BSOD Hell...please help me!

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by DarrenK, Feb 6, 2011.

  1. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    Hi guys.

    First post here.
    I'm constantly getting BSODs on my PC. Quite often it can be while closing down my internet browser, but otherwise quite random :(
    The BSOD is always the same error - ntfs.sys


    This is the crah dump file from Who Crashed.

    Crash dumps are enabled on your computer.


    On Sun 06/02/2011 15:27:26 GMT your computer crashed
    crash dump file: C:\Windows\Minidump\020611-18236-01.dmp
    This was probably caused by the following module: ntfs.sys (Ntfs+0x213D8)
    Bugcheck code: 0x24 (0x1904FB, 0xFFFFF88008A5B0D8, 0xFFFFF88008A5A940, 0xFFFFF800028D0905)
    Error: NTFS_FILE_SYSTEM
    file path: C:\Windows\system32\drivers\ntfs.sys
    product: Microsoft® Windows® Operating System
    company: Microsoft Corporation
    description: NT File System Driver
    Bug check description: This indicates a problem occurred in the NTFS file system.
    The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.

    SPD.PNG Memory.PNG CPU.PNG

    I would be exremely grateful if someone would be kind enough to help me solve this. I have tried everything I can think of.

    Thanks.
     
    #1 DarrenK, Feb 6, 2011
    Last edited: Feb 6, 2011
  2. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    Sorry guys forgot to add this attachment. Although I got errors when clicking on most of the buttons.
    The files could not be found.
     

    Attached Files:

  3. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    The timings are wrong, you need them 7-7-7-20. Load setup defaults in the bios and reattach the memory tab.
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
  5. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    Thanks for the quick reply Cybercore.
    Here is the new attachment... Memory.PNG
     
  6. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
  7. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
  8. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    Thanks Cyber!

    I will post the above info if I get more hassle.

    I got SF Tool running by the way....I had to run as Admin :)
     
  9. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    The dreaded blue screens are back :(

    I have attached the 7 forums zip, plus the other info requested.

    Capture2.PNG SPD slot 1.PNG Capture 1.PNG SPD slot 3.PNG



    This is really getting me down.
    Let me know if you need anymore info.

    Thanks in advance.
     

    Attached Files:

  10. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321




    1. The RAM settings look right. Let's verify what you have now with the official rated specs - give me the link. You can see the specs written on the RAM sticks themselves and on their package as well.

    2. Check if your motherboard supports DDR1600.

    3. Run Memtest86+ - Advanced Memory Diagnostic Tool overnight for 10 passes.

    4. Update Marvell Yukon Ethernet Controller:

    yk62x64.sys Mon Sep 28 04:19:31 2009








    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\020811-15787-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a50000 PsLoadedModuleList = 0xfffff800`02c8de50
    Debug session time: Tue Feb  8 12:15:20.676 2011 (UTC - 5:00)
    System Uptime: 0 days 0:01:53.034
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {ffffffffc0000005, fffff80002af34b2, fffff880031c45c8, fffff880031c3e30}
    
    Probably caused by : memory_corruption ( nt!MiGetNextNode+26 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002af34b2, The address that the exception occurred at
    Arg3: fffff880031c45c8, Exception Record Address
    Arg4: fffff880031c3e30, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!MiGetNextNode+26
    fffff800`02af34b2 488b4908        mov     rcx,qword ptr [rcx+8]
    
    EXCEPTION_RECORD:  fffff880031c45c8 -- (.exr 0xfffff880031c45c8)
    ExceptionAddress: fffff80002af34b2 (nt!MiGetNextNode+0x0000000000000026)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff880031c3e30 -- (.cxr 0xfffff880031c3e30)
    rax=1000000000000000 rbx=fffffa80039df040 rcx=1000000000000000
    rdx=fffffa80063a862c rsi=fffffa8006363278 rdi=fffffa8006365f80
    rip=fffff80002af34b2 rsp=fffff880031c4808 rbp=fffffa80062b8010
     r8=000000000000000d  r9=00000000000007ff r10=0000000000000801
    r11=0000000000000743 r12=fffff8a002807000 r13=0000000000000000
    r14=fffff8a002808a18 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    nt!MiGetNextNode+0x26:
    fffff800`02af34b2 488b4908        mov     rcx,qword ptr [rcx+8] ds:002b:10000000`00000008=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  CCC.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf80e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    nt!MiGetNextNode+26
    fffff800`02af34b2 488b4908        mov     rcx,qword ptr [rcx+8]
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from fffff80002e59610 to fffff80002af34b2
    
    STACK_TEXT:  
    fffff880`031c4808 fffff800`02e59610 : fffff880`031c4830 fffffa80`039df040 fffff880`00000006 fffff8a0`01deae60 : nt!MiGetNextNode+0x26
    fffff880`031c4810 fffff800`02e9d451 : fffffa80`06363060 00000000`00001404 fffffa80`069e2000 00000000`00000002 : nt!MmEnumerateAndReferenceImages+0x160
    fffff880`031c4890 fffff800`02e9d6c4 : fffffa80`06363060 fffff800`00000068 fffff800`02e9d400 fffff880`031c49b0 : nt!EtwpEnumerateImages+0x51
    fffff880`031c48e0 fffff800`02e54e06 : fffffa80`06241060 fffffa80`06363060 fffff800`02e9d4f0 fffff880`031c49b0 : nt!EtwpProcessEnumCallback+0x1d4
    fffff880`031c4960 fffff800`02e9d811 : fffff880`031c4a98 fffffa80`0398ec01 fffffa80`0398ea00 fffffa80`0398ea00 : nt!PsEnumProcesses+0x26
    fffff880`031c4990 fffff800`02e9d867 : 00000000`00000000 00000000`00000002 fffff800`02c64470 fffffa80`0398ea00 : nt!EtwpProcessThreadImageRundown+0x51
    fffff880`031c49e0 fffff800`02f0898c : 00000000`00401802 fffffa80`0398eca8 fffffa80`0398ea00 fffff800`02acdc3e : nt!EtwpKernelTraceRundown+0x47
    fffff880`031c4a10 fffff800`02f08a8f : fffffa80`0398ea00 00000000`00000002 fffff8a0`016bbd10 fffffa80`0398ea00 : nt!EtwpUpdateLoggerGroupMasks+0x22c
    fffff880`031c4b10 fffff800`02d1c8c9 : 00000000`00000000 fffff8a0`016bbd10 00000000`00000000 fffff800`02ae1536 : nt!EtwpStopLoggerInstance+0x4f
    fffff880`031c4b50 fffff800`02e24b60 : 00000000`00000000 00000000`00000002 fffffa80`0398ea00 ffffffff`88ca6c00 : nt!EtwpStopTrace+0x129
    fffff880`031c4bc0 fffff800`02f2fd95 : ffffffff`ffffffff 00000000`00000001 ffffffff`000000b4 fffffa80`051517b0 : nt! ?? ::NNGAKEGL::`string'+0x5792c
    fffff880`031c4c30 fffff800`02acd961 : fffff800`02c65500 fffff800`02f2fbd0 fffff800`02c655f8 fffffa80`039df040 : nt!PerfDiagpProxyWorker+0x1c5
    fffff880`031c4c70 fffff800`02d64c06 : 48484848`09494948 fffffa80`039df040 00000000`00000080 fffffa80`039cd040 : nt!ExpWorkerThread+0x111
    fffff880`031c4d00 fffff800`02a9ec26 : fffff880`02f63180 fffffa80`039df040 fffff880`02f6dfc0 d04c88cc`c8cccccc : nt!PspSystemThreadStartup+0x5a
    fffff880`031c4d40 00000000`00000000 : fffff880`031c5000 fffff880`031bf000 fffff880`031c4660 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!MiGetNextNode+26
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    STACK_COMMAND:  .cxr 0xfffff880031c3e30 ; kb
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x7E_nt!MiGetNextNode+26
    
    BUCKET_ID:  X64_0x7E_nt!MiGetNextNode+26
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\020811-14976-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a55000 PsLoadedModuleList = 0xfffff800`02c92e50
    Debug session time: Tue Feb  8 12:26:10.211 2011 (UTC - 5:00)
    System Uptime: 0 days 0:06:04.944
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 1, fffff80002af236f}
    
    Probably caused by : memory_corruption ( nt!MiReferenceControlArea+1ff )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002af236f, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfd0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiReferenceControlArea+1ff
    fffff800`02af236f 488908          mov     qword ptr [rax],rcx
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff88008b96150 -- (.trap 0xfffff88008b96150)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0004000000000000
    rdx=0000000080000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002af236f rsp=fffff88008b962e0 rbp=fffff880009e9180
     r8=0000000000000000  r9=fffff880009e9180 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!MiReferenceControlArea+0x1ff:
    fffff800`02af236f 488908          mov     qword ptr [rax],rcx ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ac4ca9 to fffff80002ac5740
    
    STACK_TEXT:  
    fffff880`08b96008 fffff800`02ac4ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`08b96010 fffff800`02ac3920 : fffffa80`0626b010 fffffa80`056fba30 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`08b96150 fffff800`02af236f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`08b962e0 fffff800`02dc0751 : 00000000`00000000 00000000`00000002 00000000`01000000 00000000`00000000 : nt!MiReferenceControlArea+0x1ff
    fffff880`08b96350 fffff800`02db6013 : fffff880`08b965b0 00000000`00000000 fffff880`08b96658 fffff880`08b965a8 : nt!MmCreateSection+0x285
    fffff880`08b96560 fffff800`02f22a23 : 00000000`00000000 fffff8a0`09f847f0 00000000`00000000 00000000`00000001 : nt!NtCreateSection+0x162
    fffff880`08b965e0 fffff800`02f22fb1 : 00000000`00000000 fffff8a0`09f847f0 fffffa80`05d729b0 fffff880`00000060 : nt!PfpFileBuildReadSupport+0x163
    fffff880`08b966d0 fffff800`02f2b0ce : fffff8a0`00000000 fffff8a0`00000003 fffff8a0`0000007c fffff8a0`00000000 : nt!PfpPrefetchFilesTrickle+0x121
    fffff880`08b967d0 fffff800`02f2bc67 : 00000000`00000000 fffff880`08b96c60 fffff880`08b969c8 fffff8a0`00f9b060 : nt!PfpPrefetchRequestPerform+0x30e
    fffff880`08b96920 fffff800`02f3823e : fffff880`08b969c8 fffff880`08b96a01 fffffa80`069cf3a0 00000000`00000000 : nt!PfpPrefetchRequest+0x176
    fffff880`08b96990 fffff800`02f3c96e : 00000000`00000000 00000000`020af560 00000000`0000004f 00000000`08337001 : nt!PfSetSuperfetchInformation+0x1ad
    fffff880`08b96a70 fffff800`02ac4993 : fffffa80`0509eb60 00000000`00000000 00000000`00000001 00000000`00000001 : nt!NtSetSystemInformation+0xb91
    fffff880`08b96be0 00000000`7781144a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`020af538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7781144a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiReferenceControlArea+1ff
    fffff800`02af236f 488908          mov     qword ptr [rax],rcx
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiReferenceControlArea+1ff
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiReferenceControlArea+1ff
    
    BUCKET_ID:  X64_0xA_nt!MiReferenceControlArea+1ff
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`040b3000 fffff880`040f1000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00ec6000 fffff880`00f1d000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c97000 fffff880`02d21000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0413b000 fffff880`04151000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`010c3000 fffff880`010ce000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00fe0000 fffff880`00fe9000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01099000 fffff880`010c3000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`0531d000 fffff880`0533d000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
    fffff880`0480e000 fffff880`05045000   atikmdag atikmdag.sys Tue Jan 04 21:48:52 2011 (4D23DC14)
    fffff880`03f3c000 fffff880`03f89000   atikmpag atikmpag.sys Tue Jan 04 21:19:38 2011 (4D23D53A)
    fffff960`00970000 fffff960`009d1000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
    fffff880`00f8e000 fffff880`00f9a000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`0190e000 fffff880`01915000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03eef000 fffff880`03f00000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`05591000 fffff880`055af000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00660000 fffff960`00687000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0520c000 fffff880`05229000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
    fffff880`018db000 fffff880`01905000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00d32000 fffff880`00df2000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01875000 fffff880`018a5000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cd4000 fffff880`00d32000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0118c000 fffff880`011ff000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00f85000 fffff880`00f8e000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`0412b000 fffff880`0413b000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05471000 fffff880`0547a000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
    fffff880`05229000 fffff880`05237000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03e4e000 fffff880`03ed1000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03ed1000 fffff880`03eef000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02c68000 fffff880`02c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0185f000 fffff880`01875000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0537a000 fffff880`0539c000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05243000 fffff880`0524c000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05237000 fffff880`05243000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0524c000 fffff880`0525f000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05200000 fffff880`0520c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`05045000 fffff880`05139000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`05139000 fffff880`0517f000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`040f1000 fffff880`040fe000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`0111a000 fffff880`0112e000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`052fd000 fffff880`05308000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`010ce000 fffff880`0111a000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01825000 fffff880`0185f000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02a0c000 fffff800`02a55000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`0517f000 fffff880`051a3000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`053a2000 fffff880`053fe000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`040fe000 fffff880`04117000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`0529a000 fffff880`052a2080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`0528c000 fffff880`0529a000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`054c9000 fffff880`05591000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`0149f000 fffff880`014a8000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03f26000 fffff880`03f3c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`0411c000 fffff880`0412b000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`041ec000 fffff880`041fa000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00baa000 fffff800`00bb4000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`03e00000 fffff880`03e43000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013db000 fffff880`013f5000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`0539c000 fffff880`053a1200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`02c77000 fffff880`02c8c000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`051c1000 fffff880`051e4000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c7c000 fffff880`00cc0000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`0525f000 fffff880`0526d000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04025000 fffff880`04034000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`051e4000 fffff880`051f1000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fc6000 fffff880`00fe0000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`055af000 fffff880`055c7000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`055c7000 fffff880`055f4000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`05400000 fffff880`0544e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0544e000 fffff880`05471000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01973000 fffff880`0197e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f26000 fffff880`00f30000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0112e000 fffff880`0118c000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`0148d000 fffff880`0149f000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014ac000 fffff880`0159e000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04175000 fffff880`04181000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`04181000 fffff880`041b0000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`05308000 fffff880`0531d000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d95000 fffff880`02da4000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d21000 fffff880`02d66000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0159e000 fffff880`015fe000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`0197e000 fffff880`0198f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a55000 fffff800`03031000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01238000 fffff880`013db000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01905000 fffff880`0190e000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02d6f000 fffff880`02d95000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f70000 fffff880`00f85000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f30000 fffff880`00f63000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00faf000 fffff880`00fb6000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fb6000 fffff880`00fc6000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06602000 fffff880`066a8000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`03fdf000 fffff880`03fef000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
    fffff880`0533d000 fffff880`0537a000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00cc0000 fffff880`00cd4000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`04151000 fffff880`04175000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`041b0000 fffff880`041cb000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`041cb000 fffff880`041ec000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04000000 fffff880`0401a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`0401a000 fffff880`04025000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01958000 fffff880`01961000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01961000 fffff880`0196a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0196a000 fffff880`01973000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02dd3000 fffff880`02deb000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`066a8000 fffff880`066b3000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`0675a000 fffff880`067f0000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
    fffff880`066f2000 fffff880`0675a000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
    fffff880`066b3000 fffff880`066e0000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
    fffff880`04034000 fffff880`04035480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`066e0000 fffff880`066f2000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`019ad000 fffff880`019ba000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0198f000 fffff880`019ad000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02dbf000 fffff880`02dd3000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005d0000 fffff960`005da000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03f00000 fffff880`03f26000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04036000 fffff880`04048000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`0526d000 fffff880`0528a000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`0528a000 fffff880`0528bf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`051b0000 fffff880`051c1000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`052a3000 fffff880`052fd000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03f89000 fffff880`03fdf000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`051a3000 fffff880`051b0000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00f63000 fffff880`00f70000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01915000 fffff880`01923000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01923000 fffff880`01948000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00f9a000 fffff880`00faf000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02da4000 fffff880`02dbf000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01948000 fffff880`01958000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e13000 fffff880`00eb7000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00eb7000 fffff880`00ec6000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d66000 fffff880`02d6f000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00090000 fffff960`003a0000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`00f1d000 fffff880`00f26000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0404e000 fffff880`040b3000   yk62x64  yk62x64.sys  Mon Sep 28 04:19:31 2009 (4AC07193)
    
    Unloaded modules:
    fffff880`0689f000 fffff880`06910000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`018a5000 fffff880`018b3000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`018b3000 fffff880`018bf000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018bf000 fffff880`018c8000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`018c8000 fffff880`018db000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`040fe000 fffff880`0411c000   i8042prt.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001E000
    
    
     
  11. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    Thanks very much again for the speedy reply.

    The timings written on the memory sticks are indeed 7-7-7-20 What link are you asking for?

    This is the ram info for my motherboard:
    DDR3 Memory
    Dual channel memory architecture
    4 x DIMM, max. 8GB, 1800(O.C)/1600(O.C.)/1333/1066, Non-ECC, un-buffered memory
    Support Intel® XMP Technology

    From what I can make out the ethernet driver is up to date.

    I will run Memtest tonight.
     
  12. Elmer

    Elmer Extraordinary Member

    Joined:
    Mar 5, 2010
    Messages:
    3,873
    Likes Received:
    284
    Hi DarrenK.

    Try this:

    Marvell Yukon networking Enter Part # 88E8040 in Drivers >> Search Box. (Windows 7 & Server 2008 R2 9/15/10 v11.30.1.3)
     
    #12 Elmer, Feb 8, 2011
    Last edited: Feb 8, 2011
  13. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

    Great, the timings are set right at the moment and I wanted to be sure that CPU-Z shows the right specs, sometimes it doesn't.

    Run memtest:




    Marvell driver - check motherboard support and Marvell site:
    Marvell: Support

    Look up your Marvell ID in windows device manager, you need it to download driver from Marvell support.
     
  14. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    Thanks again for your support and time on this!!

    Ok I have found the lastest Yukon driver and installed it. Memtest ran for 10 passes with no errors.

    What exactly is this that was in the optional updates for my PC? ----ATK - system - ATK0110 ACPI UTILITY
    Do I need to install this?


    Sometimes after a BSOD, upon rebooting, my PC recommends a disk check which I do. There doesn't seem to be any errors there either , but this has happened quite a few times now. I usually get a BSOD at start up with apps are starting up.

    Lets see how things go now after the Yukon driver update.....
     
  15. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    ATK0110 ACPI UTILITY is a very important motherboard driver, install it if there's an update for it.
     
  16. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    Thanks Cyber.

    Things were good until I have added my WD velocoraptor disk, now the blue screen are back.

    Here are some new attachments..... :(

    Thanks again for your time on this.
    cpu.PNG SPD2.PNG SPD1.PNG memory.PNG [​IMG]
     

    Attached Files:

  17. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    1600 7-7-7-20, this is probably what you need.


    ~~~~~~~~~





    Update Asus ATK0110 ACPI Utility:
    ASACPI.sys Sun Mar 27 22:30:36 2005
    ASUSTeK Computer Inc.-Support-


    Remove it.









    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\021211-19609-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a5b000 PsLoadedModuleList = 0xfffff800`02c98e50
    Debug session time: Sat Feb 12 14:48:47.786 2011 (UTC - 5:00)
    System Uptime: 0 days 0:39:48.519
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff8800317e678, fffff8800317dee0, fffff80002a9c928}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsDeleteFcb+179 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff8800317e678
    Arg3: fffff8800317dee0
    Arg4: fffff80002a9c928
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff8800317e678 -- (.exr 0xfffff8800317e678)
    ExceptionAddress: fffff80002a9c928 (nt!DeleteNodeFromTree+0x0000000000000128)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff8800317dee0 -- (.cxr 0xfffff8800317dee0)
    rax=0080000000000000 rbx=0080000000000000 rcx=fffffa8004f01640
    rdx=fffff8a00f91a220 rsi=fffffa800aa6bba0 rdi=fffff8a00f91a220
    rip=fffff80002a9c928 rsp=fffff8800317e8b0 rbp=fffffa8004f01640
     r8=0000000000005f5c  r9=0000ffffffffffff r10=fffff88001275880
    r11=fffffa800aa6bba0 r12=fffff8a00f8b15c0 r13=fffffa8004f01180
    r14=fffff8800317e9a1 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    nt!DeleteNodeFromTree+0x128:
    fffff800`02a9c928 488b4008        mov     rax,qword ptr [rax+8] ds:002b:00800000`00000008=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d030e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsDeleteFcb+179
    fffff880`012aef69 4c8b1b          mov     r11,qword ptr [rbx]
    
    FAULTING_IP: 
    nt!DeleteNodeFromTree+128
    fffff800`02a9c928 488b4008        mov     rax,qword ptr [rax+8]
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from fffff80002a9c9d9 to fffff80002a9c928
    
    STACK_TEXT:  
    fffff880`0317e8b0 fffff800`02a9c9d9 : fffffa80`04f01640 fffff800`02c705a0 fffffa80`0aa6bba0 fffffa80`04f01180 : nt!DeleteNodeFromTree+0x128
    fffff880`0317e8f0 fffff880`012aef69 : fffff880`0317e9b0 fffff800`02c705a0 fffff8a0`0f91a220 fffffa80`03eea3e0 : nt!RtlDeleteElementGenericTableAvl+0x39
    fffff880`0317e920 fffff880`01221f6a : fffff800`02c705a0 fffff880`0317eb01 fffff880`0317e9a1 fffff8a0`0f8b15c0 : Ntfs!NtfsDeleteFcb+0x179
    fffff880`0317e980 fffff880`012ac2cc : fffffa80`03eea3e0 fffffa80`04f01180 fffff8a0`0f8b15c0 fffff8a0`0f8b1958 : Ntfs!NtfsTeardownFromLcb+0x1ea
    fffff880`0317ea10 fffff880`0122a882 : fffffa80`03eea3e0 fffffa80`03eea3e0 fffff8a0`0f8b15c0 00000000`00000000 : Ntfs!NtfsTeardownStructures+0xcc
    fffff880`0317ea90 fffff880`012c3813 : fffffa80`03eea3e0 fffff800`02c705a0 fffff8a0`0f8b15c0 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0xa2
    fffff880`0317ead0 fffff880`0129d38f : fffffa80`03eea3e0 fffff8a0`0f8b16f0 fffff8a0`0f8b15c0 fffffa80`04f01180 : Ntfs!NtfsCommonClose+0x353
    fffff880`0317eba0 fffff800`02ad8961 : 00000000`00000000 fffff800`02dc5900 fffffa80`039e3b01 ac38ac18`00000002 : Ntfs!NtfsFspClose+0x15f
    fffff880`0317ec70 fffff800`02d6e7c6 : aa30aa28`aa20aa18 fffffa80`039e3b60 00000000`00000080 fffffa80`039cd040 : nt!ExpWorkerThread+0x111
    fffff880`0317ed00 fffff800`02aa9c26 : fffff880`02f63180 fffffa80`039e3b60 fffff880`02f6dfc0 ac28ac18`ac10ac08 : nt!PspSystemThreadStartup+0x5a
    fffff880`0317ed40 00000000`00000000 : fffff880`0317f000 fffff880`03179000 fffff880`0317e9b0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  Ntfs!NtfsDeleteFcb+179
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    STACK_COMMAND:  .cxr 0xfffff8800317dee0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsDeleteFcb+179
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsDeleteFcb+179
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\021211-23228-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a5e000 PsLoadedModuleList = 0xfffff800`02c9be50
    Debug session time: Sat Feb 12 14:05:22.271 2011 (UTC - 5:00)
    System Uptime: 0 days 0:14:55.003
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 1, fffff80002abadb0}
    
    Probably caused by : memory_corruption ( nt!MiComputeFlushRange+39c )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002abadb0, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d060e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiComputeFlushRange+39c
    fffff800`02abadb0 488908          mov     qword ptr [rax],rcx
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88003193730 -- (.trap 0xfffff88003193730)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0004000000000000
    rdx=0000000080000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002abadb0 rsp=fffff880031938c0 rbp=fffffa80046a6630
     r8=0000000000000000  r9=fffff88002f63180 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!MiComputeFlushRange+0x39c:
    fffff800`02abadb0 488908          mov     qword ptr [rax],rcx ds:64b8:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002acdca9 to fffff80002ace740
    
    STACK_TEXT:  
    fffff880`031935e8 fffff800`02acdca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`031935f0 fffff800`02acc920 : 00000000`00000000 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`03193730 fffff800`02abadb0 : 00000000`00000001 fffff880`049d939f fffff880`03193904 fffffa80`05be63f0 : nt!KiPageFault+0x260
    fffff880`031938c0 fffff800`02aba7a9 : fffff880`00000000 fffff880`03193c18 00000000`00038000 fffff880`031939a0 : nt!MiComputeFlushRange+0x39c
    fffff880`03193950 fffff800`02aba259 : 00000000`0000e021 00000000`00000000 00000000`00038000 00000000`00000000 : nt!MmFlushSection+0x49
    fffff880`03193a10 fffff800`02ac194b : fffffa80`0443dca8 fffff800`00000001 00000000`00000001 fffff800`00038000 : nt!CcFlushCache+0x5e9
    fffff880`03193b10 fffff800`02ac2520 : 00000000`00000000 fffff880`03193c18 00000000`00000000 fffff880`00000000 : nt!CcWriteBehind+0x1eb
    fffff880`03193bc0 fffff800`02adb961 : fffffa80`03a01ee0 fffff880`0513f510 fffff800`02cd5140 fffff800`00000002 : nt!CcWorkerThread+0x1c8
    fffff880`03193c70 fffff800`02d717c6 : 00000000`00000000 fffffa80`03a121a0 00000000`00000080 fffffa80`039e7040 : nt!ExpWorkerThread+0x111
    fffff880`03193d00 fffff800`02aacc26 : fffff880`02f63180 fffffa80`03a121a0 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`03193d40 00000000`00000000 : fffff880`03194000 fffff880`0318e000 fffff880`031939b0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiComputeFlushRange+39c
    fffff800`02abadb0 488908          mov     qword ptr [rax],rcx
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiComputeFlushRange+39c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiComputeFlushRange+39c
    
    BUCKET_ID:  X64_0xA_nt!MiComputeFlushRange+39c
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\021211-28657-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a08000 PsLoadedModuleList = 0xfffff800`02c45e50
    Debug session time: Sat Feb 12 13:49:44.403 2011 (UTC - 5:00)
    System Uptime: 0 days 0:48:30.151
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff80002a9cb10, fffff880072eff20, 0}
    
    Probably caused by : memory_corruption ( nt!MiInsertNode+20 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002a9cb10, Address of the instruction which caused the bugcheck
    Arg3: fffff880072eff20, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!MiInsertNode+20
    fffff800`02a9cb10 493b4018        cmp     rax,qword ptr [r8+18h]
    
    CONTEXT:  fffff880072eff20 -- (.cxr 0xfffff880072eff20)
    rax=0000000000000230 rbx=ffffffffffffffff rcx=0080000000000000
    rdx=0000000000000000 rsi=fffffa800647eb60 rdi=fffffa80061ec060
    rip=fffff80002a9cb10 rsp=fffff880072f08f8 rbp=0000000000001000
     r8=0080000000000000  r9=fffff80002a08000 r10=fffffa8003e027b0
    r11=fffffa80061ec4a8 r12=fffffa8003e027b0 r13=fffffa80061ec060
    r14=fffffa80061ec3f8 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    nt!MiInsertNode+0x20:
    fffff800`02a9cb10 493b4018        cmp     rax,qword ptr [r8+18h] ds:002b:00800000`00000018=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  ekrn.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002a9cb10
    
    STACK_TEXT:  
    fffff880`072f08f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiInsertNode+0x20
    
    
    FOLLOWUP_IP: 
    nt!MiInsertNode+20
    fffff800`02a9cb10 493b4018        cmp     rax,qword ptr [r8+18h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!MiInsertNode+20
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    STACK_COMMAND:  .cxr 0xfffff880072eff20 ; kb
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!MiInsertNode+20
    
    BUCKET_ID:  X64_0x3B_nt!MiInsertNode+20
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`02c77000 fffff880`02cb5000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00ec0000 fffff880`00f17000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02cb8000 fffff880`02d42000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0104c000 fffff880`01062000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`0108f000 fffff880`0109a000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`03bda000 fffff880`03be2000   ASACPI   ASACPI.sys   Sun Mar 27 22:30:36 2005 (42476C4C)
    fffff880`00fda000 fffff880`00fe3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01065000 fffff880`0108f000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`04200000 fffff880`04220000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
    fffff880`048f8000 fffff880`0512f000   atikmdag atikmdag.sys Tue Jan 04 21:48:52 2011 (4D23DC14)
    fffff880`03b0c000 fffff880`03b59000   atikmpag atikmpag.sys Tue Jan 04 21:19:38 2011 (4D23D53A)
    fffff960`00910000 fffff960`00971000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`00f88000 fffff880`00f94000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`019af000 fffff880`019b6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03abf000 fffff880`03ad0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`05a4e000 fffff880`05a6c000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0197c000 fffff880`019a6000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00d25000 fffff880`00de5000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01916000 fffff880`01946000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cc7000 fffff880`00d25000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01158000 fffff880`011cb000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00f7f000 fffff880`00f88000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`01200000 fffff880`01210000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05b5b000 fffff880`05b69000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03a1e000 fffff880`03aa1000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03aa1000 fffff880`03abf000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02c68000 fffff880`02c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01900000 fffff880`01916000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05ad7000 fffff880`05af9000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05b75000 fffff880`05b7e000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05b69000 fffff880`05b75000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05b7e000 fffff880`05b91000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05b91000 fffff880`05b9d000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`04800000 fffff880`048f4000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`0512f000 fffff880`05175000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`02aec000 fffff880`02bc5000   eamonm   eamonm.sys   Thu Dec 09 00:29:20 2010 (4D006930)
    fffff880`019b6000 fffff880`019db000   ehdrv    ehdrv.sys    Thu Dec 09 00:29:58 2010 (4D006956)
    fffff880`06943000 fffff880`06964000   epfwwfpr epfwwfpr.sys Thu Dec 09 00:26:09 2010 (4D006871)
    fffff880`06d9a000 fffff880`06dd0000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`03bcd000 fffff880`03bda000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`010e6000 fffff880`010fa000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`043c9000 fffff880`043d4000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`0109a000 fffff880`010e6000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`013e7000 fffff880`013f1000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`018c6000 fffff880`01900000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02a12000 fffff800`02a5b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`05175000 fffff880`05199000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`05aff000 fffff880`05b5b000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`05bd8000 fffff880`05bf1000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05bf1000 fffff880`05bf9080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05bca000 fffff880`05bd8000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`02a18000 fffff880`02ae0000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`018bd000 fffff880`018c6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03af6000 fffff880`03b0c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`03a00000 fffff880`03a0f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05a1d000 fffff880`05a2b000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bc6000 fffff800`00bd0000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`0431a000 fffff880`0435d000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013bc000 fffff880`013d6000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05af9000 fffff880`05afe200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`02be6000 fffff880`02bfb000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05a2b000 fffff880`05a4e000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c6f000 fffff880`00cb3000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`05b9d000 fffff880`05bab000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04309000 fffff880`04318000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05a00000 fffff880`05a0d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fc0000 fffff880`00fda000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`05a6c000 fffff880`05a84000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`05a84000 fffff880`05ab1000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`068d2000 fffff880`06920000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`06920000 fffff880`06943000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01850000 fffff880`0185b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f20000 fffff880`00f2a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010fa000 fffff880`01158000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`018ab000 fffff880`018bd000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0148d000 fffff880`0157f000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03a0f000 fffff880`03a1b000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`04279000 fffff880`042a8000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`043d4000 fffff880`043e9000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02db6000 fffff880`02dc5000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d42000 fffff880`02d87000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0157f000 fffff880`015df000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`0185b000 fffff880`0186c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a5b000 fffff800`03038000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
    fffff880`01219000 fffff880`013bc000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`019a6000 fffff880`019af000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02d90000 fffff880`02db6000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f6a000 fffff880`00f7f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f2a000 fffff880`00f5d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fa9000 fffff880`00fb0000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fb0000 fffff880`00fc0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013d6000 fffff880`013e7000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06800000 fffff880`068a6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05a0d000 fffff880`05a1d000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
    fffff880`04220000 fffff880`0425d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00cb3000 fffff880`00cc7000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`011cb000 fffff880`011ef000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`042a8000 fffff880`042c3000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`042c3000 fffff880`042e4000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`042e4000 fffff880`042fe000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`042fe000 fffff880`04309000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01835000 fffff880`0183e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0183e000 fffff880`01847000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01847000 fffff880`01850000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01871000 fffff880`018ab000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02a00000 fffff880`02a18000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`068a6000 fffff880`068b1000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`06d04000 fffff880`06d9a000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
    fffff880`06c9c000 fffff880`06d04000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
    fffff880`06964000 fffff880`06991000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
    fffff880`04318000 fffff880`04319480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`06991000 fffff880`069a3000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`019e9000 fffff880`019f6000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`015df000 fffff880`015fd000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02de0000 fffff880`02df4000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00560000 fffff960`0056a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03ad0000 fffff880`03af6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`0435d000 fffff880`0436f000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05bab000 fffff880`05bc8000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05bc8000 fffff880`05bc9f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03b59000 fffff880`03b6a000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`0436f000 fffff880`043c9000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`051a6000 fffff880`051fc000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05199000 fffff880`051a6000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00f5d000 fffff880`00f6a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019db000 fffff880`019e9000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01800000 fffff880`01825000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00f94000 fffff880`00fa9000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02dc5000 fffff880`02de0000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01825000 fffff880`01835000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e0d000 fffff880`00eb1000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00eb1000 fffff880`00ec0000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d87000 fffff880`02d90000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00040000 fffff960`00350000   win32k   win32k.sys   unavailable (00000000)
    fffff880`00f17000 fffff880`00f20000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02bc5000 fffff880`02be6000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`03b6a000 fffff880`03bcd000   yk62x64  yk62x64.sys  Wed Sep 15 10:31:29 2010 (4C90D8C1)
    
    Unloaded modules:
    fffff880`06c00000 fffff880`06c71000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`06c00000 fffff880`06c71000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`01946000 fffff880`01954000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01954000 fffff880`01960000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01960000 fffff880`01969000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01969000 fffff880`0197c000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`03be2000 fffff880`03c00000   i8042prt.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001E000
    
    
     
  18. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    I installed the newest ATK0110 driver from Asus support. The one I had from windows updates was 5 years older !!!

    I am not sure what this is that you wrote though...."ASACPI.sys Sun Mar 27 22:30:36 2005"
    Am I right in thinking that this was in the ATK 0110 driver I got from Asus?

    I try to read the crash dumps but can't understand anything there lol :confused:

    As for the WD Velocelraptor disk; I did a disk scan and it appears ok.
     
  19. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    It's in your crash dump:

    Code:
    [B]fffff880`03bda000 fffff880`03be2000   ASACPI   ASACPI.sys   Sun Mar 27 22:30:36 2005 (42476C4C)[/B]
    
    EDIT: see the code attached in my previous post.
     
    #19 cybercore, Feb 13, 2011
    Last edited: Feb 13, 2011
  20. DarrenK

    DarrenK New Member

    Joined:
    Feb 6, 2011
    Messages:
    32
    Likes Received:
    0
    Sorry but all those numbers and letters do not mean anything to me.
    I'm not really sure what I am reading in those attachments.

    2 more blue screens while playing/launching a game.

    I have attached new files again.

    Thank you for the help thus far :) SPD 3.PNG CPU.PNG SPD 1.PNG Memory.PNG [​IMG]
     

    Attached Files:

Share This Page

Loading...