BSODs in a new computer

#1
I had probably three BSODs at the day I got my computer so I decided to re-install windows and after that I've been getting BSOD approximately once in a week. The computer is about a month old and it was build in a local shop. Hope you guys could help me.
 


Attachments

Venom

New Member
#2
You should take it back to him and tell him he didn't configure it properly.
 


#3
Re: BSODs in a new computer





Update drivers:


Logitech Setpoint
LUsbFilt.Sys Wed Jun 17 12:49:46 2009


Motherboard USB 3.0 Controller
nusb3hub.sys Thu Apr 22 21:34:35 2010


Realtek Audio and Lan drivers
Rt64win7.sys Sun May 30 23:46:43 2010
RTKVHD64.sys Fri Jan 29 01:48:35 2010




If crashes persist after the updates, uninstall F-Secure and install MSE as the replacement.














CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032911-18813-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c1f000 PsLoadedModuleList = 0xfffff800`02e64e90
Debug session time: Tue Mar 29 00:41:43.628 2011 (UTC - 4:00)
System Uptime: 0 days 0:08:18.783
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff88004ae9550, 0, 6f1f988}

Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGCONTEXT::Present+cc )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004ae9550, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000006f1f988, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgkrnl!DXGCONTEXT::Present+cc
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000006f1f988

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ed00e8
 0000000006f1f988 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88006f1f3e0 -- (.trap 0xfffff88006f1f3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8008a81410
rdx=0000000006f1f930 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004ae9550 rsp=fffff88006f1f578 rbp=fffff8a0073c8ec0
 r8=fffff88006f1f8c0  r9=fffff88006f1f8f0 r10=fffff88002f65660
r11=fffff8a007adea40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgkrnl!DXGCONTEXT::Present+0xcc:
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh ds:00000000`00000058=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ceb028 to fffff80002c9f640

STACK_TEXT:  
fffff880`06f1eb58 fffff800`02ceb028 : 00000000`0000001e ffffffff`c0000005 fffff880`04ae9550 00000000`00000000 : nt!KeBugCheckEx
fffff880`06f1eb60 fffff800`02c9ecc2 : fffff880`06f1f338 fffff8a0`073c8ec0 fffff880`06f1f3e0 00000000`06f1f930 : nt! ?? ::FNODOBFM::`string'+0x4987d
fffff880`06f1f200 fffff800`02c9d83a : 00000000`00000000 00000000`06f1f988 fffffa80`09655c00 fffff8a0`073c8ec0 : nt!KiExceptionDispatch+0xc2
fffff880`06f1f3e0 fffff880`04ae9550 : 00000000`00000000 00000000`00000000 00000000`06f1f930 00000000`00000001 : nt!KiPageFault+0x23a
fffff880`06f1f578 fffff880`06f1f8c0 : fffff880`06f1f8f0 00000000`00000004 fffffa80`0977cd60 fffffa80`0967a001 : dxgkrnl!DXGCONTEXT::Present+0xcc
fffff880`06f1f898 fffff880`06f1f8f0 : 00000000`00000004 fffffa80`0977cd60 fffffa80`0967a001 fffff8a0`072bef00 : 0xfffff880`06f1f8c0
fffff880`06f1f8a0 00000000`00000004 : fffffa80`0977cd60 fffffa80`0967a001 fffff8a0`072bef00 00000000`00000000 : 0xfffff880`06f1f8f0
fffff880`06f1f8a8 fffffa80`0977cd60 : fffffa80`0967a001 fffff8a0`072bef00 00000000`00000000 00000000`00000001 : 0x4
fffff880`06f1f8b0 fffffa80`0967a001 : fffff8a0`072bef00 00000000`00000000 00000000`00000001 fffffa80`08a8f000 : 0xfffffa80`0977cd60
fffff880`06f1f8b8 fffff8a0`072bef00 : 00000000`00000000 00000000`00000001 fffffa80`08a8f000 00000000`00000001 : 0xfffffa80`0967a001
fffff880`06f1f8c0 00000000`00000000 : 00000000`00000001 fffffa80`08a8f000 00000000`00000001 fffff8a0`073d9000 : 0xfffff8a0`072bef00


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgkrnl!DXGCONTEXT::Present+cc
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgkrnl!DXGCONTEXT::Present+cc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799fa

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_dxgkrnl!DXGCONTEXT::Present+cc

BUCKET_ID:  X64_0x1E_c0000005_dxgkrnl!DXGCONTEXT::Present+cc

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004ae9550, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000006f1f988, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgkrnl!DXGCONTEXT::Present+cc
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000006f1f988

READ_ADDRESS:  0000000006f1f988 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88006f1f3e0 -- (.trap 0xfffff88006f1f3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8008a81410
rdx=0000000006f1f930 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004ae9550 rsp=fffff88006f1f578 rbp=fffff8a0073c8ec0
 r8=fffff88006f1f8c0  r9=fffff88006f1f8f0 r10=fffff88002f65660
r11=fffff8a007adea40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgkrnl!DXGCONTEXT::Present+0xcc:
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh ds:00000000`00000058=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ceb028 to fffff80002c9f640

STACK_TEXT:  
fffff880`06f1eb58 fffff800`02ceb028 : 00000000`0000001e ffffffff`c0000005 fffff880`04ae9550 00000000`00000000 : nt!KeBugCheckEx
fffff880`06f1eb60 fffff800`02c9ecc2 : fffff880`06f1f338 fffff8a0`073c8ec0 fffff880`06f1f3e0 00000000`06f1f930 : nt! ?? ::FNODOBFM::`string'+0x4987d
fffff880`06f1f200 fffff800`02c9d83a : 00000000`00000000 00000000`06f1f988 fffffa80`09655c00 fffff8a0`073c8ec0 : nt!KiExceptionDispatch+0xc2
fffff880`06f1f3e0 fffff880`04ae9550 : 00000000`00000000 00000000`00000000 00000000`06f1f930 00000000`00000001 : nt!KiPageFault+0x23a
fffff880`06f1f578 fffff880`06f1f8c0 : fffff880`06f1f8f0 00000000`00000004 fffffa80`0977cd60 fffffa80`0967a001 : dxgkrnl!DXGCONTEXT::Present+0xcc
fffff880`06f1f898 fffff880`06f1f8f0 : 00000000`00000004 fffffa80`0977cd60 fffffa80`0967a001 fffff8a0`072bef00 : 0xfffff880`06f1f8c0
fffff880`06f1f8a0 00000000`00000004 : fffffa80`0977cd60 fffffa80`0967a001 fffff8a0`072bef00 00000000`00000000 : 0xfffff880`06f1f8f0
fffff880`06f1f8a8 fffffa80`0977cd60 : fffffa80`0967a001 fffff8a0`072bef00 00000000`00000000 00000000`00000001 : 0x4
fffff880`06f1f8b0 fffffa80`0967a001 : fffff8a0`072bef00 00000000`00000000 00000000`00000001 fffffa80`08a8f000 : 0xfffffa80`0977cd60
fffff880`06f1f8b8 fffff8a0`072bef00 : 00000000`00000000 00000000`00000001 fffffa80`08a8f000 00000000`00000001 : 0xfffffa80`0967a001
fffff880`06f1f8c0 00000000`00000000 : 00000000`00000001 fffffa80`08a8f000 00000000`00000001 fffff8a0`073d9000 : 0xfffff8a0`072bef00


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgkrnl!DXGCONTEXT::Present+cc
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgkrnl!DXGCONTEXT::Present+cc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799fa

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_dxgkrnl!DXGCONTEXT::Present+cc

BUCKET_ID:  X64_0x1E_c0000005_dxgkrnl!DXGCONTEXT::Present+cc

Followup: MachineOwner
---------











Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032011-18330-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e8ee90
Debug session time: Sun Mar 20 17:54:54.580 2011 (UTC - 4:00)
System Uptime: 0 days 1:23:31.985
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8800459748e, fffff8800339d100, 0}

Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTKVHD64.sys
*** ERROR: Module load completed but symbols could not be loaded for RTKVHD64.sys
Probably caused by : portcls.sys ( portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800459748e, Address of the instruction which caused the bugcheck
Arg3: fffff8800339d100, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a
fffff880`0459748e eb04            jmp     portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x40 (fffff880`04597494)

CONTEXT:  fffff8800339d100 -- (.cxr 0xfffff8800339d100)
rax=fffffa8006c11e30 rbx=fffffa8006c11e30 rcx=fffffa8006c11e38
rdx=fffff8800458e498 rsi=fffffa80095741d0 rdi=0000000000000000
rip=fffff8800459748e rsp=fffff8800339dae0 rbp=fffffa80095741c8
 r8=fffff8800339db78  r9=11d05791b4c90a60 r10=fffff880009e9ca0
r11=fffff8800339dad0 r12=fffffa80086b2620 r13=0000000000000001
r14=0000000000000000 r15=fffffa800809d900
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x3a:
fffff880`0459748e eb04            jmp     portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x40 (fffff880`04597494)
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  audiodg.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8800459730a to fffff8800459748e

STACK_TEXT:  
fffff880`0339dae0 fffff880`0459730a : 00000000`0000041f 00000000`00000000 fffffa80`0809d900 00000000`000007ff : portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x3a
fffff880`0339db10 fffff880`045970ee : 00000000`00000000 fffffa80`0809da50 fffffa80`095741c0 fffffa80`06f26900 : portcls!CPortTopology::NewIrpTarget+0xbe
fffff880`0339db40 fffff880`0449aeea : fffffa80`06f26900 fffffa80`08084630 00000000`00000000 fffffa80`00000000 : portcls!xDispatchCreate+0xfa
fffff880`0339dbc0 fffff880`044957a6 : fffffa80`06f26900 fffffa80`0808eb00 fffffa80`0809d900 00000000`00000000 : ks!DispatchCreate+0x11e
fffff880`0339dc10 fffff880`04596897 : fffffa80`06f26900 fffffa80`0809d900 00000000`00000000 fffff800`02f66e1e : ks!KsDispatchIrp+0xc6
fffff880`0339dc40 fffff880`04596064 : 00000000`c000000d fffffa80`06f26b80 fffffa80`0808ebd0 00000000`00000801 : portcls!DispatchCreate+0x67
fffff880`0339dc70 fffff880`065033fd : fffffa80`080a25a0 00000000`00000000 fffffa80`071e82f0 fffffa80`06f26900 : portcls!PcDispatchIrp+0x54
fffff880`0339dca0 fffffa80`080a25a0 : 00000000`00000000 fffffa80`071e82f0 fffffa80`06f26900 fffffa80`06f26900 : RTKVHD64+0xd23fd
fffff880`0339dca8 00000000`00000000 : fffffa80`071e82f0 fffffa80`06f26900 fffffa80`06f26900 fffff880`045d8825 : 0xfffffa80`080a25a0


FOLLOWUP_IP: 
portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a
fffff880`0459748e eb04            jmp     portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x40 (fffff880`04597494)

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: portcls

IMAGE_NAME:  portcls.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc03

STACK_COMMAND:  .cxr 0xfffff8800339d100 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a

BUCKET_ID:  X64_0x3B_portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a

Followup: MachineOwner
---------













Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\030711-26504-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a51000 PsLoadedModuleList = 0xfffff800`02c8ee50
Debug session time: Sun Mar  6 19:34:36.100 2011 (UTC - 4:00)
System Uptime: 0 days 1:46:57.723
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff8800926dcf8, fffff8800926d560, fffff880012fcd49}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFindStartingNode+4b9 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff8800926dcf8
Arg3: fffff8800926d560
Arg4: fffff880012fcd49

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff8800926dcf8 -- (.exr 0xfffff8800926dcf8)
ExceptionAddress: fffff880012fcd49 (Ntfs!NtfsFindStartingNode+0x00000000000004b9)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff8800926d560 -- (.cxr 0xfffff8800926d560)
rax=ffbff8a006c8b510 rbx=fffffa8008df8a60 rcx=fffff8a006ce1a38
rdx=fffffa8008f6d370 rsi=fffff8800926e098 rdi=fffff8a006ce16a0
rip=fffff880012fcd49 rsp=fffff8800926df30 rbp=fffffa8008df8a60
 r8=0000000000000000  r9=0000000000000000 r10=fffffa8008df8a60
r11=0000000000000000 r12=fffff8800926e3c0 r13=0000000000000000
r14=fffff8800926e3b0 r15=fffff8800926e438
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
Ntfs!NtfsFindStartingNode+0x4b9:
fffff880`012fcd49 f6404103        test    byte ptr [rax+41h],3 ds:002b:ffbff8a0`06c8b551=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  CCC.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf90e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsFindStartingNode+4b9
fffff880`012fcd49 f6404103        test    byte ptr [rax+41h],3

FAULTING_IP: 
Ntfs!NtfsFindStartingNode+4b9
fffff880`012fcd49 f6404103        test    byte ptr [rax+41h],3

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880012f728d to fffff880012fcd49

STACK_TEXT:  
fffff880`0926df30 fffff880`012f728d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFindStartingNode+0x4b9
fffff880`0926e000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreate+0x3dd


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsFindStartingNode+4b9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff8800926d560 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFindStartingNode+4b9

BUCKET_ID:  X64_0x24_Ntfs!NtfsFindStartingNode+4b9

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032611-18174-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02ea2e90
Debug session time: Sat Mar 26 17:07:47.663 2011 (UTC - 4:00)
System Uptime: 0 days 0:10:51.068
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88002922228, fffff88002921a80, fffff880012ce665}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushVolume+449 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88002922228
Arg3: fffff88002921a80
Arg4: fffff880012ce665

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88002922228 -- (.exr 0xfffff88002922228)
ExceptionAddress: fffff880012ce665 (Ntfs!NtfsFlushVolume+0x0000000000000449)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88002921a80 -- (.cxr 0xfffff88002921a80)
rax=ffbff8a003940010 rbx=0000000000000000 rcx=fffff8a00391e6e0
rdx=fffff8a00750c300 rsi=0000000000000001 rdi=fffffa80090c44e0
rip=fffff880012ce665 rsp=fffff88002922460 rbp=fffff88002922720
 r8=fffff8a00391e6e0  r9=fffff8a00391e700 r10=fffff880029224f0
r11=fffff88002922410 r12=fffff8a007b015c0 r13=fffff8a007b01770
r14=0000000000000702 r15=fffffa8007ee9180
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
Ntfs!NtfsFlushVolume+0x449:
fffff880`012ce665 f0017014        lock add dword ptr [rax+14h],esi ds:002b:ffbff8a0`03940024=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0e0e8
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsFlushVolume+449
fffff880`012ce665 f0017014        lock add dword ptr [rax+14h],esi

FAULTING_IP: 
Ntfs!NtfsFlushVolume+449
fffff880`012ce665 f0017014        lock add dword ptr [rax+14h],esi

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880012d6fad to fffff880012ce665

STACK_TEXT:  
fffff880`02922460 fffff880`012d6fad : fffffa80`090c44e0 fffffa80`07ee9180 00000000`00100001 00000000`00000000 : Ntfs!NtfsFlushVolume+0x449
fffff880`02922590 fffff880`012d76b4 : fffffa80`090c44e0 fffffa80`0910a410 fffffa80`09738ad0 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459
fffff880`02922670 fffff880`0106abcf : fffffa80`0910a7b0 fffffa80`0910a410 fffffa80`090c44e0 fffff880`02922698 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`029226e0 fffff880`010696df : fffffa80`076f7a30 00000000`00000000 fffffa80`076f7a00 fffffa80`0910a410 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`02922770 fffff800`02fe571b : 00000000`00000002 fffffa80`09738ad0 00000000`00000000 fffffa80`0910a410 : fltmgr!FltpDispatch+0xcf
fffff880`029227d0 fffff800`02f7c871 : fffffa80`0910a410 fffffa80`06802060 fffffa80`09738ad0 00000000`000007ff : nt!IopSynchronousServiceTail+0xfb
fffff880`02922840 fffff800`02cdc8d3 : fffffa80`06802060 fffffa80`06701040 fffffa80`076f7a30 fffffa80`09738ad0 : nt!NtFlushBuffersFile+0x171
fffff880`029228d0 fffff800`02cd8e70 : fffff800`02f1c96d 00000000`00000004 fffffa80`075ed190 fffffa80`098065f0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02922a68 fffff800`02f1c96d : 00000000`00000004 fffffa80`075ed190 fffffa80`098065f0 fffff800`02fb2f48 : nt!KiServiceLinkage
fffff880`02922a70 fffff800`02f7acce : fffff880`03348a38 fffffa80`06802060 00000000`00000080 00000000`00000001 : nt!PopFlushVolumeWorker+0x1bd
fffff880`02922d40 fffff800`02ccefe6 : fffff800`02e4fe80 fffffa80`06802060 fffff800`02e5dcc0 fffff880`01266384 : nt!PspSystemThreadStartup+0x5a
fffff880`02922d80 00000000`00000000 : fffff880`02923000 fffff880`0291d000 fffff880`029215d0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsFlushVolume+449

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9

STACK_COMMAND:  .cxr 0xfffff88002921a80 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushVolume+449

BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushVolume+449

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`04886000 fffff880`048c4000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`00f2d000 fffff880`00f84000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`03607000 fffff880`03690000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`03e00000 fffff880`03e16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01026000 fffff880`0103b000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c33000 fffff880`00c3e000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`0487e000 fffff880`04886000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`015f4000 fffff880`015fa000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`03600000 fffff880`03606000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`06ddd000 fffff880`06de8000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00c00000 fffff880`00c09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c09000 fffff880`00c33000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`04400000 fffff880`04422000   AtiHdmi  AtiHdmi.sys  Thu Jan 28 20:03:36 2010 (4B6233E8)
fffff880`03e70000 fffff880`03ea4000   atikmpag atikmpag.sys Wed Feb 10 21:11:13 2010 (4B736741)
fffff880`019dc000 fffff880`019e4000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`048f2000 fffff880`04f57000   atipmdag atipmdag.sys Wed Feb 10 21:54:19 2010 (4B73715B)
fffff880`0164f000 fffff880`01656000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`011d8000 fffff880`011e9000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03b50000 fffff880`03b6e000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00670000 fffff960`00697000   cdd      cdd.dll      unavailable (00000000)
fffff880`0161c000 fffff880`01646000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cd0000 fffff880`00d90000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`019ac000 fffff880`019dc000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c72000 fffff880`00cd0000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01126000 fffff880`01198000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`048cd000 fffff880`048dd000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`0666c000 fffff880`0667a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`011ba000 fffff880`011d8000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`01243000 fffff880`01252000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01996000 fffff880`019ac000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0445f000 fffff880`04481000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06686000 fffff880`0668f000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0667a000 fffff880`06686000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0668f000 fffff880`066a2000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06731000 fffff880`0673d000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03ea4000 fffff880`03f98000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`04f57000 fffff880`04f9d000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`06400000 fffff880`06436000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`010b4000 fffff880`010c8000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01068000 fffff880`010b4000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`0122c000 fffff880`01236000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`037cf000 fffff880`037e4380   fsdfw    fsdfw.sys    Mon Jun 14 07:04:05 2010 (4C160CA5)
fffff880`037e5000 fffff880`037ee3a0   fses     fses.sys     Tue Mar 09 06:37:48 2010 (4B96330C)
fffff880`06d07000 fffff880`06d3b000   fsgk     fsgk.sys     Tue Sep 21 06:51:16 2010 (4C988E24)
fffff880`037ef000 fffff880`037fbf60   fshs     fshs.sys     Fri Jun 04 04:39:19 2010 (4C08BBB7)
fffff880`037c7000 fffff880`037cf000   fsvista  fsvista.sys  Tue Mar 18 02:37:07 2008 (47DF6313)
fffff880`0195c000 fffff880`01996000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01869000 fffff880`018b3000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`02c14000 fffff800`02c5d000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`04f9d000 fffff880`04fc1000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`066db000 fffff880`066f4000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`066f4000 fffff880`066fc080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`066cd000 fffff880`066db000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`03a87000 fffff880`03b50000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01953000 fffff880`0195c000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`00d90000 fffff880`00db0000   jraid    jraid.sys    Mon Jan 11 06:28:18 2010 (4B4B0B52)
fffff880`044ef000 fffff880`044fe000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0675a000 fffff880`06768000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bb3000 fffff800`00bbd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0450f000 fffff880`04552000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`01200000 fffff880`0121b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`04481000 fffff880`04486200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`066fd000 fffff880`06710000   LHidFilt LHidFilt.Sys Wed Jun 17 12:49:39 2009 (4A391EA3)
fffff880`067ba000 fffff880`067cf000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0671d000 fffff880`06731000   LMouFilt LMouFilt.Sys Wed Jun 17 12:49:43 2009 (4A391EA7)
fffff880`06776000 fffff880`06799000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`066bd000 fffff880`066cd000   LUsbFilt LUsbFilt.Sys Wed Jun 17 12:49:46 2009 (4A391EAA)
fffff880`00c51000 fffff880`00c5e000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`06768000 fffff880`06776000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`044fe000 fffff880`0450d000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06710000 fffff880`0671d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00ddf000 fffff880`00df9000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`03b6e000 fffff880`03b86000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03b86000 fffff880`03bb3000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`03bb3000 fffff880`03c00000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`03a00000 fffff880`03a24000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`0147b000 fffff880`01486000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f8d000 fffff880`00f97000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010c8000 fffff880`01126000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`037bc000 fffff880`037c7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01941000 fffff880`01953000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01490000 fffff880`01583000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`048dd000 fffff880`048e9000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03e3a000 fffff880`03e69000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`045d6000 fffff880`045eb000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`03704000 fffff880`03713000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03690000 fffff880`036d5000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01583000 fffff880`015e3000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`015e3000 fffff880`015f4000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`037b0000 fffff880`037bc000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c5d000 fffff800`03247000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01253000 fffff880`013f6000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`01646000 fffff880`0164f000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04564000 fffff880`0457c000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
fffff880`04fc1000 fffff880`04ff1000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
fffff880`036de000 fffff880`03704000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00fd7000 fffff880`00fec000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f97000 fffff880`00fca000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fec000 fffff880`00ffc000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121b000 fffff880`0122c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06017000 fffff880`060bd000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04422000 fffff880`0445f000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c5e000 fffff880`00c72000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03e16000 fffff880`03e3a000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`0103b000 fffff880`01056000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`044b4000 fffff880`044d5000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`044d5000 fffff880`044ef000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0375f000 fffff880`037b0000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`01460000 fffff880`01469000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01469000 fffff880`01472000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01472000 fffff880`0147b000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01907000 fffff880`01941000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`067cf000 fffff880`067e7000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03f98000 fffff880`03feb000   Rt64win7 Rt64win7.sys Sun May 30 23:46:43 2010 (4C033123)
fffff880`06445000 fffff880`0666b300   RTKVHD64 RTKVHD64.sys Fri Jan 29 01:48:35 2010 (4B6284C3)
fffff880`00db0000 fffff880`00ddf000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
fffff880`060bd000 fffff880`060c8000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04872000 fffff880`0487e000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03713000 fffff880`03730000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`018ff000 fffff880`01907000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06c6e000 fffff880`06d07000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`0610b000 fffff880`06176000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`060c8000 fffff880`060f9000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`0450d000 fffff880`0450e480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01665000 fffff880`01869000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`060f9000 fffff880`0610b000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`01236000 fffff880`01243000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`01198000 fffff880`011ba000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`0374b000 fffff880`0375f000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`005b0000 fffff960`005ba000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`01000000 fffff880`01026000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`04552000 fffff880`04564000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`0673d000 fffff880`0675a000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`04ff1000 fffff880`04ff2f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04861000 fffff880`04872000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04ff3000 fffff880`05000000   usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
fffff880`0457c000 fffff880`045d6000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`04800000 fffff880`0480b000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0480b000 fffff880`04861000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00fca000 fffff880`00fd7000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01656000 fffff880`01664000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0142b000 fffff880`01450000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`018b3000 fffff880`018ff000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`03730000 fffff880`0374b000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01450000 fffff880`01460000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e7a000 fffff880`00f1e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f1e000 fffff880`00f2d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`036d5000 fffff880`036de000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00371000   win32k   win32k.sys   unavailable (00000000)
fffff880`048c4000 fffff880`048cd000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f84000 fffff880`00f8d000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`06799000 fffff880`067ba000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`06d3b000 fffff880`06d6c000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`066a2000 fffff880`066bd000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001B000
fffff880`06d6c000 fffff880`06ddd000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`019e4000 fffff880`019f2000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019f2000 fffff880`019fe000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01600000 fffff880`01609000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01609000 fffff880`0161c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


Last edited:

Gulps

New Member
#4
View attachment minidump.txt Thanks for your help! I tried uptading the drivers but I'm not 100% sure I installed the correct drivers and I got another crash today. Here's the minidump file

E: Should I try adjusting BIOS settings because my problem seems to be similar to this one http://windows7forums.com/blue-scre...d-brand-new-pc-windows-7-ultimate-64-bit.html ?? But I really have no clue how to do that..
 


Last edited:
#5
Some RAM issue here. The sticks are set well but sometimes the voltage needs to be set manually.

Should have attached the crash dump anyway.

3B {c0000005, ...
process: dllhost
memory_corruption

Try setup/optimized/fail-safe defaults in the bios, and if no luck send your PC to the repairs shop. Or test sticks separately in different slots to find out which one is guilty.
 


#6
Yesterday I got another BSOD but it occurred so quickly after the start up that Windows didn't even create a minidump file. Could this help to locate the problem ? I really need this computer now and I don't want to wait a month while it's being repaired. I haven't tried adjusting bios settings yet cos I don't know how to do it. Also the BSODs seems allways appear very soon after the start up. I think all the BSODs I've got have occurred less than 15 minutes after the start up.
 


#7
Yesterday I got another BSOD but it occurred so quickly after the start up that Windows didn't even create a minidump file. Could this help to locate the problem ? I think all the BSODs I've got have occurred less than 15 minutes after the start up.

So far I see your blue screens seem to be related to memory:

3B {c0000005, ...
process: dllhost
memory_corruption


BugCheck 1E, {ffffffffc0000005, fffff88004ae9550, 0, 6f1f988}
process: dwm.exe
Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGCONTEXT::present+cc )


Load bios defaults.
You may want to do some testing:

Memtest86+ - Advanced Memory Diagnostic Tool for 10 passes

FurMark: VGA Stress Test, Graphics Card and GPU Stability Test, Burn-in Test, OpenGL Benchmark and GPU Temperature | oZone3D.Net


If you get any crashes during these tests, attach the crash dumps.

Also follow my 1st post on updating drivers and uninstalling F-Secure.
 


Last edited:
This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.
Top