Problem Devices:
Code:
Universal Serial Bus (USB) Controller PCI\VEN_1033&DEV_0194&SUBSYS_50071458&REV_03\4&304316D0&0&00E2 The drivers for this device are not installed.
Ethernet Controller PCI\VEN_10EC&DEV_8168&SUBSYS_E0001458&REV_06\4&43FAD29&0&00E1 The drivers for this device are not installed.
The above drivers should be included with your motherboard support. Check your motherboard support site for the most up to date versions. If you need help, and even if you do not, we recommend filling in your system specs on your profile (not in a post in this thread). System Info - See Your System Specs can help with filling in the system specs.
Security Software: ??? I recommend either of these two setups:
Download and install the security setup of your choice, update the software, and then run a full scan of your system for viruses and malware. If you only install MSE, I would also suggest installing and updating Malwarebytes : Free anti-malware, anti-virus and spyware removal download, but do not start the free trial/full version of Malwarebytes. Run a full scan with Malwarebytes after updating it. Post back the results.
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Kingston\BSODDmpFiles\monkey314\Windows_NT6_BSOD_jcgriff2\042812-42993-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16841.amd64fre.win7_gdr.110622-1503
Machine Name:
Kernel base = 0xfffff800`02a50000 PsLoadedModuleList = 0xfffff800`02c8de70
Debug session time: Sat Apr 28 11:50:37.881 2012 (UTC - 6:00)
System Uptime: 0 days 0:28:53.239
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff30015b7f7f0, 1, fffff80002ac5a07, 7}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!SeAccessCheckWithHint+d7 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff30015b7f7f0, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ac5a07, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf80e0
fffff30015b7f7f0
FAULTING_IP:
nt!SeAccessCheckWithHint+d7
fffff800`02ac5a07 c684249000000001 mov byte ptr [rsp+90h],1
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: TeraCopy.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880080975a0 -- (.trap 0xfffff880080975a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a007c2302c rbx=0000000000000000 rcx=0000000000000000
rdx=fffff88008097a0c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ac5a07 rsp=fffff88008097730 rbp=fffffa800dae8030
r8=fffff88008097a28 r9=fffffa800dae8001 r10=fffff88008098770
r11=fffff88008097808 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!SeAccessCheckWithHint+0xd7:
fffff800`02ac5a07 c684249000000001 mov byte ptr [rsp+90h],1 ss:0018:fffff880`080977c0=10
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b3f729 to fffff80002ac05c0
STACK_TEXT:
fffff880`08097438 fffff800`02b3f729 : 00000000`00000050 fffff300`15b7f7f0 00000000`00000001 fffff880`080975a0 : nt!KeBugCheckEx
fffff880`08097440 fffff800`02abe6ae : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40ccb
fffff880`080975a0 fffff800`02ac5a07 : 00000000`00000000 00000028`00000030 00000000`00000000 fffffa80`0c070c40 : nt!KiPageFault+0x16e
fffff880`08097730 fffff880`012c2e33 : fffff8a0`07c2302c fffff8a0`07c2302c fffff8a0`07c23010 fffffa80`07822180 : nt!SeAccessCheckWithHint+0xd7
fffff880`08097810 fffff880`012c49e7 : fffffa80`0dae8010 00000000`00000000 fffff8a0`115d1010 00000000`00000080 : Ntfs!TxfAccessCheck+0x123
fffff880`08097980 fffff880`012b3573 : fffffa80`0cdb7010 fffff880`080983b0 fffff8a0`115d1010 fffff8a0`21025510 : Ntfs!NtfsAccessCheck+0x1b7
fffff880`08097b60 fffff880`012b3d73 : fffff880`080983b0 fffff8a0`115d1010 00000000`00000002 fffff880`01057001 : Ntfs!NtfsCheckExistingFile+0xc3
fffff880`08097bf0 fffff880`012b06ef : fffff880`080983b0 00000000`00000000 fffff880`02fd5180 fffffa80`00000094 : Ntfs!NtfsOpenExistingAttr+0x73
fffff880`08097cb0 fffff880`012b0eff : fffffa80`0cdb7010 fffffa80`079e1c10 fffff8a0`115d1450 fffff880`00000094 : Ntfs!NtfsOpenAttributeInExistingFile+0x50f
fffff880`08097e40 fffff880`012c1e76 : fffffa80`0cdb7010 fffffa80`079e1c10 fffff8a0`115d1450 00000000`02734501 : Ntfs!NtfsOpenExistingPrefixFcb+0x1ef
fffff880`08097f30 fffff880`012bc28d : fffffa80`0cdb7010 fffffa80`079e1c10 fffff880`08098110 fffff880`08098158 : Ntfs!NtfsFindStartingNode+0x5e6
fffff880`08098000 fffff880`01225c0d : fffffa80`0cdb7010 fffffa80`079e1c10 fffff880`080983b0 fffff8a0`21bcfc00 : Ntfs!NtfsCommonCreate+0x3dd
fffff880`080981e0 fffff800`02acfcda : fffff880`08098320 fffff8a0`115d1140 fffffa80`07822180 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`08098210 fffff880`01225b2f : fffff880`01225bf0 fffff880`08098320 fffff880`08098300 fffff880`012c732d : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`080982f0 fffff880`012c29c0 : 00000000`00000000 00000000`00000000 fffff880`08098540 fffffa80`079e1c10 : Ntfs!NtfsCommonCreateOnNewStack+0x4f
fffff880`08098350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFsdCreate+0x1b0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!SeAccessCheckWithHint+d7
fffff800`02ac5a07 c684249000000001 mov byte ptr [rsp+90h],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!SeAccessCheckWithHint+d7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44
FAILURE_BUCKET_ID: X64_0x50_nt!SeAccessCheckWithHint+d7
BUCKET_ID: X64_0x50_nt!SeAccessCheckWithHint+d7
Followup: MachineOwner
---------
The above crash was caused by TeraCopy. Recommend uninstalling the software through Start Menu -> Control Panel -> Uninstall a program.