddiag.html


    8. Keep us updated.




    CRASH DUMPS

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051311-20685-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`0380d000 PsLoadedModuleList = 0xfffff800`03a4ae50
    Debug session time: Fri May 13 13:07:32.453 2011 (UTC - 4:00)
    System Uptime: 0 days 0:15:39.592
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff8800bdcb508, fffff8800bdcad70, fffff8800163680e}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireSharedFcb+4e )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff8800bdcb508
    Arg3: fffff8800bdcad70
    Arg4: fffff8800163680e
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff8800bdcb508 -- (.exr 0xfffff8800bdcb508)
    ExceptionAddress: fffff8800163680e (Ntfs!NtfsAcquireSharedFcb+0x000000000000004e)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff8800bdcad70 -- (.cxr 0xfffff8800bdcad70)
    rax=fffffa8003f95bb0 rbx=0045003300460032 rcx=fffffa8007f982c0
    rdx=0045003300460001 rsi=0000000000000000 rdi=fffff8a000217bc0
    rip=fffff8800163680e rsp=fffff8800bdcb740 rbp=0000000000000000
     r8=fffff8a000217bc0  r9=0000000000000000 r10=0000000000000400
    r11=0000000000000052 r12=fffffa8007f982c0 r13=00000000c00000d8
    r14=0000000000000702 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    Ntfs!NtfsAcquireSharedFcb+0x4e:
    fffff880`0163680e 66443b33        cmp     r14w,word ptr [rbx] ds:002b:00450033`00460032=????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab50e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsAcquireSharedFcb+4e
    fffff880`0163680e 66443b33        cmp     r14w,word ptr [rbx]
    
    FAULTING_IP: 
    Ntfs!NtfsAcquireSharedFcb+4e
    fffff880`0163680e 66443b33        cmp     r14w,word ptr [rbx]
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from fffff8800169f1b5 to fffff8800163680e
    
    STACK_TEXT:  
    fffff880`0bdcb740 fffff880`0169f1b5 : 00000000`00000000 fffffa80`04233930 fffffa80`04e20180 00000000`00000000 : Ntfs!NtfsAcquireSharedFcb+0x4e
    fffff880`0bdcb790 fffff880`016a021d : fffffa80`07f982c0 fffffa80`04e20180 fffffa80`04233930 00000000`00000000 : Ntfs!NtfsCacheSharedSecurityBySecurityId+0xad
    fffff880`0bdcb810 fffff880`016a270f : fffffa80`07f982c0 fffff8a0`0e4c9010 fffffa80`07f98200 fffff8a0`0e4c9010 : Ntfs!NtfsUpdateFcbInfoFromDisk+0x4fe
    fffff880`0bdcb960 fffff880`016c5be4 : fffff880`08e8c350 fffffa80`04233930 fffffa80`07f982c0 00000000`00000000 : Ntfs!NtfsOpenFile+0x2cf
    fffff880`0bdcbb50 fffff880`0163198d : fffffa80`07f982c0 fffffa80`04233930 fffff880`08e8c350 fffffa80`0c5ce000 : Ntfs!NtfsCommonCreate+0xc54
    fffff880`0bdcbd30 fffff800`03875587 : fffff880`08e8c2c0 00000000`00000000 00000000`7efd5000 00000000`0502ff88 : Ntfs!NtfsCommonCreateCallout+0x1d
    fffff880`0bdcbd60 fffff800`03875541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
    fffff880`08e8c190 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsAcquireSharedFcb+4e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d79996d
    
    STACK_COMMAND:  .cxr 0xfffff8800bdcad70 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireSharedFcb+4e
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireSharedFcb+4e
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051311-37206-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`03813000 PsLoadedModuleList = 0xfffff800`03a50e50
    Debug session time: Fri May 13 04:03:46.001 2011 (UTC - 4:00)
    System Uptime: 0 days 16:07:13.515
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................................
    Loading User Symbols
    Loading unloaded module list
    .......................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 1097, 650064, fffff8a00f55a460}
    
    GetPointerFromAddress: unable to read from fffff80003abb0e0
    GetUlongFromAddress: unable to read from fffff80003a291b0
    GetUlongFromAddress: unable to read from fffff80003a291b0
    Probably caused by : memory_corruption ( nt!MiProcessDereferenceList+23b )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 0000000000001097, (reserved)
    Arg3: 0000000000650064, Memory contents of the pool block
    Arg4: fffff8a00f55a460, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    GetUlongFromAddress: unable to read from fffff80003a291b0
    GetUlongFromAddress: unable to read from fffff80003a291b0
    
    POOL_ADDRESS:  fffff8a00f55a460 
    
    BUGCHECK_STR:  0xc2_7
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff800039b660e to fffff80003883700
    
    STACK_TEXT:  
    fffff880`035fcb48 fffff800`039b660e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`00650064 : nt!KeBugCheckEx
    fffff880`035fcb50 fffff800`039aafeb : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000631 : nt!ExDeferredFreePool+0x11eb
    fffff880`035fcc00 fffff800`039ab65d : 00000000`00000000 00000000`00000080 fffffa80`03e54040 fa009e29`00000012 : nt!MiProcessDereferenceList+0x23b
    fffff880`035fccc0 fffff800`03b26bc6 : ff7ffefb`feffffff 01000000`00246300 f9ffffdf`ffffffef 01802c00`00000900 : nt!MiDereferenceSegmentThread+0x10d
    fffff880`035fcd40 fffff800`03861bc6 : fffff880`009e9180 fffffa80`03e78a10 fffff880`009f3fc0 34894a80`503115a8 : nt!PspSystemThreadStartup+0x5a
    fffff880`035fcd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiProcessDereferenceList+23b
    fffff800`039aafeb 450f20c6        mov     r14,cr8
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!MiProcessDereferenceList+23b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xc2_7_nt!MiProcessDereferenceList+23b
    
    BUCKET_ID:  X64_0xc2_7_nt!MiProcessDereferenceList+23b
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051511-20170-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`03857000 PsLoadedModuleList = 0xfffff800`03a94e50
    Debug session time: Sun May 15 21:15:22.402 2011 (UTC - 4:00)
    System Uptime: 0 days 2:25:31.916
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff8800acf1c68, fffff8800acf14d0, fffff880016add07}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+1fe )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff8800acf1c68
    Arg3: fffff8800acf14d0
    Arg4: fffff880016add07
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff8800acf1c68 -- (.exr 0xfffff8800acf1c68)
    ExceptionAddress: fffff880016add07 (Ntfs!NtfsFindPrefixHashEntry+0x00000000000001fe)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff8800acf14d0 -- (.cxr 0xfffff8800acf14d0)
    rax=fffff8a00ba4a000 rbx=0076007200630063 rcx=0000000000000240
    rdx=0000000000000003 rsi=fffff8a000243640 rdi=fffffa8004f05358
    rip=fffff880016add07 rsp=fffff8800acf1ea0 rbp=000000000000e890
     r8=0000000010bfad20  r9=0000000000000000 r10=0000000000000003
    r11=fffff8800acf1ee8 r12=fffff8800acf21b0 r13=fffff8800acf2450
    r14=0000000000000120 r15=0000000000000d20
    iopl=0         nv up ei pl nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    Ntfs!NtfsFindPrefixHashEntry+0x1fe:
    fffff880`016add07 44394310        cmp     dword ptr [rbx+10h],r8d ds:002b:00760072`00630073=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003aff0e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsFindPrefixHashEntry+1fe
    fffff880`016add07 44394310        cmp     dword ptr [rbx+10h],r8d
    
    FAULTING_IP: 
    Ntfs!NtfsFindPrefixHashEntry+1fe
    fffff880`016add07 44394310        cmp     dword ptr [rbx+10h],r8d
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from fffff880016aedc2 to fffff880016add07
    
    STACK_TEXT:  
    fffff880`0acf1ea0 fffff880`016aedc2 : fffffa80`051fc7b0 fffffa80`04f05358 fffff8a0`00243640 00000000`00000801 : Ntfs!NtfsFindPrefixHashEntry+0x1fe
    fffff880`0acf1fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFindStartingNode+0x452
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsFindPrefixHashEntry+1fe
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d79996d
    
    STACK_COMMAND:  .cxr 0xfffff8800acf14d0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-20514-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`0380a000 PsLoadedModuleList = 0xfffff800`03a47e50
    Debug session time: Mon May 16 01:10:10.486 2011 (UTC - 4:00)
    System Uptime: 0 days 3:53:55.000
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1, {770cf72a, 0, ffff, fffff88008189ca0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    APC_INDEX_MISMATCH (1)
    This is a kernel internal error. The most common reason to see this
    bugcheck is when a filesystem or a driver has a mismatched number of
    calls to disable and re-enable APCs. The key data item is the
    Thread->KernelApcDisable field. A negative value indicates that a driver
    has disabled APC calls without re-enabling them.  A positive value indicates
    that the reverse is true. This check is made on exit from a system call.
    Arguments:
    Arg1: 00000000770cf72a, address of system function (system call)
    Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
    Arg3: 000000000000ffff, Thread->KernelApcDisable
    Arg4: fffff88008189ca0, Previous KernelApcDisable
    
    Debugging Details:
    ------------------
    
    
    FAULTING_IP: 
    +3030353763613965
    00000000`770cf72a ??              ???
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x1
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80003879c69 to fffff8000387a700
    
    STACK_TEXT:  
    fffff880`08189a68 fffff800`03879c69 : 00000000`00000001 00000000`770cf72a 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
    fffff880`08189a70 fffff800`03879ba0 : 00000000`00000001 00000000`000f2c8e 00000000`0358ace0 00000000`00000001 : nt!KiBugCheckDispatch+0x69
    fffff880`08189bb0 00000000`770cf72a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
    00000000`02efaf38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770cf72a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiSystemServiceExit+245
    fffff800`03879ba0 4883ec50        sub     rsp,50h
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiSystemServiceExit+245
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34
    
    FAILURE_BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245
    
    BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245
    
    Followup: MachineOwner
    ---------




    DRIVERS

    Code:
    start             end                 module name
    fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02eff000 fffff880`02f89000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`045a6000 fffff880`045bc000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`0147b000 fffff880`01486000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`014e6000 fffff880`014f3000   AsDsm    AsDsm.sys    Fri Feb 13 01:14:26 2009 (49950FC2)
    fffff880`08818000 fffff880`08820000   ASMMAP64 ASMMAP64.sys Thu Jul 02 05:13:26 2009 (4A4C7A36)
    fffff880`0143d000 fffff880`01446000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01446000 fffff880`01470000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`07038000 fffff880`071c1000   athrx    athrx.sys    Tue Mar 02 19:45:21 2010 (4B8DB121)
    fffff880`07ff7000 fffff880`07fff000   ATK64AMD ATK64AMD.sys Tue May 12 21:04:54 2009 (4A0A1CB6)
    fffff960`00910000 fffff960`00971000   ATMFD    ATMFD.DLL    Fri Feb 18 23:13:38 2011 (4D5F4372)
    fffff880`04000000 fffff880`04047000   avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
    fffff880`043f0000 fffff880`043f7080   avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
    fffff880`01809000 fffff880`018150c0   avgrkx64 avgrkx64.sys Wed Feb 10 22:52:44 2010 (4B737F0C)
    fffff880`0435a000 fffff880`043ab000   avgtdia  avgtdia.sys  Wed Apr 27 03:34:54 2011 (4DB7C71E)
    fffff880`00fd8000 fffff880`00fe4000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`042ae000 fffff880`042b5000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02ee9000 fffff880`02efa000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`03dc6000 fffff880`03de4000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
    fffff960`00610000 fffff960`00637000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0427b000 fffff880`042a5000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`08517000 fffff880`085c8000   CHDRT64  CHDRT64.sys  Fri Oct 30 13:50:02 2009 (4AEB274A)
    fffff880`00cc6000 fffff880`00d86000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c68000 fffff880`00cc6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`071f5000 fffff880`071f9500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`0156f000 fffff880`015e2000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`011f3000 fffff880`011fc000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`04596000 fffff880`045a6000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`08897000 fffff880`088a5000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`088e3000 fffff880`088f5000   dc3d     dc3d.sys     Thu Jul 01 06:07:45 2010 (4C2C68F1)
    fffff880`02fdd000 fffff880`02ffb000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02eda000 fffff880`02ee9000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`017de000 fffff880`017f4000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0843d000 fffff880`0845f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`02e00000 fffff880`02e43000   dtsoftbus01 dtsoftbus01.sys Wed Dec 22 05:19:28 2010 (4D11D0B0)
    fffff880`088a5000 fffff880`088b8000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`04047000 fffff880`04251000   dump_iaStor dump_iaStor.sys Wed Mar 03 21:51:31 2010 (4B8F2033)
    fffff880`088b8000 fffff880`088c4000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`07e9b000 fffff880`07f8f000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`07f8f000 fffff880`07fd5000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`04518000 fffff880`0453d000   ETD      ETD.sys      Mon Jan 18 07:37:56 2010 (4B545624)
    fffff880`08f89000 fffff880`08fbf000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`014d2000 fffff880`014e6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01486000 fffff880`014d2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`017d4000 fffff880`017de000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`00dc0000 fffff880`00dfa000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01998000 fffff880`019e2000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`0454c000 fffff880`04559000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`03de6000 fffff800`03e2f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`07456000 fffff880`0747a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`07fd5000 fffff880`07fe6000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
    fffff880`0890c000 fffff880`08925000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`088f5000 fffff880`088fd080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`088fe000 fffff880`0890c000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`03cfe000 fffff880`03dc6000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01800000 fffff880`01809000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`044fa000 fffff880`04518000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01233000 fffff880`0143d000   iaStor   iaStor.sys   Wed Mar 03 21:51:31 2010 (4B8F2033)
    fffff880`0747c000 fffff880`07e9ab60   igdkmd64 igdkmd64.sys Wed Aug 25 15:35:58 2010 (4C75709E)
    fffff880`04559000 fffff880`0457fd00   Impcd    Impcd.sys    Fri Feb 26 18:32:11 2010 (4B8859FB)
    fffff880`08850000 fffff880`08897000   IntcDAud IntcDAud.sys Wed Feb 03 08:38:31 2010 (4B697C57)
    fffff880`04580000 fffff880`04596000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`071ce000 fffff880`071f5000   jmcr     jmcr.sys     Tue Aug 18 04:23:06 2009 (4A8A64EA)
    fffff880`07000000 fffff880`0701f000   JME      JME.sys      Wed Feb 24 22:26:53 2010 (4B85EDFD)
    fffff880`0453d000 fffff880`0454c000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`08925000 fffff880`08933000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`0702e000 fffff880`07036000   kbfiltr  kbfiltr.sys  Mon Jul 20 05:21:42 2009 (4A643726)
    fffff800`00bb4000 fffff800`00bbe000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
    fffff880`04485000 fffff880`044c8000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`017a9000 fffff880`017c3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`0196d000 fffff880`01998000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`0845f000 fffff880`08464200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`014f3000 fffff880`01508000   Lbd      Lbd.sys      Tue May 25 03:45:36 2010 (4BFB8020)
    fffff880`02217000 fffff880`0222c000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`08950000 fffff880`08973000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`01508000 fffff880`01511000   lullaby  lullaby.sys  Wed Jun 17 22:45:32 2009 (4A39AA4C)
    fffff880`00c10000 fffff880`00c54000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`02209000 fffff880`02217000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0701f000 fffff880`0702e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`08933000 fffff880`08940000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e73000 fffff880`00e8d000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03de4000 fffff880`03dfc000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03c00000 fffff880`03c2d000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
    fffff880`03c2d000 fffff880`03c7b000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
    fffff880`03c7b000 fffff880`03c9e000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
    fffff880`01470000 fffff880`0147b000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04313000 fffff880`0431e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`011c7000 fffff880`011d1000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01511000 fffff880`0156f000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02ecf000 fffff880`02eda000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`019ea000 fffff880`019fc000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0181b000 fffff880`0190d000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`045e0000 fffff880`045ec000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`089e7000 fffff880`089fa000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`04400000 fffff880`0442f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`08502000 fffff880`08517000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02fce000 fffff880`02fdd000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`043ab000 fffff880`043f0000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0190d000 fffff880`0196d000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`0431e000 fffff880`0432f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02ec3000 fffff880`02ecf000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`0380a000 fffff800`03de6000   nt       ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
    fffff880`01607000 fffff880`017a9000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
    fffff880`042a5000 fffff880`042ae000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`08994000 fffff880`089e7000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02f92000 fffff880`02fb8000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`011de000 fffff880`011f3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00fa5000 fffff880`00fd8000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`017c3000 fffff880`017d4000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`08c63000 fffff880`08d09000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`08940000 fffff880`08950000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
    fffff880`08400000 fffff880`0843d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c54000 fffff880`00c68000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`045bc000 fffff880`045e0000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0442f000 fffff880`0444a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0444a000 fffff880`0446b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`0446b000 fffff880`04485000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02e72000 fffff880`02ec3000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`042f8000 fffff880`04301000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`04301000 fffff880`0430a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0430a000 fffff880`04313000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`00d86000 fffff880`00dc0000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`08800000 fffff880`08818000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`01198000 fffff880`011c7000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`08d09000 fffff880`08d14000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`02200000 fffff880`02208a80   sncduvc  sncduvc.SYS  Mon Dec 29 04:14:26 2008 (495894F2)
    fffff880`02237000 fffff880`023ee600   snp2uvc  snp2uvc.sys  Wed May 20 04:11:05 2009 (4A13BB19)
    fffff880`019e2000 fffff880`019ea000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`0105b000 fffff880`0118f000   sptd     sptd.sys     Sun Mar 22 08:35:35 2009 (49C63097)
    fffff880`08ef4000 fffff880`08f89000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
    fffff880`08d53000 fffff880`08dba000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
    fffff880`08d14000 fffff880`08d41000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
    fffff880`023ef000 fffff880`023ffd00   STREAM   STREAM.SYS   Mon Jul 13 20:06:18 2009 (4A5BCBFA)
    fffff880`071fa000 fffff880`071fb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01a02000 fffff880`01bff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`08d41000 fffff880`08d53000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0434d000 fffff880`0435a000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0432f000 fffff880`0434d000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02e5e000 fffff880`02e72000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004e0000 fffff960`004ea000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`044d4000 fffff880`044fa000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`0222c000 fffff880`02233000   TurboB   TurboB.sys   Thu Aug 06 17:17:31 2009 (4A7B486B)
    fffff880`045ec000 fffff880`045fe000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`088c4000 fffff880`088e1000   usbccgp  usbccgp.sys  Thu Mar 24 23:23:03 2011 (4D8C0A97)
    fffff880`088e1000 fffff880`088e2f00   USBD     USBD.SYS     Thu Mar 24 23:22:51 2011 (4D8C0A8B)
    fffff880`07fe6000 fffff880`07ff7000   usbehci  usbehci.sys  Thu Mar 24 23:22:57 2011 (4D8C0A91)
    fffff880`084a8000 fffff880`08502000   usbhub   usbhub.sys   Thu Mar 24 23:23:22 2011 (4D8C0AAA)
    fffff880`07400000 fffff880`07456000   USBPORT  USBPORT.SYS  Thu Mar 24 23:23:03 2011 (4D8C0A97)
    fffff880`011d1000 fffff880`011de000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`042b5000 fffff880`042c3000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`042c3000 fffff880`042e8000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fe4000 fffff880`00ff9000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`00e8d000 fffff880`00ed9000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`071c1000 fffff880`071ce000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02fb8000 fffff880`02fce000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`02e43000 fffff880`02e5e000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`042e8000 fffff880`042f8000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ef2000 fffff880`00f96000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f96000 fffff880`00fa5000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02f89000 fffff880`02f92000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00090000 fffff960`003a2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
    fffff880`0118f000 fffff880`01198000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`08973000 fffff880`08994000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`08e71000 fffff880`08e79000   lvupdtio.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    fffff880`08e00000 fffff880`08e71000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`015e2000 fffff880`015f0000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0405e000 fffff880`04268000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0020A000
    fffff880`04268000 fffff880`0427b000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


  3. Posts : 6
    windows 7 home premium 64 bit OS
    Thread Starter
       #3

    thank you so much i will do those things and get back to you.
      My Computer


  4. Posts : 6
    windows 7 home premium 64 bit OS
    Thread Starter
       #4

    might you tell me where i can find these updates? i tried going to devise manager and manually update each but it reports that the drivers are already up to date, which is obviously false. Also the crashes continued and happened once when i was shutting down and once when i plugged in my iphone. I've done 2,4, and 5 of the above. Thanks again.

    Heres a recent dump
      My Computer


  5. Posts : 670
    Windows 7 x64
       #5

    You are getting the same stop codes again. Follow my 1st post.

    1. Uninstall Turbo Boost.
    2. Go to your PC support to update drivers, including Asus Data Security Manager.
    AsDsm.sys Fri Feb 13 01:14:26 2009

    ~~~~~~~~~

    CRASH DUMPS

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-21106-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`0381b000 PsLoadedModuleList = 0xfffff800`03a58e50
    Debug session time: Mon May 16 02:24:03.485 2011 (UTC - 4:00)
    System Uptime: 0 days 1:13:23.625
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff800039bf000, fffff8800b537030, 0}
    
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+174 )
    
    Followup: Pool_corruption
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff800039bf000, Address of the instruction which caused the bugcheck
    Arg3: fffff8800b537030, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ExDeferredFreePool+174
    fffff800`039bf000 4c395008        cmp     qword ptr [rax+8],r10
    
    CONTEXT:  fffff8800b537030 -- (.cxr 0xfffff8800b537030)
    rax=0065006400690076 rbx=0000000000000001 rcx=fffffa8003adc680
    rdx=fffff8a00031cbc0 rsi=0000000000000000 rdi=fffff8a0011bf1c0
    rip=fffff800039bf000 rsp=fffff8800b537a00 rbp=0000000000000000
     r8=fffff8a00cee75a0  r9=fffff8a00031c990 r10=fffff8a00031c9a0
    r11=0000000000000001 r12=fffffa8003adc140 r13=0000000000000000
    r14=0000000000000006 r15=0000000000000001
    iopl=0         nv up ei pl nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    nt!ExDeferredFreePool+0x174:
    fffff800`039bf000 4c395008        cmp     qword ptr [rax+8],r10 ds:002b:00650064`0069007e=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff800039c04c1 to fffff800039bf000
    
    STACK_TEXT:  
    fffff880`0b537a00 fffff800`039c04c1 : fffff8a0`0c93fa40 fffff8a0`0c93fa40 fffffa80`0bcfeb30 00000000`00000000 : nt!ExDeferredFreePool+0x174
    fffff880`0b537a90 fffff800`03b342bc : 00000000`00000400 fffff8a0`0c93fa50 fffff880`50777445 00000000`00000000 : nt!ExFreePoolWithTag+0x411
    fffff880`0b537b40 fffff800`0388a953 : fffffa80`0c732b60 00000000`0250fdc8 00000000`00000000 0000007f`ffffffff : nt!NtTraceControl+0x208
    fffff880`0b537bb0 00000000`76ff0efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0250fda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76ff0efa
    
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+174
    fffff800`039bf000 4c395008        cmp     qword ptr [rax+8],r10
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+174
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    STACK_COMMAND:  .cxr 0xfffff8800b537030 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+174
    
    BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+174
    
    Followup: Pool_corruption
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-18548-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`03813000 PsLoadedModuleList = 0xfffff800`03a50e50
    Debug session time: Mon May 16 20:08:59.800 2011 (UTC - 4:00)
    System Uptime: 0 days 4:23:19.314
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {20, fffff8a000abe870, fffff8a000abec80, 5410109}
    
    Unable to load image \SystemRoot\System32\Drivers\AsDsm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for AsDsm.sys
    *** ERROR: Module load completed but symbols could not be loaded for AsDsm.sys
    Probably caused by : AsDsm.sys ( AsDsm+7f8a )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000020, a pool block header size is corrupt.
    Arg2: fffff8a000abe870, The pool entry we were looking for within the page.
    Arg3: fffff8a000abec80, The next pool entry.
    Arg4: 0000000005410109, (reserved)
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_20
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80003abb0e0
     fffff8a000abe870 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff800039b66d3 to fffff80003883700
    
    STACK_TEXT:  
    fffff880`08395978 fffff800`039b66d3 : 00000000`00000019 00000000`00000020 fffff8a0`00abe870 fffff8a0`00abec80 : nt!KeBugCheckEx
    fffff880`08395980 fffff880`01508f8a : fffff8a0`00abe880 00000000`00000000 fffffa80`6e705341 fffffa80`046c79e0 : nt!ExDeferredFreePool+0x12c4
    fffff880`08395a30 fffff8a0`00abe880 : 00000000`00000000 fffffa80`6e705341 fffffa80`046c79e0 fffff880`08395ad8 : AsDsm+0x7f8a
    fffff880`08395a38 00000000`00000000 : fffffa80`6e705341 fffffa80`046c79e0 fffff880`08395ad8 00000000`00000000 : 0xfffff8a0`00abe880
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    AsDsm+7f8a
    fffff880`01508f8a ??              ???
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  AsDsm+7f8a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: AsDsm
    
    IMAGE_NAME:  AsDsm.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  49950fc2
    
    FAILURE_BUCKET_ID:  X64_0x19_20_AsDsm+7f8a
    
    BUCKET_ID:  X64_0x19_20_AsDsm+7f8a
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-20514-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`0380a000 PsLoadedModuleList = 0xfffff800`03a47e50
    Debug session time: Mon May 16 01:10:10.486 2011 (UTC - 4:00)
    System Uptime: 0 days 3:53:55.000
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1, {770cf72a, 0, ffff, fffff88008189ca0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    APC_INDEX_MISMATCH (1)
    This is a kernel internal error. The most common reason to see this
    bugcheck is when a filesystem or a driver has a mismatched number of
    calls to disable and re-enable APCs. The key data item is the
    Thread->KernelApcDisable field. A negative value indicates that a driver
    has disabled APC calls without re-enabling them.  A positive value indicates
    that the reverse is true. This check is made on exit from a system call.
    Arguments:
    Arg1: 00000000770cf72a, address of system function (system call)
    Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
    Arg3: 000000000000ffff, Thread->KernelApcDisable
    Arg4: fffff88008189ca0, Previous KernelApcDisable
    
    Debugging Details:
    ------------------
    
    
    FAULTING_IP: 
    +3030353763613965
    00000000`770cf72a ??              ???
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x1
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80003879c69 to fffff8000387a700
    
    STACK_TEXT:  
    fffff880`08189a68 fffff800`03879c69 : 00000000`00000001 00000000`770cf72a 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
    fffff880`08189a70 fffff800`03879ba0 : 00000000`00000001 00000000`000f2c8e 00000000`0358ace0 00000000`00000001 : nt!KiBugCheckDispatch+0x69
    fffff880`08189bb0 00000000`770cf72a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
    00000000`02efaf38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770cf72a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiSystemServiceExit+245
    fffff800`03879ba0 4883ec50        sub     rsp,50h
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiSystemServiceExit+245
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34
    
    FAILURE_BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245
    
    BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-24960-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`0385a000 PsLoadedModuleList = 0xfffff800`03a97e50
    Debug session time: Mon May 16 15:45:12.562 2011 (UTC - 4:00)
    System Uptime: 0 days 1:59:49.076
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff88004e6a718, fffff88004e69f80, fffff880016ded07}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+1fe )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff88004e6a718
    Arg3: fffff88004e69f80
    Arg4: fffff880016ded07
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff88004e6a718 -- (.exr 0xfffff88004e6a718)
    ExceptionAddress: fffff880016ded07 (Ntfs!NtfsFindPrefixHashEntry+0x00000000000001fe)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff88004e69f80 -- (.cxr 0xfffff88004e69f80)
    rax=fffff8a00d624000 rbx=0037003800310033 rcx=000000000000007a
    rdx=0000000000000002 rsi=fffff8a00037a4f0 rdi=fffffa8004e24358
    rip=fffff880016ded07 rsp=fffff88004e6a950 rbp=00000000000062c0
     r8=00000000094f9c3d  r9=0000000000000000 r10=0000000000000007
    r11=fffff88004e6a998 r12=fffff88004e6ac60 r13=fffff8800b5e8a60
    r14=000000000000003d r15=0000000000001c3d
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    Ntfs!NtfsFindPrefixHashEntry+0x1fe:
    fffff880`016ded07 44394310        cmp     dword ptr [rbx+10h],r8d ds:002b:00370038`00310043=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  chrome.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003b020e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsFindPrefixHashEntry+1fe
    fffff880`016ded07 44394310        cmp     dword ptr [rbx+10h],r8d
    
    FAULTING_IP: 
    Ntfs!NtfsFindPrefixHashEntry+1fe
    fffff880`016ded07 44394310        cmp     dword ptr [rbx+10h],r8d
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from fffff880016dfdc2 to fffff880016ded07
    
    STACK_TEXT:  
    fffff880`04e6a950 fffff880`016dfdc2 : fffffa80`047ef2f0 fffffa80`04e24358 fffff8a0`0037a4f0 00000000`00000701 : Ntfs!NtfsFindPrefixHashEntry+0x1fe
    fffff880`04e6aa80 fffff880`016da36d : fffffa80`047ef2f0 fffffa80`04ebb010 fffff880`04e6ac60 fffff880`04e6aca8 : Ntfs!NtfsFindStartingNode+0x452
    fffff880`04e6ab50 fffff880`0164698d : fffffa80`047ef2f0 fffffa80`04ebb010 fffff880`0b5e8a60 fffffa80`04404b00 : Ntfs!NtfsCommonCreate+0x3dd
    fffff880`04e6ad30 fffff800`038c2587 : fffff880`0b5e89d0 00000000`00454030 00000000`76f95270 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
    fffff880`04e6ad60 fffff800`038c2541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
    fffff880`0b5e88a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsFindPrefixHashEntry+1fe
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d79996d
    
    STACK_COMMAND:  .cxr 0xfffff88004e69f80 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
    
    Followup: MachineOwner
    ---------




    DRIVERS

    Code:
    start             end                 module name
    fffff880`0102f000 fffff880`01086000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`01c6a000 fffff880`01cf4000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03000000 fffff880`03016000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`0146a000 fffff880`01475000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`014d5000 fffff880`014e2000   AsDsm    AsDsm.sys    Fri Feb 13 01:14:26 2009 (49950FC2)
    fffff880`089eb000 fffff880`089f3000   ASMMAP64 ASMMAP64.sys Thu Jul 02 05:13:26 2009 (4A4C7A36)
    fffff880`0142c000 fffff880`01435000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01435000 fffff880`0145f000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`07054000 fffff880`071dd000   athrx    athrx.sys    Tue Mar 02 19:45:21 2010 (4B8DB121)
    fffff880`031dc000 fffff880`031e4000   ATK64AMD ATK64AMD.sys Tue May 12 21:04:54 2009 (4A0A1CB6)
    fffff960`00990000 fffff960`009f1000   ATMFD    ATMFD.DLL    Fri Feb 18 23:13:38 2011 (4D5F4372)
    fffff880`030d3000 fffff880`0311a000   avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
    fffff880`04499000 fffff880`044a0080   avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
    fffff880`01c4f000 fffff880`01c5b0c0   avgrkx64 avgrkx64.sys Wed Feb 10 22:52:44 2010 (4B737F0C)
    fffff880`0479f000 fffff880`047f0000   avgtdia  avgtdia.sys  Wed Apr 27 03:34:54 2011 (4DB7C71E)
    fffff880`00fb2000 fffff880`00fbe000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`046f3000 fffff880`046fa000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`01def000 fffff880`01e00000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`04163000 fffff880`04181000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
    fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
    fffff880`046c0000 fffff880`046ea000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`07318000 fffff880`073c9000   CHDRT64  CHDRT64.sys  Fri Oct 30 13:50:02 2009 (4AEB274A)
    fffff880`00e0c000 fffff880`00ecc000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01c1f000 fffff880`01c4f000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d06000 fffff880`00d64000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0704e000 fffff880`07052500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`01549000 fffff880`015bc000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`011f2000 fffff880`011fb000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`031e4000 fffff880`031f4000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0887b000 fffff880`08889000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02400000 fffff880`02412000   dc3d     dc3d.sys     Thu Jul 01 06:07:45 2010 (4C2C68F1)
    fffff880`01dd1000 fffff880`01def000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`01dc2000 fffff880`01dd1000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0161b000 fffff880`01631000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`073c9000 fffff880`073eb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`08889000 fffff880`0889c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`044a1000 fffff880`046ab000   dump_iaStor dump_iaStor.sys Wed Mar 03 21:51:31 2010 (4B8F2033)
    fffff880`0886f000 fffff880`0887b000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`0807b000 fffff880`0816f000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`0816f000 fffff880`081b5000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`0315e000 fffff880`03183000   ETD      ETD.sys      Mon Jan 18 07:37:56 2010 (4B545624)
    fffff880`08f57000 fffff880`08f8d000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`014c1000 fffff880`014d5000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01475000 fffff880`014c1000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01611000 fffff880`0161b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`00c4c000 fffff880`00c86000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0188b000 fffff880`018d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`03192000 fffff880`0319f000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`03811000 fffff800`0385a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`081d7000 fffff880`081fb000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`081b5000 fffff880`081c6000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
    fffff880`088c9000 fffff880`088e2000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`02412000 fffff880`0241a080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`0241b000 fffff880`02429000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0409b000 fffff880`04163000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`019e8000 fffff880`019f1000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03140000 fffff880`0315e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01222000 fffff880`0142c000   iaStor   iaStor.sys   Wed Mar 03 21:51:31 2010 (4B8F2033)
    fffff880`0765c000 fffff880`0807ab60   igdkmd64 igdkmd64.sys Wed Aug 25 15:35:58 2010 (4C75709E)
    fffff880`0319f000 fffff880`031c5d00   Impcd    Impcd.sys    Fri Feb 26 18:32:11 2010 (4B8859FB)
    fffff880`08828000 fffff880`0886f000   IntcDAud IntcDAud.sys Wed Feb 03 08:38:31 2010 (4B697C57)
    fffff880`031c6000 fffff880`031dc000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`07000000 fffff880`07027000   jmcr     jmcr.sys     Tue Aug 18 04:23:06 2009 (4A8A64EA)
    fffff880`07027000 fffff880`07046000   JME      JME.sys      Wed Feb 24 22:26:53 2010 (4B85EDFD)
    fffff880`03183000 fffff880`03192000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`088e2000 fffff880`088f0000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`07046000 fffff880`0704e000   kbfiltr  kbfiltr.sys  Mon Jul 20 05:21:42 2009 (4A643726)
    fffff800`00bc9000 fffff800`00bd3000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
    fffff880`07254000 fffff880`07297000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`017d7000 fffff880`017f1000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01860000 fffff880`0188b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`073eb000 fffff880`073f0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`08951000 fffff880`08966000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0890d000 fffff880`08930000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`014e2000 fffff880`014eb000   lullaby  lullaby.sys  Wed Jun 17 22:45:32 2009 (4A39AA4C)
    fffff880`00cae000 fffff880`00cf2000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`0889c000 fffff880`088aa000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`071ea000 fffff880`071f9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`088f0000 fffff880`088fd000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00dc0000 fffff880`00dda000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04181000 fffff880`04199000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`04199000 fffff880`041c6000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
    fffff880`04000000 fffff880`0404e000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
    fffff880`0404e000 fffff880`04071000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
    fffff880`0145f000 fffff880`0146a000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04758000 fffff880`04763000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01086000 fffff880`01090000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`014eb000 fffff880`01549000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`01db7000 fffff880`01dc2000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`018dd000 fffff880`018ef000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`018f6000 fffff880`019e8000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0303a000 fffff880`03046000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`089b9000 fffff880`089cc000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`03046000 fffff880`03075000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`07303000 fffff880`07318000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`0448a000 fffff880`04499000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`04400000 fffff880`04445000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01800000 fffff880`01860000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`04763000 fffff880`04774000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`047f0000 fffff880`047fc000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`0385a000 fffff800`03e36000   nt       ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
    fffff880`01635000 fffff880`017d7000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
    fffff880`046ea000 fffff880`046f3000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`08966000 fffff880`089b9000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`0444e000 fffff880`04474000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`0109d000 fffff880`010b2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f7f000 fffff880`00fb2000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fd3000 fffff880`00fda000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fda000 fffff880`00fea000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01600000 fffff880`01611000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`08c83000 fffff880`08d29000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`088fd000 fffff880`0890d000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
    fffff880`07200000 fffff880`0723d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00cf2000 fffff880`00d06000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03016000 fffff880`0303a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03075000 fffff880`03090000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`03090000 fffff880`030b1000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`030b1000 fffff880`030cb000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`01d66000 fffff880`01db7000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`0473d000 fffff880`04746000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`04746000 fffff880`0474f000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0474f000 fffff880`04758000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`015bc000 fffff880`015f6000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`089cc000 fffff880`089e4000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`08d29000 fffff880`08d34000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`025f7000 fffff880`025ffa80   sncduvc  sncduvc.SYS  Mon Dec 29 04:14:26 2008 (495894F2)
    fffff880`0242e000 fffff880`025e5600   snp2uvc  snp2uvc.sys  Wed May 20 04:11:05 2009 (4A13BB19)
    fffff880`018d5000 fffff880`018dd000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`010b5000 fffff880`011e9000   sptd     sptd.sys     Sun Mar 22 08:35:35 2009 (49C63097)
    fffff880`08ec2000 fffff880`08f57000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
    fffff880`08d73000 fffff880`08dda000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
    fffff880`08d34000 fffff880`08d61000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
    fffff880`025e6000 fffff880`025f6d00   STREAM   STREAM.SYS   Mon Jul 13 20:06:18 2009 (4A5BCBFA)
    fffff880`071f9000 fffff880`071fa480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01a00000 fffff880`01bfd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`08d61000 fffff880`08d73000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`04792000 fffff880`0479f000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`04774000 fffff880`04792000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`01d52000 fffff880`01d66000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00410000 fffff960`0041a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`0311a000 fffff880`03140000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`089e4000 fffff880`089eb000   TurboB   TurboB.sys   Thu Aug 06 17:17:31 2009 (4A7B486B)
    fffff880`07297000 fffff880`072a9000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`088aa000 fffff880`088c7000   usbccgp  usbccgp.sys  Thu Mar 24 23:23:03 2011 (4D8C0A97)
    fffff880`088c7000 fffff880`088c8f00   USBD     USBD.SYS     Thu Mar 24 23:22:51 2011 (4D8C0A8B)
    fffff880`081c6000 fffff880`081d7000   usbehci  usbehci.sys  Thu Mar 24 23:22:57 2011 (4D8C0A91)
    fffff880`072a9000 fffff880`07303000   usbhub   usbhub.sys   Thu Mar 24 23:23:22 2011 (4D8C0AAA)
    fffff880`07600000 fffff880`07656000   USBPORT  USBPORT.SYS  Thu Mar 24 23:23:03 2011 (4D8C0A97)
    fffff880`01090000 fffff880`0109d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`046fa000 fffff880`04708000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`04708000 fffff880`0472d000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fbe000 fffff880`00fd3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00d64000 fffff880`00dc0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`00c00000 fffff880`00c4c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`071dd000 fffff880`071ea000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`04474000 fffff880`0448a000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`01d37000 fffff880`01d52000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`0472d000 fffff880`0473d000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ecc000 fffff880`00f70000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f70000 fffff880`00f7f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04445000 fffff880`0444e000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000c0000 fffff960`003d2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
    fffff880`011e9000 fffff880`011f2000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`08930000 fffff880`08951000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`08e08000 fffff880`08e10000   lvupdtio.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    fffff880`08e00000 fffff880`08e08000   lvupdtio.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    fffff880`08f8d000 fffff880`08ffe000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`01cf4000 fffff880`01d37000   dtsoftbus01.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00043000
    fffff880`01c5c000 fffff880`01c6a000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`044a3000 fffff880`046ad000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0020A000
    fffff880`046ad000 fffff880`046c0000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


  6. Posts : 6
    windows 7 home premium 64 bit OS
    Thread Starter
       #6

    Thank you, i haven't had a crash since so i assume it is okay now. Thank you so much.
      My Computer


  7. Posts : 6
    windows 7 home premium 64 bit OS
    Thread Starter
       #7

    Hey there, the crash seem to re appear recently and i updated most of the drivers via driver genius. here are the attached info thank you very much. it happens very much like it used to, which i start watching something in the browser, after a while it crashes.
      My Computer


  8. Posts : 6
    windows 7 home premium 64 bit OS
    Thread Starter
       #8

    help please?
      My Computer


  9. Posts : 507
    Windows 7 Ultimate x64 SP1
       #9

    Uninstall all Asus Utility Programs for a while and see if the BSOD problem would stop.

    Code:
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
    Machine Name:
    Kernel base = 0xfffff800`03814000 PsLoadedModuleList = 0xfffff800`03a59650
    Debug session time: Thu Jul 14 10:58:01.286 2011 (GMT-8)
    System Uptime: 0 days 1:39:17.332
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff880091f5168, fffff880091f49c0, fffff8800162e2a8}
    
    Unable to load image \SystemRoot\System32\Drivers\AsDsm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for AsDsm.sys
    *** ERROR: Module load completed but symbols could not be loaded for AsDsm.sys
    Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireExclusiveFcb+58 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff880091f5168
    Arg3: fffff880091f49c0
    Arg4: fffff8800162e2a8
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff880091f5168 -- (.exr 0xfffff880091f5168)
    ExceptionAddress: fffff8800162e2a8 (Ntfs!NtfsAcquireExclusiveFcb+0x0000000000000058)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff880091f49c0 -- (.cxr 0xfffff880091f49c0)
    rax=fffff880091f5301 rbx=0045003300460032 rcx=fffffa8004531660
    rdx=0045003300460001 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800162e2a8 rsp=fffff880091f53a0 rbp=fffffa8004531660
     r8=fffff8a0003d6bc0  r9=0000000000000000 r10=0000000000000000
    r11=fffff880091f53f0 r12=fffff8a0003d6bc0 r13=00000000c00000d8
    r14=0000000000000702 r15=fffff8a00ba103a8
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210202
    Ntfs!NtfsAcquireExclusiveFcb+0x58:
    fffff880`0162e2a8 66443b33        cmp     r14w,word ptr [rbx] ds:002b:00450033`00460032=????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  rundll32.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ac3100
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsAcquireExclusiveFcb+58
    fffff880`0162e2a8 66443b33        cmp     r14w,word ptr [rbx]
    
    FAULTING_IP: 
    Ntfs!NtfsAcquireExclusiveFcb+58
    fffff880`0162e2a8 66443b33        cmp     r14w,word ptr [rbx]
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from fffff88001636763 to fffff8800162e2a8
    
    STACK_TEXT:  
    fffff880`091f53a0 fffff880`01636763 : fffff8a0`003d6bc0 fffff880`091f59c0 00000000`00000000 fffffa80`04531660 : Ntfs!NtfsAcquireExclusiveFcb+0x58
    fffff880`091f53f0 fffff880`01696a08 : fffff8a0`0ba10010 fffff8a0`0ba10010 00000000`00000000 00000000`000007ff : Ntfs!NtfsAcquireExclusiveScb+0x1f
    fffff880`091f5420 fffff880`016baaf3 : fffff8a0`0ba10330 fffff880`091f59c0 00000000`0000000a 00000000`00000701 : Ntfs!NtfsSetRenameInfo+0xc74
    fffff880`091f5810 fffff880`0162c574 : fffffa80`04531660 fffffa80`048cc010 fffff880`091f5901 fffff880`091f5900 : Ntfs!NtfsCommonSetInformation+0x7e3
    fffff880`091f58f0 fffff880`00e1cbcf : fffffa80`048cc3f8 fffffa80`048cc010 fffffa80`04531660 fffff880`091f5918 : Ntfs!NtfsFsdSetInformation+0x11c
    fffff880`091f5970 fffff880`00e1b6df : fffffa80`04e14040 fffffa80`048cc010 fffffa80`04e14000 fffffa80`048cc010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`091f5a00 fffff880`0124135a : 00000000`000000ec 00000000`0000000a 00000000`00000000 fffffa80`048cc010 : fltmgr!FltpDispatch+0xcf
    fffff880`091f5a60 00000000`000000ec : 00000000`0000000a 00000000`00000000 fffffa80`048cc010 fffff880`091f5ca0 : AsDsm+0x135a
    fffff880`091f5a68 00000000`0000000a : 00000000`00000000 fffffa80`048cc010 fffff880`091f5ca0 fffff800`03b72743 : 0xec
    fffff880`091f5a70 00000000`00000000 : fffffa80`048cc010 fffff880`091f5ca0 fffff800`03b72743 00000000`000000ec : 0xa
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsAcquireExclusiveFcb+58
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d79997b
    
    STACK_COMMAND:  .cxr 0xfffff880091f49c0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+58
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+58
    
    Followup: MachineOwner
    ---------
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 04:26.
Find Us