Windows 7 ~ BSOD ~

im234ran

Banned
Joined
Feb 6, 2011
Hi.
Here is my info.
I hope you will get a solution to fix my blue screen error.
I have attached the info...in a zip file.
 

Attachments

  • info.zip
    1.2 MB · Views: 728
blue screen error

Hi.
My pc was running extremely good before yesterday.I was playing game and a blue screen appeared and it restarts my pc.
Anyone knows how to fix it?If you want more information let me know.

And when my pc restarts,check online solution box appeared.I clicked on details and this info came.

Locale ID: 1033

Additional information about the problem:
BCCode: a
BCP1: 0000000000000008
BCP2: 0000000000000002
BCP3: 0000000000000000
BCP4: FFFFF800028EDC06
OS Version: 6_1_7600
Service Pack: 0_0
Product: 256_1

Files that help describe the problem:
C:\Windows\Minidump\020511-23805-01.dmp
C:\Users\Imran\AppData\Local\Temp\WER-34663-0.sysdata.xml

and here is the link to the dumped files.

Link Removed - Invalid URL

I hope anyone would get a solution of it.
 
Re: blue screen error

Hi.
Here are the dump files and the sdp images.
I hope you will get a solution to fix my blue screen error
 

Attachments

  • 4.JPG
    4.JPG
    41.1 KB · Views: 454
  • 1.JPG
    1.JPG
    53 KB · Views: 515
  • 3.JPG
    3.JPG
    53.3 KB · Views: 486
  • dump file.zip
    479 KB · Views: 333
  • 2.JPG
    2.JPG
    41.1 KB · Views: 471
Update old drivers:


Intel HD Audio driver
sthda64.sys Wed Nov 16 14:49:04 2005


Broadcom NetXtreme Gigabit Ethernet
b57nd60a.sys Sun Apr 26 07:14:55 2009



If crashes reoccur,

http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html

Take the screenshots of SPD under each slot.




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020611-21746-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02866000 PsLoadedModuleList = 0xfffff800`02aa3e50
Debug session time: Sun Feb  6 12:56:09.371 2011 (UTC - 5:00)
System Uptime: 0 days 0:02:20.260
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff800028f7a83}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028f7a83, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0e0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`028f7a83 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  takeown.exe

IRP_ADDRESS:  ffffffffffffff89

TRAP_FRAME:  fffff880026da330 -- (.trap 0xfffff880026da330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880026da728 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028f7a83 rsp=fffff880026da4c0 rbp=0000000000000000
 r8=fffffa8003d94df0  r9=fffff880026da5c0 r10=0000000000000002
r11=fffffa8004188750 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`028f7a83 488b09          mov     rcx,qword ptr [rcx] ds:0e80:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028d7469 to fffff800028d7f00

STACK_TEXT:  
fffff880`026da1e8 fffff800`028d7469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`026da1f0 fffff800`028d60e0 : 00000000`00000002 fffffa80`03c94860 fffffa80`018433f0 fffff880`026da3d9 : nt!KiBugCheckDispatch+0x69
fffff880`026da330 fffff800`028f7a83 : fffffa80`02ad7b60 fffff800`028dddda 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`026da4c0 fffff800`028b492f : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`026da590 fffff800`02934748 : fffffa80`02ad7b60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`026da610 fffff800`02bd64d4 : fffffa80`00000000 fffff8a0`00000001 00000000`00000000 fffff8a0`02036c00 : nt! ?? ::FNODOBFM::`string'+0xf5be
fffff880`026da690 00000000`00000200 : 00000001`00000080 fffff880`026da728 fffff880`026da728 0050a000`00000000 : nt!AlpcpCompleteDispatchMessage+0x9a4
fffff880`026da720 00000001`00000080 : fffff880`026da728 fffff880`026da728 0050a000`00000000 00000000`00000000 : 0x200
fffff880`026da728 fffff880`026da728 : fffff880`026da728 0050a000`00000000 00000000`00000000 fffff880`026d0000 : 0x1`00000080
fffff880`026da730 fffff880`026da728 : 0050a000`00000000 00000000`00000000 fffff880`026d0000 fffff880`026da8a0 : 0xfffff880`026da728
fffff880`026da738 0050a000`00000000 : 00000000`00000000 fffff880`026d0000 fffff880`026da8a0 00000000`00010002 : 0xfffff880`026da728
fffff880`026da740 00000000`00000000 : fffff880`026d0000 fffff880`026da8a0 00000000`00010002 fffffa80`03532420 : 0x50a000`00000000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`028d60e0 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020711-17830-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02853000 PsLoadedModuleList = 0xfffff800`02a90e50
Debug session time: Mon Feb  7 00:54:22.684 2011 (UTC - 5:00)
System Uptime: 0 days 0:07:23.573
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 1, fffff800028a4634}

Probably caused by : ntkrnlmp.exe ( nt!KiExitDispatcher+90 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028a4634, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002afb0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiExitDispatcher+90
fffff800`028a4634 488908          mov     qword ptr [rax],rcx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff880025a0980 -- (.trap 0xfffff880025a0980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8003b6c968
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028a4634 rsp=fffff880025a0b10 rbp=0000000000000000
 r8=0000000000000001  r9=0000000000000002 r10=0000000000000001
r11=00000000001fffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiExitDispatcher+0x90:
fffff800`028a4634 488908          mov     qword ptr [rax],rcx ds:69c0:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028c4469 to fffff800028c4f00

STACK_TEXT:  
fffff880`025a0838 fffff800`028c4469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`025a0840 fffff800`028c30e0 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`025a0980 fffff800`028a4634 : fffffa80`0374a3d0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`025a0b10 fffff800`028aa7e0 : fffff880`02f00180 fffff880`025a0c00 fffff880`00000001 fffffa80`00000002 : nt!KiExitDispatcher+0x90
fffff880`025a0b80 fffff800`02baec15 : fffffa80`03e96601 fffff880`025a0ca0 00000000`00000000 80000000`00000001 : nt!KeAlertThread+0x70
fffff880`025a0bd0 fffff800`028c4153 : 00000000`000000a8 fffffa80`03757060 00000000`00000000 00000000`00000000 : nt!NtAlertThread+0x51
fffff880`025a0c20 00000000`7724058a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01f2ed38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7724058a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiExitDispatcher+90
fffff800`028a4634 488908          mov     qword ptr [rax],rcx

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiExitDispatcher+90

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0xA_nt!KiExitDispatcher+90

BUCKET_ID:  X64_0xA_nt!KiExitDispatcher+90

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`00edd000 fffff880`00f34000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03a10000 fffff880`03a9a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`040c4000 fffff880`040da000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00fec000 fffff880`00ff7000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fe3000 fffff880`00fec000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01897000 fffff880`018df000   b57nd60a b57nd60a.sys Sun Apr 26 07:14:55 2009 (49F4422F)
fffff880`019d2000 fffff880`019d9000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03cb8000 fffff880`03cc9000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02aca000 fffff880`02ae8000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00620000 fffff960`00647000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`00d15000 fffff880`00dd5000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01939000 fffff880`01969000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cb7000 fffff880`00d15000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`040b4000 fffff880`040c4000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02b9c000 fffff880`02ba5000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`04265000 fffff880`04273000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c17000 fffff880`03c9a000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03c9a000 fffff880`03cb8000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03bd1000 fffff880`03be0000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01923000 fffff880`01939000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0423d000 fffff880`0425f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0427f000 fffff880`04288000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04273000 fffff880`0427f000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04288000 fffff880`0429b000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0429b000 fffff880`042a7000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03d05000 fffff880`03df9000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`0f000000 fffff880`0f046000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0fdc0000 fffff880`0fdf6000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`0407e000 fffff880`0408b000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`0112b000 fffff880`0113f000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010df000 fffff880`0112b000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013d1000 fffff880`013db000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018e9000 fffff880`01923000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`0280a000 fffff800`02853000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0f046000 fffff880`0f06a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`03f01000 fffff880`03f1a000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`043ea000 fffff880`043f2080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`042a7000 fffff880`042b5000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02a02000 fffff880`02aca000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f5000 fffff880`015fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`00fb1000 fffff880`00fb9000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03cef000 fffff880`03d05000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0419a000 fffff880`041a9000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03f1a000 fffff880`03f28000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b97000 fffff800`00b9a000   kdcom    kdcom.dll    Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`041ba000 fffff880`041fd000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013a6000 fffff880`013c0000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015b0000 fffff880`015db000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`0425f000 fffff880`04264200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03f87000 fffff880`03f9c000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03f43000 fffff880`03f66000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c5f000 fffff880`00ca3000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`03f35000 fffff880`03f43000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`041a9000 fffff880`041b8000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03f28000 fffff880`03f35000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fc9000 fffff880`00fe3000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02ae8000 fffff880`02b00000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02b00000 fffff880`02b2c000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`02b2c000 fffff880`02b79000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`02b79000 fffff880`02b9c000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`01850000 fffff880`0185b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f3d000 fffff880`00f47000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0113f000 fffff880`0119d000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03bc6000 fffff880`03bd1000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e3000 fffff880`015f5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0145e000 fffff880`01550000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`040fe000 fffff880`0410a000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0410a000 fffff880`04139000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03eec000 fffff880`03f01000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03b0e000 fffff880`03b1d000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03a9a000 fffff880`03adf000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01550000 fffff880`015b0000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0185b000 fffff880`0186c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03bba000 fffff880`03bc6000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02853000 fffff800`02e30000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01203000 fffff880`013a6000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`019c9000 fffff880`019d2000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fdbe000 fffff880`0fdbf180   nvBridge nvBridge.kmd Tue Mar 23 19:11:12 2010 (4BA94A90)
fffff880`0f087000 fffff880`0fdbdc80   nvlddmkm nvlddmkm.sys Tue Mar 23 19:33:35 2010 (4BA94FCF)
fffff880`03ae8000 fffff880`03b0e000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`0408b000 fffff880`040a8000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f87000 fffff880`00f9c000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f47000 fffff880`00f7a000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fb9000 fffff880`00fc9000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013c0000 fffff880`013d1000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`03866000 fffff880`0390c000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04200000 fffff880`0423d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ca3000 fffff880`00cb7000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`040da000 fffff880`040fe000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04139000 fffff880`04154000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04154000 fffff880`04175000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04175000 fffff880`0418f000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03b69000 fffff880`03bba000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0418f000 fffff880`0419a000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01835000 fffff880`0183e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0183e000 fffff880`01847000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01847000 fffff880`01850000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0119d000 fffff880`011d7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03f9c000 fffff880`03fb4000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0390c000 fffff880`03917000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`040a8000 fffff880`040b4000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03b1d000 fffff880`03b3a000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015db000 fffff880`015e3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`056e2000 fffff880`0577a000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`03e00000 fffff880`03e69000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`03917000 fffff880`03944000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`042b7000 fffff880`043ea000   sthda64  sthda64.sys  Wed Nov 16 14:49:04 2005 (437B8D30)
fffff880`041b8000 fffff880`041b9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`03944000 fffff880`03956000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0188a000 fffff880`01897000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0186c000 fffff880`0188a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03b55000 fffff880`03b69000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00430000 fffff960`0043a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03cc9000 fffff880`03cef000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04000000 fffff880`04012000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`043f3000 fffff880`043f4f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0406d000 fffff880`0407e000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e92000 fffff880`03eec000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04017000 fffff880`0406d000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0f06a000 fffff880`0f077000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f7a000 fffff880`00f87000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019d9000 fffff880`019e7000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01800000 fffff880`01825000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0144a000 fffff880`0145a000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f9c000 fffff880`00fb1000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03b3a000 fffff880`03b55000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01825000 fffff880`01835000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e2a000 fffff880`00ece000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ece000 fffff880`00edd000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03adf000 fffff880`03ae8000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000f0000 fffff960`003ff000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`00f34000 fffff880`00f3d000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03f66000 fffff880`03f87000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`03956000 fffff880`039c7000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01969000 fffff880`01977000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01977000 fffff880`01983000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01983000 fffff880`0198c000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`0198c000 fffff880`0199f000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`0199f000 fffff880`019c9000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
 
Re: blue screen error

The Samsung sticks are matching and set right.

Update drivers:

Intel HD Audio driver

sthda64.sys Wed Nov 16 14:49:04 2005


Broadcom NetXtreme Gigabit Ethernet
b57nd60a.sys Sun Apr 26 07:14:55 2009
 
Re: blue screen error

I have updated....Still no use...same error coming.

I have attached the latest dump file.
 

Attachments

  • 020711-19141-01.dmp
    265.3 KB · Views: 361
Re: blue screen error

I have updated....Still no use...same error coming.

I have attached the latest dump file.


BUGCHECK_STR: 0x1E_c0000005

I'm sorry, what happened to those 2 drivers, there are no tracks of them, they are gone. You were supposed to update them, not delete or rename. Or perhaps did you reinstall the OS.



Run Memtest86+ - Advanced Memory Diagnostic Tool
Run it 10 passes overnight.


If it detects no errors, reinstall the OS.






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020711-19141-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`01c0a000 PsLoadedModuleList = 0xfffff800`01e47e50
Debug session time: Mon Feb  7 10:28:07.548 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:28.189
Loading Kernel Symbols
...............................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80001c7a21a, 0, ffffffffffffffff}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+39a )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80001c7a21a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!KiPageFault+39a
fffff800`01c7a21a 48cf            iretq

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001eb20e0
 ffffffffffffffff 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  AtBroker.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880030f3398 -- (.trap 0xfffff880030f3398)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00000c030 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8002f79000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000401802 rsp=0000000003f7fdd5 rbp=0000000000000000
 r8=0000000020206f49  r9=0000000000000002 r10=0000002e00000000
r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=2         ov dn ei pl zr na pe cy
e7a0:fffff880`00401802 ??              ???
Resetting default scope

UNALIGNED_STACK_POINTER:  0000000003f7fdd5

LAST_CONTROL_TRANSFER:  from fffff80001cbba17 to fffff80001c7bf00

STACK_TEXT:  
fffff880`030f2978 fffff800`01cbba17 : 00000000`0000001e ffffffff`c0000005 fffff800`01c7a21a 00000000`00000000 : nt!KeBugCheckEx
fffff880`030f2980 fffff800`01c7b542 : fffff880`030f3158 fffffa80`02774010 fffff880`030f3200 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`030f3020 fffff800`01c79e4a : fffff8a0`01405010 00000000`00000011 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0xc2
fffff880`030f3200 fffff800`01c7a21a : fffff800`01f5f455 00000000`00000200 00000000`00010292 fffff880`030f33c0 : nt!KiGeneralProtectionFault+0x10a
fffff880`030f3398 fffff800`01c87efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x39a
fffff900`c1ad0ce0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExReleaseResourceAndLeavePriorityRegion+0x12


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+39a
fffff800`01c7a21a 48cf            iretq

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiPageFault+39a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!KiPageFault+39a

BUCKET_ID:  X64_0x1E_c0000005_nt!KiPageFault+39a

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`00eea000 fffff880`00f41000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`00e2a000 fffff880`00e35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00ff0000 fffff880`00ff9000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0197b000 fffff880`01982000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`018a5000 fffff880`018b6000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0190c000 fffff880`0193c000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d2c000 fffff880`00d8a000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01120000 fffff880`01193000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`019e1000 fffff880`019f1000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`028f7000 fffff880`02905000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`018f6000 fffff880`0190c000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02911000 fffff880`0291a000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02905000 fffff880`02911000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0291a000 fffff880`0292d000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0297a000 fffff880`02986000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00540000 fffff960`0055e000   dxg      dxg.sys      Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`028c1000 fffff880`028f7000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01898000 fffff880`018a5000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`010ae000 fffff880`010c2000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01062000 fffff880`010ae000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff960`008d0000 fffff960`008d9000   framebuf framebuf.dll Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018bc000 fffff880`018f6000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`021e7000 fffff800`02230000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`01800000 fffff880`01824000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0293b000 fffff880`02954000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`02954000 fffff880`0295c080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0292d000 fffff880`0293b000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`015f6000 fffff880`015ff000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`00fbe000 fffff880`00fc6000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0103a000 fffff880`01049000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0295f000 fffff880`0296d000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba0000 fffff800`00ba3000   kdcom    kdcom.dll    Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`02812000 fffff880`02855000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013e4000 fffff880`013fe000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`00cd4000 fffff880`00d18000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`01049000 fffff880`01058000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0296d000 fffff880`0297a000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fd6000 fffff880`00ff0000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`019c5000 fffff880`019d0000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f4a000 fffff880`00f54000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010c2000 fffff880`01120000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`019f1000 fffff880`019fc000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e4000 fffff880`015f6000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014da000 fffff880`015cc000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`019d0000 fffff880`019e1000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff800`01c0a000 fffff800`021e7000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01241000 fffff880`013e4000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01972000 fffff880`0197b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`00f94000 fffff880`00fa9000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f54000 fffff880`00f87000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fc6000 fffff880`00fd6000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00d18000 fffff880`00d2c000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0121b000 fffff880`01226000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`019fc000 fffff880`019fd480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`01226000 fffff880`0123a000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00780000 fffff960`0078a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02855000 fffff880`02867000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0295d000 fffff880`0295ef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`01887000 fffff880`01898000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`02867000 fffff880`028c1000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`01831000 fffff880`01887000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`01824000 fffff880`01831000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f87000 fffff880`00f94000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01982000 fffff880`01990000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01990000 fffff880`019b5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015cc000 fffff880`015dc000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fa9000 fffff880`00fbe000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d8a000 fffff880`00de6000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01193000 fffff880`011df000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`019b5000 fffff880`019c5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e37000 fffff880`00edb000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00edb000 fffff880`00eea000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff960`00050000 fffff960`0035f000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`00f41000 fffff880`00f4a000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02986000 fffff880`029a7000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`0193c000 fffff880`0194a000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0194a000 fffff880`01956000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01956000 fffff880`0195f000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`0195f000 fffff880`01972000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`015dc000 fffff880`015e4000   spldr.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
 
Also check if your RAM is compatible with the motherboard. See if the motherboard actually supports DDR667.
 
Re: blue screen error

i run the test...test pass...no error..... here are the latest dump files
 

Attachments

  • 020911-20826-01.dmp
    359.7 KB · Views: 358
  • 020911-20779-01.dmp
    359.7 KB · Views: 342
  • 020911-20295-01.dmp
    359.7 KB · Views: 334
  • 020911-24336-01.dmp
    359.7 KB · Views: 320
  • 020711-19141-01.dmp
    265.3 KB · Views: 313
Re: blue screen error

Update SigmaTel Audio driver, it's too old:

sthda64.sys Wed Nov 16 14:49:04 2005



If crashes persist still, it might be something with the system/configuration, or a hardware issue. PSU? RAM? Motherboard?

Reinstall the OS, do not install any old incompattible drivers. If it crashes with a blue screen - blame the hardware for sure.






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020911-24336-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0285a000 PsLoadedModuleList = 0xfffff800`02a97e50
Debug session time: Wed Feb  9 04:30:10.482 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:39.370
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff800028eba83}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028eba83, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b020e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`028eba83 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  wmpnscfg.exe

IRP_ADDRESS:  ffffffffffffff89

TRAP_FRAME:  fffff88002e306e0 -- (.trap 0xfffff88002e306e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002173728 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028eba83 rsp=fffff88002e30870 rbp=0000000000000000
 r8=fffffa8003d2d010  r9=fffff88002e30970 r10=0000000000000002
r11=fffffa8002fd3b70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`028eba83 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028cb469 to fffff800028cbf00

STACK_TEXT:  
fffff880`02e30598 fffff800`028cb469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02e305a0 fffff800`028ca0e0 : 00000000`00000000 fffffa80`03d96640 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02e306e0 fffff800`028eba83 : fffffa80`00000000 fffffa80`04053290 00000000`00000000 fffff800`028d3b3c : nt!KiPageFault+0x260
fffff880`02e30870 fffff800`028a892f : 00000000`00000001 00000000`0011f000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`02e30940 fffff800`0287dba9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02e309c0 fffff800`02c0e2da : fffffa80`032d0df0 fffffa80`04053290 fffff880`02e30b50 fffff880`02e30b48 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`02e309f0 fffff800`02be2ebf : fffffa80`00000004 fffffa80`04053290 fffff880`02e30b50 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x2a83e
fffff880`02e30ae0 fffff800`028cb153 : 00000000`0000000c fffffa80`0403fb60 00000000`0023ea88 00000000`0023eb01 : nt!NtMapViewOfSection+0x2be
fffff880`02e30bb0 00000000`7778013a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0023ea68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7778013a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`028ca0e0 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020911-20295-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02852000 PsLoadedModuleList = 0xfffff800`02a8fe50
Debug session time: Tue Feb  8 15:42:34.865 2011 (UTC - 5:00)
System Uptime: 0 days 0:04:16.753
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffff8800225d738, 2, 1, fffff88000dde074}

Unable to load image ataport.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ataport.SYS
*** ERROR: Module load completed but symbols could not be loaded for ataport.SYS
Probably caused by : ataport.SYS ( ataport+13074 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800225d738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000dde074, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002afa0e0
 fffff8800225d738 

CURRENT_IRQL:  2

FAULTING_IP: 
ataport+13074
fffff880`00dde074 488901          mov     qword ptr [rcx],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050a00000000000 rbx=0000000000000000 rcx=fffff8800225d738
rdx=000002000045e8c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dde074 rsp=fffff80000b9ca38 rbp=fffffa80026c07d0
 r8=0000000000000012  r9=0000000000000002 r10=fffffa8002698610
r11=fffff8800225d738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport+0x13074:
fffff880`00dde074 488901          mov     qword ptr [rcx],rax ds:ffb0:fffff880`0225d738=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028c3469 to fffff800028c3f00

STACK_TEXT:  
fffff800`00b9c758 fffff800`028c3469 : 00000000`0000000a fffff880`0225d738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`028c20e0 : fffffa80`026986a8 00000000`00000002 fffffa80`00000000 fffffa80`026986a8 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff880`00dde074 : fffff880`00dd74a5 fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 : nt!KiPageFault+0x260
fffff800`00b9ca38 fffff880`00dd74a5 : fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 : ataport+0x13074
fffff800`00b9ca40 fffffa80`025a4000 : fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 : ataport+0xc4a5
fffff800`00b9ca48 fffff880`00dd7b34 : fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 : 0xfffffa80`025a4000
fffff800`00b9ca50 fffff800`00b9caa8 : 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 : ataport+0xcb34
fffff800`00b9ca58 00000000`00000000 : fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 fffffa80`025a55d3 : 0xfffff800`00b9caa8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport+13074
fffff880`00dde074 488901          mov     qword ptr [rcx],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ataport+13074

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xD1_ataport+13074

BUCKET_ID:  X64_0xD1_ataport+13074

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800225d738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000dde074, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  fffff8800225d738 

CURRENT_IRQL:  2

FAULTING_IP: 
ataport+13074
fffff880`00dde074 488901          mov     qword ptr [rcx],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050a00000000000 rbx=0000000000000000 rcx=fffff8800225d738
rdx=000002000045e8c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dde074 rsp=fffff80000b9ca38 rbp=fffffa80026c07d0
 r8=0000000000000012  r9=0000000000000002 r10=fffffa8002698610
r11=fffff8800225d738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport+0x13074:
fffff880`00dde074 488901          mov     qword ptr [rcx],rax ds:ffb0:fffff880`0225d738=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028c3469 to fffff800028c3f00

STACK_TEXT:  
fffff800`00b9c758 fffff800`028c3469 : 00000000`0000000a fffff880`0225d738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`028c20e0 : fffffa80`026986a8 00000000`00000002 fffffa80`00000000 fffffa80`026986a8 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff880`00dde074 : fffff880`00dd74a5 fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 : nt!KiPageFault+0x260
fffff800`00b9ca38 fffff880`00dd74a5 : fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 : ataport+0x13074
fffff800`00b9ca40 fffffa80`025a4000 : fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 : ataport+0xc4a5
fffff800`00b9ca48 fffff880`00dd7b34 : fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 : 0xfffffa80`025a4000
fffff800`00b9ca50 fffff800`00b9caa8 : 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 : ataport+0xcb34
fffff800`00b9ca58 00000000`00000000 : fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 fffffa80`025a55d3 : 0xfffff800`00b9caa8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport+13074
fffff880`00dde074 488901          mov     qword ptr [rcx],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ataport+13074

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xD1_ataport+13074

BUCKET_ID:  X64_0xD1_ataport+13074

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800225d738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000dde074, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  fffff8800225d738 

CURRENT_IRQL:  2

FAULTING_IP: 
ataport+13074
fffff880`00dde074 488901          mov     qword ptr [rcx],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050a00000000000 rbx=0000000000000000 rcx=fffff8800225d738
rdx=000002000045e8c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dde074 rsp=fffff80000b9ca38 rbp=fffffa80026c07d0
 r8=0000000000000012  r9=0000000000000002 r10=fffffa8002698610
r11=fffff8800225d738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport+0x13074:
fffff880`00dde074 488901          mov     qword ptr [rcx],rax ds:ffb0:fffff880`0225d738=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028c3469 to fffff800028c3f00

STACK_TEXT:  
fffff800`00b9c758 fffff800`028c3469 : 00000000`0000000a fffff880`0225d738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`028c20e0 : fffffa80`026986a8 00000000`00000002 fffffa80`00000000 fffffa80`026986a8 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff880`00dde074 : fffff880`00dd74a5 fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 : nt!KiPageFault+0x260
fffff800`00b9ca38 fffff880`00dd74a5 : fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 : ataport+0x13074
fffff800`00b9ca40 fffffa80`025a4000 : fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 : ataport+0xc4a5
fffff800`00b9ca48 fffff880`00dd7b34 : fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 : 0xfffffa80`025a4000
fffff800`00b9ca50 fffff800`00b9caa8 : 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 : ataport+0xcb34
fffff800`00b9ca58 00000000`00000000 : fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 fffffa80`025a55d3 : 0xfffff800`00b9caa8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport+13074
fffff880`00dde074 488901          mov     qword ptr [rcx],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ataport+13074

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xD1_ataport+13074

BUCKET_ID:  X64_0xD1_ataport+13074

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800225d738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000dde074, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  fffff8800225d738 

CURRENT_IRQL:  2

FAULTING_IP: 
ataport+13074
fffff880`00dde074 488901          mov     qword ptr [rcx],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050a00000000000 rbx=0000000000000000 rcx=fffff8800225d738
rdx=000002000045e8c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dde074 rsp=fffff80000b9ca38 rbp=fffffa80026c07d0
 r8=0000000000000012  r9=0000000000000002 r10=fffffa8002698610
r11=fffff8800225d738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport+0x13074:
fffff880`00dde074 488901          mov     qword ptr [rcx],rax ds:ffb0:fffff880`0225d738=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028c3469 to fffff800028c3f00

STACK_TEXT:  
fffff800`00b9c758 fffff800`028c3469 : 00000000`0000000a fffff880`0225d738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`028c20e0 : fffffa80`026986a8 00000000`00000002 fffffa80`00000000 fffffa80`026986a8 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff880`00dde074 : fffff880`00dd74a5 fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 : nt!KiPageFault+0x260
fffff800`00b9ca38 fffff880`00dd74a5 : fffffa80`025a4000 fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 : ataport+0x13074
fffff800`00b9ca40 fffffa80`025a4000 : fffff880`00dd7b34 fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 : ataport+0xc4a5
fffff800`00b9ca48 fffff880`00dd7b34 : fffff800`00b9caa8 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 : 0xfffffa80`025a4000
fffff800`00b9ca50 fffff800`00b9caa8 : 00000000`00000000 fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 : ataport+0xcb34
fffff800`00b9ca58 00000000`00000000 : fffffa80`02d70400 fffffa80`0280ec00 00000000`00000000 fffffa80`025a55d3 : 0xfffff800`00b9caa8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport+13074
fffff880`00dde074 488901          mov     qword ptr [rcx],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ataport+13074

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xD1_ataport+13074

BUCKET_ID:  X64_0xD1_ataport+13074

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020911-20826-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02868000 PsLoadedModuleList = 0xfffff800`02aa5e50
Debug session time: Wed Feb  9 04:33:03.651 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:31.539
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 5, {200, fffffa8003de7060, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+46283 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: 0000000000000200
Arg2: fffffa8003de7060
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x5

PROCESS_NAME:  nwiz.exe

CURRENT_IRQL:  1

LAST_CONTROL_TRANSFER:  from fffff80002919bb5 to fffff800028d9f00

STACK_TEXT:  
fffff880`02afd428 fffff800`02919bb5 : 00000000`00000005 00000000`00000200 fffffa80`03de7060 00000000`00000000 : nt!KeBugCheckEx
fffff880`02afd430 fffff800`028de2ce : fffffa80`03e60810 00000000`00000000 fffff800`02b97710 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x46283
fffff880`02afd4b0 fffff800`028efb1b : fffffa80`018de680 00000000`00000001 fffff880`02afd700 fffffa80`018de788 : nt!KeSetEvent+0x43e
fffff880`02afd520 fffffa80`0289d90b : 00000000`00000000 00000000`00000000 fffffa80`03b61e80 fffffa80`03b61db0 : nt!ExReleaseFastMutexUnsafe+0x3f
fffff880`02afd550 00000000`00000000 : 00000000`00000000 fffffa80`03b61e80 fffffa80`03b61db0 fffff8a0`01fa63b2 : 0xfffffa80`0289d90b


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+46283
fffff800`02919bb5 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+46283

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x5_nt!_??_::FNODOBFM::_string_+46283

BUCKET_ID:  X64_0x5_nt!_??_::FNODOBFM::_string_+46283

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020711-19141-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`01c0a000 PsLoadedModuleList = 0xfffff800`01e47e50
Debug session time: Mon Feb  7 10:28:07.548 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:28.189
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80001c7a21a, 0, ffffffffffffffff}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+39a )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80001c7a21a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!KiPageFault+39a
fffff800`01c7a21a 48cf            iretq

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001eb20e0
 ffffffffffffffff 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  AtBroker.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880030f3398 -- (.trap 0xfffff880030f3398)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00000c030 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8002f79000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000401802 rsp=0000000003f7fdd5 rbp=0000000000000000
 r8=0000000020206f49  r9=0000000000000002 r10=0000002e00000000
r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=2         ov dn ei pl zr na pe cy
e7a0:fffff880`00401802 ??              ???
Resetting default scope

UNALIGNED_STACK_POINTER:  0000000003f7fdd5

LAST_CONTROL_TRANSFER:  from fffff80001cbba17 to fffff80001c7bf00

STACK_TEXT:  
fffff880`030f2978 fffff800`01cbba17 : 00000000`0000001e ffffffff`c0000005 fffff800`01c7a21a 00000000`00000000 : nt!KeBugCheckEx
fffff880`030f2980 fffff800`01c7b542 : fffff880`030f3158 fffffa80`02774010 fffff880`030f3200 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`030f3020 fffff800`01c79e4a : fffff8a0`01405010 00000000`00000011 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0xc2
fffff880`030f3200 fffff800`01c7a21a : fffff800`01f5f455 00000000`00000200 00000000`00010292 fffff880`030f33c0 : nt!KiGeneralProtectionFault+0x10a
fffff880`030f3398 fffff800`01c87efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x39a
fffff900`c1ad0ce0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExReleaseResourceAndLeavePriorityRegion+0x12


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+39a
fffff800`01c7a21a 48cf            iretq

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiPageFault+39a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!KiPageFault+39a

BUCKET_ID:  X64_0x1E_c0000005_nt!KiPageFault+39a

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`03b2c000 fffff880`03b6f000   a5w0xtxv a5w0xtxv.SYS Fri Aug 07 09:30:20 2009 (4A7C2C6C)
fffff880`011a9000 fffff880`01200000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cbf000 fffff880`02d49000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0f073000 fffff880`0f089000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00da7000 fffff880`00db2000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00d74000 fffff880`00d7d000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d7d000 fffff880`00da7000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`03e24000 fffff880`03e6c000   b57nd60a b57nd60a.sys Sun Apr 26 07:14:55 2009 (49F4422F)
fffff880`01485000 fffff880`0148c000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03adf000 fffff880`03af0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`026d5000 fffff880`026f3000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00740000 fffff960`00767000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`04265000 fffff880`0428f000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00eb9000 fffff880`00f79000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01416000 fffff880`01446000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ce4000 fffff880`00d42000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014a1000 fffff880`01514000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03fe8000 fffff880`03ff8000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`027a7000 fffff880`027b0000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`0428f000 fffff880`0429d000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03a3e000 fffff880`03ac1000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03ac1000 fffff880`03adf000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`00c7d000 fffff880`00c8c000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01400000 fffff880`01416000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0423d000 fffff880`0425f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`042a9000 fffff880`042b2000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0429d000 fffff880`042a9000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`043ea000 fffff880`043fd000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`041eb000 fffff880`041f7000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03eae000 fffff880`03fa2000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`03fa2000 fffff880`03fe8000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`040fb000 fffff880`04131000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`03e8a000 fffff880`03e97000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00c00000 fffff880`00c14000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00db2000 fffff880`00dfe000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01525000 fffff880`0152f000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015b5000 fffff880`015ef000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01787000 fffff880`017d1000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02811000 fffff800`0285a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e00000 fffff880`03e24000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`041ae000 fffff880`041c7000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`041c7000 fffff880`041cf080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`041a0000 fffff880`041ae000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0260d000 fffff880`026d5000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01600000 fffff880`01609000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`00d42000 fffff880`00d4a000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03b16000 fffff880`03b2c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03a00000 fffff880`03a0f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`041d0000 fffff880`041de000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bb0000 fffff800`00bb3000   kdcom    kdcom.dll    Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`040a6000 fffff880`040e9000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0175c000 fffff880`01787000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`0425f000 fffff880`04264200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04052000 fffff880`04067000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0400e000 fffff880`04031000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c8c000 fffff880`00cd0000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04000000 fffff880`0400e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03a0f000 fffff880`03a1e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`041de000 fffff880`041eb000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d5a000 fffff880`00d74000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`026f3000 fffff880`0270b000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0270b000 fffff880`02737000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`02737000 fffff880`02784000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`02784000 fffff880`027a7000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`00c72000 fffff880`00c7d000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`0100a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`00c14000 fffff880`00c72000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02df5000 fffff880`02e00000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017e9000 fffff880`017fb000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0160a000 fffff880`016fc000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fde9000 fffff880`0fdf5000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03b6f000 fffff880`03b9e000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0418b000 fffff880`041a0000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02dbd000 fffff880`02dcc000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d49000 fffff880`02d8e000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`016fc000 fffff880`0175c000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02c83000 fffff880`02c94000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02de9000 fffff880`02df5000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0285a000 fffff800`02e37000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01251000 fffff880`013f4000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0147c000 fffff880`01485000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fde7000 fffff880`0fde8180   nvBridge nvBridge.kmd Tue Mar 23 19:11:12 2010 (4BA94A90)
fffff880`0f0b0000 fffff880`0fde6c80   nvlddmkm nvlddmkm.sys Tue Mar 23 19:33:35 2010 (4BA94FCF)
fffff880`02d97000 fffff880`02dbd000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`0f056000 fffff880`0f073000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f79000 fffff880`00f8e000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`01017000 fffff880`0104a000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00d4a000 fffff880`00d5a000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01514000 fffff880`01525000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`03884000 fffff880`0392a000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04200000 fffff880`0423d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cd0000 fffff880`00ce4000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0f089000 fffff880`0f0ad000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03b9e000 fffff880`03bb9000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03bb9000 fffff880`03bda000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03bda000 fffff880`03bf4000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c2f000 fffff880`02c80000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03ea3000 fffff880`03eae000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0123f000 fffff880`01248000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01248000 fffff880`01251000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013f4000 fffff880`013fd000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0157b000 fffff880`015b5000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04067000 fffff880`0407f000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0117a000 fffff880`011a9000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`0392a000 fffff880`03935000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03e97000 fffff880`03ea3000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02dcc000 fffff880`02de9000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`017e1000 fffff880`017e9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`03962000 fffff880`039d3000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`0104b000 fffff880`01171000   spub     spub.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`04817000 fffff880`048af000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`03800000 fffff880`03869000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`03935000 fffff880`03962000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`042b7000 fffff880`043ea000   sthda64  sthda64.sys  Wed Nov 16 14:49:04 2005 (437B8D30)
fffff880`03ff8000 fffff880`03ff9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`039d3000 fffff880`039e5000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02cb2000 fffff880`02cbf000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02c94000 fffff880`02cb2000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c1b000 fffff880`02c2f000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005c0000 fffff960`005ca000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03af0000 fffff880`03b16000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`040e9000 fffff880`040fb000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`043fd000 fffff880`043fef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03e79000 fffff880`03e8a000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04131000 fffff880`0418b000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0f000000 fffff880`0f056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03e6c000 fffff880`03e79000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`0100a000 fffff880`01017000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0148c000 fffff880`0149a000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0121a000 fffff880`0123f000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d1000 fffff880`017e1000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f8e000 fffff880`00fa3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00fa3000 fffff880`00fff000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0152f000 fffff880`0157b000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c00000 fffff880`02c1b000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`015ef000 fffff880`015ff000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ea4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea4000 fffff880`00eb3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d8e000 fffff880`02d97000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`0039f000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`01171000 fffff880`0117a000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04031000 fffff880`04052000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`01446000 fffff880`01454000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01454000 fffff880`01460000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01460000 fffff880`01469000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01469000 fffff880`0147c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`0121a000 fffff880`01244000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
 
Re: blue screen error

Forgot to mention to update the Broadcom NetXtreme Gigabit Ethernet Driver:

b57nd60a.sys Sun Apr 26 07:14:55 2009
 
Re: blue screen error

Hi.
I click on upload driver.It says your driver is already up to date....My pc is dell precision 390 and windows 7 ultimate 64 bit..... can you find a driver for me.....thanks
 
Re: blue screen error

Hi.
I have reinstall the OS.Still same error...I have checked my every hardware by using that in another pc....my all hardwares are fine....so please anyone found a solution of it?
and i dont think its drivers error because my pc was running good for almost 5-6 months but certainly this blue screen error....please anyone found a solution let me know.
 
Re: blue screen error

1. What is your result of running memtest 10 passes overnight?
2. According to your screenshots on page 1, your RAM is set right samsung M391T2953CZ3-CE6 DDR667 5-5-5-13 1.8v. Ensure the voltage is set right in the bios too.

You're still getting BCCode A.

--> One of your RAM sticks or RAM slots might be faulty, if memtest detects 0 errors you should remove one of the sticks to try out for BSOD's. Try in different slots too.

--> Submit your latest crash dump.

--> Make sure there are no old drivers in your system such as SigmaTel sthda64.sys Wed Nov 16 14:49:04 2005 .
 
Re: blue screen error

their were no errors..
i have attached the dump also...i couldn't found the drivers...please attach the drivers...please

my pc is dell precision 390
 

Attachments

  • dump.zip
    471.9 KB · Views: 306
Re: blue screen error

Your most recent crash dumps, as of February 20, 2011:


022011-20108-01.dmp
BugCheck A, {0, 2, 0, fffff80002ae7c06}
PROCESS_NAME: BCSSync.exe <--- Microsoft Office 2010
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

------------------

022011-19702-01.dmp
BugCheck D1, {fffff88005a69738, 2, 1, fffff88000fbf074}
PROCESS_NAME: System
Probably caused by : ataport.SYS ( ataport!memmove+64 )

------------------

022011-20233-01.dmp
BugCheck A, {200000014, 2, 0, fffff80002ae1a83}
PROCESS_NAME: explorer.exe
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

------------------

022011-19375-01.dmp
BugCheck D1, {fffff8800276c3e0, 2, 0, fffff88000e87c50}
PROCESS_NAME: mpc-hc.exe <--- Media Player Classic - Home Cinema
Probably caused by : ataport.SYS ( ataport!IdeLogCrbActive+bc )


It does look like some hardware issue. I'd think RAM or HDD.
You never answered this question:

What is your result of running memtest 10 passes overnight?


Old drivers needing updates:

SigmaTel
sthda64.sys Wed Nov 16 14:49:04 2005

Broadcom NetXtreme Gigabit Ethernet Driver
b57nd60a.sys Sun Apr 26 07:14:55 2009
Broadcom.com - Ethernet NIC Driver Downloads


my pc is dell precision 390

Unfortunately it looks like they have dropped support for dell precision 390.

Update Broadcom LAN. Then go to device manager and disable SgmaTel. Reboot.

If your note will crash with Sigma disabled, you got a hardware issue for sure. Take the note to the repairs shop.




~~~~~

Hardware:

a) Memtest86+ - Advanced Memory Diagnostic Tool
10 passes overnight

b) HDD
PassMark DiskCheckup - SMART hard drive monitoring utility
HDDScan



Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022011-20108-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a56000 PsLoadedModuleList = 0xfffff800`02c93e50
Debug session time: Sun Feb 20 04:12:57.992 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:30.881
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80002ae7c06}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ae7c06, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfe0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+c73
fffff800`02ae7c06 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  BCSSync.exe

IRP_ADDRESS:  ffffffffffffff88

TRAP_FRAME:  fffff8800476e670 -- (.trap 0xfffff8800476e670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880046b8778 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae7c06 rsp=fffff8800476e800 rbp=0000000000000000
 r8=fffffa8003128650  r9=fffff8800476e900 r10=0000000000000002
r11=fffffa8003bfa150 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xc73:
fffff800`02ae7c06 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ac7469 to fffff80002ac7f00

STACK_TEXT:  
fffff880`0476e528 fffff800`02ac7469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0476e530 fffff800`02ac60e0 : fffffa80`0383d650 fffffa80`0383d650 fffff880`046b8770 fffff880`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0476e670 fffff800`02ae7c06 : fffffa80`03ce7060 fffff800`02acddda 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0476e800 fffff800`02aa492f : 00000000`00000000 00000000`00000000 00000000`00000000 ffffeda5`001b9fb7 : nt!IopCompleteRequest+0xc73
fffff880`0476e8d0 fffff800`02acf25d : fffff800`02c442a0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`0476e950 fffff800`02ad2ac1 : fffffa80`03c20ec8 fffffa80`03ce7060 fffffa80`00000081 fffff8a0`019199f0 : nt!KiCommitThreadWait+0x3dd
fffff880`0476e9e0 fffff800`02dc06d7 : fffffa80`00010000 fffff880`0476ebc8 00000000`00000001 fffff880`0476eb40 : nt!KeRemoveQueueEx+0x301
fffff880`0476ea90 fffff800`02ad8296 : 00000000`00000000 fffff880`0476eba8 fffff880`0476ebc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`0476eb20 fffff800`02ac7153 : fffffa80`03ce7060 00000000`76ed4270 fffff880`0476eca0 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`0476ec20 00000000`76e217ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0270f708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e217ba


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02ac60e0 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------







Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022011-19702-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50
Debug session time: Sun Feb 20 04:09:15.908 2011 (UTC - 5:00)
System Uptime: 0 days 2:07:46.648
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffff88005a69738, 2, 1, fffff88000fbf074}

Unable to load image spla.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for spla.sys
*** ERROR: Module load completed but symbols could not be loaded for spla.sys
Probably caused by : ataport.SYS ( ataport!memmove+64 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88005a69738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000fbf074, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc60e0
 fffff88005a69738 

CURRENT_IRQL:  2

FAULTING_IP: 
ataport!memmove+64
fffff880`00fbf074 488901          mov     qword ptr [rcx],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff800055878a0 -- (.trap 0xfffff800055878a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0050e0c24f000000 rbx=0000000000000000 rcx=fffff88005a69738
rdx=000001fffcc978c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000fbf074 rsp=fffff80005587a38 rbp=fffffa80027031b0
 r8=0000000000000012  r9=0000000000000002 r10=fffffa80026ea610
r11=fffff88005a69738 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport!memmove+0x64:
fffff880`00fbf074 488901          mov     qword ptr [rcx],rax ds:7fb0:fffff880`05a69738=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a8f469 to fffff80002a8ff00

STACK_TEXT:  
fffff800`05587758 fffff800`02a8f469 : 00000000`0000000a fffff880`05a69738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`05587760 fffff800`02a8e0e0 : fffffa80`026ea6a8 00000000`00000002 fffffa80`00000000 fffffa80`026ea6a8 : nt!KiBugCheckDispatch+0x69
fffff800`055878a0 fffff880`00fbf074 : fffff880`00fb84a5 fffffa80`018a6000 fffff880`00fb8b34 fffff800`05587aa8 : nt!KiPageFault+0x260
fffff800`05587a38 fffff880`00fb84a5 : fffffa80`018a6000 fffff880`00fb8b34 fffff800`05587aa8 00000000`00000000 : ataport!memmove+0x64
fffff800`05587a40 fffff880`00fb80ec : fffffa80`026e91a0 00000000`00000000 fffffa80`026e91a0 fffffa80`01d27b80 : ataport!IdeProcessCompletedRequests+0x18d
fffff800`05587b70 fffff880`0104a4ce : fffffa80`018a6000 00000000`00000000 fffffa80`026e9050 fffffa80`018a6750 : ataport!IdePortCompletionDpc+0x1a8
fffff800`05587c30 fffffa80`018a6000 : 00000000`00000000 fffffa80`026e9050 fffffa80`018a6750 fffff800`02c08e80 : spla+0x424ce
fffff800`05587c38 00000000`00000000 : fffffa80`026e9050 fffffa80`018a6750 fffff800`02c08e80 00000000`00000000 : 0xfffffa80`018a6000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!memmove+64
fffff880`00fbf074 488901          mov     qword ptr [rcx],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ataport!memmove+64

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xD1_ataport!memmove+64

BUCKET_ID:  X64_0xD1_ataport!memmove+64

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022011-20233-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a50000 PsLoadedModuleList = 0xfffff800`02c8de50
Debug session time: Sun Feb 20 04:10:11.235 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:31.123
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {200000014, 2, 0, fffff80002ae1a83}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000200000014, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ae1a83, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf80e0
 0000000200000014 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`02ae1a83 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  explorer.exe

IRP_ADDRESS:  00000001ffffff9c

TRAP_FRAME:  fffff88002867670 -- (.trap 0xfffff88002867670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88003563778 rbx=0000000000000000 rcx=0000000200000014
rdx=0000000200000014 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae1a83 rsp=fffff88002867800 rbp=0000000000000000
 r8=0000000000000100  r9=0000000000000000 r10=0000000000000002
r11=fffffa80039b8710 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02ae1a83 488b09          mov     rcx,qword ptr [rcx] ds:00000002`00000014=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ac1469 to fffff80002ac1f00

STACK_TEXT:  
fffff880`02867528 fffff800`02ac1469 : 00000000`0000000a 00000002`00000014 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02867530 fffff800`02ac00e0 : 00000000`00000000 fffffa80`03c686b0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02867670 fffff800`02ae1a83 : fffffa80`03c686b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`02867800 fffff800`02a9e92f : 00000002`00000014 00000000`00000000 00000000`00000000 ffffeda9`00000000 : nt!IopCompleteRequest+0xae3
fffff880`028678d0 fffff800`02ac925d : fffff880`02f037a0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02867950 fffff800`02accac1 : fffffa80`03a69ec8 fffffa80`02d59a50 fffffa80`00000091 fffff8a0`01b477d0 : nt!KiCommitThreadWait+0x3dd
fffff880`028679e0 fffff800`02dba6d7 : fffffa80`00010000 fffff880`02867bc8 00000000`00000001 fffff880`02867b40 : nt!KeRemoveQueueEx+0x301
fffff880`02867a90 fffff800`02ad2296 : 00000000`00000000 fffff880`02867ba8 fffff880`02867bc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`02867b20 fffff800`02ac1153 : fffffa80`02d59a50 00000000`77c04270 fffff880`02867ca0 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`02867c20 00000000`77b517ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`06def728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b517ba


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02ac00e0 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022011-19375-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1b000 PsLoadedModuleList = 0xfffff800`02c58e50
Debug session time: Sun Feb 20 04:20:25.665 2011 (UTC - 5:00)
System Uptime: 0 days 0:07:06.553
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffff8800276c3e0, 2, 0, fffff88000e87c50}

Unable to load image spss.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for spss.sys
*** ERROR: Module load completed but symbols could not be loaded for spss.sys
Probably caused by : ataport.SYS ( ataport!IdeLogCrbActive+bc )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8800276c3e0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88000e87c50, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc30e0
 fffff8800276c3e0 

CURRENT_IRQL:  2

FAULTING_IP: 
ataport!IdeLogCrbActive+bc
fffff880`00e87c50 f30f6f4148      movdqu  xmm0,xmmword ptr [rcx+48h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  mpc-hc.exe

TRAP_FRAME:  fffff80000ba2720 -- (.trap 0xfffff80000ba2720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003a0c400 rbx=0000000000000000 rcx=fffff8800276c390
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000e87c50 rsp=fffff80000ba28b0 rbp=0000000000000001
 r8=0000000000000000  r9=0000000000000000 r10=fffffa8001c1a0b0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ataport!IdeLogCrbActive+0xbc:
fffff880`00e87c50 f30f6f4148      movdqu  xmm0,xmmword ptr [rcx+48h] ds:3e60:fffff880`0276c3d8=????????????????????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a8c469 to fffff80002a8cf00

STACK_TEXT:  
fffff800`00ba25d8 fffff800`02a8c469 : 00000000`0000000a fffff880`0276c3e0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba25e0 fffff800`02a8b0e0 : fffff800`00ba2830 fffffa80`026c2168 00000000`00400000 00000000`0000000b : nt!KiBugCheckDispatch+0x69
fffff800`00ba2720 fffff880`00e87c50 : fffff800`02c05e80 00000000`00000000 fffffa80`026c07d0 00000000`00000001 : nt!KiPageFault+0x260
fffff800`00ba28b0 fffff880`00e91c71 : 00000000`00000000 fffffa80`018421a0 fffffa80`01c1a010 fffffa80`03b151b0 : ataport!IdeLogCrbActive+0xbc
fffff800`00ba28e0 fffff800`02ffc62f : 00000000`00000000 fffffa80`01c1a0b0 fffffa80`01844ea0 fffffa80`0362b7a8 : ataport!IdeStartIoCallBack+0xc9
fffff800`00ba2a50 fffff880`00e5d0d3 : fffffa80`01c1a010 fffff880`00e5d12c 00000000`0000014c fffff880`0443fe20 : hal!HalBuildScatterGatherList+0x203
fffff800`00ba2ac0 fffff880`00e91b3b : fffffa80`01c1a010 fffffa80`026c07d0 fffffa80`018421a0 fffffa80`01c1a010 : PCIIDEX!BmSetup+0x6b
fffff800`00ba2b20 fffff880`00e907eb : fffffa80`01843500 fffffa80`026c07d0 fffffa80`01843500 fffffa80`018421a0 : ataport!IdeDispatchChannelRequest+0xef
fffff800`00ba2b50 fffff880`00e9031e : 00000000`00000001 fffffa80`01c1a010 00000000`00000001 fffffa80`01c1a010 : ataport!IdeStartChannelRequest+0x113
fffff800`00ba2bd0 fffff880`00e92582 : 00000000`00000000 00000000`00000000 fffffa80`026c07d0 fffffa80`0392ab80 : ataport!IdeStartNextDeviceRequest+0x18e
fffff800`00ba2c70 fffff880`00e920ec : fffffa80`018421a0 00000000`00000000 fffffa80`018421a0 fffffa80`0392ab80 : ataport!IdeProcessCompletedRequests+0x26a
fffff800`00ba2da0 fffff880`010674ce : fffffa80`025a4000 fffff800`00ba2e88 fffffa80`01842050 fffffa80`025a4750 : ataport!IdePortCompletionDpc+0x1a8
fffff800`00ba2e60 fffffa80`025a4000 : fffff800`00ba2e88 fffffa80`01842050 fffffa80`025a4750 fffffa80`01a00430 : spss+0x424ce
fffff800`00ba2e68 fffff800`00ba2e88 : fffffa80`01842050 fffffa80`025a4750 fffffa80`01a00430 01cbd0df`6851989a : 0xfffffa80`025a4000
fffff800`00ba2e70 fffffa80`01842050 : fffffa80`025a4750 fffffa80`01a00430 01cbd0df`6851989a 00000000`0837fba0 : 0xfffff800`00ba2e88
fffff800`00ba2e78 fffffa80`025a4750 : fffffa80`01a00430 01cbd0df`6851989a 00000000`0837fba0 00000000`00000022 : 0xfffffa80`01842050
fffff800`00ba2e80 fffffa80`01a00430 : 01cbd0df`6851989a 00000000`0837fba0 00000000`00000022 00000000`00000000 : 0xfffffa80`025a4750
fffff800`00ba2e88 01cbd0df`6851989a : 00000000`0837fba0 00000000`00000022 00000000`00000000 00000000`00000000 : 0xfffffa80`01a00430
fffff800`00ba2e90 00000000`0837fba0 : 00000000`00000022 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1cbd0df`6851989a
fffff800`00ba2e98 00000000`00000022 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`01842118 : 0x837fba0
fffff800`00ba2ea0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`01842118 fffffa80`01842050 : 0x22


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!IdeLogCrbActive+bc
fffff880`00e87c50 f30f6f4148      movdqu  xmm0,xmmword ptr [rcx+48h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ataport!IdeLogCrbActive+bc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xD1_ataport!IdeLogCrbActive+bc

BUCKET_ID:  X64_0xD1_ataport!IdeLogCrbActive+bc

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`01183000 fffff880`011da000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02d2c000 fffff880`02db6000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fde0000 fffff880`0fdf6000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03c16000 fffff880`03c59000   am7sp3ze am7sp3ze.SYS Fri Aug 07 09:30:20 2009 (4A7C2C6C)
fffff880`00eb0000 fffff880`00ebb000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`011f1000 fffff880`011fa000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e86000 fffff880`00eb0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00860000 fffff960`008c1000   ATMFD    ATMFD.DLL    Mon Jul 13 19:38:13 2009 (4A5BC565)
fffff880`03e6a000 fffff880`03eb2000   b57nd60a b57nd60a.sys Sun Apr 26 07:14:55 2009 (49F4422F)
fffff880`01213000 fffff880`0121a000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03db8000 fffff880`03dc9000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`029b9000 fffff880`029d7000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00640000 fffff960`00667000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`045d5000 fffff880`045ff000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d3a000 fffff880`00dfa000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`013be000 fffff880`013ee000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cdc000 fffff880`00d3a000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014e1000 fffff880`01554000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0fdd0000 fffff880`0fde0000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0289c000 fffff880`028a5000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`04400000 fffff880`0440e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03d17000 fffff880`03d9a000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03d9a000 fffff880`03db8000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03d08000 fffff880`03d17000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045ad000 fffff880`045cf000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0441a000 fffff880`04423000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0440e000 fffff880`0441a000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04423000 fffff880`04436000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04024000 fffff880`04030000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03eed000 fffff880`03fe1000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`03e00000 fffff880`03e46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`04130000 fffff880`04166000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`03ed0000 fffff880`03edd000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00fc1000 fffff880`00fd5000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00c00000 fffff880`00c4c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01565000 fffff880`0156f000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0178a000 fffff880`017d4000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02ff8000 fffff800`03041000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e46000 fffff880`03e6a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`041e3000 fffff880`041fc000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04000000 fffff880`04008080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`041d5000 fffff880`041e3000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`028f1000 fffff880`029b9000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01600000 fffff880`01609000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01015000 fffff880`0101d000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c00000 fffff880`03c16000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03cde000 fffff880`03ced000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04009000 fffff880`04017000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bd1000 fffff800`00bd4000   kdcom    kdcom.dll    Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`040db000 fffff880`0411e000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`014c7000 fffff880`014e1000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0175f000 fffff880`0178a000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`045cf000 fffff880`045d4200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04082000 fffff880`04097000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0403e000 fffff880`04061000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c84000 fffff880`00cc8000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04030000 fffff880`0403e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03def000 fffff880`03dfe000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04017000 fffff880`04024000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e6c000 fffff880`00e86000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`029d7000 fffff880`029ef000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02800000 fffff880`0282c000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`0282c000 fffff880`02879000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`02879000 fffff880`0289c000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`02ce5000 fffff880`02cf0000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011da000 fffff880`011e4000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01469000 fffff880`014c7000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03cfd000 fffff880`03d08000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017ec000 fffff880`017fe000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0160d000 fffff880`016ff000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0f024000 fffff880`0f030000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03c59000 fffff880`03c88000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`041c0000 fffff880`041d5000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02c2f000 fffff880`02c3e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02db6000 fffff880`02dfb000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`016ff000 fffff880`0175f000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02cf0000 fffff880`02d01000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03cf1000 fffff880`03cfd000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a1b000 fffff800`02ff8000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`0121b000 fffff880`013be000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`015f5000 fffff880`015fe000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fd78000 fffff880`0fd79180   nvBridge nvBridge.kmd Tue Mar 23 19:11:12 2010 (4BA94A90)
fffff880`0f041000 fffff880`0fd77c80   nvlddmkm nvlddmkm.sys Tue Mar 23 19:33:35 2010 (4BA94FCF)
fffff880`02c09000 fffff880`02c2f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03fe1000 fffff880`03ffe000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01000000 fffff880`01015000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f79000 fffff880`00fac000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01554000 fffff880`01565000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`046cb000 fffff880`04771000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04570000 fffff880`045ad000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cc8000 fffff880`00cdc000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0f000000 fffff880`0f024000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03c88000 fffff880`03ca3000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03ca3000 fffff880`03cc4000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03cc4000 fffff880`03cde000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c8a000 fffff880`02cdb000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0f030000 fffff880`0f03b000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`00ff3000 fffff880`00ffc000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`00ebb000 fffff880`00ec4000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`00c71000 fffff880`00c7a000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015bb000 fffff880`015f5000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04097000 fffff880`040af000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01154000 fffff880`01183000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`04771000 fffff880`0477c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03edd000 fffff880`03ee9000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02c3e000 fffff880`02c5b000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`017e4000 fffff880`017ec000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01025000 fffff880`0114b000   spss     spss.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`0493d000 fffff880`049d5000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`048d4000 fffff880`0493d000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`0477c000 fffff880`047a9000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`0443d000 fffff880`04570000   sthda64  sthda64.sys  Wed Nov 16 14:49:04 2005 (437B8D30)
fffff880`03ee9000 fffff880`03eea480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`04671000 fffff880`04683000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02d1f000 fffff880`02d2c000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02d01000 fffff880`02d1f000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c76000 fffff880`02c8a000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00460000 fffff960`0046a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03dc9000 fffff880`03def000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0411e000 fffff880`04130000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04436000 fffff880`04437f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03ebf000 fffff880`03ed0000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04166000 fffff880`041c0000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0fd7a000 fffff880`0fdd0000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03eb2000 fffff880`03ebf000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`011e4000 fffff880`011f1000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00fd5000 fffff880`00fe3000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`00c4c000 fffff880`00c71000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d4000 fffff880`017e4000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fac000 fffff880`00fc1000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0156f000 fffff880`015bb000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c5b000 fffff880`02c76000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`00fe3000 fffff880`00ff3000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ec6000 fffff880`00f6a000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f6a000 fffff880`00f79000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c00000 fffff880`02c09000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003ef000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`0114b000 fffff880`01154000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04061000 fffff880`04082000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`04600000 fffff880`04671000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01450000 fffff880`0145e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`013ee000 fffff880`013fa000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0145e000 fffff880`01467000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01200000 fffff880`01213000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`00fd5000 fffff880`00fff000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
 
Back
Top Bottom