Windows 7 BSOD Win 7 64bit 3-5 times a day

Hello and welcome.

Navigate to C:\Windows\System32\drivers and delete the following ancient driver:

BIOS64 BIOS64.sys Sat Jun 07 20:12:00 2003

-----------

Reboot and then open an elevated command prompt. Type the following, press enter, and then follow the simple instructions it shows:

chkdsk /r


-----------

Please let us know how it goes after or post new crashes if necessary.

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\Temp\Rar$DI00.759\100110-16754-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a4c000 PsLoadedModuleList = 0xfffff800`02c89e50
Debug session time: Fri Oct  1 09:49:25.021 2010 (UTC - 4:00)
System Uptime: 0 days 0:01:14.050
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88002f458d8, fffff88002f45140, fffff880012ff72f}

Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonClose+26f )

Followup: MachineOwner
---------

0: kd> lmtn
start             end                 module name
fffff800`00ba6000 fffff800`00bb0000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff800`02a03000 fffff800`02a4c000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff800`02a4c000 fffff800`03028000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`00c81000 fffff880`00c8e000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`00c8e000 fffff880`00ca2000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`00ca2000 fffff880`00d00000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d00000 fffff880`00dc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00dc0000 fffff880`00dfa000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`00e2a000 fffff880`00e35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e37000 fffff880`00edb000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00edb000 fffff880`00eea000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00eea000 fffff880`00f41000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`00f41000 fffff880`00f4a000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f4a000 fffff880`00f54000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`00f54000 fffff880`00f87000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f87000 fffff880`00f94000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00f94000 fffff880`00fa9000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fa9000 fffff880`00fbe000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00fbe000 fffff880`00fc5000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fc5000 fffff880`00fd5000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`00fd5000 fffff880`00fef000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00fef000 fffff880`00ff8000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`01030000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`01039000 fffff880`01085000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01085000 fffff880`01099000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01099000 fffff880`010f7000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`010f7000 fffff880`0116a000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0116a000 fffff880`011b6000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`011b6000 fffff880`011f0000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01235000 fffff880`0124b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0124b000 fffff880`01253000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`01255000 fffff880`013f8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`01486000 fffff880`01578000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01578000 fffff880`015d8000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`015d8000 fffff880`015e0000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`015e0000 fffff880`015f2000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`015f2000 fffff880`015fb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`02a0b000 fffff880`02a35000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a35000 fffff880`02a3e000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02a3e000 fffff880`02a45000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02a45000 fffff880`02a53000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02a53000 fffff880`02a78000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`02a78000 fffff880`02a88000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`02a88000 fffff880`02a91000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02a91000 fffff880`02a9a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02a9a000 fffff880`02aa3000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`02aa3000 fffff880`02aae000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02aae000 fffff880`02abf000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02abf000 fffff880`02add000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02add000 fffff880`02aea000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02aea000 fffff880`02b74000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02b74000 fffff880`02bb9000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`02bb9000 fffff880`02bc2000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02bc2000 fffff880`02be8000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`02be8000 fffff880`02bf7000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03e21000 fffff880`03e3e000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`03e3e000 fffff880`03e59000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`03e59000 fffff880`03e6d000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03e6d000 fffff880`03ebe000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03ebe000 fffff880`03eca000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff880`03eca000 fffff880`03ed5000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`03ed5000 fffff880`03ee4000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`03ee4000 fffff880`03f67000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f67000 fffff880`03f85000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03f85000 fffff880`03f96000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03f96000 fffff880`03f9e000   BIOS64   BIOS64.sys   Sat Jun 07 20:12:00 2003 (3EE27F50)
fffff880`03f9e000 fffff880`03fc4000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03fc4000 fffff880`03fd9000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03fd9000 fffff880`03fe8000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04000000 fffff880`040c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`040cf000 fffff880`04112000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`04112000 fffff880`04124000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04124000 fffff880`0417e000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0417e000 fffff880`04193000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04193000 fffff880`041c0000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`04200000 fffff880`0420c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0420c000 fffff880`0423b000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0423b000 fffff880`04256000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04256000 fffff880`04277000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04277000 fffff880`04291000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`04291000 fffff880`0429c000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0429c000 fffff880`042f2000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`042f2000 fffff880`042ff000   usbfilter usbfilter.sys Wed Oct 07 03:44:08 2009 (4ACC46C8)
fffff880`042ff000 fffff880`04300f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04301000 fffff880`04312000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04312000 fffff880`04336000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04336000 fffff880`04353000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`04353000 fffff880`0435f000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0435f000 fffff880`043b6000   Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA)
fffff880`043b6000 fffff880`043c6000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`043c6000 fffff880`043dc000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`043dc000 fffff880`04400000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05800000 fffff880`05818000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05818000 fffff880`05836000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`05836000 fffff880`0584e000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05854000 fffff880`05a81d80   RTKVHD64 RTKVHD64.sys Fri Mar 12 16:47:03 2010 (4B9AB657)
fffff880`05a82000 fffff880`05abf000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`05abf000 fffff880`05ae1000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05ae1000 fffff880`05ae6200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05ae7000 fffff880`05af3000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`05af3000 fffff880`05b01000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`05b01000 fffff880`05b1e000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05b1e000 fffff880`05b2c000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05b2c000 fffff880`05b45000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05b45000 fffff880`05b4d080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05b4e000 fffff880`05b5c000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`05b5c000 fffff880`05b68000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05b68000 fffff880`05b71000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05b71000 fffff880`05b84000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05b84000 fffff880`05b91000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`05b91000 fffff880`05b9f000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`05b9f000 fffff880`05bc2000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`05bc2000 fffff880`05be3000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`05be3000 fffff880`05bf8000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c2c000 fffff880`05c7a000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05c7a000 fffff880`05c9d000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`05c9d000 fffff880`05d43000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05d43000 fffff880`05d4e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`05d4e000 fffff880`05d7b000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`05d7b000 fffff880`05d8d000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`05d8d000 fffff880`05df5000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`06c95000 fffff880`06d2b000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`11c00000 fffff880`11c46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`11c46000 fffff880`11c53000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff880`11c53000 fffff880`11c5e000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`11c5e000 fffff880`11c6d000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`11c6d000 fffff880`11c6e480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`11c71000 fffff880`12902e00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`12903000 fffff880`12904180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`12905000 fffff880`129f9000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff960`00080000 fffff960`0038f000   win32k   win32k.sys   unavailable (00000000)
fffff960`00510000 fffff960`0051a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00690000 fffff960`006b7000   cdd      cdd.dll      unavailable (00000000)

Unloaded modules:
fffff880`011f0000 fffff880`011fe000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`00c5c000 fffff880`00c68000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01030000 fffff880`01039000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`00c68000 fffff880`00c7b000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
blue screen still happen, here is the new minidump folder. please help
 

Attachments

  • Minidump.rar
    54.3 KB · Views: 181
100510-23259-01.dmp
KMODE_EXCEPTION_NOT_HANDLED (1e)
X64_0x1E_Rt64win7+14fad

100510-17815-01.dmp
MEMORY_MANAGEMENT (1a)
X64_0x1a_5002_nt!_??_::FNODOBFM::_string_+2a1c7

100510-19921-01.dmp
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
ataport.SYS ( ataport!AtaPortReadPortBufferUshort+e )



You still have a few outdated drivers, please update them:

Rt64win7.sys
Realtek 8136/8168/8169
Make sure you have the latest Realtek, as it caused one of your latest crash dumps (1e)
Realtek


usbfilter.sys Wed Oct 07 10:44:08 2009
AMD USB Filter
AtiPcie.sys Tue May 05 18:00:22 2009
ATI PCIE chipset
Graphics Drivers & Software



Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\100510-23259-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a66000 PsLoadedModuleList = 0xfffff800`02ca3e50
System Uptime: 0 days 0:09:05.966
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+14fad )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+0
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002f1b8a8 -- (.exr 0xfffff88002f1b8a8)
ExceptionAddress: fffff80002a2176c (hal!HalPutScatterGatherList+0x000000000000001c)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002f1b950 -- (.trap 0xfffff88002f1b950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80002a44e00 rbx=0000000000000000 rcx=fffffa80057b2a70
rdx=ff00fa80057b5730 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a2176c rsp=fffff88002f1bae0 rbp=fffffa80057785a0
 r8=0000000000000001  r9=0000000000000000 r10=0000000000000000
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
hal!HalPutScatterGatherList+0x1c:
fffff800`02a2176c 488b5a08        mov     rbx,qword ptr [rdx+8] ds:2a70:ff00fa80`057b5738=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ace46e to fffff80002ad6710

STACK_TEXT:  
fffff880`02f1a998 fffff800`02ace46e : 00000000`a000000c 00000000`00000000 fffff880`02f1b110 fffff800`02b03668 : nt!KeBugCheck
fffff880`02f1a9a0 fffff800`02afc40d : fffff800`02ce4b7c fffff800`02c1ee84 fffff800`02a66000 fffff880`02f1b8a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f1a9d0 fffff800`02b03a90 : fffff800`02c25b14 fffff880`02f1aa48 fffff880`02f1b8a8 fffff800`02a66000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f1aa00 fffff800`02b109ef : fffff880`02f1b8a8 fffff880`02f1b110 fffff880`00000000 fffffa80`056065a0 : nt!RtlDispatchException+0x410
fffff880`02f1b0e0 fffff800`02ad5d82 : fffff880`02f1b8a8 fffffa80`03b87a80 fffff880`02f1b950 fffffa80`03c75030 : nt!KiDispatchException+0x16f
fffff880`02f1b770 fffff800`02ad468a : fffffa80`03ba9a70 fffff880`01455a47 00000000`00000000 fffffa80`07038c60 : nt!KiExceptionDispatch+0xc2
fffff880`02f1b950 fffff800`02a2176c : fffffa80`057b5540 00000000`00000a00 00000000`00000000 fffffa80`0462d550 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f1bae0 fffff880`014568a1 : fffffa80`03b87a80 fffffa80`057785a0 fffffa80`03c75030 00000000`00000000 : hal!HalPutScatterGatherList+0x1c
fffff880`02f1bb40 fffff880`12b6cfad : fffffa80`05778000 fffffa80`03c75030 fffffa80`05778000 00000000`00000000 : ndis!NdisMFreeNetBufferSGList+0x31
fffff880`02f1bb80 fffffa80`05778000 : fffffa80`03c75030 fffffa80`05778000 00000000`00000000 fffffa80`03ba9a70 : Rt64win7+0x14fad
fffff880`02f1bb88 fffffa80`03c75030 : fffffa80`05778000 00000000`00000000 fffffa80`03ba9a70 00000000`00000000 : 0xfffffa80`05778000
fffff880`02f1bb90 fffffa80`05778000 : 00000000`00000000 fffffa80`03ba9a70 00000000`00000000 00000000`00000000 : 0xfffffa80`03c75030
fffff880`02f1bb98 00000000`00000000 : fffffa80`03ba9a70 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`05778000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Rt64win7+14fad
fffff880`12b6cfad ??              ???

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  Rt64win7+14fad

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Rt64win7

IMAGE_NAME:  Rt64win7.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ba73efa

FAILURE_BUCKET_ID:  X64_0x1E_Rt64win7+14fad

BUCKET_ID:  X64_0x1E_Rt64win7+14fad

Followup: MachineOwner
---------

















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\100510-17815-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Invalid directory table base value 0x0
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a54000 PsLoadedModuleList = 0xfffff800`02c91e50
System Uptime: 0 days 2:35:40.743
Loading Kernel Symbols
..............................................Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000

Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5002, fffff780c0000000, 6dd, ff248cfffffffe}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2a1c7 )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005002, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000006dd
Arg4: 00ff248cfffffffe

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5002

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b340a9 to fffff80002ac4740

STACK_TEXT:  
fffff880`08b8d368 fffff800`02b340a9 : 00000000`0000001a 00000000`00005002 fffff780`c0000000 00000000`000006dd : nt!KeBugCheckEx
fffff880`08b8d370 fffff800`02ae168f : fffff6fc`c0090f78 00000000`00000001 fffff880`00000010 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x2a1c7
fffff880`08b8d4e0 fffff800`02b08cae : fffff980`121ce000 00000000`00030000 00000000`00000000 fffffa80`03e4ad10 : nt!MmCheckCachedPageStates+0x3ef
fffff880`08b8d690 fffff800`02de195b : 00000000`315c0000 00000000`315ce200 fffffa80`03f37390 00000000`004a89ae : nt!CcFetchDataForRead+0x10e
fffff880`08b8d6f0 fffff880`012e9c48 : fffff880`00000000 00000000`00000005 fffffa80`00031e00 fffffa80`0002f001 : nt!CcCopyRead+0x16b
fffff880`08b8d7b0 fffff880`010530c8 : fffffa80`03f37390 fffffa80`03e4aca8 00000000`00000000 fffffa80`03f37301 : Ntfs!NtfsCopyReadA+0x1a8
fffff880`08b8d980 fffff880`01056c2a : fffff880`08b8da50 00000000`004a8903 00000000`004a8900 fffffa80`03f37300 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`08b8d9e0 fffff880`010745f0 : fffffa80`03f37390 00000000`00000000 fffff880`08b8db40 00000000`0002f000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`08b8da20 fffff800`02de2289 : fffffa80`03f37390 00000000`00000001 fffffa80`03a0d750 fffffa80`03f37390 : fltmgr!FltpFastIoRead+0x1d0
fffff880`08b8dac0 fffff800`02ac3993 : 00000000`0000042f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`08b8dbb0 00000000`740f2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008ebf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x740f2dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+2a1c7
fffff800`02b340a9 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+2a1c7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1a_5002_nt!_??_::FNODOBFM::_string_+2a1c7

BUCKET_ID:  X64_0x1a_5002_nt!_??_::FNODOBFM::_string_+2a1c7

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\100510-19921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a52000 PsLoadedModuleList = 0xfffff800`02c8fe50
System Uptime: 0 days 16:43:15.010
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3D, {fffff88002eaf100, 0, 0, fffff88000fbccee}

Probably caused by : ataport.SYS ( ataport!AtaPortReadPortBufferUshort+e )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff88002eaf100
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffff88000fbccee

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3D

PROCESS_NAME:  System

CURRENT_IRQL:  8

EXCEPTION_RECORD:  fffff88002eaf898 -- (.exr 0xfffff88002eaf898)
ExceptionAddress: fffff88000fbccee (ataport!AtaPortReadPortBufferUshort+0x000000000000000e)
   ExceptionCode: c0000096
  ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME:  fffff88002eaf940 -- (.trap 0xfffff88002eaf940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000008000 rbx=0000000000000000 rcx=0000000000000004
rdx=000000000000a000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000fbccee rsp=fffff88002eafad8 rbp=fffffa80049c26a8
 r8=0000000000000004  r9=fffffa80049c2658 r10=00000000000160a7
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport!AtaPortReadPortBufferUshort+0xe:
fffff880`00fbccee 66f36d          rep ins word ptr [rdi],dx
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ac1ca9 to fffff80002ac2740

STACK_TEXT:  
fffff880`02eae848 fffff800`02ac1ca9 : 00000000`0000003d fffff880`02eaf100 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`02eae850 fffff800`02abdfe9 : fffffa80`069adf10 fffff880`0149d831 fffff880`02eaf100 fffff800`02aef668 : nt!KiBugCheckDispatch+0x69
fffff880`02eae990 fffff800`02ae840d : fffff800`02cd0120 fffff800`02c118f4 fffff800`02a52000 fffff880`02eaf898 : nt!KiInterruptHandler+0x29
fffff880`02eae9c0 fffff800`02aefa90 : fffff800`02c118ec fffff880`02eaea38 fffff880`02eaf898 fffff800`02a52000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02eae9f0 fffff800`02afc9ef : fffff880`02eaf898 fffff880`02eaf100 fffff880`00000000 ff00fa80`05017380 : nt!RtlDispatchException+0x410
fffff880`02eaf0d0 fffff800`02ac1d82 : fffff880`02eaf898 fffffa80`0441ec00 fffff880`02eaf940 fffffa80`0453df68 : nt!KiDispatchException+0x16f
fffff880`02eaf760 fffff800`02ac068a : fffffa80`0453db80 fffff880`00fb87ef fffffa80`04bd39e0 00000000`00000001 : nt!KiExceptionDispatch+0xc2
fffff880`02eaf940 fffff880`00fbccee : fffff880`00fb08ff 00000000`00000008 fffffa80`0453db80 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`02eafad8 fffff880`00fb08ff : 00000000`00000008 fffffa80`0453db80 00000000`00000000 fffffa80`0453db80 : ataport!AtaPortReadPortBufferUshort+0xe
fffff880`02eafae0 fffff880`00faf83a : fffffa80`0441ec04 fffffa80`0441ec04 fffff880`02eafc70 fffffa80`0453df68 : atapi!AtapiProcessInterrupt+0x19b
fffff880`02eafb40 fffff800`02abe339 : fffffa80`0441ec58 fffffa80`0441ecc8 fffff880`02eafc70 fffffa80`0441ecc0 : atapi!AtapiHwInterrupt+0x156
fffff880`02eafba0 fffff800`02abe118 : 00000000`00000001 fffffa80`0453db80 00000000`00000000 fffff880`00fc30fc : nt!KiScanInterruptObjectList+0x69
fffff880`02eafbf0 fffff800`02acaec2 : fffff880`02e87180 fffff880`00000001 00000000`00000001 fffff880`00000000 : nt!KiChainedDispatch+0x128
fffff880`02eafd80 00000000`00000000 : fffff880`02eb0000 fffff880`02eaa000 fffff880`02eafd40 00000000`00000000 : nt!KiIdleLoop+0x32


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!AtaPortReadPortBufferUshort+e
fffff880`00fbccee 66f36d          rep ins word ptr [rdi],dx

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  ataport!AtaPortReadPortBufferUshort+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0x3D_ataport!AtaPortReadPortBufferUshort+e

BUCKET_ID:  X64_0x3D_ataport!AtaPortReadPortBufferUshort+e

Followup: MachineOwner
---------










start             end                 module name
fffff800`00bb4000 fffff800`00bbe000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02a09000 fffff800`02a52000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02a52000 fffff800`0302e000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00ca9000 fffff880`00cb6000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00cb6000 fffff880`00cca000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00cca000 fffff880`00d28000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d28000 fffff880`00de8000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00de8000 fffff880`00df7000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00e00000 fffff880`00e4c000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`00e4d000 fffff880`00ea4000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00ea4000 fffff880`00ead000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00ead000 fffff880`00eb7000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00eb7000 fffff880`00eea000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00eea000 fffff880`00ef7000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00ef7000 fffff880`00f0c000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00f0c000 fffff880`00f21000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00f21000 fffff880`00f7d000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00f7d000 fffff880`00f84000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00f84000 fffff880`00f94000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00f94000 fffff880`00fae000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00fae000 fffff880`00fb7000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00fb7000 fffff880`00fe1000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00fe1000 fffff880`00fec000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00fec000 fffff880`01000000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01000000 fffff880`01030000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01055000 fffff880`011f8000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`01200000 fffff880`01216000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01216000 fffff880`0121e000   AtiPcie  AtiPcie.sys  Tue May 05 18:00:22 2009 (4A005486)
fffff880`0122a000 fffff880`01288000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01288000 fffff880`012a2000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`012a2000 fffff880`01315000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`01315000 fffff880`01326000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`01326000 fffff880`01330000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01330000 fffff880`0137c000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0137c000 fffff880`013b6000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`013b6000 fffff880`013f0000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`0148d000 fffff880`01496000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`0149b000 fffff880`0158d000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0158d000 fffff880`015ed000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`015ed000 fffff880`015ff000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`02a00000 fffff880`02a45000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02a45000 fffff880`02a4e000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02a4e000 fffff880`02a74000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02a77000 fffff880`02aa1000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02aa1000 fffff880`02aaa000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`02aaa000 fffff880`02ab1000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`02ab1000 fffff880`02abf000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`02abf000 fffff880`02ae4000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`02ae4000 fffff880`02af4000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02af4000 fffff880`02afd000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02afd000 fffff880`02b06000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02b06000 fffff880`02b0f000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`02b0f000 fffff880`02b1a000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02b1a000 fffff880`02b2b000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`02b2b000 fffff880`02b49000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`02b49000 fffff880`02b56000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`02b56000 fffff880`02be0000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02be0000 fffff880`02bef000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03e2d000 fffff880`03e4a000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`03e4a000 fffff880`03e65000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`03e65000 fffff880`03e79000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03e79000 fffff880`03eca000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03eca000 fffff880`03ed6000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03ed6000 fffff880`03ee1000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03ee1000 fffff880`03ef0000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03ef0000 fffff880`03f73000   csc      csc.sys      Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`03f73000 fffff880`03f91000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03f91000 fffff880`03fa2000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03fa2000 fffff880`03fc8000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`03fc8000 fffff880`03fdd000   amdppm   amdppm.sys   Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`03fdd000 fffff880`03fec000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`03fec000 fffff880`03ffb000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04000000 fffff880`04024000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04024000 fffff880`04030000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04030000 fffff880`0403b000   rdpbus   rdpbus.sys   Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`0403b000 fffff880`0403c480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`04042000 fffff880`04088000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`04088000 fffff880`04095000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`04095000 fffff880`040a0000   usbohci  usbohci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`040a0000 fffff880`040f6000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`040f6000 fffff880`04103000   usbfilter usbfilter.sys Wed Oct 07 10:44:08 2009 (4ACC46C8)
fffff880`04103000 fffff880`04104f00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`04105000 fffff880`04116000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`04116000 fffff880`0413a000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0413a000 fffff880`04157000   parport  parport.sys  Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`04157000 fffff880`04163000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`041ba000 fffff880`041ca000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`041ca000 fffff880`041e0000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`041e0000 fffff880`041fb000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04200000 fffff880`042c8000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`042c8000 fffff880`042f5000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`042f6000 fffff880`04339000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`04339000 fffff880`0434b000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`0434b000 fffff880`043a5000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`043a5000 fffff880`043ba000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`05800000 fffff880`0580e000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`0580e000 fffff880`05831000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`05831000 fffff880`05852000   WudfPf   WudfPf.sys   Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`05852000 fffff880`05867000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`05867000 fffff880`0587f000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0587f000 fffff880`0589d000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`0589d000 fffff880`058b5000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`058c2000 fffff880`05aefd80   RTKVHD64 RTKVHD64.sys Fri Mar 12 23:47:03 2010 (4B9AB657)
fffff880`05af0000 fffff880`05b2d000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`05b2d000 fffff880`05b4f000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`05b4f000 fffff880`05b54200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`05b55000 fffff880`05b61000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`05b61000 fffff880`05b7e000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`05b7e000 fffff880`05b8c000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`05b8c000 fffff880`05ba5000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`05ba5000 fffff880`05bad080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`05bae000 fffff880`05bbc000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`05bbc000 fffff880`05bc8000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05bc8000 fffff880`05bd1000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05bd1000 fffff880`05be4000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`05be4000 fffff880`05bf1000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`05bf1000 fffff880`05bff000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`05c00000 fffff880`05c2d000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`05c2d000 fffff880`05c3f000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`05c3f000 fffff880`05ca7000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`05cbd000 fffff880`05d0b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`05d0b000 fffff880`05d2e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`05d2e000 fffff880`05dd4000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`05dd4000 fffff880`05ddf000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`06031000 fffff880`06067000   fastfat  fastfat.SYS  Tue Jul 14 02:23:28 2009 (4A5BC1F0)
fffff880`060a7000 fffff880`0613d000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`0613d000 fffff880`06194000   Rt64win7 Rt64win7.sys Mon Mar 22 11:57:14 2010 (4BA73EFA)
fffff880`061ae000 fffff880`061b9000   asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff880`11c00000 fffff880`11c21000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`11c21000 fffff880`11c3b000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`11c45000 fffff880`128d6e00   nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
fffff880`128d7000 fffff880`128d8180   nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
fffff880`128d9000 fffff880`129cd000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`129cd000 fffff880`129fc000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff960`000e0000 fffff960`003ef000   win32k   win32k.sys   unavailable (00000000)
fffff960`00520000 fffff960`0052a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00710000 fffff960`00737000   cdd      cdd.dll      unavailable (00000000)

Unloaded modules:
fffff880`0613d000 fffff880`06194000   Rt64win7.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`04163000 fffff880`041ba000   Rt64win7.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0613d000 fffff880`0616e000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`06067000 fffff880`06082000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`06000000 fffff880`06031000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`061b9000 fffff880`061d4000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0613d000 fffff880`061ae000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`013f0000 fffff880`013fe000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0121e000 fffff880`0122a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01030000 fffff880`01039000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01039000 fffff880`0104c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
 
Update the Realtek (Realtek 8136/8168/8169 PCI/PCIe Adapter) if there's a version newer than March 2010:



fffff880`12b58000 fffff880`12baf000 Rt64win7 T (no symbols)
Loaded symbol image file: Rt64win7.sys
Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
Image name: Rt64win7.sys
Timestamp: Mon Mar 22 11:57:14 2010 (4BA73EFA)
CheckSum: 0005CA6C
ImageSize: 00057000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4

Code:
fffffa80`03e4aca8 00000000`00000000 fffffa80`03f37301 : Ntfs!NtfsCopyReadA+0x1a8

Check the hard drive:

cmd -> chkdsk /r /f

HDDScan


If the hdd is Ok, then run Advanced Memory Diagnostic Tool overnight.
 
100510-19921-01.dmp
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
ataport.SYS ( ataport!AtaPortReadPortBufferUshort+e )

cmd -> chkdsk /r /f

HDDScan
 
i run the hdddscan and the result is on the pic
 

Attachments

  • Untitled.jpg
    Untitled.jpg
    202.1 KB · Views: 439
Hello,

Seems like CRC (Cyclic redundancy check) mostly happen due to a faulty cable. Try changing the cable and see if that go away if not it's a good idea to backup the data and RMA the Hard drive. The dump files are pointing to Direct X Drivers mostly a false postive. To be on safe side update the Display drivers. Try running a Memory Diagnostic as well here is a link for help Link Removed - Invalid URL

Bugcheck:

Code:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa80007ac2b0
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------

BUGCHECK_STR:  0x1a_41790
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
PROCESS_NAME:  left4dead2.exe
CURRENT_IRQL:  0
LAST_CONTROL_TRANSFER:  from fffff80002af9f9e to fffff80002a86740
STACK_TEXT:  
fffff880`05328358 fffff800`02af9f9e : 00000000`0000001a 00000000`00041790 fffffa80`007ac2b0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`05328360 fffff800`02ab9df9 : 00000000`00000000 00000000`5732bfff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33906
fffff880`05328520 fffff800`02d9f1d0 : fffffa80`06a98430 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`05328640 fffff880`12bca548 : 00000000`00000000 fffffa80`03b87b30 00000980`00000001 00000000`57080000 : nt!MiUnmapViewOfSection+0x1b0
fffff880`05328700 fffff880`12bbe9fa : fffff8a0`07a501a0 fffff8a0`07a501a0 fffffa80`03dd7101 fffff8a0`07a501a0 : dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+0x78
fffff880`05328730 fffff880`12bc7d99 : fffffa80`04542000 00000000`00000000 00000000`00000001 00000000`00000006 : dxgmms1!VidMmUnmapViewOfAllocation+0x56
fffff880`05328760 fffff880`12bc6bbc : fffffa80`06122d30 fffff8a0`07a501a0 00000000`000000d8 00000000`002ac000 : dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x59d
fffff880`053287f0 fffff880`12bc16a0 : fffff8a0`07a501a0 fffff8a0`07a501a0 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_SEGMENT::LockAllocationBackingStore+0x80
fffff880`05328860 fffff880`12bb5af3 : fffffa80`03fc8bc0 fffffa80`06119000 fffffa80`06119001 fffff880`12bb5600 : dxgmms1!VIDMM_APERTURE_SEGMENT::CommitResource+0x1c4
fffff880`053288b0 fffff880`12bb2763 : 00000000`00000000 fffffa80`03dd7000 00000000`00000000 fffffa80`03c795c0 : dxgmms1!VIDMM_GLOBAL::PageInAllocations+0xbb
fffff880`05328910 fffff880`12bcc65d : 00000000`00000000 fffff8a0`022f03f0 fffffa80`00000000 fffffa80`03defc30 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0xccf
fffff880`05328ae0 fffff880`12bcc398 : fffff880`0308bfc0 fffff880`12bcbd00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`05328cd0 fffff880`12bcbe96 : 00000000`00000000 fffffa80`03cab820 00000000`00000080 fffffa80`05fcb010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`05328d00 fffff800`02d2ac06 : 00000000`0c48c96d fffffa80`060e2060 fffffa80`03973890 fffffa80`060e2060 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`05328d40 fffff800`02a64c26 : fffff880`03087180 fffffa80`060e2060 fffff880`03092040 fffff880`01263534 : nt!PspSystemThreadStartup+0x5a
fffff880`05328d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16

STACK_COMMAND:  kb
FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+78
fffff880`12bca548 8327fd          and     dword ptr [rdi],0FFFFFFFDh
SYMBOL_STACK_INDEX:  4
SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+78
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME:  dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578
FAILURE_BUCKET_ID:  X64_0x1a_41790_dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+78
BUCKET_ID:  X64_0x1a_41790_dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+78
Followup: MachineOwner
---------
0: kd> lmvm dxgmms1
start             end                 module name
fffff880`12b94000 fffff880`12bda000   dxgmms1    (pdb symbols)          c:\symcache\dxgmms1.pdb\685AF9F266284BE19008B39B739A572B1\dxgmms1.pdb
    Loaded symbol image file: dxgmms1.sys
    Mapped memory image file: c:\symcache\dxgmms1.sys\4A5BC57846000\dxgmms1.sys
    Image path: \SystemRoot\System32\drivers\dxgmms1.sys
    Image name: dxgmms1.sys
    Timestamp:        Tue Jul 14 05:08:32 2009 (4A5BC578)
    CheckSum:         0004AD44
    ImageSize:        00046000
    File version:     6.1.7600.16385
    Product version:  6.1.7600.16385
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     dxgmms1.sys
    OriginalFilename: dxgmms1.sys
    ProductVersion:   6.1.7600.16385
    FileVersion:      6.1.7600.16385 (win7_rtm.090713-1255)
    FileDescription:  DirectX Graphics MMS
    LegalCopyright:   © Microsoft Corporation. All rights reserved.

Hope this helps,
Captain
 
Latest bsod is another 0x24 NTFS crash. Some NTFS partition out of them all on your system is corrupt and needs fixing or possibly physical replacement.

Run the checkdisk command for all NTFS partitions on the system, changing C: to match each time:

chkdsk /r C:

chkdsk /r D:

etc...

---------

If you still receive bsods, you'll have to figure out which hard drive partition is causing errors and remove the hard drive it's on, by looking in the event manager.
 
I did everything that u guys told me to do, but BOSD still happen. i am not sure could that be my video card driver problem sometimes there is a message pop up and said the video card driver stopped respond. i tried to reinstall my video driver but problem still goes on everyday. All hardware beside the power supply is new.

Here is my pc hardware list
 

Attachments

  • Minidump.rar
    169.9 KB · Views: 254
Last edited:
BugCheck 3B, {c0000005, ...
BugCheck 24 ( Ntfs!NtfsCommonRead+91d )
BugCheck 3B, {c0000005, ... nvlddmkm.sys ( nvlddmkm+1b54c3 ) nvlddmkm.sys Sat Jul 10 00:15:58 2010
BugCheck 3D, {fffff88002eaf100, ... ataport.SYS ( ataport!AtaPortReadPortBufferUshort+e )
BugCheck 3B, {c0000005, ... win32k.sys ( win32k!xxxRealInternalGetMessage+2aa )




Update these ones:

NTACCESS_64.sys Wed Apr 27 12:55:40 2005
Ntaccess driver


nvlddmkm.sys Mon Sep 28 03:12:06 2009
nvBridge.kmd Mon Sep 28 02:46:14 2009
NVIDIA nForce

AtiPcie.sys Tue May 05 18:00:22 2009
ATI PCIE Driver for ATI PCIE chipset





If crashes persist, replace AVG with MSE:

AVG Worldwide - Download tools

Link Removed due to 404 Error




Scan your hard disk for errors:

cmd -> chkdsk /r
S.M.A.R.T. HDDScan





Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100810-17050-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5e000 PsLoadedModuleList = 0xfffff800`02c9be50
Debug session time: Sat Oct  9 03:34:55.784 2010 (GMT-5)
System Uptime: 0 days 6:04:30.126
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002ad1cdc, fffff8800ad1c810, 0}

Probably caused by : ntkrnlmp.exe ( nt!KeWaitForMultipleObjects+202 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ad1cdc, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800ad1c810, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!KeWaitForMultipleObjects+202
fffff800`02ad1cdc 488908          mov     qword ptr [rax],rcx

CONTEXT:  fffff8800ad1c810 -- (.cxr 0xfffff8800ad1c810)
rax=ff00fa800719b388 rbx=fffffa8006fb7168 rcx=fffffa8006fb7198
rdx=fffffa800719b388 rsi=fffffa8006fb7060 rdi=fffffa800719b380
rip=fffff80002ad1cdc rsp=fffff8800ad1d1e0 rbp=fffffa8006fb71b0
 r8=0000000000000000  r9=0000000000000001 r10=0000000000000002
r11=0000000000000006 r12=0000000000000001 r13=fffff8800ad1d520
r14=fffff880009e9180 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!KeWaitForMultipleObjects+0x202:
fffff800`02ad1cdc 488908          mov     qword ptr [rax],rcx ds:002b:ff00fa80`0719b388=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  iexplore.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002ad1cdc

STACK_TEXT:  
fffff880`0ad1d1e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeWaitForMultipleObjects+0x202


FOLLOWUP_IP: 
nt!KeWaitForMultipleObjects+202
fffff800`02ad1cdc 488908          mov     qword ptr [rax],rcx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KeWaitForMultipleObjects+202

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff8800ad1c810 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!KeWaitForMultipleObjects+202

BUCKET_ID:  X64_0x3B_nt!KeWaitForMultipleObjects+202

Followup: MachineOwner
---------















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100610-16411-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Thu Oct  7 01:38:12.118 2010 (GMT-5)
System Uptime: 0 days 0:01:42.460
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88009ace398, fffff88009acdc00, fffff8800123269d}

Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonRead+91d )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88009ace398
Arg3: fffff88009acdc00
Arg4: fffff8800123269d

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88009ace398 -- (.exr 0xfffff88009ace398)
ExceptionAddress: fffff8800123269d (Ntfs!NtfsCommonRead+0x000000000000091d)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88009acdc00 -- (.cxr 0xfffff88009acdc00)
rax=0000000000000000 rbx=fffff8a0036a5c70 rcx=f8800127e1840000
rdx=0000000000000000 rsi=0000000000000001 rdi=fffff8a0036a5b08
rip=fffff8800123269d rsp=fffff88009ace5d0 rbp=fffff88009ace8f0
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
r11=fffff88009ace700 r12=0000000000060001 r13=ff00fa8003af8c10
r14=0000000000004000 r15=fffff88009ace7a0
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
Ntfs!NtfsCommonRead+0x91d:
fffff880`0123269d 418b7530        mov     esi,dword ptr [r13+30h] ds:002b:ff00fa80`03af8c40=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc10e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsCommonRead+91d
fffff880`0123269d 418b7530        mov     esi,dword ptr [r13+30h]

FAULTING_IP: 
Ntfs!NtfsCommonRead+91d
fffff880`0123269d 418b7530        mov     esi,dword ptr [r13+30h]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff88001234f78 to fffff8800123269d

STACK_TEXT:  
fffff880`09ace5d0 fffff880`01234f78 : fffff880`09ace7a0 fffffa80`03af8c10 fffff880`09ace801 fffffa80`06f11001 : Ntfs!NtfsCommonRead+0x91d
fffff880`09ace770 fffff880`0105923f : fffffa80`03af8fb0 fffffa80`03af8c10 fffffa80`06f11010 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
fffff880`09ace970 fffff880`010576df : fffffa80`04937900 fffffa80`03af8c10 fffffa80`04937900 fffffa80`03af8c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`09acea00 fffff800`02a7b1f2 : fffffa80`03af8c30 fffffa80`051c8320 00000000`00000043 00000000`77688ba8 : fltmgr!FltpDispatch+0xcf
fffff880`09acea60 fffff800`02a7b4f5 : 00000000`00000001 00000000`00000001 fffff880`09aceb20 00000000`00000000 : nt!IoPageRead+0x252
fffff880`09aceaf0 fffff800`02aa48bb : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255
fffff880`09aceb80 fffff800`02a8782e : 00000000`00000000 00000000`000143fc 00000000`17050e01 00000000`00000000 : nt!MmAccessFault+0x14bb
fffff880`09acece0 00000000`778451df : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`036fc000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778451df


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsCommonRead+91d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff88009acdc00 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonRead+91d

BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonRead+91d

Followup: MachineOwner
---------

















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100710-21325-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a51000 PsLoadedModuleList = 0xfffff800`02c8ee50
Debug session time: Fri Oct  8 05:17:40.329 2010 (GMT-5)
System Uptime: 0 days 1:09:58.311
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff88011e634c3, fffff8800951f3e0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+1b54c3 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88011e634c3, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800951f3e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nvlddmkm+1b54c3
fffff880`11e634c3 493b5008        cmp     rdx,qword ptr [r8+8]

CONTEXT:  fffff8800951f3e0 -- (.cxr 0xfffff8800951f3e0)
rax=ff00f8800811fa20 rbx=fffff8800951fe40 rcx=fffff8800951fe70
rdx=fffffa8004239060 rsi=0000000000000000 rdi=fffff8800951fe70
rip=fffff88011e634c3 rsp=fffff8800951fdb0 rbp=fffffa80041df470
 r8=ff00f8800811fa20  r9=fffff880128de730 r10=fffffa8004239060
r11=000003d17e1d8500 r12=fffff88009520870 r13=0000000040200000
r14=0000000000184000 r15=fffffa8005585000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0x1b54c3:
fffff880`11e634c3 493b5008        cmp     rdx,qword ptr [r8+8] ds:002b:ff00f880`0811fa28=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  left4dead2.exe

CURRENT_IRQL:  e

LAST_CONTROL_TRANSFER:  from fffff8800951fe40 to fffff88011e634c3

STACK_TEXT:  
fffff880`0951fdb0 fffff880`0951fe40 : fffff900`c08b9910 00000000`00000000 fffff880`11e2ca68 fffff880`0951fe70 : nvlddmkm+0x1b54c3
fffff880`0951fdb8 fffff900`c08b9910 : 00000000`00000000 fffff880`11e2ca68 fffff880`0951fe70 fffff880`11e8c758 : 0xfffff880`0951fe40
fffff880`0951fdc0 00000000`00000000 : fffff880`11e2ca68 fffff880`0951fe70 fffff880`11e8c758 000003d1`7e1d8500 : 0xfffff900`c08b9910


FOLLOWUP_IP: 
nvlddmkm+1b54c3
fffff880`11e634c3 493b5008        cmp     rdx,qword ptr [r8+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nvlddmkm+1b54c3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c37918e

STACK_COMMAND:  .cxr 0xfffff8800951f3e0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nvlddmkm+1b54c3

BUCKET_ID:  X64_0x3B_nvlddmkm+1b54c3

Followup: MachineOwner















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100510-19921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a52000 PsLoadedModuleList = 0xfffff800`02c8fe50
Debug session time: Tue Oct  5 23:42:42.668 2010 (GMT-5)
System Uptime: 0 days 16:43:15.010
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3D, {fffff88002eaf100, 0, 0, fffff88000fbccee}

Probably caused by : ataport.SYS ( ataport!AtaPortReadPortBufferUshort+e )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff88002eaf100
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffff88000fbccee

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3D

PROCESS_NAME:  System

CURRENT_IRQL:  8

EXCEPTION_RECORD:  fffff88002eaf898 -- (.exr 0xfffff88002eaf898)
ExceptionAddress: fffff88000fbccee (ataport!AtaPortReadPortBufferUshort+0x000000000000000e)
   ExceptionCode: c0000096
  ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME:  fffff88002eaf940 -- (.trap 0xfffff88002eaf940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000008000 rbx=0000000000000000 rcx=0000000000000004
rdx=000000000000a000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000fbccee rsp=fffff88002eafad8 rbp=fffffa80049c26a8
 r8=0000000000000004  r9=fffffa80049c2658 r10=00000000000160a7
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport!AtaPortReadPortBufferUshort+0xe:
fffff880`00fbccee 66f36d          rep ins word ptr [rdi],dx
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ac1ca9 to fffff80002ac2740

STACK_TEXT:  
fffff880`02eae848 fffff800`02ac1ca9 : 00000000`0000003d fffff880`02eaf100 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`02eae850 fffff800`02abdfe9 : fffffa80`069adf10 fffff880`0149d831 fffff880`02eaf100 fffff800`02aef668 : nt!KiBugCheckDispatch+0x69
fffff880`02eae990 fffff800`02ae840d : fffff800`02cd0120 fffff800`02c118f4 fffff800`02a52000 fffff880`02eaf898 : nt!KiInterruptHandler+0x29
fffff880`02eae9c0 fffff800`02aefa90 : fffff800`02c118ec fffff880`02eaea38 fffff880`02eaf898 fffff800`02a52000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02eae9f0 fffff800`02afc9ef : fffff880`02eaf898 fffff880`02eaf100 fffff880`00000000 ff00fa80`05017380 : nt!RtlDispatchException+0x410
fffff880`02eaf0d0 fffff800`02ac1d82 : fffff880`02eaf898 fffffa80`0441ec00 fffff880`02eaf940 fffffa80`0453df68 : nt!KiDispatchException+0x16f
fffff880`02eaf760 fffff800`02ac068a : fffffa80`0453db80 fffff880`00fb87ef fffffa80`04bd39e0 00000000`00000001 : nt!KiExceptionDispatch+0xc2
fffff880`02eaf940 fffff880`00fbccee : fffff880`00fb08ff 00000000`00000008 fffffa80`0453db80 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`02eafad8 fffff880`00fb08ff : 00000000`00000008 fffffa80`0453db80 00000000`00000000 fffffa80`0453db80 : ataport!AtaPortReadPortBufferUshort+0xe
fffff880`02eafae0 fffff880`00faf83a : fffffa80`0441ec04 fffffa80`0441ec04 fffff880`02eafc70 fffffa80`0453df68 : atapi!AtapiProcessInterrupt+0x19b
fffff880`02eafb40 fffff800`02abe339 : fffffa80`0441ec58 fffffa80`0441ecc8 fffff880`02eafc70 fffffa80`0441ecc0 : atapi!AtapiHwInterrupt+0x156
fffff880`02eafba0 fffff800`02abe118 : 00000000`00000001 fffffa80`0453db80 00000000`00000000 fffff880`00fc30fc : nt!KiScanInterruptObjectList+0x69
fffff880`02eafbf0 fffff800`02acaec2 : fffff880`02e87180 fffff880`00000001 00000000`00000001 fffff880`00000000 : nt!KiChainedDispatch+0x128
fffff880`02eafd80 00000000`00000000 : fffff880`02eb0000 fffff880`02eaa000 fffff880`02eafd40 00000000`00000000 : nt!KiIdleLoop+0x32


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!AtaPortReadPortBufferUshort+e
fffff880`00fbccee 66f36d          rep ins word ptr [rdi],dx

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  ataport!AtaPortReadPortBufferUshort+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0x3D_ataport!AtaPortReadPortBufferUshort+e

BUCKET_ID:  X64_0x3D_ataport!AtaPortReadPortBufferUshort+e

Followup: MachineOwner



























start             end                 module name
fffff880`11cae000 fffff880`1293fe00   nvlddmkm T (no symbols)           
    Loaded symbol image file: nvlddmkm.sys
    Image path: \SystemRoot\system32\DRIVERS\nvlddmkm.sys
    Image name: nvlddmkm.sys
    Timestamp:        Sat Jul 10 00:15:58 2010 (4C37918E)
    CheckSum:         00CA10CD
    ImageSize:        00C91E00
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4






















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\100810-21621-  01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a07000 PsLoadedModuleList = 0xfffff800`02c44e50
Debug session time: Fri Oct  8 19:45:15.298 2010 (GMT-5)
System Uptime: 0 days 0:20:13.641
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff960001696ea, fffff8800a29f0a0, 0}

Probably caused by : win32k.sys ( win32k!xxxRealInternalGetMessage+2aa )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960001696ea, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800a29f0a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
win32k!xxxRealInternalGetMessage+2aa
fffff960`001696ea 488b8b70010000  mov     rcx,qword ptr [rbx+170h]

CONTEXT:  fffff8800a29f0a0 -- (.cxr 0xfffff8800a29f0a0)
rax=0000000000000001 rbx=ff00f900c1f7bc30 rcx=0000000000000000
rdx=8000000000040000 rsi=0000000000000001 rdi=0000000000000000
rip=fffff960001696ea rsp=fffff8800a29fa70 rbp=fffff8800a29fca0
 r8=00000000001284c8  r9=0000000000000000 r10=fffffffffffffffe
r11=00000000000ab8af r12=0000000000000001 r13=fffff8800a29fbd8
r14=00000000000025ff r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
win32k!xxxRealInternalGetMessage+0x2aa:
fffff960`001696ea 488b8b70010000  mov     rcx,qword ptr [rbx+170h] ds:002b:ff00f900`c1f7bda0=????????????????
Resetting default scope

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  taskmgr.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff96000169d21 to fffff960001696ea

STACK_TEXT:  
fffff880`0a29fa70 fffff960`00169d21 : 00000000`00000000 fffff800`000025ff 00000000`00000000 fffffa80`ffffffff : win32k!xxxRealInternalGetMessage+0x2aa
fffff880`0a29fb50 fffff960`0016b725 : 00000000`00000020 fffff960`0017956e 00ff0000`0020f288 fffff880`0a29fca0 : win32k!xxxInternalGetMessage+0x35
fffff880`0a29fb90 fffff800`02a76993 : fffffa80`04093b60 00000000`ff7d0000 00000000`00000020 00000000`00387ea0 : win32k!NtUserGetMessage+0x75
fffff880`0a29fc20 00000000`779fc92a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0020f1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779fc92a


FOLLOWUP_IP: 
win32k!xxxRealInternalGetMessage+2aa
fffff960`001696ea 488b8b70010000  mov     rcx,qword ptr [rbx+170h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!xxxRealInternalGetMessage+2aa

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c483f

STACK_COMMAND:  .cxr 0xfffff8800a29f0a0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_win32k!xxxRealInternalGetMessage+2aa

BUCKET_ID:  X64_0x3B_win32k!xxxRealInternalGetMessage+2aa

Followup: MachineOwner












start             end                 module name
fffff800`00ba6000 fffff800`00bb0000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02a07000 fffff800`02fe3000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`02fe3000 fffff800`0302c000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00c35000 fffff880`00c81000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`00c8c000 fffff880`00c99000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00c99000 fffff880`00cad000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00cad000 fffff880`00d0b000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d0b000 fffff880`00dcb000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00dcb000 fffff880`00de5000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00de5000 fffff880`00dee000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0d000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00e0d000 fffff880`00e22000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00e22000 fffff880`00e37000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e37000 fffff880`00e93000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00e93000 fffff880`00e9a000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00e9a000 fffff880`00eaa000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00eae000 fffff880`00f52000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f52000 fffff880`00f61000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f61000 fffff880`00fb8000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00fb8000 fffff880`00fc1000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fc1000 fffff880`00fcb000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00fcb000 fffff880`00ffe000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`01086000 fffff880`010c0000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`010c0000 fffff880`010d6000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`010eb000 fffff880`010ff000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`010ff000 fffff880`0115d000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`0115d000 fffff880`011d0000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`011d0000 fffff880`01200000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01235000 fffff880`0123d000   AtiPcie  AtiPcie.sys  Tue May 05 18:00:22 2009 (4A005486)
fffff880`01248000 fffff880`013eb000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0144a000 fffff880`0145a000   vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`0145e000 fffff880`01550000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`01550000 fffff880`015b0000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`015b0000 fffff880`015db000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`015db000 fffff880`015e3000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`015e3000 fffff880`015f5000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`015f5000 fffff880`015fe000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`02a00000 fffff880`02a8a000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02a8a000 fffff880`02acf000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02acf000 fffff880`02ad8000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02b02000 fffff880`02b2c000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02b2c000 fffff880`02b35000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`02b35000 fffff880`02b3c000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`02b3c000 fffff880`02b4a000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`02b4a000 fffff880`02b6f000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`02b6f000 fffff880`02b7f000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02b7f000 fffff880`02b88000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02b88000 fffff880`02b91000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02b91000 fffff880`02b9a000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`02b9a000 fffff880`02ba5000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02ba5000 fffff880`02bb6000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`02bb6000 fffff880`02bd4000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`02bd4000 fffff880`02be1000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`03e00000 fffff880`03e83000   csc      csc.sys      Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`03e83000 fffff880`03ea1000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03ea1000 fffff880`03eb2000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03ec8000 fffff880`03eee000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`03eee000 fffff880`03efd000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03efd000 fffff880`03f1a000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`03f1a000 fffff880`03f35000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`03f35000 fffff880`03f49000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03f49000 fffff880`03f9a000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03f9a000 fffff880`03fa6000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03fa6000 fffff880`03fb1000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03fb1000 fffff880`03fc0000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03fc0000 fffff880`03fe2000   avipbb   avipbb.sys   Mon Feb 22 12:08:50 2010 (4B8257B2)
fffff880`03fe2000 fffff880`03ffd000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04007000 fffff880`0402d000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`0402d000 fffff880`04042000   amdppm   amdppm.sys   Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`04042000 fffff880`04136000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`04136000 fffff880`0418d000   Rt64win7 Rt64win7.sys Mon Mar 22 11:57:14 2010 (4BA73EFA)
fffff880`0418d000 fffff880`041b1000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`041b1000 fffff880`041bd000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`041bd000 fffff880`041ec000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04235000 fffff880`04256000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`04256000 fffff880`04270000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`04270000 fffff880`0427b000   rdpbus   rdpbus.sys   Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`0427b000 fffff880`0428a000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0428a000 fffff880`04299000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04299000 fffff880`0429a480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`0429b000 fffff880`042de000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`042de000 fffff880`042f0000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`042f0000 fffff880`0434a000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`0434a000 fffff880`0435f000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`0435f000 fffff880`043f5000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`04600000 fffff880`04611000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`04611000 fffff880`04635000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`04635000 fffff880`04652000   parport  parport.sys  Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`04652000 fffff880`0465e000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0465e000 fffff880`0466e000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0466e000 fffff880`04684000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`04684000 fffff880`05147a80   nvlddmkm nvlddmkm.sys Mon Sep 28 03:12:06 2009 (4ABFFF56)
fffff880`05149000 fffff880`0514a180   nvBridge nvBridge.kmd Mon Sep 28 02:46:14 2009 (4ABFF946)
fffff880`0514b000 fffff880`05191000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`05191000 fffff880`0519e000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`0519e000 fffff880`051a9000   usbohci  usbohci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`051a9000 fffff880`051ff000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`05200000 fffff880`0524e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`05252000 fffff880`0531a000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`0531a000 fffff880`05328000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`05328000 fffff880`05334000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05334000 fffff880`0533d000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`0533d000 fffff880`05350000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`05350000 fffff880`0536e000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`0536e000 fffff880`05386000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`05386000 fffff880`053b3000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`053b3000 fffff880`053d6000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`06600000 fffff880`0660e000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`0660e000 fffff880`0662b000   cdfs     cdfs.sys     Tue Jul 14 02:19:46 2009 (4A5BC112)
fffff880`0662b000 fffff880`0664e000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`0664e000 fffff880`0666b000   avgntflt avgntflt.sys Thu Feb 11 17:12:02 2010 (4B741E42)
fffff880`0666b000 fffff880`0668c000   WudfPf   WudfPf.sys   Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`0668c000 fffff880`066a1000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`066a1000 fffff880`066b9000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`066c4000 fffff880`0691fd80   RTKVHD64 RTKVHD64.sys Fri Sep 03 11:02:27 2010 (4C80AB93)
fffff880`06920000 fffff880`0695d000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`0695d000 fffff880`0697f000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`0697f000 fffff880`06984200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`06985000 fffff880`06991000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`0699f000 fffff880`069bc000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`069bc000 fffff880`069bdf00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`069be000 fffff880`069cc000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`069cc000 fffff880`069e5000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`069e5000 fffff880`069ed080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`069ee000 fffff880`069fb000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`07e71000 fffff880`07e7c000   asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff880`07e7c000 fffff880`07e8a000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`07e95000 fffff880`07f3b000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`07f3b000 fffff880`07f46000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`07f46000 fffff880`07f73000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`07f73000 fffff880`07f85000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`07f85000 fffff880`07fed000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`07fed000 fffff880`07ffb000   NTACCESS_64 NTACCESS_64.sys Wed Apr 27 12:55:40 2005 (426F619C)
fffff960`000a0000 fffff960`003af000   win32k   win32k.sys   Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`00580000 fffff960`0058a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Wed May 19 22:48:26 2010 (4BF4408A)

Unloaded modules:
fffff880`07e00000 fffff880`07e71000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`04685000 fffff880`05149000   nvlddmkm.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`06991000 fffff880`0699f000   monitor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`013eb000 fffff880`013f9000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`010d6000 fffff880`010e2000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0123d000 fffff880`01246000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`02aef000 fffff880`02b02000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
 
:-c

LoL, 100710-21325-01.dmp shows you were playing Left4Dead 2, so how do you like this game? Is it any cooler than L4D 1? I played the 1st part, not bad when online, but it was like them all rushing at you and all I could do there was shoot non-stop. Perhaps they added an element of quest this time? ; )


 
what is Ntaccess driver and NVIDIA nForce? i tried to google but not sure which one i should download. Can u give me the link??
 
All I can tell about this one it's too old and must be updated. MSI I guess, something like c:\Program Files\MSI\Live Update 3\ntaccess_64.sys.


NTACCESS_64.sys Wed Apr 27 12:55:40 2005
Ntaccess driver


nvlddmkm.sys Mon Sep 28 03:12:06 2009
nvBridge.kmd Mon Sep 28 02:46:14 2009
NVIDIA nForce
Your videocard driver


nForce - I actually wanted to say Forceware. LoL
 
Uninstall MSI Core Center, Live Update and any other motherboard utilities you might have.

That very likely will not help, but could.

More likely you have a memory issue. Defective RAM or incorrect bios setting for it.
 
Last edited:
Back
Top