Blue screens experienced only during gameplay

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by romelako, Mar 10, 2011.

  1. romelako

    romelako New Member

    Joined:
    Mar 10, 2011
    Messages:
    10
    Likes Received:
    0
    Hello, everyone. I've been having a lot of trouble with my computer this past week because of blue screens during my gaming. I've been mostly playing SC2 and Heroes of Newerth, so crashing a bunch of times is not only annoying but it hurts my record as well. I just recently purchased an ATI Radeon HD 5670 along with an Athlon II x3 435 and G.Skill (2 x 2 GB) 4GB DDR2 RAM. I popped these into my system and it worked fine for the first day and suddenly I crash multiple times. They are completely random and the reasoning for the crash changes each time. Here are six minidumps:

    minidumps.zip

    I've done the following things:

    • Update my ATI drivers to 2.1
    • Removed my old NVIDIA GeForce 9500 GT drivers
    I was having the same issues with my old memory and BSOD's, except I would crash when Windows started up. I thought that it had to do something with the timing (because it was 5-5-5-18) so I purchased new memory, but I'm still blue screening. I ran memtest86+ on my old memory and it didn't show any errors.

    Perhaps maybe it's a PSU issue, as it's only 480W. Maybe my GPU is overheating? I'm honestly not too sure. Hopefully by looking at the minidumps, you guys can enlighten me with this nuisance of a problem. Thanks in advanced!
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    0x50_dxgkrnl!DxgkRender

    1. I see slot#1 only, attach SPD under the other slot too.


    2. Attach dxdiag report.

    If there is a hardware issue like faulty PSU, bad RAM, videocard, overclocking or whatever else, updating drivers won't help. Follow 1 and 2, attach the necessary info.




    3. Uninstall Avast, install MSE:

    avast! Uninstall Utility

    https://www.microsoft.com/security_essentials/




    4. Update drivers:

    Logitech SetPoint
    LMouFilt.Sys Fri Sep 21 07:05:43 2007
    LUsbFilt.Sys Fri Sep 21 07:05:46 2007


    Realtek Audio
    RTKVHD64.sys Tue Sep 15 07:02:10 2009


    Atheros Extensible Wireless LAN device driver
    athrx.sys Tue Jun 09 14:06:49 2009
















    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030911-12136-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (3 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a4a000 PsLoadedModuleList = 0xfffff800`02c87e50
    Debug session time: Wed Mar  9 03:52:25.328 2011 (UTC - 5:00)
    System Uptime: 0 days 0:04:20.139
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff87fa15bd638, 0, fffff880045d07f6, 5}
    
    
    Could not read faulting driver name
    Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff87fa15bd638, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff880045d07f6, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf20e0
     fffff87fa15bd638 
    
    FAULTING_IP: 
    dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e
    fffff880`045d07f6 8b053ccefeff    mov     eax,dword ptr [dxgmms1!VIDMM_DMA_POOL::_FairDmaBufferBytes (fffff880`045bd638)]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  dwm.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff8800752c790 -- (.trap 0xfffff8800752c790)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880045b98c0 rbx=0000000000000000 rcx=fffffa800651fad0
    rdx=fffff8800752c9b8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880045d07f6 rsp=fffff8800752c920 rbp=fffff8800752c9b8
     r8=fffff8800752cbf8  r9=fffff8800752cc00 r10=0000000000000000
    r11=fffff8800752c2e0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+0xe:
    fffff880`045d07f6 8b053ccefeff    mov     eax,dword ptr [dxgmms1!VIDMM_DMA_POOL::_FairDmaBufferBytes (fffff880`045bd638)] ds:fffff880`045bd638=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002b398c1 to fffff80002aba740
    
    STACK_TEXT:  
    fffff880`0752c628 fffff800`02b398c1 : 00000000`00000050 fffff87f`a15bd638 00000000`00000000 fffff880`0752c790 : nt!KeBugCheckEx
    fffff880`0752c630 fffff800`02ab882e : 00000000`00000000 fffffa80`0651fad0 fffff8a0`02162a00 fffffa80`0667b970 : nt! ?? ::FNODOBFM::`string'+0x40e8b
    fffff880`0752c790 fffff880`045d07f6 : 00000000`00000000 fffffa80`0592e000 00000000`00000002 00000000`00000000 : nt!KiPageFault+0x16e
    fffff880`0752c920 fffff880`045ab2b7 : 00000000`00000000 fffff8a0`01bfbd80 00000000`00000002 fffff880`0752cca0 : dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+0xe
    fffff880`0752c950 fffff880`045239ca : fffff8a0`01c0f440 fffff880`0752cca0 00000000`00000002 00000000`00000003 : dxgmms1!VidMmGetNextBuffersContractedSize+0x2b
    fffff880`0752c980 fffff960`0018c9da : 00000000`022beba0 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkRender+0x6da
    fffff880`0752cbf0 fffff800`02ab9993 : fffffa80`065eab60 00000000`022bfa00 000007fe`f8f3d610 fffffa80`00000000 : win32k!NtGdiDdDDIRender+0x12
    fffff880`0752cc20 000007fe`fe3113ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`022beb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fe3113ba
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e
    fffff880`045d07f6 8b053ccefeff    mov     eax,dword ptr [dxgmms1!VIDMM_DMA_POOL::_FairDmaBufferBytes (fffff880`045bd638)]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d3fa174
    
    FAILURE_BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e
    
    BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030911-11622-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (3 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a49000 PsLoadedModuleList = 0xfffff800`02c86e50
    Debug session time: Wed Mar  9 02:59:45.944 2011 (UTC - 5:00)
    System Uptime: 0 days 2:46:24.754
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {8a4c, d, 0, fffff80002ac63aa}
    
    Probably caused by : amdppm.sys ( amdppm!C1Halt+2 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000008a4c, memory referenced
    Arg2: 000000000000000d, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ac63aa, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf10e0
     0000000000008a4c 
    
    CURRENT_IRQL:  d
    
    FAULTING_IP: 
    nt!KiSecondaryClockInterrupt+13a
    fffff800`02ac63aa ff11            call    qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002f8b960 -- (.trap 0xfffff88002f8b960)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=468bac616416aa00 rbx=0000000000000000 rcx=fffff80002a24b50
    rdx=00000000000089f3 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ac63aa rsp=fffff88002f8baf8 rbp=fffff88002f8bb80
     r8=000000000000a430  r9=0000000000000000 r10=0000000000018b30
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up di ng nz na po nc
    nt!KiSecondaryClockInterrupt+0x13a:
    fffff800`02ac63aa ff11            call    qword ptr [rcx] ds:fffff800`02a24b50=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ab8ca9 to fffff80002ab9740
    
    STACK_TEXT:  
    fffff880`02f8b818 fffff800`02ab8ca9 : 00000000`0000000a 00000000`00008a4c 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02f8b820 fffff800`02ab7920 : fffff880`02f8ba88 00000000`00000000 fffffa80`0586f018 00000000`00000004 : nt!KiBugCheckDispatch+0x69
    fffff880`02f8b960 fffff800`02ac63aa : 00000000`00000011 00000000`00000000 fffff880`02f8bb80 fffff880`02f63180 : nt!KiPageFault+0x260
    fffff880`02f8baf8 fffff880`0409e7f2 : fffff800`02ac724a 00000000`002b6965 fffffa80`04df8598 fffffa80`051b1260 : nt!KiSecondaryClockInterrupt+0x13a
    fffff880`02f8bc98 fffff800`02ac724a : 00000000`002b6965 fffffa80`04df8598 fffffa80`051b1260 fffffa80`03995410 : amdppm!C1Halt+0x2
    fffff880`02f8bca0 fffff800`02ac1ebc : fffff880`02f63180 fffff880`00000000 00000000`00000000 fffff880`0421c480 : nt!PoIdle+0x53a
    fffff880`02f8bd80 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 : nt!KiIdleLoop+0x2c
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    amdppm!C1Halt+2
    fffff880`0409e7f2 c3              ret
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  amdppm!C1Halt+2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: amdppm
    
    IMAGE_NAME:  amdppm.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc0fd
    
    FAILURE_BUCKET_ID:  X64_0xA_amdppm!C1Halt+2
    
    BUCKET_ID:  X64_0xA_amdppm!C1Halt+2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030911-11356-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (3 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a0a000 PsLoadedModuleList = 0xfffff800`02c47e50
    Debug session time: Wed Mar  9 03:47:20.380 2011 (UTC - 5:00)
    System Uptime: 0 days 0:16:50.190
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff87fefad00ec, 1, fffff88004511ad9, 5}
    
    
    Could not read faulting driver name
    Probably caused by : dxgkrnl.sys ( dxgkrnl!DxgkRender+7e9 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff87fefad00ec, memory referenced.
    Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
    Arg3: fffff88004511ad9, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb20e0
     fffff87fefad00ec 
    
    FAULTING_IP: 
    dxgkrnl!DxgkRender+7e9
    fffff880`04511ad9 488d4c2448      lea     rcx,[rsp+48h]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  hon.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff8800764d7f0 -- (.trap 0xfffff8800764d7f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000000000000fffb rbx=0000000000000000 rcx=fffffa8005898000
    rdx=fffffa800685db60 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88004511ad9 rsp=fffff8800764d980 rbp=fffff8800764dca0
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
    r11=fffff8800764d2e0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    dxgkrnl!DxgkRender+0x7e9:
    fffff880`04511ad9 488d4c2448      lea     rcx,[rsp+48h]
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002af98c1 to fffff80002a7a740
    
    STACK_TEXT:  
    fffff880`0764d688 fffff800`02af98c1 : 00000000`00000050 fffff87f`efad00ec 00000000`00000001 fffff880`0764d7f0 : nt!KeBugCheckEx
    fffff880`0764d690 fffff800`02a7882e : 00000000`00000001 fffff8a0`0399b890 00000000`00000000 fffff880`044a4333 : nt! ?? ::FNODOBFM::`string'+0x40e8b
    fffff880`0764d7f0 fffff880`04511ad9 : fffff8a0`0399b890 fffff8a0`0399b890 00000000`00000002 00000000`00000003 : nt!KiPageFault+0x16e
    fffff880`0764d980 fffff960`0019c9da : 00000000`05b4e6b0 fffffa80`00000200 00000000`00000c00 00000000`fffa4000 : dxgkrnl!DxgkRender+0x7e9
    fffff880`0764dbf0 fffff800`02a79993 : fffffa80`0685db60 00000000`000003e0 00000000`00000000 fffffa80`03aeed20 : win32k!NtGdiDdDDIRender+0x12
    fffff880`0764dc20 00000000`7407143a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`05b4e688 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7407143a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgkrnl!DxgkRender+7e9
    fffff880`04511ad9 488d4c2448      lea     rcx,[rsp+48h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgkrnl!DxgkRender+7e9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgkrnl
    
    IMAGE_NAME:  dxgkrnl.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d3fa1a0
    
    FAILURE_BUCKET_ID:  X64_0x50_dxgkrnl!DxgkRender+7e9
    
    BUCKET_ID:  X64_0x50_dxgkrnl!DxgkRender+7e9
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\031011-11918-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (3 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a60000 PsLoadedModuleList = 0xfffff800`02c9de50
    Debug session time: Thu Mar 10 17:46:08.389 2011 (UTC - 5:00)
    System Uptime: 0 days 0:26:57.200
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {0, 0, 0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: 0000000000000000, The exception code that was not handled
    Arg2: 0000000000000000, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
    
    FAULTING_IP: 
    +3434323231333631
    00000000`00000000 ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
    
    BUGCHECK_STR:  0x1E_0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff80000b9c328 -- (.exr 0xfffff80000b9c328)
    ExceptionAddress: fffff80002ad50a2 (nt!KiDeferredReadyThread+0x00000000000001c2)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff80000b9c3d0 -- (.trap 0xfffff80000b9c3d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=88fff80002c58b80 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ad50a2 rsp=fffff80000b9c560 rbp=0000000000000001
     r8=0000000000000007  r9=0000000000000000 r10=fffff80002a60000
    r11=fffff880031c4c00 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    nt!KiDeferredReadyThread+0x1c2:
    fffff800`02ad50a2 663b5048        cmp     dx,word ptr [rax+48h] ds:88fff800`02c58bc8=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ac846e to fffff80002ad0710
    
    STACK_TEXT:  
    fffff800`00b9b418 fffff800`02ac846e : fffffa80`00000000 00000000`00000000 fffff800`00b9bb90 fffff800`02afd668 : nt!KeBugCheck
    fffff800`00b9b420 fffff800`02af640d : fffff800`02cdeb7c fffff800`02c18ea4 fffff800`02a60000 fffff800`00b9c328 : nt!KiKernelCalloutExceptionHandler+0xe
    fffff800`00b9b450 fffff800`02afda90 : fffff800`02c1fb34 fffff800`00b9b4c8 fffff800`00b9c328 fffff800`02a60000 : nt!RtlpExecuteHandlerForException+0xd
    fffff800`00b9b480 fffff800`02b0a9ef : fffff800`00b9c328 fffff800`00b9bb90 fffff800`00000000 fffffa80`039045b0 : nt!RtlDispatchException+0x410
    fffff800`00b9bb60 fffff800`02acfd82 : fffff800`00b9c328 fffff880`009e4180 fffff800`00b9c3d0 fffff800`02c4ae80 : nt!KiDispatchException+0x16f
    fffff800`00b9c1f0 fffff800`02ace68a : fffffa80`04c551a0 fffffa80`00000000 00000000`00000000 fffff800`02ade3a1 : nt!KiExceptionDispatch+0xc2
    fffff800`00b9c3d0 fffff800`02ad50a2 : fffffa80`03eaf068 fffffa80`03eaf068 00000000`00000000 fffffa80`03eaf060 : nt!KiGeneralProtectionFault+0x10a
    fffff800`00b9c560 fffff800`02adbe67 : fffffa80`03eaf060 fffffa80`039046b8 fffffa80`039046b8 00000000`00000000 : nt!KiDeferredReadyThread+0x1c2
    fffff800`00b9c5e0 fffff800`02adc4be : 00000003`c3ed2ad0 fffff800`00b9cc58 00000000`000194f2 fffff800`02c4f0c8 : nt!KiProcessExpiredTimerList+0x157
    fffff800`00b9cc30 fffff800`02adbcb7 : 00000001`124f37c2 00000001`000194f2 00000001`124f3742 00000000`000000f2 : nt!KiTimerExpiration+0x1be
    fffff800`00b9ccd0 fffff800`02ad8eea : fffff800`02c4ae80 fffff800`02c58c40 00000000`00000000 fffff880`014fb0c0 : nt!KiRetireDpcList+0x277
    fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiKernelCalloutExceptionHandler+e
    fffff800`02ac846e 90              nop
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
    
    BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`00e0f000 fffff880`00e66000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03663000 fffff880`036ed000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04456000 fffff880`0446c000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`03f0e000 fffff880`03f23000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00e00000 fffff880`00e0b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`05bf4000 fffff880`05bfd000   aswFsBlk aswFsBlk.SYS Thu Jan 13 03:37:10 2011 (4D2EB9B6)
    fffff880`03e5f000 fffff880`03e99000   aswMonFlt aswMonFlt.sys Thu Jan 13 03:37:21 2011 (4D2EB9C1)
    fffff880`036ed000 fffff880`036f7000   aswRdr   aswRdr.SYS   Thu Jan 13 03:37:32 2011 (4D2EB9CC)
    fffff880`03e9f000 fffff880`03ee8000   aswSP    aswSP.SYS    Thu Jan 13 03:41:42 2011 (4D2EBAC6)
    fffff880`01847000 fffff880`01857000   aswTdi   aswTdi.SYS   Thu Jan 13 03:40:19 2011 (4D2EBA73)
    fffff880`04278000 fffff880`043d0000   athrx    athrx.sys    Tue Jun 09 14:06:49 2009 (4A2EA4B9)
    fffff880`04879000 fffff880`05175000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
    fffff880`03f95000 fffff880`03fe3000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
    fffff960`00950000 fffff960`009b1000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`0199b000 fffff880`019a2000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`01857000 fffff880`01868000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`05ee7000 fffff880`05f05000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00700000 fffff960`00727000   cdd      cdd.dll      unavailable (00000000)
    fffff880`05a9c000 fffff880`05ab9000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
    fffff880`01968000 fffff880`01992000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c88000 fffff880`00d48000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018ce000 fffff880`018fe000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c2a000 fffff880`00c88000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010e4000 fffff880`01157000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`04446000 fffff880`04456000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05fbb000 fffff880`05fc4000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
    fffff880`05b67000 fffff880`05b75000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`037d9000 fffff880`037f7000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`037ca000 fffff880`037d9000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`018b8000 fffff880`018ce000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03e3d000 fffff880`03e5f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05b75000 fffff880`05b7f000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
    fffff880`05bbe000 fffff880`05bd1000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05b7f000 fffff880`05bbe000   dump_nvstor64 dump_nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
    fffff880`05a90000 fffff880`05a9c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`044ca000 fffff880`045be000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`04400000 fffff880`04446000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`01072000 fffff880`01086000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01026000 fffff880`01072000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`013d9000 fffff880`013e3000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`0187e000 fffff880`018b8000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`015ab000 fffff880`015f5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`043dd000 fffff880`043ea000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02a17000 fffff800`02a60000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04200000 fffff880`04224000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`05a34000 fffff880`05a90000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`05ae6000 fffff880`05aff000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05aff000 fffff880`05b07080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05ad8000 fffff880`05ae6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`05e1f000 fffff880`05ee7000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`0149d000 fffff880`014a6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`044b7000 fffff880`044c6000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05b08000 fffff880`05b16000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bbd000 fffff800`00bc7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`051b0000 fffff880`051f3000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013ae000 fffff880`013c8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`059ec000 fffff880`059f1200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`05b34000 fffff880`05b47000   LHidFilt LHidFilt.Sys Fri Sep 21 07:05:39 2007 (46F3A583)
    fffff880`03fe3000 fffff880`03ff8000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05b54000 fffff880`05b67000   LMouFilt LMouFilt.Sys Fri Sep 21 07:05:43 2007 (46F3A587)
    fffff880`05bd1000 fffff880`05bf4000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`05b24000 fffff880`05b34000   LUsbFilt LUsbFilt.Sys Fri Sep 21 07:05:46 2007 (46F3A58A)
    fffff880`00c09000 fffff880`00c16000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`05b16000 fffff880`05b24000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`045ed000 fffff880`045fc000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05b47000 fffff880`05b54000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00f3f000 fffff880`00f59000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`05f05000 fffff880`05f1d000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`05f1d000 fffff880`05f4a000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`05f4a000 fffff880`05f98000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`05f98000 fffff880`05fbb000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01800000 fffff880`0180b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e6f000 fffff880`00e79000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01086000 fffff880`010e4000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`037bf000 fffff880`037ca000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`0148b000 fffff880`0149d000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014b9000 fffff880`015ab000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04490000 fffff880`0449c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`05a21000 fffff880`05a34000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`045be000 fffff880`045ed000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`043ea000 fffff880`043ff000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03781000 fffff880`03790000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`036f7000 fffff880`0373c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`0180b000 fffff880`0181c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03651000 fffff880`0365d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a60000 fffff800`0303d000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
    fffff880`0120b000 fffff880`013ae000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01992000 fffff880`0199b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`04224000 fffff880`04275500   nvmf6264 nvmf6264.sys Thu Jul 30 19:48:18 2009 (4A723142)
    fffff880`00f59000 fffff880`00f98000   nvstor64 nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
    fffff880`018fe000 fffff880`01951000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`03745000 fffff880`0376b000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00eb9000 fffff880`00ece000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e79000 fffff880`00eac000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`013c8000 fffff880`013d9000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`0629b000 fffff880`06341000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`03e00000 fffff880`03e3d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c16000 fffff880`00c2a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`0446c000 fffff880`04490000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0449c000 fffff880`044b7000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`05175000 fffff880`05196000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`05196000 fffff880`051b0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03600000 fffff880`03651000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`019e5000 fffff880`019ee000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019ee000 fffff880`019f7000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019f7000 fffff880`01a00000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`011a3000 fffff880`011dd000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`013e3000 fffff880`013fb000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05804000 fffff880`059eba80   RTKVHD64 RTKVHD64.sys Tue Sep 15 07:02:10 2009 (4AAF7432)
    fffff880`06341000 fffff880`0634c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`015f5000 fffff880`015fd000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`06200000 fffff880`06296000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`0638b000 fffff880`063f2000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`0634c000 fffff880`06379000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`00f98000 fffff880`00ffa000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
    fffff880`045fc000 fffff880`045fd480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`06379000 fffff880`0638b000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0183a000 fffff880`01847000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0181c000 fffff880`0183a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`037ab000 fffff880`037bf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005e0000 fffff960`005ea000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03ee8000 fffff880`03f0e000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04800000 fffff880`04812000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05ab9000 fffff880`05ad6000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05ad6000 fffff880`05ad7f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03f84000 fffff880`03f95000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`04812000 fffff880`0486c000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
    fffff880`03f23000 fffff880`03f2e000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03f2e000 fffff880`03f84000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00eac000 fffff880`00eb9000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019a2000 fffff880`019b0000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`019b0000 fffff880`019d5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00ece000 fffff880`00ee3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00ee3000 fffff880`00f3f000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01157000 fffff880`011a3000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`043d0000 fffff880`043dd000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`0376b000 fffff880`03781000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`03790000 fffff880`037ab000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019d5000 fffff880`019e5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00d48000 fffff880`00dec000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00dec000 fffff880`00dfb000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`0373c000 fffff880`03745000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000b0000 fffff960`003c0000   win32k   win32k.sys   unavailable (00000000)
    fffff880`00e66000 fffff880`00e6f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`05a00000 fffff880`05a21000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`094fe000 fffff880`0956f000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`018fe000 fffff880`0190c000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0190c000 fffff880`01916000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`01916000 fffff880`01955000   dump_nvstor6
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0003F000
    fffff880`01955000 fffff880`01968000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. romelako

    romelako New Member

    Joined:
    Mar 10, 2011
    Messages:
    10
    Likes Received:
    0
    I've done all of the above things and I still receive the blue screen error. However, I don't get the ATIKMDAG.sys error anymore. Only the "ntoskrnl.exe" error (0x50, 0x1e, and 0x0a). I've attached the second memory slot below. Here are my specs:

    http://speccy.piriform.com/results/TGpXO63Jz9V0bkqn0oej4wr

    Right now I'm using a 480W PSU. Could the fact that my GPU requires at least 400W and my processor requires 95W be the cause of the problem? Let me know. Thanks. :)
     

    Attached Files:

  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    If your system crashes only on peak load that would likely be the lack of Watts in the power supply.

    Your GSkill sticks are identical and are set right.

    Attach your latest crash dump.

    Run Memtest86+ - Advanced Memory Diagnostic Tool 10 passes overnight.
     
  5. romelako

    romelako New Member

    Joined:
    Mar 10, 2011
    Messages:
    10
    Likes Received:
    0
    Any suggestions for a PSU that'll actually fit in my PC? My computer is a COMPAQ CQ5500F and most PSU's I'm seeing above 500W are going to be way too big for my case.
     
  6. romelako

    romelako New Member

    Joined:
    Mar 10, 2011
    Messages:
    10
    Likes Received:
    0
    The problem isn't a GPU problem as I put in my old GeForce 9500 GT in, which only requires 300W, and I'm still experiencing the errors. Any ideas?
     
  7. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Have you run memtest?
     
  8. romelako

    romelako New Member

    Joined:
    Mar 10, 2011
    Messages:
    10
    Likes Received:
    0
    Yes I have and my memory shows no errors.
     
  9. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Have you uninstalled Avast and updated the drivers?
    Can you attach your most recent crash dump?
     

Share This Page

Loading...