Windows 7 5 to 6 BSOD appear daily, need help!!!!

casper10451

New Member
Joined
Oct 3, 2010
hey was sup room. ok here is the deal. i ordered a desktop peace by peace about 3 weeks ago. for a graphic buisness iam doing. i build my pc and when i installed windows 7 from time to time i get blue screen errors. i was wondering if i can get some help on this, because when iam editin videos i get the blue screen and i dont get 2 save my projects, also the pc can just be there without being used and the blue screen comes out. i heard someone tell me to use a registry cleaner. if that is the case do anyone know a good registry cleaner for BSOD. if not can any one please help me on this i dont kno what to do or how to fix it.

OH AND IF YA WANT TO KNOW THE MODEL OF MY PC AND WHAT IT HAS TO HELP OUT ALILBIT MORE LET ME KNOW AND I WILL POST IT UP.

(yesterday i took 3 pics of 3 diferent BSOD i will post them up and if you have any idea please help me out. and i have also re-installed windows 2 times but still the blue screen appear.)

IMG_0760.JPGIMG_0759.JPGIMG_0756.JPG
 
Hello and Welcome, Casper. : )

Boot to safe mode, navigate to C:\Windows\Minidump, and attach the .dmp files.
 
C\Windows\Minidump, alright, there are files with .dmp extensions in there, so you please zip those files found in that folder and when posting here click reply -> Go Advanced -> Manage attachments -> Upload your .dmp files.
 
C\Windows\Minidump, alright, there are files with .dmp extensions in there, so you please zip those files found in that folder and when posting here click reply -> Go Advanced -> Manage attachments -> Upload your .dmp files.

when i try to zip them with winrar it a window pops up telling me 'access denied'
 
Log in as admin, change permissions if necessary - right click -> properties -> security tab.
 
i honestly dont know how to login as admin.
because i only made one profile . if there is a way to login as admin pls tell me
 
Try creating a new folder on your desktop, then open the C:\windows\minidump folder, select all the .dmp files (actually depending on how many, the most recent few as indicated by date should be sufficient) right click and choose copy (or Ctrl+C) and then paste them into the new folder you created on the desktop and see if you can zip that one up and attach it.
Hope this helps.
 
yea it worked that way so i attach it here as a rar file or zip file? n how i attach again... thanks
 
This way,

C\Windows\Minidump, alright, there are files with .dmp extensions in there, so you please zip those files found in that folder and when posting here click reply -> Go Advanced -> Manage attachments -> Upload your .dmp files.

attach what you've got, we'll try to help. : )
 
X64_0x50_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
X64_0xD1_USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
X64_IP_MISALIGNED by hardware
X64_0x24_Ntfs!NtfsPagingFileIo+155
X64_0x50_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f



Update:


jraid.sys Thu Aug 13 11:10:27 2009
Jmicron RAID
Link Removed due to 404 Error


Rt64win7.sys Thu Jul 30 14:58:43 2009
Realtek 8136/8168/8169
Realtek




Memtest Memtest86+ - Advanced Memory Diagnostic Tool

HDD Scan HDDScan

Video card FurMark: VGA Stress Test, Graphics Card and GPU Stability Test, OpenGL Benchmark and GPU Temperature | oZone3D.Net









Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\092710-20732-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03011000 PsLoadedModuleList = 0xfffff800`0324ee50
System Uptime: 0 days 0:49:01.341
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff6fc5805d8d8, 0, fffff800030930b8, 2}


Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff6fc5805d8d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800030930b8, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b90e0
 fffff6fc5805d8d8 

FAULTING_IP: 
nt!MiLockProtoPoolPage+38
fffff800`030930b8 4a8b3c36        mov     rdi,qword ptr [rsi+r14]

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  lotroclient.ex

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800c066080 -- (.trap 0xfffff8800c066080)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000007ffffffff8 rbx=0000000000000000 rcx=fffff8b00bb1b048
rdx=fffff8800c066318 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030930b8 rsp=fffff8800c066210 rbp=fffff8a00c519010
 r8=0000000000000000  r9=fffff8a0000c9fc0 r10=fffff8000320f600
r11=fffff8a0000c9fc0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiLockProtoPoolPage+0x38:
fffff800`030930b8 4a8b3c36        mov     rdi,qword ptr [rsi+r14] ds:0001:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800031008f2 to fffff80003081740

STACK_TEXT:  
fffff880`0c065f18 fffff800`031008f2 : 00000000`00000050 fffff6fc`5805d8d8 00000000`00000000 fffff880`0c066080 : nt!KeBugCheckEx
fffff880`0c065f20 fffff800`0307f82e : 00000000`00000000 fffffa80`0d9e65a0 00000000`00000000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`0c066080 fffff800`030930b8 : 00000000`00000001 fffff800`00000000 fffff880`0c066430 00000000`00000001 : nt!KiPageFault+0x16e
fffff880`0c066210 fffff800`0306b777 : fffffa80`103a2af0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!MiLockProtoPoolPage+0x38
fffff880`0c066260 fffff800`0337260f : fffffa80`0d9e6520 fffff8a0`0c519011 fffffa80`0d9e6520 00000000`00002001 : nt!MiDeleteSegmentPages+0xad
fffff880`0c066310 fffff800`030868b4 : 00000000`00000000 fffff8a0`0c519010 fffffa80`0d3a17b0 fffffa80`0d3a17b0 : nt!MiSegmentDelete+0x7b
fffff880`0c066350 fffff880`10bbf1ab : fffff8a0`0c519010 fffff8a0`0bb977b0 00000000`00000000 fffff8a0`0c519010 : nt!ObfDereferenceObject+0xd4
fffff880`0c0663b0 fffff880`10bbe63c : fffff8a0`08c0cf00 fffff8a0`08c0cf00 fffff8a0`09091df0 fffff8a0`02f41a40 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x2f
fffff880`0c0663e0 fffff880`10bbe54a : fffffa80`00000000 fffffa80`0df22060 fffffa80`0f9bd210 fffff880`0c0664b8 : dxgmms1!VIDMM_PROCESS_HEAP::FreeSmallAllocation+0xdc
fffff880`0c066410 fffff880`10ba9b5a : fffff880`0c066438 fffff8a0`0bb99dc0 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0x13a
fffff880`0c066440 fffff880`10ba4523 : fffffa80`0ee014e0 00000000`00000000 fffff8a0`0c519010 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x112
fffff880`0c0664f0 fffff880`10b8aecc : fffff8a0`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`0c0665c0 fffff880`0fe37c10 : 00000000`00000000 fffff8a0`01c59000 fffff8a0`01c59000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`0c0665f0 fffff880`0fe4a67c : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`0c0666e0 fffff880`0fe2f815 : 00000000`fffffeda fffff8a0`0bb833e0 fffff8a0`01c59000 fffffa80`1051e000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`0c066750 fffff880`0fe6dca6 : 00000000`00000000 fffffa80`1051e000 fffff8a0`0bb833e0 fffff8a0`0bb83460 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`0c066780 fffff880`0fe6d63c : fffff900`c09c7270 00000000`00000000 00000000`00000001 fffff900`c09c7270 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`0c066830 fffff960`00124a54 : 00000000`00000c04 fffff900`c09c7270 00000000`00000000 fffff900`c09c7270 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`0c0668c0 fffff960`00124157 : fffffa80`10613500 fffff880`0c066c20 00000000`00000000 fffff880`0c066c20 : win32k!GdiProcessCallout+0x244
fffff880`0c066940 fffff800`03366a01 : fffffa80`10613510 00000000`00000000 00000000`00000000 fffffa80`0d576770 : win32k!W32pProcessCallout+0x6b
fffff880`0c066970 fffff800`0333f635 : 00000000`c0000005 00000000`c0000001 fffffa80`78457300 fffffa80`0dba8b60 : nt!PspExitThread+0x561
fffff880`0c066a30 fffff800`0305e1db : 00000000`00000100 fffffa80`0d576830 00000000`00000001 fffff800`03088b9d : nt!PsExitSpecialApc+0x1d
fffff880`0c066a60 fffff800`0305e620 : 00000000`00000000 fffff880`0c066ae0 fffff800`0333f74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`0c066ae0 fffff800`03080a37 : fffffa80`0d576770 00000000`000005d8 00000000`00000000 fffffa80`0d76a9b0 : nt!KiInitiateUserApc+0x70
fffff880`0c066c20 00000000`75432dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`1230f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75432dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
fffff880`10bbf1ab eb22            jmp     dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x53 (fffff880`10bbf1cf)

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

FAILURE_BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\100110-17253-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0300d000 PsLoadedModuleList = 0xfffff800`0324ae50
System Uptime: 0 days 1:25:48.791
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffffa900f11b068, 2, 1, fffff8800441522c}

Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa900f11b068, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800441522c, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b50e0
 fffffa900f11b068 

CURRENT_IRQL:  2

FAULTING_IP: 
USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
fffff880`0441522c 488908          mov     qword ptr [rax],rcx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f1ba60 -- (.trap 0xfffff88002f1ba60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa900f11b068 rbx=0000000000000000 rcx=fffffa800ee097b0
rdx=0000000063706458 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800441522c rsp=fffff88002f1bbf0 rbp=fffffa800f11a050
 r8=0000000063706458  r9=0000000000000000 r10=fffffa800f11a1a0
r11=fffffa800f11a1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
USBPORT!USBPORT_Core_iRemovePriorityTransfer+0x1c8:
fffff880`0441522c 488908          mov     qword ptr [rax],rcx ds:fffffa90`0f11b068=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000307cca9 to fffff8000307d740

STACK_TEXT:  
fffff880`02f1b918 fffff800`0307cca9 : 00000000`0000000a fffffa90`0f11b068 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f1b920 fffff800`0307b920 : fffffa80`0e26fb40 fffffa80`0f11a1a0 fffffa80`0f11a1a0 fffff880`0442d0d8 : nt!KiBugCheckDispatch+0x69
fffff880`02f1ba60 fffff880`0441522c : 00000000`00000000 00000000`ffffffff fffffa80`0f11ab98 fffff880`04406f3d : nt!KiPageFault+0x260
fffff880`02f1bbf0 fffff880`044119bc : fffffa80`0f126590 fffffa80`0f11a1a0 fffffa80`0f11ab98 fffffa80`0f11a1a0 : USBPORT!USBPORT_Core_iRemovePriorityTransfer+0x1c8
fffff880`02f1bc40 fffff880`04402f89 : fffffa80`0f11a050 00000000`00000000 fffffa80`0f11ab02 fffffa80`0f11ab98 : USBPORT!USBPORT_Core_UsbDoneDpc_Worker+0x2bc
fffff880`02f1bca0 fffff800`03088bfc : fffff880`009ea180 fffffa80`0f11ab98 fffffa80`0f11abb0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f1bcd0 fffff800`03085eea : fffff880`009ea180 fffff880`009f50c0 00000000`00000000 fffff880`04402db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
fffff880`0441522c 488908          mov     qword ptr [rax],rcx

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBPORT

IMAGE_NAME:  USBPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc07

FAILURE_BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8

BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa900f11b068, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800441522c, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  fffffa900f11b068 

CURRENT_IRQL:  2

FAULTING_IP: 
USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
fffff880`0441522c 488908          mov     qword ptr [rax],rcx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f1ba60 -- (.trap 0xfffff88002f1ba60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa900f11b068 rbx=0000000000000000 rcx=fffffa800ee097b0
rdx=0000000063706458 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800441522c rsp=fffff88002f1bbf0 rbp=fffffa800f11a050
 r8=0000000063706458  r9=0000000000000000 r10=fffffa800f11a1a0
r11=fffffa800f11a1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
USBPORT!USBPORT_Core_iRemovePriorityTransfer+0x1c8:
fffff880`0441522c 488908          mov     qword ptr [rax],rcx ds:fffffa90`0f11b068=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000307cca9 to fffff8000307d740

STACK_TEXT:  
fffff880`02f1b918 fffff800`0307cca9 : 00000000`0000000a fffffa90`0f11b068 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f1b920 fffff800`0307b920 : fffffa80`0e26fb40 fffffa80`0f11a1a0 fffffa80`0f11a1a0 fffff880`0442d0d8 : nt!KiBugCheckDispatch+0x69
fffff880`02f1ba60 fffff880`0441522c : 00000000`00000000 00000000`ffffffff fffffa80`0f11ab98 fffff880`04406f3d : nt!KiPageFault+0x260
fffff880`02f1bbf0 fffff880`044119bc : fffffa80`0f126590 fffffa80`0f11a1a0 fffffa80`0f11ab98 fffffa80`0f11a1a0 : USBPORT!USBPORT_Core_iRemovePriorityTransfer+0x1c8
fffff880`02f1bc40 fffff880`04402f89 : fffffa80`0f11a050 00000000`00000000 fffffa80`0f11ab02 fffffa80`0f11ab98 : USBPORT!USBPORT_Core_UsbDoneDpc_Worker+0x2bc
fffff880`02f1bca0 fffff800`03088bfc : fffff880`009ea180 fffffa80`0f11ab98 fffffa80`0f11abb0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f1bcd0 fffff800`03085eea : fffff880`009ea180 fffff880`009f50c0 00000000`00000000 fffff880`04402db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
fffff880`0441522c 488908          mov     qword ptr [rax],rcx

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBPORT

IMAGE_NAME:  USBPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc07

FAILURE_BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8

BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8

Followup: MachineOwner





















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\100310-25584-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03065000 PsLoadedModuleList = 0xfffff800`032a2e50
System Uptime: 0 days 0:14:26.571
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck BE, {fffff960002265f9, cf00004319fe021, fffff8800e726070, b}

Probably caused by : hardware ( win32k!GrePolyPolygon+6 )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff960002265f9, Virtual address for the attempted write.
Arg2: 0cf00004319fe021, PTE contents.
Arg3: fffff8800e726070, (reserved)
Arg4: 000000000000000b, (reserved)

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xBE

PROCESS_NAME:  iexplore.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800e726070 -- (.trap 0xfffff8800e726070)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff96000226670 rbx=0000000000000000 rcx=000000001e010247
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff9600022e5ae rsp=fffff8800e726200 rbp=fffff8800e7263e0
 r8=fffff8800e726230  r9=0000000000000001 r10=000003990000007a
r11=fffff8800e726260 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32k!GrePolyPolygon+0x6:
fffff960`0022e5ae 084889          or      byte ptr [rax-77h],cl ds:77d8:fffff960`002265f9=75
Resetting default scope

MISALIGNED_IP: 
win32k!GrePolyPolygon+6
fffff960`0022e5ae 084889          or      byte ptr [rax-77h],cl

LAST_CONTROL_TRANSFER:  from fffff80003155ae2 to fffff800030d5740

STACK_TEXT:  
fffff880`0e725f08 fffff800`03155ae2 : 00000000`000000be fffff960`002265f9 0cf00004`319fe021 fffff880`0e726070 : nt!KeBugCheckEx
fffff880`0e725f10 fffff800`030d382e : 00000000`00000001 00000000`00000000 00000000`74fae400 fffff960`002263d0 : nt! ?? ::FNODOBFM::`string'+0x4237e
fffff880`0e726070 fffff960`0022e5ae : fffff900`c2861890 00000000`74f82450 fffff900`c28617c0 fffff960`000f41c5 : nt!KiPageFault+0x16e
fffff880`0e726200 fffff900`c2861890 : 00000000`74f82450 fffff900`c28617c0 fffff960`000f41c5 fffff900`00000006 : win32k!GrePolyPolygon+0x6
fffff880`0e726208 00000000`74f82450 : fffff900`c28617c0 fffff960`000f41c5 fffff900`00000006 fffff960`001b669f : 0xfffff900`c2861890
fffff880`0e726210 fffff900`c28617c0 : fffff960`000f41c5 fffff900`00000006 fffff960`001b669f 00000006`00000006 : 0x74f82450
fffff880`0e726218 fffff960`000f41c5 : fffff900`00000006 fffff960`001b669f 00000006`00000006 fffff880`0e726230 : 0xfffff900`c28617c0
fffff880`0e726220 fffff960`000f41c5 : 000003ba`0000007b 000003bb`0000007a 00000399`0000007a 00000399`00000083 : win32k!HANDLELOCK::vLockHandle+0x29
fffff880`0e726260 fffff960`002515b0 : 00000000`00001110 ffffffff`f5101028 00000000`74f82450 00000000`0280d580 : win32k!HANDLELOCK::vLockHandle+0x29
fffff880`0e7262a0 00000000`02f37fb0 : ffffffff`00000001 00000000`00000001 00000000`00000001 00000000`7efa7000 : win32k!DEC_SHARE_REF_CNT+0xe4
fffff880`0e726300 ffffffff`00000001 : 00000000`00000001 00000000`00000001 00000000`7efa7000 00000000`74f82450 : 0x2f37fb0
fffff880`0e726308 00000000`00000001 : 00000000`00000001 00000000`7efa7000 00000000`74f82450 00000000`0280d580 : 0xffffffff`00000001
fffff880`0e726310 00000000`00000001 : 00000000`7efa7000 00000000`74f82450 00000000`0280d580 00000000`0280fd20 : 0x1
fffff880`0e726318 00000000`7efa7000 : 00000000`74f82450 00000000`0280d580 00000000`0280fd20 00000000`74fae410 : 0x1
fffff880`0e726320 00000000`74f82450 : 00000000`0280d580 00000000`0280fd20 00000000`74fae410 00000000`00000001 : 0x7efa7000
fffff880`0e726328 00000000`0280d580 : 00000000`0280fd20 00000000`74fae410 00000000`00000001 fffff960`002263d0 : 0x74f82450
fffff880`0e726330 00000000`0280fd20 : 00000000`74fae410 00000000`00000001 fffff960`002263d0 00000000`02f37e9c : 0x280d580
fffff880`0e726338 00000000`74fae410 : 00000000`00000001 fffff960`002263d0 00000000`02f37e9c fffff800`030d489c : 0x280fd20
fffff880`0e726340 00000000`00000001 : fffff960`002263d0 00000000`02f37e9c fffff800`030d489c 00000000`77115d48 : 0x74fae410
fffff880`0e726348 fffff960`002263cf : 00000000`02f37e9c fffff800`030d489c 00000000`77115d48 fffff880`0e7263e0 : 0x1
fffff880`0e726350 fffff900`c00bf010 : 00000000`00000000 fffff880`0e726880 00000000`00000001 fffff800`030e1772 : win32k!CaptureDriverInfo2W+0x31f
fffff880`0e7263e0 00000000`00000000 : fffff880`0e726880 00000000`00000001 fffff800`030e1772 fffff900`c00bf010 : 0xfffff900`c00bf010


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!GrePolyPolygon+6
fffff960`0022e5ae 084889          or      byte ptr [rax-77h],cl

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32k!GrePolyPolygon+6

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  X64_IP_MISALIGNED

BUCKET_ID:  X64_IP_MISALIGNED

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\100210-18298-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`03246e50
System Uptime: 0 days 0:01:05.198
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {c08a2, 0, 0, 0}

Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000000c08a2
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x24

PROCESS_NAME:  sidebar.exe

CURRENT_IRQL:  0



STACK_TEXT:  
fffff880`0d8cfb58 fffff880`01230e95 : 00000000`00000024 00000000`000c08a2 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0d8cfb60 fffff880`01230ae8 : 00000001`00000000 00000000`00000000 00000000`00000000 00000617`00004000 : Ntfs!NtfsPagingFileIo+0x155
fffff880`0d8cfc60 fffff880`0116123f : fffffa80`1125c9b0 fffffa80`1125c610 fffffa80`0f1d2010 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x9e89
fffff880`0d8cfd10 fffff880`0115f6df : fffffa80`0e390de0 fffffa80`1125c610 fffffa80`0e390d00 fffffa80`1125c610 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0d8cfda0 fffff800`0306b1f2 : fffffa80`1125c630 fffffa80`0ee3fad0 00000000`00000043 fffff6fc`40022df8 : fltmgr!FltpDispatch+0xcf
fffff880`0d8cfe00 fffff800`0306b4f5 : 00000000`00000000 00000000`00000000 fffff880`0d8cfec0 fffffa80`1124bec0 : nt!IoPageRead+0x252
fffff880`0d8cfe90 fffff800`030945c4 : 00000000`00000000 00000000`00000008 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255
fffff880`0d8cff20 fffff800`0307782e : 00000000`00000008 00000000`00000081 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x11c4
fffff880`0d8d0080 fffff880`045bf3bc : fffff880`045b85a9 00000008`00001000 00000200`00000080 00001000`00000000 : nt!KiPageFault+0x16e
fffff880`0d8d0218 fffff880`045b85a9 : 00000008`00001000 00000200`00000080 00001000`00000000 00000001`00000000 : dxgmms1!VIDMM_GLOBAL::VerifySegmentSetAny
fffff880`0d8d0220 fffff880`045a08e3 : 00000000`00000081 fffff8a0`01fb87c0 00000000`00001000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CreateOneAllocation+0x201
fffff880`0d8d0350 fffff880`044ec2ec : 00000000`a0000000 fffff880`00000002 fffff8a0`0206d6e0 00000000`00000004 : dxgmms1!VidMmCreateAllocation+0x173
fffff880`0d8d0430 fffff880`044e5554 : fffff880`0d8d0698 00000000`00000000 fffff880`0d8d0870 fffff880`0d8d0870 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations<_DXGK_ALLOCATIONINFO>+0x1d8
fffff880`0d8d04c0 fffff880`044e81af : fffff8a0`01fd3000 fffff880`0d8d0b30 fffff880`0d8d0c01 00000000`00000000 : dxgkrnl!DXGDEVICE::CreateAllocation+0xca8
fffff880`0d8d0ac0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkCreateAllocation+0x42b



MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155

BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155

Followup: MachineOwner


---------





fffff800`00bc7000 fffff800`00bd1000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`03009000 fffff800`035e5000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`035e5000 fffff800`0362e000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c0f000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`00c32000 fffff880`00c76000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00c76000 fffff880`00c8a000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00c8a000 fffff880`00ce8000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00ce8000 fffff880`00da8000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00da8000 fffff880`00dd7000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`00dd7000 fffff880`00df8000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e6a000 fffff880`00e73000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`00e73000 fffff880`00e7c000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`00e7c000 fffff880`00e87000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00e87000 fffff880`00e98000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00e98000 fffff880`00eb6000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`00eb6000 fffff880`00ec3000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`00ec4000 fffff880`00f68000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f68000 fffff880`00f77000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f77000 fffff880`00fce000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00fce000 fffff880`00fd7000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fd7000 fffff880`00fe1000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00fe1000 fffff880`00ffb000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`01000000 fffff880`01025000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`01025000 fffff880`01035000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`01035000 fffff880`0103e000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01046000 fffff880`010a2000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`010a2000 fffff880`010a9000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`010a9000 fffff880`010b9000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`010b9000 fffff880`010d3000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`010d3000 fffff880`010dc000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`010dc000 fffff880`01106000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`01106000 fffff880`01124000   jraid    jraid.sys    Thu Aug 13 11:10:27 2009 (4A83CA73)
fffff880`01124000 fffff880`01153000   SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`01153000 fffff880`0115e000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`0115e000 fffff880`011aa000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`011aa000 fffff880`011be000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`011be000 fffff880`011ee000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`011ee000 fffff880`011fc000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`01200000 fffff880`0122a000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`0122f000 fffff880`013d2000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013f1000 fffff880`013f8000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`01400000 fffff880`014f2000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`014f4000 fffff880`01552000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01552000 fffff880`0156c000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`0156c000 fffff880`015df000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`015df000 fffff880`015f0000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`015f0000 fffff880`015fa000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01600000 fffff880`0163a000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`0163a000 fffff880`01650000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01650000 fffff880`01659000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`0165a000 fffff880`016ba000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`016ba000 fffff880`016e5000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`016e5000 fffff880`0172f000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0172f000 fffff880`0173f000   vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`0173f000 fffff880`0178b000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0178b000 fffff880`01793000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01793000 fffff880`017cd000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`017cd000 fffff880`017df000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`017df000 fffff880`017e8000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`04000000 fffff880`04051000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`04051000 fffff880`0405d000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`0405d000 fffff880`04068000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`04068000 fffff880`04077000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`04085000 fffff880`0410f000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0410f000 fffff880`04154000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`04154000 fffff880`0415d000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`0415d000 fffff880`04183000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`04183000 fffff880`04192000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`04192000 fffff880`041af000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`041af000 fffff880`041ca000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`041ca000 fffff880`041de000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`041de000 fffff880`041f8000   SCDEmu   SCDEmu.SYS   Mon Apr 12 11:52:25 2010 (4BC2DF49)
fffff880`04200000 fffff880`0421b000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`0421b000 fffff880`04226000   rdpbus   rdpbus.sys   Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`0422e000 fffff880`042b1000   csc      csc.sys      Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`042b1000 fffff880`042cf000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`042cf000 fffff880`042e0000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`042e0000 fffff880`04306000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`04306000 fffff880`0431c000   intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`0431c000 fffff880`0435a000   Rt64win7 Rt64win7.sys Thu Jul 30 14:58:43 2009 (4A718AF3)
fffff880`0435a000 fffff880`04398000   1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`04398000 fffff880`043b6000   i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`043b6000 fffff880`043cc000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`043cc000 fffff880`043f0000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`043f0000 fffff880`043fc000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04400000 fffff880`04424000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`04424000 fffff880`04431000   usbuhci  usbuhci.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`04431000 fffff880`04487000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`04487000 fffff880`04498000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`04498000 fffff880`044a4000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`044ab000 fffff880`0459f000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`0459f000 fffff880`045e5000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`045e5000 fffff880`045f4000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`045f4000 fffff880`045fd000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`045fd000 fffff880`045fe480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`04803000 fffff880`053ed500   nvlddmkm nvlddmkm.sys Thu Sep 02 07:31:44 2010 (4C7F28B0)
fffff880`053ee000 fffff880`053ef180   nvBridge nvBridge.kmd Thu Sep 02 07:27:39 2010 (4C7F27BB)
fffff880`053f0000 fffff880`05400000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`05856000 fffff880`05899000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`05899000 fffff880`058ab000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`058ab000 fffff880`05905000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`05905000 fffff880`0591a000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`0591a000 fffff880`05933000   nvhda64v nvhda64v.sys Wed Mar 10 03:48:17 2010 (4B96FA61)
fffff880`05933000 fffff880`05970000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`05970000 fffff880`05992000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`05992000 fffff880`05997200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`0765b000 fffff880`0787ce80   RTKVHD64 RTKVHD64.sys Tue Jan 19 12:42:09 2010 (4B558C81)
fffff880`0787d000 fffff880`07889000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`07889000 fffff880`07897000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`07897000 fffff880`078a3000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`078a3000 fffff880`078ac000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`078ac000 fffff880`078bf000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`078bf000 fffff880`078da000   USBSTOR  USBSTOR.SYS  Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`078da000 fffff880`078dbf00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`078dc000 fffff880`078ea000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`078ea000 fffff880`078f8000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`078f8000 fffff880`07911000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`07911000 fffff880`07919080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`0791a000 fffff880`07927000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`07927000 fffff880`0794a000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`0794a000 fffff880`0796b000   WudfPf   WudfPf.sys   Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`0796b000 fffff880`07980000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`07980000 fffff880`07998000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`07998000 fffff880`079ce000   fastfat  fastfat.SYS  Tue Jul 14 02:23:28 2009 (4A5BC1F0)
fffff880`0b400000 fffff880`0b423000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`0b478000 fffff880`0b540000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`0b540000 fffff880`0b55e000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`0b55e000 fffff880`0b576000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`0b576000 fffff880`0b5a3000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`0b5a3000 fffff880`0b5f1000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`0ba00000 fffff880`0ba68000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`0bafd000 fffff880`0bba3000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`0bba3000 fffff880`0bbae000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`0bbae000 fffff880`0bbdb000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`0bbdb000 fffff880`0bbed000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`0bc1f000 fffff880`0bcb5000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`0bcb5000 fffff880`0bce6000   WUDFRd   WUDFRd.sys   Tue Jul 14 03:06:06 2009 (4A5BCBEE)
fffff960`000f0000 fffff960`003ff000   win32k   win32k.sys   Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`006b0000 fffff960`006d7000   cdd      cdd.dll      Wed May 19 22:48:26 2010 (4BF4408A)
fffff960`00940000 fffff960`009a1000   ATMFD    ATMFD.DLL    Thu May 27 07:11:31 2010 (4BFDF0F3)
 
Update:


jraid.sys Thu Aug 13 11:10:27 2009
Jmicron RAID
Link Removed due to 404 Error


Rt64win7.sys Thu Jul 30 14:58:43 2009
Realtek 8136/8168/8169
Realtek




If after the updates bsod's are still occurring, attach the fresh crash dumps.
 
The beta NVIDIA driver likely responsible. Use Driver Sweeper in safe mode to clear all NVIDIA video files/settings, then reboot and install latest WHQL driver:

Link Removed - Invalid URL
 
Back
Top Bottom