Windows 7 BSODs in a new computer

Gulps

New Member
Joined
Mar 29, 2011
I had probably three BSODs at the day I got my computer so I decided to re-install windows and after that I've been getting BSOD approximately once in a week. The computer is about a month old and it was build in a local shop. Hope you guys could help me.
 

Attachments

  • Minidump.rar
    110.3 KB · Views: 224
  • CPUIDpic.png
    CPUIDpic.png
    83.3 KB · Views: 420
  • RAMMon - SPD Info.rar
    2.4 KB · Views: 220
You should take it back to him and tell him he didn't configure it properly.
 
Re: BSODs in a new computer





Update drivers:


Logitech Setpoint
LUsbFilt.Sys Wed Jun 17 12:49:46 2009


Motherboard USB 3.0 Controller
nusb3hub.sys Thu Apr 22 21:34:35 2010


Realtek Audio and Lan drivers
Rt64win7.sys Sun May 30 23:46:43 2010
RTKVHD64.sys Fri Jan 29 01:48:35 2010




If crashes persist after the updates, uninstall F-Secure and install MSE as the replacement.














CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032911-18813-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c1f000 PsLoadedModuleList = 0xfffff800`02e64e90
Debug session time: Tue Mar 29 00:41:43.628 2011 (UTC - 4:00)
System Uptime: 0 days 0:08:18.783
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff88004ae9550, 0, 6f1f988}

Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGCONTEXT::Present+cc )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004ae9550, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000006f1f988, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgkrnl!DXGCONTEXT::Present+cc
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000006f1f988

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ed00e8
 0000000006f1f988 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88006f1f3e0 -- (.trap 0xfffff88006f1f3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8008a81410
rdx=0000000006f1f930 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004ae9550 rsp=fffff88006f1f578 rbp=fffff8a0073c8ec0
 r8=fffff88006f1f8c0  r9=fffff88006f1f8f0 r10=fffff88002f65660
r11=fffff8a007adea40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgkrnl!DXGCONTEXT::Present+0xcc:
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh ds:00000000`00000058=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ceb028 to fffff80002c9f640

STACK_TEXT:  
fffff880`06f1eb58 fffff800`02ceb028 : 00000000`0000001e ffffffff`c0000005 fffff880`04ae9550 00000000`00000000 : nt!KeBugCheckEx
fffff880`06f1eb60 fffff800`02c9ecc2 : fffff880`06f1f338 fffff8a0`073c8ec0 fffff880`06f1f3e0 00000000`06f1f930 : nt! ?? ::FNODOBFM::`string'+0x4987d
fffff880`06f1f200 fffff800`02c9d83a : 00000000`00000000 00000000`06f1f988 fffffa80`09655c00 fffff8a0`073c8ec0 : nt!KiExceptionDispatch+0xc2
fffff880`06f1f3e0 fffff880`04ae9550 : 00000000`00000000 00000000`00000000 00000000`06f1f930 00000000`00000001 : nt!KiPageFault+0x23a
fffff880`06f1f578 fffff880`06f1f8c0 : fffff880`06f1f8f0 00000000`00000004 fffffa80`0977cd60 fffffa80`0967a001 : dxgkrnl!DXGCONTEXT::Present+0xcc
fffff880`06f1f898 fffff880`06f1f8f0 : 00000000`00000004 fffffa80`0977cd60 fffffa80`0967a001 fffff8a0`072bef00 : 0xfffff880`06f1f8c0
fffff880`06f1f8a0 00000000`00000004 : fffffa80`0977cd60 fffffa80`0967a001 fffff8a0`072bef00 00000000`00000000 : 0xfffff880`06f1f8f0
fffff880`06f1f8a8 fffffa80`0977cd60 : fffffa80`0967a001 fffff8a0`072bef00 00000000`00000000 00000000`00000001 : 0x4
fffff880`06f1f8b0 fffffa80`0967a001 : fffff8a0`072bef00 00000000`00000000 00000000`00000001 fffffa80`08a8f000 : 0xfffffa80`0977cd60
fffff880`06f1f8b8 fffff8a0`072bef00 : 00000000`00000000 00000000`00000001 fffffa80`08a8f000 00000000`00000001 : 0xfffffa80`0967a001
fffff880`06f1f8c0 00000000`00000000 : 00000000`00000001 fffffa80`08a8f000 00000000`00000001 fffff8a0`073d9000 : 0xfffff8a0`072bef00


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgkrnl!DXGCONTEXT::Present+cc
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgkrnl!DXGCONTEXT::Present+cc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799fa

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_dxgkrnl!DXGCONTEXT::Present+cc

BUCKET_ID:  X64_0x1E_c0000005_dxgkrnl!DXGCONTEXT::Present+cc

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004ae9550, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000006f1f988, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgkrnl!DXGCONTEXT::Present+cc
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000006f1f988

READ_ADDRESS:  0000000006f1f988 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88006f1f3e0 -- (.trap 0xfffff88006f1f3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8008a81410
rdx=0000000006f1f930 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004ae9550 rsp=fffff88006f1f578 rbp=fffff8a0073c8ec0
 r8=fffff88006f1f8c0  r9=fffff88006f1f8f0 r10=fffff88002f65660
r11=fffff8a007adea40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgkrnl!DXGCONTEXT::Present+0xcc:
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh ds:00000000`00000058=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ceb028 to fffff80002c9f640

STACK_TEXT:  
fffff880`06f1eb58 fffff800`02ceb028 : 00000000`0000001e ffffffff`c0000005 fffff880`04ae9550 00000000`00000000 : nt!KeBugCheckEx
fffff880`06f1eb60 fffff800`02c9ecc2 : fffff880`06f1f338 fffff8a0`073c8ec0 fffff880`06f1f3e0 00000000`06f1f930 : nt! ?? ::FNODOBFM::`string'+0x4987d
fffff880`06f1f200 fffff800`02c9d83a : 00000000`00000000 00000000`06f1f988 fffffa80`09655c00 fffff8a0`073c8ec0 : nt!KiExceptionDispatch+0xc2
fffff880`06f1f3e0 fffff880`04ae9550 : 00000000`00000000 00000000`00000000 00000000`06f1f930 00000000`00000001 : nt!KiPageFault+0x23a
fffff880`06f1f578 fffff880`06f1f8c0 : fffff880`06f1f8f0 00000000`00000004 fffffa80`0977cd60 fffffa80`0967a001 : dxgkrnl!DXGCONTEXT::Present+0xcc
fffff880`06f1f898 fffff880`06f1f8f0 : 00000000`00000004 fffffa80`0977cd60 fffffa80`0967a001 fffff8a0`072bef00 : 0xfffff880`06f1f8c0
fffff880`06f1f8a0 00000000`00000004 : fffffa80`0977cd60 fffffa80`0967a001 fffff8a0`072bef00 00000000`00000000 : 0xfffff880`06f1f8f0
fffff880`06f1f8a8 fffffa80`0977cd60 : fffffa80`0967a001 fffff8a0`072bef00 00000000`00000000 00000000`00000001 : 0x4
fffff880`06f1f8b0 fffffa80`0967a001 : fffff8a0`072bef00 00000000`00000000 00000000`00000001 fffffa80`08a8f000 : 0xfffffa80`0977cd60
fffff880`06f1f8b8 fffff8a0`072bef00 : 00000000`00000000 00000000`00000001 fffffa80`08a8f000 00000000`00000001 : 0xfffffa80`0967a001
fffff880`06f1f8c0 00000000`00000000 : 00000000`00000001 fffffa80`08a8f000 00000000`00000001 fffff8a0`073d9000 : 0xfffff8a0`072bef00


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgkrnl!DXGCONTEXT::Present+cc
fffff880`04ae9550 0fba66580e      bt      dword ptr [rsi+58h],0Eh

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgkrnl!DXGCONTEXT::Present+cc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799fa

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_dxgkrnl!DXGCONTEXT::Present+cc

BUCKET_ID:  X64_0x1E_c0000005_dxgkrnl!DXGCONTEXT::Present+cc

Followup: MachineOwner
---------











Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032011-18330-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e8ee90
Debug session time: Sun Mar 20 17:54:54.580 2011 (UTC - 4:00)
System Uptime: 0 days 1:23:31.985
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8800459748e, fffff8800339d100, 0}

Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTKVHD64.sys
*** ERROR: Module load completed but symbols could not be loaded for RTKVHD64.sys
Probably caused by : portcls.sys ( portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800459748e, Address of the instruction which caused the bugcheck
Arg3: fffff8800339d100, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a
fffff880`0459748e eb04            jmp     portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x40 (fffff880`04597494)

CONTEXT:  fffff8800339d100 -- (.cxr 0xfffff8800339d100)
rax=fffffa8006c11e30 rbx=fffffa8006c11e30 rcx=fffffa8006c11e38
rdx=fffff8800458e498 rsi=fffffa80095741d0 rdi=0000000000000000
rip=fffff8800459748e rsp=fffff8800339dae0 rbp=fffffa80095741c8
 r8=fffff8800339db78  r9=11d05791b4c90a60 r10=fffff880009e9ca0
r11=fffff8800339dad0 r12=fffffa80086b2620 r13=0000000000000001
r14=0000000000000000 r15=fffffa800809d900
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x3a:
fffff880`0459748e eb04            jmp     portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x40 (fffff880`04597494)
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  audiodg.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8800459730a to fffff8800459748e

STACK_TEXT:  
fffff880`0339dae0 fffff880`0459730a : 00000000`0000041f 00000000`00000000 fffffa80`0809d900 00000000`000007ff : portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x3a
fffff880`0339db10 fffff880`045970ee : 00000000`00000000 fffffa80`0809da50 fffffa80`095741c0 fffffa80`06f26900 : portcls!CPortTopology::NewIrpTarget+0xbe
fffff880`0339db40 fffff880`0449aeea : fffffa80`06f26900 fffffa80`08084630 00000000`00000000 fffffa80`00000000 : portcls!xDispatchCreate+0xfa
fffff880`0339dbc0 fffff880`044957a6 : fffffa80`06f26900 fffffa80`0808eb00 fffffa80`0809d900 00000000`00000000 : ks!DispatchCreate+0x11e
fffff880`0339dc10 fffff880`04596897 : fffffa80`06f26900 fffffa80`0809d900 00000000`00000000 fffff800`02f66e1e : ks!KsDispatchIrp+0xc6
fffff880`0339dc40 fffff880`04596064 : 00000000`c000000d fffffa80`06f26b80 fffffa80`0808ebd0 00000000`00000801 : portcls!DispatchCreate+0x67
fffff880`0339dc70 fffff880`065033fd : fffffa80`080a25a0 00000000`00000000 fffffa80`071e82f0 fffffa80`06f26900 : portcls!PcDispatchIrp+0x54
fffff880`0339dca0 fffffa80`080a25a0 : 00000000`00000000 fffffa80`071e82f0 fffffa80`06f26900 fffffa80`06f26900 : RTKVHD64+0xd23fd
fffff880`0339dca8 00000000`00000000 : fffffa80`071e82f0 fffffa80`06f26900 fffffa80`06f26900 fffff880`045d8825 : 0xfffffa80`080a25a0


FOLLOWUP_IP: 
portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a
fffff880`0459748e eb04            jmp     portcls!CPortFilterTopology::NonDelegatingQueryInterface+0x40 (fffff880`04597494)

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: portcls

IMAGE_NAME:  portcls.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc03

STACK_COMMAND:  .cxr 0xfffff8800339d100 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a

BUCKET_ID:  X64_0x3B_portcls!CPortFilterTopology::NonDelegatingQueryInterface+3a

Followup: MachineOwner
---------













Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\030711-26504-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a51000 PsLoadedModuleList = 0xfffff800`02c8ee50
Debug session time: Sun Mar  6 19:34:36.100 2011 (UTC - 4:00)
System Uptime: 0 days 1:46:57.723
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff8800926dcf8, fffff8800926d560, fffff880012fcd49}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFindStartingNode+4b9 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff8800926dcf8
Arg3: fffff8800926d560
Arg4: fffff880012fcd49

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff8800926dcf8 -- (.exr 0xfffff8800926dcf8)
ExceptionAddress: fffff880012fcd49 (Ntfs!NtfsFindStartingNode+0x00000000000004b9)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff8800926d560 -- (.cxr 0xfffff8800926d560)
rax=ffbff8a006c8b510 rbx=fffffa8008df8a60 rcx=fffff8a006ce1a38
rdx=fffffa8008f6d370 rsi=fffff8800926e098 rdi=fffff8a006ce16a0
rip=fffff880012fcd49 rsp=fffff8800926df30 rbp=fffffa8008df8a60
 r8=0000000000000000  r9=0000000000000000 r10=fffffa8008df8a60
r11=0000000000000000 r12=fffff8800926e3c0 r13=0000000000000000
r14=fffff8800926e3b0 r15=fffff8800926e438
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
Ntfs!NtfsFindStartingNode+0x4b9:
fffff880`012fcd49 f6404103        test    byte ptr [rax+41h],3 ds:002b:ffbff8a0`06c8b551=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  CCC.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf90e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsFindStartingNode+4b9
fffff880`012fcd49 f6404103        test    byte ptr [rax+41h],3

FAULTING_IP: 
Ntfs!NtfsFindStartingNode+4b9
fffff880`012fcd49 f6404103        test    byte ptr [rax+41h],3

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880012f728d to fffff880012fcd49

STACK_TEXT:  
fffff880`0926df30 fffff880`012f728d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFindStartingNode+0x4b9
fffff880`0926e000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreate+0x3dd


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsFindStartingNode+4b9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff8800926d560 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFindStartingNode+4b9

BUCKET_ID:  X64_0x24_Ntfs!NtfsFindStartingNode+4b9

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032611-18174-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02ea2e90
Debug session time: Sat Mar 26 17:07:47.663 2011 (UTC - 4:00)
System Uptime: 0 days 0:10:51.068
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88002922228, fffff88002921a80, fffff880012ce665}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushVolume+449 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88002922228
Arg3: fffff88002921a80
Arg4: fffff880012ce665

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88002922228 -- (.exr 0xfffff88002922228)
ExceptionAddress: fffff880012ce665 (Ntfs!NtfsFlushVolume+0x0000000000000449)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88002921a80 -- (.cxr 0xfffff88002921a80)
rax=ffbff8a003940010 rbx=0000000000000000 rcx=fffff8a00391e6e0
rdx=fffff8a00750c300 rsi=0000000000000001 rdi=fffffa80090c44e0
rip=fffff880012ce665 rsp=fffff88002922460 rbp=fffff88002922720
 r8=fffff8a00391e6e0  r9=fffff8a00391e700 r10=fffff880029224f0
r11=fffff88002922410 r12=fffff8a007b015c0 r13=fffff8a007b01770
r14=0000000000000702 r15=fffffa8007ee9180
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
Ntfs!NtfsFlushVolume+0x449:
fffff880`012ce665 f0017014        lock add dword ptr [rax+14h],esi ds:002b:ffbff8a0`03940024=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0e0e8
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsFlushVolume+449
fffff880`012ce665 f0017014        lock add dword ptr [rax+14h],esi

FAULTING_IP: 
Ntfs!NtfsFlushVolume+449
fffff880`012ce665 f0017014        lock add dword ptr [rax+14h],esi

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880012d6fad to fffff880012ce665

STACK_TEXT:  
fffff880`02922460 fffff880`012d6fad : fffffa80`090c44e0 fffffa80`07ee9180 00000000`00100001 00000000`00000000 : Ntfs!NtfsFlushVolume+0x449
fffff880`02922590 fffff880`012d76b4 : fffffa80`090c44e0 fffffa80`0910a410 fffffa80`09738ad0 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459
fffff880`02922670 fffff880`0106abcf : fffffa80`0910a7b0 fffffa80`0910a410 fffffa80`090c44e0 fffff880`02922698 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`029226e0 fffff880`010696df : fffffa80`076f7a30 00000000`00000000 fffffa80`076f7a00 fffffa80`0910a410 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`02922770 fffff800`02fe571b : 00000000`00000002 fffffa80`09738ad0 00000000`00000000 fffffa80`0910a410 : fltmgr!FltpDispatch+0xcf
fffff880`029227d0 fffff800`02f7c871 : fffffa80`0910a410 fffffa80`06802060 fffffa80`09738ad0 00000000`000007ff : nt!IopSynchronousServiceTail+0xfb
fffff880`02922840 fffff800`02cdc8d3 : fffffa80`06802060 fffffa80`06701040 fffffa80`076f7a30 fffffa80`09738ad0 : nt!NtFlushBuffersFile+0x171
fffff880`029228d0 fffff800`02cd8e70 : fffff800`02f1c96d 00000000`00000004 fffffa80`075ed190 fffffa80`098065f0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02922a68 fffff800`02f1c96d : 00000000`00000004 fffffa80`075ed190 fffffa80`098065f0 fffff800`02fb2f48 : nt!KiServiceLinkage
fffff880`02922a70 fffff800`02f7acce : fffff880`03348a38 fffffa80`06802060 00000000`00000080 00000000`00000001 : nt!PopFlushVolumeWorker+0x1bd
fffff880`02922d40 fffff800`02ccefe6 : fffff800`02e4fe80 fffffa80`06802060 fffff800`02e5dcc0 fffff880`01266384 : nt!PspSystemThreadStartup+0x5a
fffff880`02922d80 00000000`00000000 : fffff880`02923000 fffff880`0291d000 fffff880`029215d0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsFlushVolume+449

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9

STACK_COMMAND:  .cxr 0xfffff88002921a80 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushVolume+449

BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushVolume+449

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`04886000 fffff880`048c4000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`00f2d000 fffff880`00f84000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`03607000 fffff880`03690000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`03e00000 fffff880`03e16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01026000 fffff880`0103b000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c33000 fffff880`00c3e000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`0487e000 fffff880`04886000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`015f4000 fffff880`015fa000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`03600000 fffff880`03606000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`06ddd000 fffff880`06de8000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00c00000 fffff880`00c09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c09000 fffff880`00c33000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`04400000 fffff880`04422000   AtiHdmi  AtiHdmi.sys  Thu Jan 28 20:03:36 2010 (4B6233E8)
fffff880`03e70000 fffff880`03ea4000   atikmpag atikmpag.sys Wed Feb 10 21:11:13 2010 (4B736741)
fffff880`019dc000 fffff880`019e4000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`048f2000 fffff880`04f57000   atipmdag atipmdag.sys Wed Feb 10 21:54:19 2010 (4B73715B)
fffff880`0164f000 fffff880`01656000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`011d8000 fffff880`011e9000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03b50000 fffff880`03b6e000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00670000 fffff960`00697000   cdd      cdd.dll      unavailable (00000000)
fffff880`0161c000 fffff880`01646000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cd0000 fffff880`00d90000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`019ac000 fffff880`019dc000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c72000 fffff880`00cd0000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01126000 fffff880`01198000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`048cd000 fffff880`048dd000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`0666c000 fffff880`0667a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`011ba000 fffff880`011d8000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`01243000 fffff880`01252000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01996000 fffff880`019ac000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0445f000 fffff880`04481000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06686000 fffff880`0668f000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0667a000 fffff880`06686000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0668f000 fffff880`066a2000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06731000 fffff880`0673d000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03ea4000 fffff880`03f98000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`04f57000 fffff880`04f9d000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`06400000 fffff880`06436000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`010b4000 fffff880`010c8000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01068000 fffff880`010b4000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`0122c000 fffff880`01236000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`037cf000 fffff880`037e4380   fsdfw    fsdfw.sys    Mon Jun 14 07:04:05 2010 (4C160CA5)
fffff880`037e5000 fffff880`037ee3a0   fses     fses.sys     Tue Mar 09 06:37:48 2010 (4B96330C)
fffff880`06d07000 fffff880`06d3b000   fsgk     fsgk.sys     Tue Sep 21 06:51:16 2010 (4C988E24)
fffff880`037ef000 fffff880`037fbf60   fshs     fshs.sys     Fri Jun 04 04:39:19 2010 (4C08BBB7)
fffff880`037c7000 fffff880`037cf000   fsvista  fsvista.sys  Tue Mar 18 02:37:07 2008 (47DF6313)
fffff880`0195c000 fffff880`01996000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01869000 fffff880`018b3000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`02c14000 fffff800`02c5d000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`04f9d000 fffff880`04fc1000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`066db000 fffff880`066f4000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`066f4000 fffff880`066fc080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`066cd000 fffff880`066db000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`03a87000 fffff880`03b50000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01953000 fffff880`0195c000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`00d90000 fffff880`00db0000   jraid    jraid.sys    Mon Jan 11 06:28:18 2010 (4B4B0B52)
fffff880`044ef000 fffff880`044fe000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0675a000 fffff880`06768000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bb3000 fffff800`00bbd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0450f000 fffff880`04552000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`01200000 fffff880`0121b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`04481000 fffff880`04486200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`066fd000 fffff880`06710000   LHidFilt LHidFilt.Sys Wed Jun 17 12:49:39 2009 (4A391EA3)
fffff880`067ba000 fffff880`067cf000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0671d000 fffff880`06731000   LMouFilt LMouFilt.Sys Wed Jun 17 12:49:43 2009 (4A391EA7)
fffff880`06776000 fffff880`06799000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`066bd000 fffff880`066cd000   LUsbFilt LUsbFilt.Sys Wed Jun 17 12:49:46 2009 (4A391EAA)
fffff880`00c51000 fffff880`00c5e000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`06768000 fffff880`06776000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`044fe000 fffff880`0450d000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06710000 fffff880`0671d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00ddf000 fffff880`00df9000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`03b6e000 fffff880`03b86000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03b86000 fffff880`03bb3000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`03bb3000 fffff880`03c00000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`03a00000 fffff880`03a24000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`0147b000 fffff880`01486000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f8d000 fffff880`00f97000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010c8000 fffff880`01126000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`037bc000 fffff880`037c7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01941000 fffff880`01953000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01490000 fffff880`01583000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`048dd000 fffff880`048e9000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03e3a000 fffff880`03e69000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`045d6000 fffff880`045eb000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`03704000 fffff880`03713000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03690000 fffff880`036d5000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01583000 fffff880`015e3000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`015e3000 fffff880`015f4000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`037b0000 fffff880`037bc000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c5d000 fffff800`03247000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01253000 fffff880`013f6000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`01646000 fffff880`0164f000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04564000 fffff880`0457c000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
fffff880`04fc1000 fffff880`04ff1000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
fffff880`036de000 fffff880`03704000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00fd7000 fffff880`00fec000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f97000 fffff880`00fca000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fec000 fffff880`00ffc000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121b000 fffff880`0122c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06017000 fffff880`060bd000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04422000 fffff880`0445f000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c5e000 fffff880`00c72000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03e16000 fffff880`03e3a000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`0103b000 fffff880`01056000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`044b4000 fffff880`044d5000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`044d5000 fffff880`044ef000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0375f000 fffff880`037b0000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`01460000 fffff880`01469000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01469000 fffff880`01472000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01472000 fffff880`0147b000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01907000 fffff880`01941000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`067cf000 fffff880`067e7000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03f98000 fffff880`03feb000   Rt64win7 Rt64win7.sys Sun May 30 23:46:43 2010 (4C033123)
fffff880`06445000 fffff880`0666b300   RTKVHD64 RTKVHD64.sys Fri Jan 29 01:48:35 2010 (4B6284C3)
fffff880`00db0000 fffff880`00ddf000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
fffff880`060bd000 fffff880`060c8000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04872000 fffff880`0487e000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03713000 fffff880`03730000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`018ff000 fffff880`01907000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06c6e000 fffff880`06d07000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`0610b000 fffff880`06176000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`060c8000 fffff880`060f9000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`0450d000 fffff880`0450e480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01665000 fffff880`01869000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`060f9000 fffff880`0610b000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`01236000 fffff880`01243000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`01198000 fffff880`011ba000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`0374b000 fffff880`0375f000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`005b0000 fffff960`005ba000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`01000000 fffff880`01026000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`04552000 fffff880`04564000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`0673d000 fffff880`0675a000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`04ff1000 fffff880`04ff2f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04861000 fffff880`04872000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04ff3000 fffff880`05000000   usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
fffff880`0457c000 fffff880`045d6000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`04800000 fffff880`0480b000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0480b000 fffff880`04861000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00fca000 fffff880`00fd7000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01656000 fffff880`01664000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0142b000 fffff880`01450000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`018b3000 fffff880`018ff000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`03730000 fffff880`0374b000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01450000 fffff880`01460000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e7a000 fffff880`00f1e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f1e000 fffff880`00f2d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`036d5000 fffff880`036de000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00371000   win32k   win32k.sys   unavailable (00000000)
fffff880`048c4000 fffff880`048cd000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f84000 fffff880`00f8d000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`06799000 fffff880`067ba000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`06d3b000 fffff880`06d6c000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`066a2000 fffff880`066bd000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001B000
fffff880`06d6c000 fffff880`06ddd000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`019e4000 fffff880`019f2000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019f2000 fffff880`019fe000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01600000 fffff880`01609000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01609000 fffff880`0161c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Last edited:
Some RAM issue here. The sticks are set well but sometimes the voltage needs to be set manually.

Should have attached the crash dump anyway.

3B {c0000005, ...
process: dllhost
memory_corruption

Try setup/optimized/fail-safe defaults in the bios, and if no luck send your PC to the repairs shop. Or test sticks separately in different slots to find out which one is guilty.
 
Yesterday I got another BSOD but it occurred so quickly after the start up that Windows didn't even create a minidump file. Could this help to locate the problem ? I really need this computer now and I don't want to wait a month while it's being repaired. I haven't tried adjusting bios settings yet cos I don't know how to do it. Also the BSODs seems allways appear very soon after the start up. I think all the BSODs I've got have occurred less than 15 minutes after the start up.
 
Yesterday I got another BSOD but it occurred so quickly after the start up that Windows didn't even create a minidump file. Could this help to locate the problem ? I think all the BSODs I've got have occurred less than 15 minutes after the start up.


So far I see your blue screens seem to be related to memory:

3B {c0000005, ...
process: dllhost
memory_corruption


BugCheck 1E, {ffffffffc0000005, fffff88004ae9550, 0, 6f1f988}
process: dwm.exe
Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGCONTEXT::present+cc )


Load bios defaults.
You may want to do some testing:

Memtest86+ - Advanced Memory Diagnostic Tool for 10 passes

FurMark: VGA Stress Test, Graphics Card and GPU Stability Test, Burn-in Test, OpenGL Benchmark and GPU Temperature | oZone3D.Net


If you get any crashes during these tests, attach the crash dumps.

Also follow my 1st post on updating drivers and uninstalling F-Secure.
 
Last edited:
Back
Top Bottom