- Thread Author
- #1
Hi.
Here is my info.
I hope you will get a solution to fix my blue screen error.
I have attached the info...in a zip file.
Here is my info.
I hope you will get a solution to fix my blue screen error.
I have attached the info...in a zip file.
- Thread Author
- #2
blue screen error
Hi.
My pc was running extremely good before yesterday.I was playing game and a blue screen appeared and it restarts my pc.
Anyone knows how to fix it?If you want more information let me know.
And when my pc restarts,check online solution box appeared.I clicked on details and this info came.
Locale ID: 1033
Additional information about the problem:
BCCode: a
BCP1: 0000000000000008
BCP2: 0000000000000002
BCP3: 0000000000000000
BCP4: FFFFF800028EDC06
OS Version: 6_1_7600
Service Pack: 0_0
Product: 256_1
Files that help describe the problem:
C:\Windows\Minidump\020511-23805-01.dmp
C:\Users\Imran\AppData\Local\Temp\WER-34663-0.sysdata.xml
and here is the link to the dumped files.
Link Removed - Invalid URL
I hope anyone would get a solution of it.
Hi.
My pc was running extremely good before yesterday.I was playing game and a blue screen appeared and it restarts my pc.
Anyone knows how to fix it?If you want more information let me know.
And when my pc restarts,check online solution box appeared.I clicked on details and this info came.
Locale ID: 1033
Additional information about the problem:
BCCode: a
BCP1: 0000000000000008
BCP2: 0000000000000002
BCP3: 0000000000000000
BCP4: FFFFF800028EDC06
OS Version: 6_1_7600
Service Pack: 0_0
Product: 256_1
Files that help describe the problem:
C:\Windows\Minidump\020511-23805-01.dmp
C:\Users\Imran\AppData\Local\Temp\WER-34663-0.sysdata.xml
and here is the link to the dumped files.
Link Removed - Invalid URL
I hope anyone would get a solution of it.
Elmer
Extraordinary Member
- Joined
- Mar 5, 2010
- Messages
- 3,864
- Thread Author
- #4
Re: blue screen error
Hi.
Here are the dump files and the sdp images.
I hope you will get a solution to fix my blue screen error
Hi.
Here are the dump files and the sdp images.
I hope you will get a solution to fix my blue screen error
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
Update old drivers:
Intel HD Audio driver
sthda64.sys Wed Nov 16 14:49:04 2005
Broadcom NetXtreme Gigabit Ethernet
b57nd60a.sys Sun Apr 26 07:14:55 2009
If crashes reoccur,
Link Removed
Take the screenshots of SPD under each slot.
Crash Dumps:
Drivers:
Intel HD Audio driver
sthda64.sys Wed Nov 16 14:49:04 2005
Broadcom NetXtreme Gigabit Ethernet
b57nd60a.sys Sun Apr 26 07:14:55 2009
If crashes reoccur,
Link Removed
Take the screenshots of SPD under each slot.
Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020611-21746-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02866000 PsLoadedModuleList = 0xfffff800`02aa3e50
Debug session time: Sun Feb 6 12:56:09.371 2011 (UTC - 5:00)
System Uptime: 0 days 0:02:20.260
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800028f7a83}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028f7a83, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0e0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`028f7a83 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: takeown.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff880026da330 -- (.trap 0xfffff880026da330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880026da728 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028f7a83 rsp=fffff880026da4c0 rbp=0000000000000000
r8=fffffa8003d94df0 r9=fffff880026da5c0 r10=0000000000000002
r11=fffffa8004188750 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`028f7a83 488b09 mov rcx,qword ptr [rcx] ds:0e80:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028d7469 to fffff800028d7f00
STACK_TEXT:
fffff880`026da1e8 fffff800`028d7469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`026da1f0 fffff800`028d60e0 : 00000000`00000002 fffffa80`03c94860 fffffa80`018433f0 fffff880`026da3d9 : nt!KiBugCheckDispatch+0x69
fffff880`026da330 fffff800`028f7a83 : fffffa80`02ad7b60 fffff800`028dddda 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`026da4c0 fffff800`028b492f : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`026da590 fffff800`02934748 : fffffa80`02ad7b60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`026da610 fffff800`02bd64d4 : fffffa80`00000000 fffff8a0`00000001 00000000`00000000 fffff8a0`02036c00 : nt! ?? ::FNODOBFM::`string'+0xf5be
fffff880`026da690 00000000`00000200 : 00000001`00000080 fffff880`026da728 fffff880`026da728 0050a000`00000000 : nt!AlpcpCompleteDispatchMessage+0x9a4
fffff880`026da720 00000001`00000080 : fffff880`026da728 fffff880`026da728 0050a000`00000000 00000000`00000000 : 0x200
fffff880`026da728 fffff880`026da728 : fffff880`026da728 0050a000`00000000 00000000`00000000 fffff880`026d0000 : 0x1`00000080
fffff880`026da730 fffff880`026da728 : 0050a000`00000000 00000000`00000000 fffff880`026d0000 fffff880`026da8a0 : 0xfffff880`026da728
fffff880`026da738 0050a000`00000000 : 00000000`00000000 fffff880`026d0000 fffff880`026da8a0 00000000`00010002 : 0xfffff880`026da728
fffff880`026da740 00000000`00000000 : fffff880`026d0000 fffff880`026da8a0 00000000`00010002 fffffa80`03532420 : 0x50a000`00000000
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`028d60e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020711-17830-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02853000 PsLoadedModuleList = 0xfffff800`02a90e50
Debug session time: Mon Feb 7 00:54:22.684 2011 (UTC - 5:00)
System Uptime: 0 days 0:07:23.573
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff800028a4634}
Probably caused by : ntkrnlmp.exe ( nt!KiExitDispatcher+90 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028a4634, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002afb0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiExitDispatcher+90
fffff800`028a4634 488908 mov qword ptr [rax],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff880025a0980 -- (.trap 0xfffff880025a0980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8003b6c968
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028a4634 rsp=fffff880025a0b10 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000002 r10=0000000000000001
r11=00000000001fffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiExitDispatcher+0x90:
fffff800`028a4634 488908 mov qword ptr [rax],rcx ds:69c0:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028c4469 to fffff800028c4f00
STACK_TEXT:
fffff880`025a0838 fffff800`028c4469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`025a0840 fffff800`028c30e0 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`025a0980 fffff800`028a4634 : fffffa80`0374a3d0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`025a0b10 fffff800`028aa7e0 : fffff880`02f00180 fffff880`025a0c00 fffff880`00000001 fffffa80`00000002 : nt!KiExitDispatcher+0x90
fffff880`025a0b80 fffff800`02baec15 : fffffa80`03e96601 fffff880`025a0ca0 00000000`00000000 80000000`00000001 : nt!KeAlertThread+0x70
fffff880`025a0bd0 fffff800`028c4153 : 00000000`000000a8 fffffa80`03757060 00000000`00000000 00000000`00000000 : nt!NtAlertThread+0x51
fffff880`025a0c20 00000000`7724058a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01f2ed38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7724058a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiExitDispatcher+90
fffff800`028a4634 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiExitDispatcher+90
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiExitDispatcher+90
BUCKET_ID: X64_0xA_nt!KiExitDispatcher+90
Followup: MachineOwner
---------
Drivers:
Code:
start end module name
fffff880`00edd000 fffff880`00f34000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03a10000 fffff880`03a9a000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`040c4000 fffff880`040da000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00fec000 fffff880`00ff7000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fe3000 fffff880`00fec000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01897000 fffff880`018df000 b57nd60a b57nd60a.sys Sun Apr 26 07:14:55 2009 (49F4422F)
fffff880`019d2000 fffff880`019d9000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03cb8000 fffff880`03cc9000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02aca000 fffff880`02ae8000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00620000 fffff960`00647000 cdd cdd.dll Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`00d15000 fffff880`00dd5000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01939000 fffff880`01969000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cb7000 fffff880`00d15000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`040b4000 fffff880`040c4000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02b9c000 fffff880`02ba5000 cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`04265000 fffff880`04273000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c17000 fffff880`03c9a000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03c9a000 fffff880`03cb8000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03bd1000 fffff880`03be0000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01923000 fffff880`01939000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0423d000 fffff880`0425f000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0427f000 fffff880`04288000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04273000 fffff880`0427f000 dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04288000 fffff880`0429b000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0429b000 fffff880`042a7000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03d05000 fffff880`03df9000 dxgkrnl dxgkrnl.sys Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`0f000000 fffff880`0f046000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0fdc0000 fffff880`0fdf6000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`0407e000 fffff880`0408b000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`0112b000 fffff880`0113f000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010df000 fffff880`0112b000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013d1000 fffff880`013db000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018e9000 fffff880`01923000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`0280a000 fffff800`02853000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0f046000 fffff880`0f06a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`03f01000 fffff880`03f1a000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`043ea000 fffff880`043f2080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`042a7000 fffff880`042b5000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02a02000 fffff880`02aca000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f5000 fffff880`015fe000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`00fb1000 fffff880`00fb9000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03cef000 fffff880`03d05000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0419a000 fffff880`041a9000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03f1a000 fffff880`03f28000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b97000 fffff800`00b9a000 kdcom kdcom.dll Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`041ba000 fffff880`041fd000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013a6000 fffff880`013c0000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015b0000 fffff880`015db000 ksecpkg ksecpkg.sys Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`0425f000 fffff880`04264200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03f87000 fffff880`03f9c000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03f43000 fffff880`03f66000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c5f000 fffff880`00ca3000 mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`03f35000 fffff880`03f43000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`041a9000 fffff880`041b8000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03f28000 fffff880`03f35000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fc9000 fffff880`00fe3000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02ae8000 fffff880`02b00000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02b00000 fffff880`02b2c000 mrxsmb mrxsmb.sys Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`02b2c000 fffff880`02b79000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`02b79000 fffff880`02b9c000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`01850000 fffff880`0185b000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f3d000 fffff880`00f47000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0113f000 fffff880`0119d000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03bc6000 fffff880`03bd1000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e3000 fffff880`015f5000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0145e000 fffff880`01550000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`040fe000 fffff880`0410a000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0410a000 fffff880`04139000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03eec000 fffff880`03f01000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03b0e000 fffff880`03b1d000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03a9a000 fffff880`03adf000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01550000 fffff880`015b0000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0185b000 fffff880`0186c000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03bba000 fffff880`03bc6000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02853000 fffff800`02e30000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01203000 fffff880`013a6000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`019c9000 fffff880`019d2000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fdbe000 fffff880`0fdbf180 nvBridge nvBridge.kmd Tue Mar 23 19:11:12 2010 (4BA94A90)
fffff880`0f087000 fffff880`0fdbdc80 nvlddmkm nvlddmkm.sys Tue Mar 23 19:33:35 2010 (4BA94FCF)
fffff880`03ae8000 fffff880`03b0e000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`0408b000 fffff880`040a8000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f87000 fffff880`00f9c000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f47000 fffff880`00f7a000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fb9000 fffff880`00fc9000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013c0000 fffff880`013d1000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`03866000 fffff880`0390c000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04200000 fffff880`0423d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ca3000 fffff880`00cb7000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`040da000 fffff880`040fe000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04139000 fffff880`04154000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04154000 fffff880`04175000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04175000 fffff880`0418f000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03b69000 fffff880`03bba000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0418f000 fffff880`0419a000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01835000 fffff880`0183e000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0183e000 fffff880`01847000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01847000 fffff880`01850000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0119d000 fffff880`011d7000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03f9c000 fffff880`03fb4000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0390c000 fffff880`03917000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`040a8000 fffff880`040b4000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03b1d000 fffff880`03b3a000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015db000 fffff880`015e3000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`056e2000 fffff880`0577a000 srv srv.sys Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`03e00000 fffff880`03e69000 srv2 srv2.sys Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`03917000 fffff880`03944000 srvnet srvnet.sys Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`042b7000 fffff880`043ea000 sthda64 sthda64.sys Wed Nov 16 14:49:04 2005 (437B8D30)
fffff880`041b8000 fffff880`041b9480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`03944000 fffff880`03956000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0188a000 fffff880`01897000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0186c000 fffff880`0188a000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03b55000 fffff880`03b69000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00430000 fffff960`0043a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03cc9000 fffff880`03cef000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04000000 fffff880`04012000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`043f3000 fffff880`043f4f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0406d000 fffff880`0407e000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e92000 fffff880`03eec000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04017000 fffff880`0406d000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0f06a000 fffff880`0f077000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f7a000 fffff880`00f87000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019d9000 fffff880`019e7000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01800000 fffff880`01825000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0144a000 fffff880`0145a000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f9c000 fffff880`00fb1000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01073000 fffff880`010bf000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03b3a000 fffff880`03b55000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01825000 fffff880`01835000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e2a000 fffff880`00ece000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ece000 fffff880`00edd000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03adf000 fffff880`03ae8000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000f0000 fffff960`003ff000 win32k win32k.sys Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`00f34000 fffff880`00f3d000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03f66000 fffff880`03f87000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`03956000 fffff880`039c7000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01969000 fffff880`01977000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01977000 fffff880`01983000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01983000 fffff880`0198c000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`0198c000 fffff880`0199f000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
fffff880`0199f000 fffff880`019c9000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002A000
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
- Thread Author
- #7
Re: blue screen error
memory tab
memory tab
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
- Thread Author
- #9
Re: blue screen error
I have updated....Still no use...same error coming.
I have attached the latest dump file.
I have updated....Still no use...same error coming.
I have attached the latest dump file.
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
Re: blue screen error
BUGCHECK_STR: 0x1E_c0000005
I'm sorry, what happened to those 2 drivers, there are no tracks of them, they are gone. You were supposed to update them, not delete or rename. Or perhaps did you reinstall the OS.
Run Memtest86+ - Advanced Memory Diagnostic Tool
Run it 10 passes overnight.
If it detects no errors, reinstall the OS.
Crash Dumps:
Drivers:
I have updated....Still no use...same error coming.
I have attached the latest dump file.
BUGCHECK_STR: 0x1E_c0000005
I'm sorry, what happened to those 2 drivers, there are no tracks of them, they are gone. You were supposed to update them, not delete or rename. Or perhaps did you reinstall the OS.
Run Memtest86+ - Advanced Memory Diagnostic Tool
Run it 10 passes overnight.
If it detects no errors, reinstall the OS.
Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020711-19141-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`01c0a000 PsLoadedModuleList = 0xfffff800`01e47e50
Debug session time: Mon Feb 7 10:28:07.548 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:28.189
Loading Kernel Symbols
...............................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80001c7a21a, 0, ffffffffffffffff}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+39a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80001c7a21a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiPageFault+39a
fffff800`01c7a21a 48cf iretq
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001eb20e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: AtBroker.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880030f3398 -- (.trap 0xfffff880030f3398)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00000c030 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8002f79000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000401802 rsp=0000000003f7fdd5 rbp=0000000000000000
r8=0000000020206f49 r9=0000000000000002 r10=0000002e00000000
r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=2 ov dn ei pl zr na pe cy
e7a0:fffff880`00401802 ?? ???
Resetting default scope
UNALIGNED_STACK_POINTER: 0000000003f7fdd5
LAST_CONTROL_TRANSFER: from fffff80001cbba17 to fffff80001c7bf00
STACK_TEXT:
fffff880`030f2978 fffff800`01cbba17 : 00000000`0000001e ffffffff`c0000005 fffff800`01c7a21a 00000000`00000000 : nt!KeBugCheckEx
fffff880`030f2980 fffff800`01c7b542 : fffff880`030f3158 fffffa80`02774010 fffff880`030f3200 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`030f3020 fffff800`01c79e4a : fffff8a0`01405010 00000000`00000011 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0xc2
fffff880`030f3200 fffff800`01c7a21a : fffff800`01f5f455 00000000`00000200 00000000`00010292 fffff880`030f33c0 : nt!KiGeneralProtectionFault+0x10a
fffff880`030f3398 fffff800`01c87efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x39a
fffff900`c1ad0ce0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExReleaseResourceAndLeavePriorityRegion+0x12
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+39a
fffff800`01c7a21a 48cf iretq
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiPageFault+39a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiPageFault+39a
BUCKET_ID: X64_0x1E_c0000005_nt!KiPageFault+39a
Followup: MachineOwner
---------
Drivers:
Code:
start end module name
fffff880`00eea000 fffff880`00f41000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`00e2a000 fffff880`00e35000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00ff0000 fffff880`00ff9000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0197b000 fffff880`01982000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`018a5000 fffff880`018b6000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0190c000 fffff880`0193c000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d2c000 fffff880`00d8a000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01120000 fffff880`01193000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`019e1000 fffff880`019f1000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`028f7000 fffff880`02905000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`018f6000 fffff880`0190c000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02911000 fffff880`0291a000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02905000 fffff880`02911000 dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0291a000 fffff880`0292d000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0297a000 fffff880`02986000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00540000 fffff960`0055e000 dxg dxg.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`028c1000 fffff880`028f7000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01898000 fffff880`018a5000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`010ae000 fffff880`010c2000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01062000 fffff880`010ae000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff960`008d0000 fffff960`008d9000 framebuf framebuf.dll Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01211000 fffff880`0121b000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018bc000 fffff880`018f6000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0148b000 fffff880`014d5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`021e7000 fffff800`02230000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`01800000 fffff880`01824000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0293b000 fffff880`02954000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`02954000 fffff880`0295c080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0292d000 fffff880`0293b000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`015f6000 fffff880`015ff000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`00fbe000 fffff880`00fc6000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0103a000 fffff880`01049000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0295f000 fffff880`0296d000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba0000 fffff800`00ba3000 kdcom kdcom.dll Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`02812000 fffff880`02855000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013e4000 fffff880`013fe000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`00cd4000 fffff880`00d18000 mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`01049000 fffff880`01058000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0296d000 fffff880`0297a000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fd6000 fffff880`00ff0000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`019c5000 fffff880`019d0000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f4a000 fffff880`00f54000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010c2000 fffff880`01120000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`019f1000 fffff880`019fc000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e4000 fffff880`015f6000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014da000 fffff880`015cc000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`019d0000 fffff880`019e1000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff800`01c0a000 fffff800`021e7000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01241000 fffff880`013e4000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01972000 fffff880`0197b000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`00f94000 fffff880`00fa9000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f54000 fffff880`00f87000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fc6000 fffff880`00fd6000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00d18000 fffff880`00d2c000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0121b000 fffff880`01226000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01000000 fffff880`0103a000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`019fc000 fffff880`019fd480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`01226000 fffff880`0123a000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00780000 fffff960`0078a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02855000 fffff880`02867000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0295d000 fffff880`0295ef00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`01887000 fffff880`01898000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`02867000 fffff880`028c1000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`01831000 fffff880`01887000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`01824000 fffff880`01831000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f87000 fffff880`00f94000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01982000 fffff880`01990000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01990000 fffff880`019b5000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015cc000 fffff880`015dc000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fa9000 fffff880`00fbe000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d8a000 fffff880`00de6000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01193000 fffff880`011df000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`019b5000 fffff880`019c5000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e37000 fffff880`00edb000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00edb000 fffff880`00eea000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff960`00050000 fffff960`0035f000 win32k win32k.sys Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`00f41000 fffff880`00f4a000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02986000 fffff880`029a7000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`0193c000 fffff880`0194a000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0194a000 fffff880`01956000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01956000 fffff880`0195f000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`0195f000 fffff880`01972000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
fffff880`015dc000 fffff880`015e4000 spldr.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00008000
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
- Thread Author
- #12
Re: blue screen error
i run the test...test pass...no error..... here are the latest dump files
i run the test...test pass...no error..... here are the latest dump files
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
Re: blue screen error
Update SigmaTel Audio driver, it's too old:
sthda64.sys Wed Nov 16 14:49:04 2005
If crashes persist still, it might be something with the system/configuration, or a hardware issue. PSU? RAM? Motherboard?
Reinstall the OS, do not install any old incompattible drivers. If it crashes with a blue screen - blame the hardware for sure.
Crash Dumps:
Drivers:
Update SigmaTel Audio driver, it's too old:
sthda64.sys Wed Nov 16 14:49:04 2005
If crashes persist still, it might be something with the system/configuration, or a hardware issue. PSU? RAM? Motherboard?
Reinstall the OS, do not install any old incompattible drivers. If it crashes with a blue screen - blame the hardware for sure.
Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020911-24336-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0285a000 PsLoadedModuleList = 0xfffff800`02a97e50
Debug session time: Wed Feb 9 04:30:10.482 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:39.370
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800028eba83}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028eba83, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b020e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`028eba83 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: wmpnscfg.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff88002e306e0 -- (.trap 0xfffff88002e306e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002173728 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028eba83 rsp=fffff88002e30870 rbp=0000000000000000
r8=fffffa8003d2d010 r9=fffff88002e30970 r10=0000000000000002
r11=fffffa8002fd3b70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`028eba83 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028cb469 to fffff800028cbf00
STACK_TEXT:
fffff880`02e30598 fffff800`028cb469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02e305a0 fffff800`028ca0e0 : 00000000`00000000 fffffa80`03d96640 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02e306e0 fffff800`028eba83 : fffffa80`00000000 fffffa80`04053290 00000000`00000000 fffff800`028d3b3c : nt!KiPageFault+0x260
fffff880`02e30870 fffff800`028a892f : 00000000`00000001 00000000`0011f000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`02e30940 fffff800`0287dba9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02e309c0 fffff800`02c0e2da : fffffa80`032d0df0 fffffa80`04053290 fffff880`02e30b50 fffff880`02e30b48 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`02e309f0 fffff800`02be2ebf : fffffa80`00000004 fffffa80`04053290 fffff880`02e30b50 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x2a83e
fffff880`02e30ae0 fffff800`028cb153 : 00000000`0000000c fffffa80`0403fb60 00000000`0023ea88 00000000`0023eb01 : nt!NtMapViewOfSection+0x2be
fffff880`02e30bb0 00000000`7778013a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0023ea68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7778013a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`028ca0e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020911-20295-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02852000 PsLoadedModuleList = 0xfffff800`02a8fe50
Debug session time: Tue Feb 8 15:42:34.865 2011 (UTC - 5:00)
System Uptime: 0 days 0:04:16.753
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff8800225d738, 2, 1, fffff88000dde074}
Unable to load image ataport.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ataport.SYS
*** ERROR: Module load completed but symbols could not be loaded for ataport.SYS
Probably caused by : ataport.SYS ( ataport+13074 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800225d738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000dde074, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002afa0e0
fffff8800225d738
CURRENT_IRQL: 2
FAULTING_IP:
ataport+13074
fffff880`00dde074 488901 mov qword ptr [rcx],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050a00000000000 rbx=0000000000000000 rcx=fffff8800225d738
rdx=000002000045e8c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dde074 rsp=fffff80000b9ca38 rbp=fffffa80026c07d0
r8=0000000000000012 r9=0000000000000002 r10=fffffa8002698610
r11=fffff8800225d738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ataport+0x13074:
fffff880`00dde074 488901 mov qword ptr [rcx],rax ds:ffb0:fffff880`0225d738=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028c3469 to fffff800028c3f00
STACK_TEXT:
fffff800`00b9c758 fffff800`028c3469 : 00000000`0000000a fffff880`0225d738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`028c20e0 : fffffa80`026986a8 00000000`00000002 fffffa80`00000000 fffffa80`026986a8 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff880`00dde074 : fffff880`00dd74a5 fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 : nt!KiPageFault+0x260
fffff800`00b9ca38 fffff880`00dd74a5 : fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 : ataport+0x13074
fffff800`00b9ca40 fffffa80`025a4000 : fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 : ataport+0xc4a5
fffff800`00b9ca48 fffff880`00dd7b34 : fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 : 0xfffffa80`025a4000
fffff800`00b9ca50 fffff800`00b9caa8 : 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 : ataport+0xcb34
fffff800`00b9ca58 00000000`00000000 : fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 fffffa80`025a55d3 : 0xfffff800`00b9caa8
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport+13074
fffff880`00dde074 488901 mov qword ptr [rcx],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ataport+13074
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xD1_ataport+13074
BUCKET_ID: X64_0xD1_ataport+13074
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800225d738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000dde074, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffff8800225d738
CURRENT_IRQL: 2
FAULTING_IP:
ataport+13074
fffff880`00dde074 488901 mov qword ptr [rcx],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050a00000000000 rbx=0000000000000000 rcx=fffff8800225d738
rdx=000002000045e8c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dde074 rsp=fffff80000b9ca38 rbp=fffffa80026c07d0
r8=0000000000000012 r9=0000000000000002 r10=fffffa8002698610
r11=fffff8800225d738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ataport+0x13074:
fffff880`00dde074 488901 mov qword ptr [rcx],rax ds:ffb0:fffff880`0225d738=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028c3469 to fffff800028c3f00
STACK_TEXT:
fffff800`00b9c758 fffff800`028c3469 : 00000000`0000000a fffff880`0225d738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`028c20e0 : fffffa80`026986a8 00000000`00000002 fffffa80`00000000 fffffa80`026986a8 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff880`00dde074 : fffff880`00dd74a5 fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 : nt!KiPageFault+0x260
fffff800`00b9ca38 fffff880`00dd74a5 : fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 : ataport+0x13074
fffff800`00b9ca40 fffffa80`025a4000 : fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 : ataport+0xc4a5
fffff800`00b9ca48 fffff880`00dd7b34 : fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 : 0xfffffa80`025a4000
fffff800`00b9ca50 fffff800`00b9caa8 : 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 : ataport+0xcb34
fffff800`00b9ca58 00000000`00000000 : fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 fffffa80`025a55d3 : 0xfffff800`00b9caa8
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport+13074
fffff880`00dde074 488901 mov qword ptr [rcx],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ataport+13074
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xD1_ataport+13074
BUCKET_ID: X64_0xD1_ataport+13074
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800225d738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000dde074, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffff8800225d738
CURRENT_IRQL: 2
FAULTING_IP:
ataport+13074
fffff880`00dde074 488901 mov qword ptr [rcx],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050a00000000000 rbx=0000000000000000 rcx=fffff8800225d738
rdx=000002000045e8c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dde074 rsp=fffff80000b9ca38 rbp=fffffa80026c07d0
r8=0000000000000012 r9=0000000000000002 r10=fffffa8002698610
r11=fffff8800225d738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ataport+0x13074:
fffff880`00dde074 488901 mov qword ptr [rcx],rax ds:ffb0:fffff880`0225d738=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028c3469 to fffff800028c3f00
STACK_TEXT:
fffff800`00b9c758 fffff800`028c3469 : 00000000`0000000a fffff880`0225d738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`028c20e0 : fffffa80`026986a8 00000000`00000002 fffffa80`00000000 fffffa80`026986a8 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff880`00dde074 : fffff880`00dd74a5 fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 : nt!KiPageFault+0x260
fffff800`00b9ca38 fffff880`00dd74a5 : fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 : ataport+0x13074
fffff800`00b9ca40 fffffa80`025a4000 : fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 : ataport+0xc4a5
fffff800`00b9ca48 fffff880`00dd7b34 : fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 : 0xfffffa80`025a4000
fffff800`00b9ca50 fffff800`00b9caa8 : 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 : ataport+0xcb34
fffff800`00b9ca58 00000000`00000000 : fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 fffffa80`025a55d3 : 0xfffff800`00b9caa8
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport+13074
fffff880`00dde074 488901 mov qword ptr [rcx],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ataport+13074
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xD1_ataport+13074
BUCKET_ID: X64_0xD1_ataport+13074
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800225d738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000dde074, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffff8800225d738
CURRENT_IRQL: 2
FAULTING_IP:
ataport+13074
fffff880`00dde074 488901 mov qword ptr [rcx],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050a00000000000 rbx=0000000000000000 rcx=fffff8800225d738
rdx=000002000045e8c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dde074 rsp=fffff80000b9ca38 rbp=fffffa80026c07d0
r8=0000000000000012 r9=0000000000000002 r10=fffffa8002698610
r11=fffff8800225d738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ataport+0x13074:
fffff880`00dde074 488901 mov qword ptr [rcx],rax ds:ffb0:fffff880`0225d738=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028c3469 to fffff800028c3f00
STACK_TEXT:
fffff800`00b9c758 fffff800`028c3469 : 00000000`0000000a fffff880`0225d738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`028c20e0 : fffffa80`026986a8 00000000`00000002 fffffa80`00000000 fffffa80`026986a8 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff880`00dde074 : fffff880`00dd74a5 fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 : nt!KiPageFault+0x260
fffff800`00b9ca38 fffff880`00dd74a5 : fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 : ataport+0x13074
fffff800`00b9ca40 fffffa80`025a4000 : fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 : ataport+0xc4a5
fffff800`00b9ca48 fffff880`00dd7b34 : fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 : 0xfffffa80`025a4000
fffff800`00b9ca50 fffff800`00b9caa8 : 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 : ataport+0xcb34
fffff800`00b9ca58 00000000`00000000 : fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 fffffa80`025a55d3 : 0xfffff800`00b9caa8
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport+13074
fffff880`00dde074 488901 mov qword ptr [rcx],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ataport+13074
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xD1_ataport+13074
BUCKET_ID: X64_0xD1_ataport+13074
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020911-20826-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02868000 PsLoadedModuleList = 0xfffff800`02aa5e50
Debug session time: Wed Feb 9 04:33:03.651 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:31.539
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 5, {200, fffffa8003de7060, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+46283 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: 0000000000000200
Arg2: fffffa8003de7060
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: nwiz.exe
CURRENT_IRQL: 1
LAST_CONTROL_TRANSFER: from fffff80002919bb5 to fffff800028d9f00
STACK_TEXT:
fffff880`02afd428 fffff800`02919bb5 : 00000000`00000005 00000000`00000200 fffffa80`03de7060 00000000`00000000 : nt!KeBugCheckEx
fffff880`02afd430 fffff800`028de2ce : fffffa80`03e60810 00000000`00000000 fffff800`02b97710 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x46283
fffff880`02afd4b0 fffff800`028efb1b : fffffa80`018de680 00000000`00000001 fffff880`02afd700 fffffa80`018de788 : nt!KeSetEvent+0x43e
fffff880`02afd520 fffffa80`0289d90b : 00000000`00000000 00000000`00000000 fffffa80`03b61e80 fffffa80`03b61db0 : nt!ExReleaseFastMutexUnsafe+0x3f
fffff880`02afd550 00000000`00000000 : 00000000`00000000 fffffa80`03b61e80 fffffa80`03b61db0 fffff8a0`01fa63b2 : 0xfffffa80`0289d90b
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+46283
fffff800`02919bb5 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+46283
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x5_nt!_??_::FNODOBFM::_string_+46283
BUCKET_ID: X64_0x5_nt!_??_::FNODOBFM::_string_+46283
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020711-19141-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`01c0a000 PsLoadedModuleList = 0xfffff800`01e47e50
Debug session time: Mon Feb 7 10:28:07.548 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:28.189
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80001c7a21a, 0, ffffffffffffffff}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+39a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80001c7a21a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiPageFault+39a
fffff800`01c7a21a 48cf iretq
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001eb20e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: AtBroker.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880030f3398 -- (.trap 0xfffff880030f3398)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00000c030 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8002f79000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000401802 rsp=0000000003f7fdd5 rbp=0000000000000000
r8=0000000020206f49 r9=0000000000000002 r10=0000002e00000000
r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=2 ov dn ei pl zr na pe cy
e7a0:fffff880`00401802 ?? ???
Resetting default scope
UNALIGNED_STACK_POINTER: 0000000003f7fdd5
LAST_CONTROL_TRANSFER: from fffff80001cbba17 to fffff80001c7bf00
STACK_TEXT:
fffff880`030f2978 fffff800`01cbba17 : 00000000`0000001e ffffffff`c0000005 fffff800`01c7a21a 00000000`00000000 : nt!KeBugCheckEx
fffff880`030f2980 fffff800`01c7b542 : fffff880`030f3158 fffffa80`02774010 fffff880`030f3200 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`030f3020 fffff800`01c79e4a : fffff8a0`01405010 00000000`00000011 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0xc2
fffff880`030f3200 fffff800`01c7a21a : fffff800`01f5f455 00000000`00000200 00000000`00010292 fffff880`030f33c0 : nt!KiGeneralProtectionFault+0x10a
fffff880`030f3398 fffff800`01c87efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x39a
fffff900`c1ad0ce0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExReleaseResourceAndLeavePriorityRegion+0x12
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+39a
fffff800`01c7a21a 48cf iretq
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiPageFault+39a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiPageFault+39a
BUCKET_ID: X64_0x1E_c0000005_nt!KiPageFault+39a
Followup: MachineOwner
---------
Drivers:
Code:
start end module name
fffff880`03b2c000 fffff880`03b6f000 a5w0xtxv a5w0xtxv.SYS Fri Aug 07 09:30:20 2009 (4A7C2C6C)
fffff880`011a9000 fffff880`01200000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cbf000 fffff880`02d49000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0f073000 fffff880`0f089000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00da7000 fffff880`00db2000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00d74000 fffff880`00d7d000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d7d000 fffff880`00da7000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`03e24000 fffff880`03e6c000 b57nd60a b57nd60a.sys Sun Apr 26 07:14:55 2009 (49F4422F)
fffff880`01485000 fffff880`0148c000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03adf000 fffff880`03af0000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`026d5000 fffff880`026f3000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00740000 fffff960`00767000 cdd cdd.dll Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`04265000 fffff880`0428f000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00eb9000 fffff880`00f79000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01416000 fffff880`01446000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ce4000 fffff880`00d42000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014a1000 fffff880`01514000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03fe8000 fffff880`03ff8000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`027a7000 fffff880`027b0000 cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`0428f000 fffff880`0429d000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03a3e000 fffff880`03ac1000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03ac1000 fffff880`03adf000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`00c7d000 fffff880`00c8c000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01400000 fffff880`01416000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0423d000 fffff880`0425f000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`042a9000 fffff880`042b2000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0429d000 fffff880`042a9000 dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`043ea000 fffff880`043fd000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`041eb000 fffff880`041f7000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03eae000 fffff880`03fa2000 dxgkrnl dxgkrnl.sys Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`03fa2000 fffff880`03fe8000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`040fb000 fffff880`04131000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`03e8a000 fffff880`03e97000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00c00000 fffff880`00c14000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00db2000 fffff880`00dfe000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01525000 fffff880`0152f000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015b5000 fffff880`015ef000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01787000 fffff880`017d1000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02811000 fffff800`0285a000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e00000 fffff880`03e24000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`041ae000 fffff880`041c7000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`041c7000 fffff880`041cf080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`041a0000 fffff880`041ae000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0260d000 fffff880`026d5000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01600000 fffff880`01609000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`00d42000 fffff880`00d4a000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03b16000 fffff880`03b2c000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03a00000 fffff880`03a0f000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`041d0000 fffff880`041de000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bb0000 fffff800`00bb3000 kdcom kdcom.dll Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`040a6000 fffff880`040e9000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0175c000 fffff880`01787000 ksecpkg ksecpkg.sys Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`0425f000 fffff880`04264200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04052000 fffff880`04067000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0400e000 fffff880`04031000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c8c000 fffff880`00cd0000 mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04000000 fffff880`0400e000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03a0f000 fffff880`03a1e000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`041de000 fffff880`041eb000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d5a000 fffff880`00d74000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`026f3000 fffff880`0270b000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0270b000 fffff880`02737000 mrxsmb mrxsmb.sys Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`02737000 fffff880`02784000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`02784000 fffff880`027a7000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`00c72000 fffff880`00c7d000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`0100a000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`00c14000 fffff880`00c72000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02df5000 fffff880`02e00000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017e9000 fffff880`017fb000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0160a000 fffff880`016fc000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fde9000 fffff880`0fdf5000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03b6f000 fffff880`03b9e000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0418b000 fffff880`041a0000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02dbd000 fffff880`02dcc000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d49000 fffff880`02d8e000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`016fc000 fffff880`0175c000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02c83000 fffff880`02c94000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02de9000 fffff880`02df5000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0285a000 fffff800`02e37000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01251000 fffff880`013f4000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0147c000 fffff880`01485000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fde7000 fffff880`0fde8180 nvBridge nvBridge.kmd Tue Mar 23 19:11:12 2010 (4BA94A90)
fffff880`0f0b0000 fffff880`0fde6c80 nvlddmkm nvlddmkm.sys Tue Mar 23 19:33:35 2010 (4BA94FCF)
fffff880`02d97000 fffff880`02dbd000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`0f056000 fffff880`0f073000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f79000 fffff880`00f8e000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`01017000 fffff880`0104a000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00d4a000 fffff880`00d5a000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01514000 fffff880`01525000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`03884000 fffff880`0392a000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04200000 fffff880`0423d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cd0000 fffff880`00ce4000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0f089000 fffff880`0f0ad000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03b9e000 fffff880`03bb9000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03bb9000 fffff880`03bda000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03bda000 fffff880`03bf4000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c2f000 fffff880`02c80000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03ea3000 fffff880`03eae000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0123f000 fffff880`01248000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01248000 fffff880`01251000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013f4000 fffff880`013fd000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0157b000 fffff880`015b5000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04067000 fffff880`0407f000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0117a000 fffff880`011a9000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`0392a000 fffff880`03935000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03e97000 fffff880`03ea3000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02dcc000 fffff880`02de9000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`017e1000 fffff880`017e9000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`03962000 fffff880`039d3000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`0104b000 fffff880`01171000 spub spub.sys Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`04817000 fffff880`048af000 srv srv.sys Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`03800000 fffff880`03869000 srv2 srv2.sys Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`03935000 fffff880`03962000 srvnet srvnet.sys Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`042b7000 fffff880`043ea000 sthda64 sthda64.sys Wed Nov 16 14:49:04 2005 (437B8D30)
fffff880`03ff8000 fffff880`03ff9480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01802000 fffff880`019ff000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`039d3000 fffff880`039e5000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02cb2000 fffff880`02cbf000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02c94000 fffff880`02cb2000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c1b000 fffff880`02c2f000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005c0000 fffff960`005ca000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03af0000 fffff880`03b16000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`040e9000 fffff880`040fb000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`043fd000 fffff880`043fef00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03e79000 fffff880`03e8a000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04131000 fffff880`0418b000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0f000000 fffff880`0f056000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03e6c000 fffff880`03e79000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`0100a000 fffff880`01017000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0148c000 fffff880`0149a000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0121a000 fffff880`0123f000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d1000 fffff880`017e1000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f8e000 fffff880`00fa3000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00fa3000 fffff880`00fff000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0152f000 fffff880`0157b000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c00000 fffff880`02c1b000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`015ef000 fffff880`015ff000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ea4000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea4000 fffff880`00eb3000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d8e000 fffff880`02d97000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`0039f000 win32k win32k.sys Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`01171000 fffff880`0117a000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04031000 fffff880`04052000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`01446000 fffff880`01454000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01454000 fffff880`01460000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01460000 fffff880`01469000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01469000 fffff880`0147c000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
fffff880`0121a000 fffff880`01244000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002A000
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
- Thread Author
- #15
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
- Thread Author
- #17
Re: blue screen error
Hi.
I have reinstall the OS.Still same error...I have checked my every hardware by using that in another pc....my all hardwares are fine....so please anyone found a solution of it?
and i dont think its drivers error because my pc was running good for almost 5-6 months but certainly this blue screen error....please anyone found a solution let me know.
Hi.
I have reinstall the OS.Still same error...I have checked my every hardware by using that in another pc....my all hardwares are fine....so please anyone found a solution of it?
and i dont think its drivers error because my pc was running good for almost 5-6 months but certainly this blue screen error....please anyone found a solution let me know.
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
Re: blue screen error
1. What is your result of running memtest 10 passes overnight?
2. According to your screenshots on page 1, your RAM is set right samsung M391T2953CZ3-CE6 DDR667 5-5-5-13 1.8v. Ensure the voltage is set right in the bios too.
You're still getting BCCode A.
--> One of your RAM sticks or RAM slots might be faulty, if memtest detects 0 errors you should remove one of the sticks to try out for BSOD's. Try in different slots too.
--> Submit your latest crash dump.
--> Make sure there are no old drivers in your system such as SigmaTel sthda64.sys Wed Nov 16 14:49:04 2005 .
1. What is your result of running memtest 10 passes overnight?
2. According to your screenshots on page 1, your RAM is set right samsung M391T2953CZ3-CE6 DDR667 5-5-5-13 1.8v. Ensure the voltage is set right in the bios too.
You're still getting BCCode A.
--> One of your RAM sticks or RAM slots might be faulty, if memtest detects 0 errors you should remove one of the sticks to try out for BSOD's. Try in different slots too.
--> Submit your latest crash dump.
--> Make sure there are no old drivers in your system such as SigmaTel sthda64.sys Wed Nov 16 14:49:04 2005 .
- Thread Author
- #19
Re: blue screen error
their were no errors..
i have attached the dump also...i couldn't found the drivers...please attach the drivers...please
my pc is dell precision 390
their were no errors..
i have attached the dump also...i couldn't found the drivers...please attach the drivers...please
my pc is dell precision 390
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
Re: blue screen error
Your most recent crash dumps, as of February 20, 2011:
It does look like some hardware issue. I'd think RAM or HDD.
You never answered this question:
Old drivers needing updates:
SigmaTel
sthda64.sys Wed Nov 16 14:49:04 2005
Broadcom NetXtreme Gigabit Ethernet Driver
b57nd60a.sys Sun Apr 26 07:14:55 2009
Broadcom.com - Ethernet NIC Driver Downloads
Unfortunately it looks like they have dropped support for dell precision 390.
Update Broadcom LAN. Then go to device manager and disable SgmaTel. Reboot.
If your note will crash with Sigma disabled, you got a hardware issue for sure. Take the note to the repairs shop.
~~~~~
Hardware:
a) Memtest86+ - Advanced Memory Diagnostic Tool
10 passes overnight
b) HDD
PassMark DiskCheckup - SMART hard drive monitoring utility
HDDScan
Crash Dumps:
Drivers:
Your most recent crash dumps, as of February 20, 2011:
022011-20108-01.dmp
BugCheck A, {0, 2, 0, fffff80002ae7c06}
PROCESS_NAME: BCSSync.exe <--- Microsoft Office 2010
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
------------------
022011-19702-01.dmp
BugCheck D1, {fffff88005a69738, 2, 1, fffff88000fbf074}
PROCESS_NAME: System
Probably caused by : ataport.SYS ( ataport!memmove+64 )
------------------
022011-20233-01.dmp
BugCheck A, {200000014, 2, 0, fffff80002ae1a83}
PROCESS_NAME: explorer.exe
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
------------------
022011-19375-01.dmp
BugCheck D1, {fffff8800276c3e0, 2, 0, fffff88000e87c50}
PROCESS_NAME: mpc-hc.exe <--- Media Player Classic - Home Cinema
Probably caused by : ataport.SYS ( ataport!IdeLogCrbActive+bc )
It does look like some hardware issue. I'd think RAM or HDD.
You never answered this question:
What is your result of running memtest 10 passes overnight?
Old drivers needing updates:
SigmaTel
sthda64.sys Wed Nov 16 14:49:04 2005
Broadcom NetXtreme Gigabit Ethernet Driver
b57nd60a.sys Sun Apr 26 07:14:55 2009
Broadcom.com - Ethernet NIC Driver Downloads
my pc is dell precision 390
Unfortunately it looks like they have dropped support for dell precision 390.
Update Broadcom LAN. Then go to device manager and disable SgmaTel. Reboot.
If your note will crash with Sigma disabled, you got a hardware issue for sure. Take the note to the repairs shop.
~~~~~
Hardware:
a) Memtest86+ - Advanced Memory Diagnostic Tool
10 passes overnight
b) HDD
PassMark DiskCheckup - SMART hard drive monitoring utility
HDDScan
Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022011-20108-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a56000 PsLoadedModuleList = 0xfffff800`02c93e50
Debug session time: Sun Feb 20 04:12:57.992 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:30.881
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002ae7c06}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ae7c06, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfe0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`02ae7c06 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: BCSSync.exe
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff8800476e670 -- (.trap 0xfffff8800476e670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880046b8778 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae7c06 rsp=fffff8800476e800 rbp=0000000000000000
r8=fffffa8003128650 r9=fffff8800476e900 r10=0000000000000002
r11=fffffa8003bfa150 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xc73:
fffff800`02ae7c06 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ac7469 to fffff80002ac7f00
STACK_TEXT:
fffff880`0476e528 fffff800`02ac7469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0476e530 fffff800`02ac60e0 : fffffa80`0383d650 fffffa80`0383d650 fffff880`046b8770 fffff880`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0476e670 fffff800`02ae7c06 : fffffa80`03ce7060 fffff800`02acddda 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0476e800 fffff800`02aa492f : 00000000`00000000 00000000`00000000 00000000`00000000 ffffeda5`001b9fb7 : nt!IopCompleteRequest+0xc73
fffff880`0476e8d0 fffff800`02acf25d : fffff800`02c442a0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`0476e950 fffff800`02ad2ac1 : fffffa80`03c20ec8 fffffa80`03ce7060 fffffa80`00000081 fffff8a0`019199f0 : nt!KiCommitThreadWait+0x3dd
fffff880`0476e9e0 fffff800`02dc06d7 : fffffa80`00010000 fffff880`0476ebc8 00000000`00000001 fffff880`0476eb40 : nt!KeRemoveQueueEx+0x301
fffff880`0476ea90 fffff800`02ad8296 : 00000000`00000000 fffff880`0476eba8 fffff880`0476ebc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`0476eb20 fffff800`02ac7153 : fffffa80`03ce7060 00000000`76ed4270 fffff880`0476eca0 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`0476ec20 00000000`76e217ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0270f708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e217ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02ac60e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022011-19702-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50
Debug session time: Sun Feb 20 04:09:15.908 2011 (UTC - 5:00)
System Uptime: 0 days 2:07:46.648
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff88005a69738, 2, 1, fffff88000fbf074}
Unable to load image spla.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for spla.sys
*** ERROR: Module load completed but symbols could not be loaded for spla.sys
Probably caused by : ataport.SYS ( ataport!memmove+64 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88005a69738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000fbf074, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc60e0
fffff88005a69738
CURRENT_IRQL: 2
FAULTING_IP:
ataport!memmove+64
fffff880`00fbf074 488901 mov qword ptr [rcx],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff800055878a0 -- (.trap 0xfffff800055878a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050e0c24f000000 rbx=0000000000000000 rcx=fffff88005a69738
rdx=000001fffcc978c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000fbf074 rsp=fffff80005587a38 rbp=fffffa80027031b0
r8=0000000000000012 r9=0000000000000002 r10=fffffa80026ea610
r11=fffff88005a69738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ataport!memmove+0x64:
fffff880`00fbf074 488901 mov qword ptr [rcx],rax ds:7fb0:fffff880`05a69738=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8f469 to fffff80002a8ff00
STACK_TEXT:
fffff800`05587758 fffff800`02a8f469 : 00000000`0000000a fffff880`05a69738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`05587760 fffff800`02a8e0e0 : fffffa80`026ea6a8 00000000`00000002 fffffa80`00000000 fffffa80`026ea6a8 : nt!KiBugCheckDispatch+0x69
fffff800`055878a0 fffff880`00fbf074 : fffff880`00fb84a5 fffffa80`018a6000 fffff880`00fb8b34 fffff800`05587aa8 : nt!KiPageFault+0x260
fffff800`05587a38 fffff880`00fb84a5 : fffffa80`018a6000 fffff880`00fb8b34 fffff800`05587aa8 00000000`00000000 : ataport!memmove+0x64
fffff800`05587a40 fffff880`00fb80ec : fffffa80`026e91a0 00000000`00000000 fffffa80`026e91a0 fffffa80`01d27b80 : ataport!IdeProcessCompletedRequests+0x18d
fffff800`05587b70 fffff880`0104a4ce : fffffa80`018a6000 00000000`00000000 fffffa80`026e9050 fffffa80`018a6750 : ataport!IdePortCompletionDpc+0x1a8
fffff800`05587c30 fffffa80`018a6000 : 00000000`00000000 fffffa80`026e9050 fffffa80`018a6750 fffff800`02c08e80 : spla+0x424ce
fffff800`05587c38 00000000`00000000 : fffffa80`026e9050 fffffa80`018a6750 fffff800`02c08e80 00000000`00000000 : 0xfffffa80`018a6000
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!memmove+64
fffff880`00fbf074 488901 mov qword ptr [rcx],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ataport!memmove+64
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xD1_ataport!memmove+64
BUCKET_ID: X64_0xD1_ataport!memmove+64
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022011-20233-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a50000 PsLoadedModuleList = 0xfffff800`02c8de50
Debug session time: Sun Feb 20 04:10:11.235 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:31.123
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {200000014, 2, 0, fffff80002ae1a83}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000200000014, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ae1a83, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf80e0
0000000200000014
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02ae1a83 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: explorer.exe
IRP_ADDRESS: 00000001ffffff9c
TRAP_FRAME: fffff88002867670 -- (.trap 0xfffff88002867670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88003563778 rbx=0000000000000000 rcx=0000000200000014
rdx=0000000200000014 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae1a83 rsp=fffff88002867800 rbp=0000000000000000
r8=0000000000000100 r9=0000000000000000 r10=0000000000000002
r11=fffffa80039b8710 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02ae1a83 488b09 mov rcx,qword ptr [rcx] ds:00000002`00000014=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ac1469 to fffff80002ac1f00
STACK_TEXT:
fffff880`02867528 fffff800`02ac1469 : 00000000`0000000a 00000002`00000014 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02867530 fffff800`02ac00e0 : 00000000`00000000 fffffa80`03c686b0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02867670 fffff800`02ae1a83 : fffffa80`03c686b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`02867800 fffff800`02a9e92f : 00000002`00000014 00000000`00000000 00000000`00000000 ffffeda9`00000000 : nt!IopCompleteRequest+0xae3
fffff880`028678d0 fffff800`02ac925d : fffff880`02f037a0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02867950 fffff800`02accac1 : fffffa80`03a69ec8 fffffa80`02d59a50 fffffa80`00000091 fffff8a0`01b477d0 : nt!KiCommitThreadWait+0x3dd
fffff880`028679e0 fffff800`02dba6d7 : fffffa80`00010000 fffff880`02867bc8 00000000`00000001 fffff880`02867b40 : nt!KeRemoveQueueEx+0x301
fffff880`02867a90 fffff800`02ad2296 : 00000000`00000000 fffff880`02867ba8 fffff880`02867bc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`02867b20 fffff800`02ac1153 : fffffa80`02d59a50 00000000`77c04270 fffff880`02867ca0 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`02867c20 00000000`77b517ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`06def728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b517ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02ac00e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022011-19375-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1b000 PsLoadedModuleList = 0xfffff800`02c58e50
Debug session time: Sun Feb 20 04:20:25.665 2011 (UTC - 5:00)
System Uptime: 0 days 0:07:06.553
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff8800276c3e0, 2, 0, fffff88000e87c50}
Unable to load image spss.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for spss.sys
*** ERROR: Module load completed but symbols could not be loaded for spss.sys
Probably caused by : ataport.SYS ( ataport!IdeLogCrbActive+bc )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800276c3e0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88000e87c50, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc30e0
fffff8800276c3e0
CURRENT_IRQL: 2
FAULTING_IP:
ataport!IdeLogCrbActive+bc
fffff880`00e87c50 f30f6f4148 movdqu xmm0,xmmword ptr [rcx+48h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: mpc-hc.exe
TRAP_FRAME: fffff80000ba2720 -- (.trap 0xfffff80000ba2720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003a0c400 rbx=0000000000000000 rcx=fffff8800276c390
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000e87c50 rsp=fffff80000ba28b0 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=fffffa8001c1a0b0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ataport!IdeLogCrbActive+0xbc:
fffff880`00e87c50 f30f6f4148 movdqu xmm0,xmmword ptr [rcx+48h] ds:3e60:fffff880`0276c3d8=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8c469 to fffff80002a8cf00
STACK_TEXT:
fffff800`00ba25d8 fffff800`02a8c469 : 00000000`0000000a fffff880`0276c3e0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba25e0 fffff800`02a8b0e0 : fffff800`00ba2830 fffffa80`026c2168 00000000`00400000 00000000`0000000b : nt!KiBugCheckDispatch+0x69
fffff800`00ba2720 fffff880`00e87c50 : fffff800`02c05e80 00000000`00000000 fffffa80`026c07d0 00000000`00000001 : nt!KiPageFault+0x260
fffff800`00ba28b0 fffff880`00e91c71 : 00000000`00000000 fffffa80`018421a0 fffffa80`01c1a010 fffffa80`03b151b0 : ataport!IdeLogCrbActive+0xbc
fffff800`00ba28e0 fffff800`02ffc62f : 00000000`00000000 fffffa80`01c1a0b0 fffffa80`01844ea0 fffffa80`0362b7a8 : ataport!IdeStartIoCallBack+0xc9
fffff800`00ba2a50 fffff880`00e5d0d3 : fffffa80`01c1a010 fffff880`00e5d12c 00000000`0000014c fffff880`0443fe20 : hal!HalBuildScatterGatherList+0x203
fffff800`00ba2ac0 fffff880`00e91b3b : fffffa80`01c1a010 fffffa80`026c07d0 fffffa80`018421a0 fffffa80`01c1a010 : PCIIDEX!BmSetup+0x6b
fffff800`00ba2b20 fffff880`00e907eb : fffffa80`01843500 fffffa80`026c07d0 fffffa80`01843500 fffffa80`018421a0 : ataport!IdeDispatchChannelRequest+0xef
fffff800`00ba2b50 fffff880`00e9031e : 00000000`00000001 fffffa80`01c1a010 00000000`00000001 fffffa80`01c1a010 : ataport!IdeStartChannelRequest+0x113
fffff800`00ba2bd0 fffff880`00e92582 : 00000000`00000000 00000000`00000000 fffffa80`026c07d0 fffffa80`0392ab80 : ataport!IdeStartNextDeviceRequest+0x18e
fffff800`00ba2c70 fffff880`00e920ec : fffffa80`018421a0 00000000`00000000 fffffa80`018421a0 fffffa80`0392ab80 : ataport!IdeProcessCompletedRequests+0x26a
fffff800`00ba2da0 fffff880`010674ce : fffffa80`025a4000 fffff800`00ba2e88 fffffa80`01842050 fffffa80`025a4750 : ataport!IdePortCompletionDpc+0x1a8
fffff800`00ba2e60 fffffa80`025a4000 : fffff800`00ba2e88 fffffa80`01842050 fffffa80`025a4750 fffffa80`01a00430 : spss+0x424ce
fffff800`00ba2e68 fffff800`00ba2e88 : fffffa80`01842050 fffffa80`025a4750 fffffa80`01a00430 01cbd0df`6851989a : 0xfffffa80`025a4000
fffff800`00ba2e70 fffffa80`01842050 : fffffa80`025a4750 fffffa80`01a00430 01cbd0df`6851989a 00000000`0837fba0 : 0xfffff800`00ba2e88
fffff800`00ba2e78 fffffa80`025a4750 : fffffa80`01a00430 01cbd0df`6851989a 00000000`0837fba0 00000000`00000022 : 0xfffffa80`01842050
fffff800`00ba2e80 fffffa80`01a00430 : 01cbd0df`6851989a 00000000`0837fba0 00000000`00000022 00000000`00000000 : 0xfffffa80`025a4750
fffff800`00ba2e88 01cbd0df`6851989a : 00000000`0837fba0 00000000`00000022 00000000`00000000 00000000`00000000 : 0xfffffa80`01a00430
fffff800`00ba2e90 00000000`0837fba0 : 00000000`00000022 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1cbd0df`6851989a
fffff800`00ba2e98 00000000`00000022 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`01842118 : 0x837fba0
fffff800`00ba2ea0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`01842118 fffffa80`01842050 : 0x22
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeLogCrbActive+bc
fffff880`00e87c50 f30f6f4148 movdqu xmm0,xmmword ptr [rcx+48h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ataport!IdeLogCrbActive+bc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xD1_ataport!IdeLogCrbActive+bc
BUCKET_ID: X64_0xD1_ataport!IdeLogCrbActive+bc
Followup: MachineOwner
---------
Drivers:
Code:
start end module name
fffff880`01183000 fffff880`011da000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02d2c000 fffff880`02db6000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fde0000 fffff880`0fdf6000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03c16000 fffff880`03c59000 am7sp3ze am7sp3ze.SYS Fri Aug 07 09:30:20 2009 (4A7C2C6C)
fffff880`00eb0000 fffff880`00ebb000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`011f1000 fffff880`011fa000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e86000 fffff880`00eb0000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00860000 fffff960`008c1000 ATMFD ATMFD.DLL Mon Jul 13 19:38:13 2009 (4A5BC565)
fffff880`03e6a000 fffff880`03eb2000 b57nd60a b57nd60a.sys Sun Apr 26 07:14:55 2009 (49F4422F)
fffff880`01213000 fffff880`0121a000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03db8000 fffff880`03dc9000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`029b9000 fffff880`029d7000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00640000 fffff960`00667000 cdd cdd.dll Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`045d5000 fffff880`045ff000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d3a000 fffff880`00dfa000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`013be000 fffff880`013ee000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cdc000 fffff880`00d3a000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014e1000 fffff880`01554000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0fdd0000 fffff880`0fde0000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0289c000 fffff880`028a5000 cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`04400000 fffff880`0440e000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03d17000 fffff880`03d9a000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03d9a000 fffff880`03db8000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03d08000 fffff880`03d17000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0143a000 fffff880`01450000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045ad000 fffff880`045cf000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0441a000 fffff880`04423000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0440e000 fffff880`0441a000 dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04423000 fffff880`04436000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04024000 fffff880`04030000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03eed000 fffff880`03fe1000 dxgkrnl dxgkrnl.sys Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`03e00000 fffff880`03e46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`04130000 fffff880`04166000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`03ed0000 fffff880`03edd000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00fc1000 fffff880`00fd5000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00c00000 fffff880`00c4c000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01565000 fffff880`0156f000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0178a000 fffff880`017d4000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02ff8000 fffff800`03041000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e46000 fffff880`03e6a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`041e3000 fffff880`041fc000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04000000 fffff880`04008080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`041d5000 fffff880`041e3000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`028f1000 fffff880`029b9000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01600000 fffff880`01609000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01015000 fffff880`0101d000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c00000 fffff880`03c16000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03cde000 fffff880`03ced000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04009000 fffff880`04017000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bd1000 fffff800`00bd4000 kdcom kdcom.dll Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`040db000 fffff880`0411e000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`014c7000 fffff880`014e1000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0175f000 fffff880`0178a000 ksecpkg ksecpkg.sys Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`045cf000 fffff880`045d4200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04082000 fffff880`04097000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0403e000 fffff880`04061000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c84000 fffff880`00cc8000 mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04030000 fffff880`0403e000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03def000 fffff880`03dfe000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04017000 fffff880`04024000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e6c000 fffff880`00e86000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`029d7000 fffff880`029ef000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02800000 fffff880`0282c000 mrxsmb mrxsmb.sys Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`0282c000 fffff880`02879000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`02879000 fffff880`0289c000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`02ce5000 fffff880`02cf0000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011da000 fffff880`011e4000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01469000 fffff880`014c7000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03cfd000 fffff880`03d08000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017ec000 fffff880`017fe000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0160d000 fffff880`016ff000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0f024000 fffff880`0f030000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03c59000 fffff880`03c88000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`041c0000 fffff880`041d5000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02c2f000 fffff880`02c3e000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02db6000 fffff880`02dfb000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`016ff000 fffff880`0175f000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02cf0000 fffff880`02d01000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03cf1000 fffff880`03cfd000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a1b000 fffff800`02ff8000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`0121b000 fffff880`013be000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`015f5000 fffff880`015fe000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fd78000 fffff880`0fd79180 nvBridge nvBridge.kmd Tue Mar 23 19:11:12 2010 (4BA94A90)
fffff880`0f041000 fffff880`0fd77c80 nvlddmkm nvlddmkm.sys Tue Mar 23 19:33:35 2010 (4BA94FCF)
fffff880`02c09000 fffff880`02c2f000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03fe1000 fffff880`03ffe000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01000000 fffff880`01015000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f79000 fffff880`00fac000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e6c000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01554000 fffff880`01565000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`046cb000 fffff880`04771000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04570000 fffff880`045ad000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cc8000 fffff880`00cdc000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0f000000 fffff880`0f024000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03c88000 fffff880`03ca3000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03ca3000 fffff880`03cc4000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03cc4000 fffff880`03cde000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c8a000 fffff880`02cdb000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0f030000 fffff880`0f03b000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`00ff3000 fffff880`00ffc000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`00ebb000 fffff880`00ec4000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`00c71000 fffff880`00c7a000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015bb000 fffff880`015f5000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04097000 fffff880`040af000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01154000 fffff880`01183000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`04771000 fffff880`0477c000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03edd000 fffff880`03ee9000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02c3e000 fffff880`02c5b000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`017e4000 fffff880`017ec000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01025000 fffff880`0114b000 spss spss.sys Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`0493d000 fffff880`049d5000 srv srv.sys Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`048d4000 fffff880`0493d000 srv2 srv2.sys Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`0477c000 fffff880`047a9000 srvnet srvnet.sys Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`0443d000 fffff880`04570000 sthda64 sthda64.sys Wed Nov 16 14:49:04 2005 (437B8D30)
fffff880`03ee9000 fffff880`03eea480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01803000 fffff880`01a00000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`04671000 fffff880`04683000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02d1f000 fffff880`02d2c000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02d01000 fffff880`02d1f000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c76000 fffff880`02c8a000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00460000 fffff960`0046a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03dc9000 fffff880`03def000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0411e000 fffff880`04130000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04436000 fffff880`04437f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03ebf000 fffff880`03ed0000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04166000 fffff880`041c0000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0fd7a000 fffff880`0fdd0000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03eb2000 fffff880`03ebf000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`011e4000 fffff880`011f1000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00fd5000 fffff880`00fe3000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`00c4c000 fffff880`00c71000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d4000 fffff880`017e4000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fac000 fffff880`00fc1000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0156f000 fffff880`015bb000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c5b000 fffff880`02c76000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`00fe3000 fffff880`00ff3000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ec6000 fffff880`00f6a000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f6a000 fffff880`00f79000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c00000 fffff880`02c09000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003ef000 win32k win32k.sys Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`0114b000 fffff880`01154000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04061000 fffff880`04082000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`04600000 fffff880`04671000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01450000 fffff880`0145e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`013ee000 fffff880`013fa000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0145e000 fffff880`01467000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01200000 fffff880`01213000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
fffff880`00fd5000 fffff880`00fff000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002A000
Similar threads
- Article
- Replies
- 0
- Views
- 191
- Solved
- Replies
- 3
- Views
- 598
- Replies
- 0
- Views
- 55
- Featured
- Solved
- Replies
- 0
- Views
- 51
- Featured
- Solved
- Replies
- 0
- Views
- 234