Windows 7 SYSTEM_SERVICE / IRQL_NOT and other errors

MLu

New Member
Hello,

My computer refused to start on Monday and I ended up getting a new mobo, cpu, memory, PSU and hdd. I also upgraded from Vista to Windows 7.

I first started getting BSOD-problems when I booted the new setup on the old hdd with Vista. I assumed it was a driver error, so I did a clean install of Win7 on a new hdd. I have installed only the drivers that came on the disk with the mobo plus the latest nvidia driver, a few essential programs like winrar, bsplayer, f-secure, messenger and minecraft (obviously) and copied a whole bunch of files over from the old HDDs. I have updated the bios to the most recent version using the windows-based tool that came with the mobo.

I'm currently getting an assortment of BSODs at various intervals (can be 10 minutes, can be 5 hours). I have gotten:
IRQL_NOT_LESS_OR_EQUAL 3 times
MEMORY_MANAGEMENT
PFN_LIST_CORRUPT
SYSTEM_SERVICE_EXCEPTION 2 times

These occur seemingly at random. I ran a furmark test to see if my gpu would overheat and crash, but it didn't (only ran it for maybe 20 minutes though) and the temp never rose above 58 degrees C.

I have run Memtest86+ a total of maybe 20 passes with various configurations of my 2x2 gb Kingston DDR3-1333, and gotten a total of one errors.

I'm attaching a few files that may be of assistance.

My specs:
M4A77T/USB3 (new)
Phenom II 840 x4 3.4ghz (new)
2x2gb Kingston DDR3 1333mhz (new)
9600 GT 512mb (old)
DVD-drive (old)
1tb Samsung sata (new)
500gb sata (old, was secondary hdd, not the one with OS)
Chieftec 450W PSU (new)

I'm at my wits end with this, could anyone help me?
 

Attachments

  • rammon.txt
    10.7 KB · Views: 503
  • cpuz.jpg
    cpuz.jpg
    322.8 KB · Views: 451
  • Windows_NT6_BSOD_jcgriff2.rar
    297.6 KB · Views: 284
IRQL_NOT_LESS_OR_EQUAL 3 times
MEMORY_MANAGEMENT
PFN_LIST_CORRUPT
SYSTEM_SERVICE_EXCEPTION 2 times

I have run Memtest86+ a total of maybe 20 passes with various configurations of my 2x2 gb Kingston DDR3-1333, and gotten a total of one errors.

That means bad RAM. The settings are right 1333 9 9 9 24, and the sticks are matching.

You may want to try out your system with 1 stick of RAM, and also try it in different slots. But before doing so make sure CPU is not overclocked and that AMD Cool and Quiet is on.



CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042211-109871-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02815000 PsLoadedModuleList = 0xfffff800`02a52e50
Debug session time: Fri Apr 22 20:24:21.088 2011 (UTC - 4:00)
System Uptime: 0 days 3:36:15.731
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {39c6008, 2, 1, fffff88000e34e46}

Probably caused by : ataport.SYS ( ataport!PortListRemoveRequest+22 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000039c6008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000e34e46, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abd0e0
 00000000039c6008 

CURRENT_IRQL:  2

FAULTING_IP: 
ataport!PortListRemoveRequest+22
fffff880`00e34e46 49894008        mov     qword ptr [r8+8],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002dfb830 -- (.trap 0xfffff88002dfb830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80047be408 rbx=0000000000000000 rcx=fffffa80047be408
rdx=fffffa80046be408 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000e34e46 rsp=fffff88002dfb9c8 rbp=fffffa80047be3d0
 r8=00000000039c6000  r9=fffffa80040ba5b0 r10=fffffa80047a2620
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport!PortListRemoveRequest+0x22:
fffff880`00e34e46 49894008        mov     qword ptr [r8+8],rax ds:0002:00000000`039c6008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002884ca9 to fffff80002885740

STACK_TEXT:  
fffff880`02dfb6e8 fffff800`02884ca9 : 00000000`0000000a 00000000`039c6008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02dfb6f0 fffff800`02883920 : fffffa80`047a1100 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02dfb830 fffff880`00e34e46 : fffff880`00e358ec 00000000`00000000 00000000`00000013 fffffa80`047be408 : nt!KiPageFault+0x260
fffff880`02dfb9c8 fffff880`00e358ec : 00000000`00000000 00000000`00000013 fffffa80`047be408 00000000`00000000 : ataport!PortListRemoveRequest+0x22
fffff880`02dfb9d0 fffff880`00e356e5 : 00000000`00000014 00000000`00000001 00000000`00000001 00000000`000c0000 : ataport!TransferRequestsToQueue+0x34
fffff880`02dfba00 fffff880`00e2d1f6 : 00000000`00000001 fffffa80`047be1b0 fffffa80`047be3d0 fffffa80`03d00160 : ataport!PortAvioSchedulerTransferBatch+0x171
fffff880`02dfba40 fffff880`00e2f582 : 00000000`00000000 00000000`00000000 fffffa80`047be1b0 fffffa80`03d00160 : ataport!IdeStartNextDeviceRequest+0x66
fffff880`02dfbae0 fffff880`00e2f0ec : fffffa80`047a11a0 00000000`00000000 fffffa80`047a11a0 fffffa80`03d00160 : ataport!IdeProcessCompletedRequests+0x26a
fffff880`02dfbc10 fffff800`02890bfc : fffff880`02dd3180 00000009`7bd61944 fffffa80`047a1050 fffffa80`047a1118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`02dfbcd0 fffff800`0288deea : fffff880`02dd3180 fffff880`02dddfc0 00000000`00000000 fffff880`00e2ef44 : nt!KiRetireDpcList+0x1bc
fffff880`02dfbd80 00000000`00000000 : fffff880`02dfc000 fffff880`02df6000 fffff880`02dfbd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!PortListRemoveRequest+22
fffff880`00e34e46 49894008        mov     qword ptr [r8+8],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ataport!PortListRemoveRequest+22

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xD1_ataport!PortListRemoveRequest+22

BUCKET_ID:  X64_0xD1_ataport!PortListRemoveRequest+22

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042211-22729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02854000 PsLoadedModuleList = 0xfffff800`02a91e50
Debug session time: Fri Apr 22 21:44:04.350 2011 (UTC - 4:00)
System Uptime: 0 days 1:07:54.098
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5003, fffff70001080000, 454, 456001008a8}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+29f57 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 0000000000000454
Arg4: 00000456001008a8

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  SearchFilterHo

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800503a4c0 -- (.trap 0xfffff8800503a4c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000007fefca27000 rbx=0000000000000000 rcx=0000000000005a4d
rdx=000007fefca10000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028a47e7 rsp=fffff8800503a658 rbp=fffff80002a734a0
 r8=0000000000000000  r9=fffff8800503a698 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlImageNtHeaderEx+0x3f:
fffff800`028a47e7 66390a          cmp     word ptr [rdx],cx ds:a030:000007fe`fca10000=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002933e58 to fffff800028c4740

STACK_TEXT:  
fffff880`0503a158 fffff800`02933e58 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`00000454 : nt!KeBugCheckEx
fffff880`0503a160 fffff800`028e0ca2 : 00000000`00000001 fffff683`ff7e5080 fffff880`0503a4c0 fffff6fb`41ffbf28 : nt! ?? ::FNODOBFM::`string'+0x29f57
fffff880`0503a250 fffff800`028df13b : 00000000`00000000 00000000`00000000 fffffa80`03be14e0 00000000`10000004 : nt!MiDispatchFault+0x8c2
fffff880`0503a360 fffff800`028c282e : 00000000`00000000 00000000`00000000 00000001`00000000 00000000`00000014 : nt!MmAccessFault+0xd3b
fffff880`0503a4c0 fffff800`028a47e7 : fffff800`028a4872 fffff880`0108fd80 fffffa80`044b64e0 fffffa80`044b64e0 : nt!KiPageFault+0x16e
fffff880`0503a658 fffff800`028a4872 : fffff880`0108fd80 fffffa80`044b64e0 fffffa80`044b64e0 fffff800`02bb4a25 : nt!RtlImageNtHeaderEx+0x3f
fffff880`0503a660 fffff800`02c6cb08 : fffffa80`059d7c00 00000000`00000000 00000001`00000000 00000000`00000014 : nt!RtlImageNtHeader+0x1e
fffff880`0503a690 fffff800`02bf6d8e : fffffa80`057b1f78 00000000`00000000 fffffa80`057b1f78 fffffa80`057b0000 : nt!EtwpPsProvTraceImage+0xd7
fffff880`0503a770 fffff800`02be0b18 : 00000000`000000b8 00000000`00000000 00000000`00000001 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x14214
fffff880`0503a850 fffff800`02be08eb : fffffa80`057b1f20 fffffa80`03ac4278 fffffa80`0581c860 00000000`00001ffb : nt!PsCallImageNotifyRoutines+0xdc
fffff880`0503a8b0 fffff800`02bdc4e2 : fffffa80`0581c860 fffffa80`03ac4060 fffff880`0503ab50 fffff880`0503ab48 : nt!MiMapViewOfImageSection+0x41f
fffff880`0503a9f0 fffff800`02bdc07f : fffffa80`00000004 fffffa80`03ac4060 fffff880`0503ab50 00000000`00000000 : nt!MiMapViewOfSection+0x372
fffff880`0503aae0 fffff800`028c3993 : 00000000`000000f8 fffffa80`03bbfb60 00000000`0011e108 00000000`0011e301 : nt!NtMapViewOfSection+0x2be
fffff880`0503abb0 00000000`774af93a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0011e0e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774af93a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+29f57
fffff800`02933e58 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+29f57

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29f57

BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29f57

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`00f1b000 fffff880`00f72000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02b71000 fffff880`02bfb000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03fd8000 fffff880`03fee000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03c43000 fffff880`03c58000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00da3000 fffff880`00dae000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03fb7000 fffff880`03fbf000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`03c17000 fffff880`03c1d000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`03c11000 fffff880`03c17000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`00cda000 fffff880`00ce3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d79000 fffff880`00da3000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00a80000 fffff960`00ae1000   ATMFD    ATMFD.DLL    Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`02ac5000 fffff880`02acc000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03c00000 fffff880`03c11000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`01dd3000 fffff880`01df1000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff880`01296000 fffff880`012b3000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`02a92000 fffff880`02abc000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01000000 fffff880`01030000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d1b000 fffff880`00d79000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01338000 fffff880`013ab000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03fc8000 fffff880`03fd8000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`01df1000 fffff880`01dfa000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`03df0000 fffff880`03dfe000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03d4f000 fffff880`03dd2000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03dd2000 fffff880`03df0000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03d40000 fffff880`03d4f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`014be000 fffff880`014d4000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04e00000 fffff880`04e22000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`012b3000 fffff880`012bc000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02a83000 fffff880`02a8f000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011e8000 fffff880`011fb000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`03fee000 fffff880`03ffa000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00500000 fffff960`0051e000   dxg      dxg.sys      Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`00ce3000 fffff880`00cf7000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00dae000 fffff880`00dfa000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff960`00860000 fffff960`00869000   framebuf framebuf.dll unavailable (00000000)
fffff880`013bc000 fffff880`013c6000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`03d14000 fffff880`03d28da0   fsdfw    fsdfw.sys    Sun Nov 01 01:31:42 2009 (4AED1D3E)
fffff880`03d29000 fffff880`03d323a0   fses     fses.sys     Tue Mar 09 06:37:48 2010 (4B96330C)
fffff880`05ad9000 fffff880`05b0d000   fsgk     fsgk.sys     Tue Sep 21 06:51:16 2010 (4C988E24)
fffff880`03d33000 fffff880`03d3f7e0   fshs     fshs.sys     Wed Nov 04 06:34:54 2009 (4AF166DE)
fffff880`03d0c000 fffff880`03d14000   fsvista  fsvista.sys  Tue Mar 18 02:37:07 2008 (47DF6313)
fffff880`013c6000 fffff880`01400000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01200000 fffff880`0124a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`0280b000 fffff800`02854000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03f6a000 fffff880`03f8e000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0405a000 fffff880`04073000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04fef000 fffff880`04ff7080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04e28000 fffff880`04e36000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`01d0b000 fffff880`01dd3000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`014b5000 fffff880`014be000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`040ef000 fffff880`040fe000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04080000 fffff880`0408e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bcc000 fffff800`00bd6000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`0410f000 fffff880`04152000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`0131e000 fffff880`01338000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04e22000 fffff880`04e27200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`01cde000 fffff880`01cf3000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01cbb000 fffff880`01cde000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cfa000 fffff880`00d07000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`040fe000 fffff880`0410d000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04073000 fffff880`04080000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`01c00000 fffff880`01c18000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`01c18000 fffff880`01c45000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`01c45000 fffff880`01c93000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`01c93000 fffff880`01cb6000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`02b2a000 fffff880`02b35000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f7b000 fffff880`00f85000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`012c0000 fffff880`0131e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03d01000 fffff880`03d0c000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`014a3000 fffff880`014b5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014d4000 fffff880`015c6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03e24000 fffff880`03e30000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03e30000 fffff880`03e5f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`041d6000 fffff880`041eb000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02a74000 fffff880`02a83000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02a00000 fffff880`02a45000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02b35000 fffff880`02b46000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03cf5000 fffff880`03d01000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02854000 fffff800`02e31000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01032000 fffff880`011d5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02abc000 fffff880`02ac5000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04164000 fffff880`0417c000   nusb3hub nusb3hub.sys Thu Jan 21 22:22:18 2010 (4B5919EA)
fffff880`03e5f000 fffff880`03e8f000   nusb3xhc nusb3xhc.sys Thu Jan 21 22:22:21 2010 (4B5919ED)
fffff880`02a4e000 fffff880`02a74000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03f9a000 fffff880`03fb7000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00fc5000 fffff880`00fda000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f85000 fffff880`00fb8000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fef000 fffff880`00fff000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013ab000 fffff880`013bc000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0520e000 fffff880`052b4000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`041eb000 fffff880`041fb000   point64  point64.sys  Fri Apr 08 18:58:14 2011 (4D9F9306)
fffff880`04000000 fffff880`0403d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d07000 fffff880`00d1b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03e00000 fffff880`03e24000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0408e000 fffff880`040a9000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`040a9000 fffff880`040ca000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`040ca000 fffff880`040e4000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03ca4000 fffff880`03cf5000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`040e4000 fffff880`040ef000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02b0f000 fffff880`02b18000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b18000 fffff880`02b21000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b21000 fffff880`02b2a000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015c6000 fffff880`01600000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01cf3000 fffff880`01d0b000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e91000 fffff880`03ef8000   Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`052b4000 fffff880`052bf000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03f8e000 fffff880`03f9a000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03c58000 fffff880`03c75000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0149b000 fffff880`014a3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05b0d000 fffff880`05b7e000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`05365000 fffff880`053fa000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`052fe000 fffff880`05365000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`052bf000 fffff880`052ec000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`0410d000 fffff880`0410e480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`052ec000 fffff880`052fe000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02b64000 fffff880`02b71000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b46000 fffff880`02b64000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03c90000 fffff880`03ca4000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`006b0000 fffff960`006ba000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03c1d000 fffff880`03c43000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04152000 fffff880`04164000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0403d000 fffff880`0405a000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`03e8f000 fffff880`03e90f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03f59000 fffff880`03f6a000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`0417c000 fffff880`041d6000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`03ef8000 fffff880`03f03000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03f03000 fffff880`03f59000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00fb8000 fffff880`00fc5000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02acc000 fffff880`02ada000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04e38000 fffff880`04fef000   viahduaa viahduaa.sys Sat May 15 06:22:39 2010 (4BEE75EF)
fffff880`02ada000 fffff880`02aff000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0148b000 fffff880`0149b000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fda000 fffff880`00fef000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0124a000 fffff880`01296000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03c75000 fffff880`03c90000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02aff000 fffff880`02b0f000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e68000 fffff880`00f0c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f0c000 fffff880`00f1b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a45000 fffff880`02a4e000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000a0000 fffff960`003b2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`03fbf000 fffff880`03fc8000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f72000 fffff880`00f7b000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`01296000 fffff880`012a4000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`012a4000 fffff880`012b0000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`012b0000 fffff880`012b9000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`011d5000 fffff880`011e8000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Thank you, I've been suspecting the RAM. I've tried the computer with one stick of ram in different slots on the mobo, but eventually it always crashes. The one Memtest-error happened with both sticks of ram in and during the "random" test, so it didn't really tell me anything. I tried the Asus OC/benchmarking-suite that came with the mobo, but it's supposed to reset the settings upon reboot, and the cpu seems to run at the original mhz.

Thanks! I'll look into the Cool 'n Quiet and if need be switch out the RAM once the shops are open after Easter.
 
I bought two new memory sticks (exactly the same brand and model as the previous), checked that Cool and Quiet was turned on, power settings in Win7 set to "balanced" and the CPU seems to be running at the settings it came with out of the box.

The computer ran fine for about 5 hours, after which i got a SYSTEM_SERVICE_EXCEPTION, and again the same error immediately upon booting (at the loading-logo). After that I ran the recommended Startup Repair-thing, during which the computer crashed again, this time with a generic STOP message at 0x0000001E (0xFFFFFFFFCCCCCC5, 0xFFFFF88005FC2A60, 0x00000000000000000, 0x0000000000000000)

EDIT1: Both new mems are in the same slots as the previous ones, note that I have had crashes regardless of which slot the memory was in with the two previous memory sticks. The only other change made was installing DivX.
EDIT1,5: While writing this I got a BAD_POOL_CALLER error.
EDIT2: When starting up again after the aforementioned stop, there was no video signal to the monitor (after turning off and waiting for a few minutes before starting again the video was back, this has happened before as well, sorry I forgot to mention it earlier.) Also the "MemOK"-RAM-reset-button-led on the mobo was on.
EDIT3: Attached new dump (note: collected while in safe mode).

What's the next step in trying to figure out what might be wrong?
 

Attachments

  • Windows_NT6_BSOD_jcgriff2.rar
    414.4 KB · Views: 265
Last edited:
It looks like something's not right with the ram again. It can be actually a bad motherboard slot.

1. Uninstall F-Secure.
2. Load fail-safe defaults in bios.
3. Try with only 1 stick in diffwrent slots.
4. Memtest86+ - Advanced Memory Diagnostic Tool

It doesn't look like an HDD's fault at all, but let's quick-check it just in case.

5. Run chkdsk /f (most likely it'll come up clean)
6. HDD (it won't take much ttime) -- S.M.A.R.T.:

HD Tune website

HDDScan

PassMark DiskCheckup - SMART hard drive monitoring utility







CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042211-109871-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02815000 PsLoadedModuleList = 0xfffff800`02a52e50
Debug session time: Fri Apr 22 20:24:21.088 2011 (UTC - 4:00)
System Uptime: 0 days 3:36:15.731
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {39c6008, 2, 1, fffff88000e34e46}

Probably caused by : ataport.SYS ( ataport!PortListRemoveRequest+22 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000039c6008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000e34e46, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abd0e0
 00000000039c6008 

CURRENT_IRQL:  2

FAULTING_IP: 
ataport!PortListRemoveRequest+22
fffff880`00e34e46 49894008        mov     qword ptr [r8+8],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002dfb830 -- (.trap 0xfffff88002dfb830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80047be408 rbx=0000000000000000 rcx=fffffa80047be408
rdx=fffffa80046be408 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000e34e46 rsp=fffff88002dfb9c8 rbp=fffffa80047be3d0
 r8=00000000039c6000  r9=fffffa80040ba5b0 r10=fffffa80047a2620
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport!PortListRemoveRequest+0x22:
fffff880`00e34e46 49894008        mov     qword ptr [r8+8],rax ds:0002:00000000`039c6008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002884ca9 to fffff80002885740

STACK_TEXT:  
fffff880`02dfb6e8 fffff800`02884ca9 : 00000000`0000000a 00000000`039c6008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02dfb6f0 fffff800`02883920 : fffffa80`047a1100 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02dfb830 fffff880`00e34e46 : fffff880`00e358ec 00000000`00000000 00000000`00000013 fffffa80`047be408 : nt!KiPageFault+0x260
fffff880`02dfb9c8 fffff880`00e358ec : 00000000`00000000 00000000`00000013 fffffa80`047be408 00000000`00000000 : ataport!PortListRemoveRequest+0x22
fffff880`02dfb9d0 fffff880`00e356e5 : 00000000`00000014 00000000`00000001 00000000`00000001 00000000`000c0000 : ataport!TransferRequestsToQueue+0x34
fffff880`02dfba00 fffff880`00e2d1f6 : 00000000`00000001 fffffa80`047be1b0 fffffa80`047be3d0 fffffa80`03d00160 : ataport!PortAvioSchedulerTransferBatch+0x171
fffff880`02dfba40 fffff880`00e2f582 : 00000000`00000000 00000000`00000000 fffffa80`047be1b0 fffffa80`03d00160 : ataport!IdeStartNextDeviceRequest+0x66
fffff880`02dfbae0 fffff880`00e2f0ec : fffffa80`047a11a0 00000000`00000000 fffffa80`047a11a0 fffffa80`03d00160 : ataport!IdeProcessCompletedRequests+0x26a
fffff880`02dfbc10 fffff800`02890bfc : fffff880`02dd3180 00000009`7bd61944 fffffa80`047a1050 fffffa80`047a1118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`02dfbcd0 fffff800`0288deea : fffff880`02dd3180 fffff880`02dddfc0 00000000`00000000 fffff880`00e2ef44 : nt!KiRetireDpcList+0x1bc
fffff880`02dfbd80 00000000`00000000 : fffff880`02dfc000 fffff880`02df6000 fffff880`02dfbd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!PortListRemoveRequest+22
fffff880`00e34e46 49894008        mov     qword ptr [r8+8],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ataport!PortListRemoveRequest+22

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xD1_ataport!PortListRemoveRequest+22

BUCKET_ID:  X64_0xD1_ataport!PortListRemoveRequest+22
fffff880`00e34e46 49894008        mov     qword ptr [r8+8],rax
fffff880`00e34e4a 488b4120        mov     rax,qword ptr [rcx+20h]
fffff880`00e34e4e ff4918          dec     dword ptr [rcx+18h]
fffff880`00e34e51 4885c0          test    rax,rax
fffff880`00e34e54 7403            je      ataport!PortListRemoveRequest+0x35 (fffff880`00e34e59)

ataport!PortListRemoveRequest+0x32:
fffff880`00e34e56 ff4804          dec     dword ptr [rax+4]

ataport!PortListRemoveRequest+0x35:
fffff880`00e34e59 48394910        cmp     qword ptr [rcx+10h],rcx
fffff880`00e34e5d 7507            jne     ataport!PortListRemoveRequest+0x42 (fffff880`00e34e66)

ataport!PortListRemoveRequest+0x3b:
fffff880`00e34e5f 488b01          mov     rax,qword ptr [rcx]
fffff880`00e34e62 48894110        mov     qword ptr [rcx+10h],rax

ataport!PortListRemoveRequest+0x42:
fffff880`00e34e66 c3              ret

---------





Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042311-19765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02861000 PsLoadedModuleList = 0xfffff800`02a9ee50
Debug session time: Sat Apr 23 14:27:00.119 2011 (UTC - 4:00)
System Uptime: 0 days 0:38:30.492
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 39, {fffff80002b60414, 0, fffff80002ad6be0, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpLazyFlushWorker+0 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_EXIT_OWNED_MUTEX (39)
Arguments:
Arg1: fffff80002b60414
Arg2: 0000000000000000
Arg3: fffff80002ad6be0
Arg4: 0000000000000000

Debugging Details:
------------------


FAULTING_IP: 
nt!CmpLazyFlushWorker+0
fffff800`02b60414 488bc4          mov     rax,rsp

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x39

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8000287c52b to fffff800028d1740

STACK_TEXT:  
fffff880`031afca8 fffff800`0287c52b : 00000000`00000039 fffff800`02b60414 00000000`00000000 fffff800`02ad6be0 : nt!KeBugCheckEx
fffff880`031afcb0 fffff800`02b747c6 : 00000000`00000000 fffffa80`039de040 00000000`00000080 fffffa80`03967890 : nt! ?? ::FNODOBFM::`string'+0x54420
fffff880`031afd40 fffff800`028afc26 : fffff880`02f63180 fffffa80`039de040 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031afd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  .bugcheck ; kb

FOLLOWUP_IP: 
nt!CmpLazyFlushWorker+0
fffff800`02b60414 488bc4          mov     rax,rsp

SYMBOL_NAME:  nt!CmpLazyFlushWorker+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x39_nt!CmpLazyFlushWorker+0

BUCKET_ID:  X64_0x39_nt!CmpLazyFlushWorker+0

fffff800`02b60568 f0012d31aaeeff  lock add dword ptr [nt!CmpLazyFlushCount (fffff800`02a4afa0)],ebp
fffff800`02b6056f e951ffffff      jmp     nt!CmpLazyFlushWorker+0xb1 (fffff800`02b604c5)

nt!CmpLazyFlushWorker+0x160:
fffff800`02b60574 39742450        cmp     dword ptr [rsp+50h],esi
fffff800`02b60578 74db            je      nt!CmpLazyFlushWorker+0x141 (fffff800`02b60555)

nt!CmpLazyFlushWorker+0x166:
fffff800`02b6057a ebd4            jmp     nt!CmpLazyFlushWorker+0x13c (fffff800`02b60550)

nt! ?? ::NNGAKEGL::`string'+0x49120:
fffff800`02c2b1a0 488d0d41cceaff  lea     rcx,[nt!CmpLoadHiveLock (fffff800`02ad7de8)]
fffff800`02c2b1a7 e8846bcdff      call    nt!ExfAcquirePushLockExclusive (fffff800`02901d30)
fffff800`02c2b1ac 90              nop
fffff800`02c2b1ad e9ba52f3ff      jmp     nt!CmpLazyFlushWorker+0x58 (fffff800`02b6046c)

nt! ?? ::NNGAKEGL::`string'+0x49132:
fffff800`02c2b1b2 408acd          mov     cl,bpl
fffff800`02c2b1b5 e8a690f4ff      call    nt!CmpLockRegistryFreezeAware (fffff800`02b74260)
fffff800`02c2b1ba 90              nop
fffff800`02c2b1bb e9d952f3ff      jmp     nt!CmpLazyFlushWorker+0x85 (fffff800`02b60499)

nt! ?? ::NNGAKEGL::`string'+0x49140:
fffff800`02c2b1c0 408835dd6ce3ff  mov     byte ptr [nt!CmpForceForceFlush (fffff800`02a61ea4)],sil
fffff800`02c2b1c7 e9f952f3ff      jmp     nt!CmpLazyFlushWorker+0xb1 (fffff800`02b604c5)

nt! ?? ::NNGAKEGL::`string'+0x4914c:
fffff800`02c2b1cc 488d0d15cceaff  lea     rcx,[nt!CmpLoadHiveLock (fffff800`02ad7de8)]
fffff800`02c2b1d3 e848bbc7ff      call    nt!ExfReleasePushLock (fffff800`028a6d20)
fffff800`02c2b1d8 90              nop
fffff800`02c2b1d9 e94153f3ff      jmp     nt!CmpLazyFlushWorker+0x10b (fffff800`02b6051f)

nt! ?? ::NNGAKEGL::`string'+0x4915e:
fffff800`02c2b1de 6639b1c6010000  cmp     word ptr [rcx+1C6h],si
fffff800`02c2b1e5 0f855353f3ff    jne     nt!CmpLazyFlushWorker+0x12a (fffff800`02b6053e)

nt! ?? ::NNGAKEGL::`string'+0x4916b:
fffff800`02c2b1eb e8b099c5ff      call    nt!KiCheckForKernelApcDelivery (fffff800`02884ba0)
fffff800`02c2b1f0 90              nop
fffff800`02c2b1f1 e94853f3ff      jmp     nt!CmpLazyFlushWorker+0x12a (fffff800`02b6053e)

nt! ?? ::NNGAKEGL::`string'+0x49176:
fffff800`02c2b1f6 4038742448      cmp     byte ptr [rsp+48h],sil
fffff800`02c2b1fb 750c            jne     nt! ?? ::NNGAKEGL::`string'+0x49189 (fffff800`02c2b209)

nt! ?? ::NNGAKEGL::`string'+0x4917d:
fffff800`02c2b1fd 4088355efe1600  mov     byte ptr [nt!CmpCannotWriteConfiguration (fffff800`02d9b062)],sil
fffff800`02c2b204 e94253f3ff      jmp     nt!CmpLazyFlushWorker+0x137 (fffff800`02b6054b)

nt! ?? ::NNGAKEGL::`string'+0x49189:
fffff800`02c2b209 e8823a0a00      call    nt!CmpDiskFullWarning (fffff800`02ccec90)
fffff800`02c2b20e e8ed4ef3ff      call    nt!CmpLazyFlush (fffff800`02b60100)
fffff800`02c2b213 90              nop
fffff800`02c2b214 e93253f3ff      jmp     nt!CmpLazyFlushWorker+0x137 (fffff800`02b6054b)
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042311-20358-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02816000 PsLoadedModuleList = 0xfffff800`02a53e50
Debug session time: Sat Apr 23 17:53:39.777 2011 (UTC - 4:00)
System Uptime: 0 days 3:24:28.150
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002889905, fffff88008637950, 0}

Probably caused by : ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002889905, Address of the instruction which caused the bugcheck
Arg3: fffff88008637950, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02889905 498b08          mov     rcx,qword ptr [r8]

CONTEXT:  fffff88008637950 -- (.cxr 0xfffff88008637950)
rax=00000009e9800009 rbx=fffff880086383d0 rcx=fffffa80060dd9d0
rdx=fffdf900c344fe31 rsi=0000000000000004 rdi=00000000000000d8
rip=fffff80002889905 rsp=fffff88008638320 rbp=fffffa80060dd9d0
 r8=fffdf900c344fe30  r9=000000000000001f r10=fffffa80060dd9d0
r11=fffff900c35ae068 r12=0000000000000000 r13=00000000000bfd20
r14=00000000000bd0f0 r15=0000000074202450
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02889905 498b08          mov     rcx,qword ptr [r8] ds:002b:fffdf900`c344fe30=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  msnmsgr.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002889905

STACK_TEXT:  
fffff880`08638320 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault16


FOLLOWUP_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02889905 498b08          mov     rcx,qword ptr [r8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpInterlockedPopEntrySListFault16+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

STACK_COMMAND:  .cxr 0xfffff88008637950 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

BUCKET_ID:  X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042311-31527-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02862000 PsLoadedModuleList = 0xfffff800`02a9fe50
Debug session time: Sat Apr 23 22:43:54.499 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:21.247
Loading Kernel Symbols
...............................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800028d5905, fffff88003911c80, 0}

Probably caused by : ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800028d5905, Address of the instruction which caused the bugcheck
Arg3: fffff88003911c80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`028d5905 498b08          mov     rcx,qword ptr [r8]

CONTEXT:  fffff88003911c80 -- (.cxr 0xfffff88003911c80)
rax=00000000002c0001 rbx=fffff880039128e8 rcx=fffffa8005a42d90
rdx=fffdf900c00d2cd1 rsi=0000000000000005 rdi=0000000000000228
rip=fffff800028d5905 rsp=fffff88003912650 rbp=fffffa8005a42d90
 r8=fffdf900c00d2cd0  r9=0000000000000006 r10=fffffa8005a42d90
r11=0000000000000004 r12=0000000000000000 r13=0000000000000001
r14=0000000000000006 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!ExpInterlockedPopEntrySListFault16:
fffff800`028d5905 498b08          mov     rcx,qword ptr [r8] ds:002b:fffdf900`c00d2cd0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800028d5905

STACK_TEXT:  
fffff880`03912650 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault16


FOLLOWUP_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`028d5905 498b08          mov     rcx,qword ptr [r8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpInterlockedPopEntrySListFault16+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

STACK_COMMAND:  .cxr 0xfffff88003911c80 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

BUCKET_ID:  X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042311-69124-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02856000 PsLoadedModuleList = 0xfffff800`02a93e50
Debug session time: Sat Apr 23 23:05:52.264 2011 (UTC - 4:00)
System Uptime: 0 days 0:08:41.012
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C2, {7, 1097, 5cdc731, fffff8800650c708}

GetPointerFromAddress: unable to read from fffff80002afe0e0
GetUlongFromAddress: unable to read from fffff80002a6c1b0
GetUlongFromAddress: unable to read from fffff80002a6c1b0
Probably caused by : Ntfs.sys ( Ntfs! ?? ::FNODOBFM::`string'+67c5 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000005cdc731, Memory contents of the pool block
Arg4: fffff8800650c708, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff80002a6c1b0
GetUlongFromAddress: unable to read from fffff80002a6c1b0

POOL_ADDRESS:  fffff8800650c708 

BUGCHECK_STR:  0xc2_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  services.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800029f960e to fffff800028c6740

STACK_TEXT:  
fffff880`0650c558 fffff800`029f960e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`05cdc731 : nt!KeBugCheckEx
fffff880`0650c560 fffff880`01054a0d : 00000000`0000070d fffff880`00db7533 fffff880`0650c9f0 00000000`00000000 : nt!ExDeferredFreePool+0x11eb
fffff880`0650c610 fffff880`0104176a : fffff880`0650c730 fffff880`00000001 00000000`00000000 fffff880`0650c730 : Ntfs! ?? ::FNODOBFM::`string'+0x67c5
fffff880`0650c660 fffff880`010e3244 : fffff880`0650c980 fffff880`0650c730 fffffa80`06a26010 fffff8a0`0010b010 : Ntfs!NtfsCommonCleanupOnNewStack+0x14a
fffff880`0650c6d0 fffff880`00db623f : fffff880`0650c730 fffffa80`06a26010 fffffa80`06a263b0 fffffa80`067f74d0 : Ntfs!NtfsFsdCleanup+0x144
fffff880`0650c940 fffff880`00db46df : fffffa80`04952de0 00000000`00000000 fffffa80`047a5f00 fffffa80`06a26010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0650c9d0 fffff800`02bda84f : fffffa80`06a26010 fffffa80`0610fb30 00000000`00000000 fffffa80`03aee660 : fltmgr!FltpDispatch+0xcf
fffff880`0650ca30 fffff800`02bc0724 : 00000000`00000000 fffffa80`0610fb30 00000000`00000000 fffffa80`03b08060 : nt!IopCloseFile+0x11f
fffff880`0650cac0 fffff800`02bda341 : fffffa80`0610fb30 fffffa80`00000001 fffff8a0`018039e0 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
fffff880`0650cb40 fffff800`02bda254 : 00000000`000001fc fffffa80`0610fb30 fffff8a0`018039e0 00000000`000001fc : nt!ObpCloseHandleTableEntry+0xb1
fffff880`0650cbd0 fffff800`028c5993 : fffffa80`05baf060 fffff880`0650cca0 00000000`0008040c fffffa80`06182e60 : nt!ObpCloseHandle+0x94
fffff880`0650cc20 00000000`76e4f7aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0022de18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e4f7aa


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs! ?? ::FNODOBFM::`string'+67c5
fffff880`01054a0d 4c897b20        mov     qword ptr [rbx+20h],r15

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  Ntfs! ?? ::FNODOBFM::`string'+67c5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

FAILURE_BUCKET_ID:  X64_0xc2_7_Ntfs!_??_::FNODOBFM::_string_+67c5

BUCKET_ID:  X64_0xc2_7_Ntfs!_??_::FNODOBFM::_string_+67c5

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`00f5b000 fffff880`00fb2000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02a00000 fffff880`02a8a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03e6e000 fffff880`03e84000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03ddf000 fffff880`03df4000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00da8000 fffff880`00db3000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03e4d000 fffff880`03e55000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`03cb8000 fffff880`03cbe000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`03cb2000 fffff880`03cb8000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`00e9a000 fffff880`00ea3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d7e000 fffff880`00da8000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00930000 fffff960`00991000   ATMFD    ATMFD.DLL    Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`02b0f000 fffff880`02b16000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ca1000 fffff880`03cb2000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`039bf000 fffff880`039dd000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00730000 fffff960`00757000   cdd      cdd.dll      unavailable (00000000)
fffff880`011d3000 fffff880`011f0000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`02adc000 fffff880`02b06000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01000000 fffff880`01030000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d06000 fffff880`00d64000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01278000 fffff880`012eb000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03e5e000 fffff880`03e6e000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0389e000 fffff880`038a7000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`02bf0000 fffff880`02bfe000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c00000 fffff880`03c83000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03c83000 fffff880`03ca1000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03dd0000 fffff880`03ddf000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01400000 fffff880`01416000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04e00000 fffff880`04e22000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`03df4000 fffff880`03dfd000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`03e90000 fffff880`03e9c000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01416000 fffff880`01429000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04e28000 fffff880`04e34000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`128e8000 fffff880`129dc000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`03e9d000 fffff880`03ee3000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`00cd0000 fffff880`00ce4000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00db3000 fffff880`00dff000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`012fc000 fffff880`01306000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`03da4000 fffff880`03db8da0   fsdfw    fsdfw.sys    Sun Nov 01 01:31:42 2009 (4AED1D3E)
fffff880`03db9000 fffff880`03dc23a0   fses     fses.sys     Tue Mar 09 06:37:48 2010 (4B96330C)
fffff880`05cd8000 fffff880`05d0c000   fsgk     fsgk.sys     Tue Sep 21 06:51:16 2010 (4C988E24)
fffff880`03dc3000 fffff880`03dcf7e0   fshs     fshs.sys     Wed Nov 04 06:34:54 2009 (4AF166DE)
fffff880`03d9c000 fffff880`03da4000   fsvista  fsvista.sys  Tue Mar 18 02:37:07 2008 (47DF6313)
fffff880`015b9000 fffff880`015f3000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`014b6000 fffff880`01500000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`0280d000 fffff800`02856000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e00000 fffff880`03e24000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`040ac000 fffff880`040c5000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`040c5000 fffff880`040cd080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04ff2000 fffff880`05000000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`038f7000 fffff880`039bf000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015b0000 fffff880`015b9000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04152000 fffff880`04161000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03fee000 fffff880`03ffc000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bac000 fffff800`00bb6000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`04172000 fffff880`041b5000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`0125e000 fffff880`01278000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0148b000 fffff880`014b6000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04e22000 fffff880`04e27200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`038ca000 fffff880`038df000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`038a7000 fffff880`038ca000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ce5000 fffff880`00cf2000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`11c2f000 fffff880`11c3d000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04161000 fffff880`04170000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`040ce000 fffff880`040db000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d64000 fffff880`00d7e000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`039dd000 fffff880`039f5000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03800000 fffff880`0382d000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`0382d000 fffff880`0387b000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`0387b000 fffff880`0389e000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`02b74000 fffff880`02b7f000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fbb000 fffff880`00fc5000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01200000 fffff880`0125e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03d91000 fffff880`03d9c000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0159e000 fffff880`015b0000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01306000 fffff880`013f8000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03e84000 fffff880`03e90000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`11c00000 fffff880`11c2f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0405a000 fffff880`0406f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02be1000 fffff880`02bf0000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02a8a000 fffff880`02acf000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0142b000 fffff880`0148b000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02b7f000 fffff880`02b90000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03d85000 fffff880`03d91000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02856000 fffff800`02e33000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01030000 fffff880`011d3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02b06000 fffff880`02b0f000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`041c7000 fffff880`041df000   nusb3hub nusb3hub.sys Thu Jan 21 22:22:18 2010 (4B5919EA)
fffff880`03ee3000 fffff880`03f13000   nusb3xhc nusb3xhc.sys Thu Jan 21 22:22:21 2010 (4B5919ED)
fffff880`128e6000 fffff880`128e7180   nvBridge nvBridge.kmd Thu Apr 07 23:14:49 2011 (4D9E7DA9)
fffff880`11c41000 fffff880`128e5300   nvlddmkm nvlddmkm.sys Thu Apr 07 23:22:12 2011 (4D9E7F64)
fffff880`02bbb000 fffff880`02be1000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03e30000 fffff880`03e4d000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00e0d000 fffff880`00e22000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fc5000 fffff880`00ff8000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e93000 fffff880`00e9a000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00cc0000 fffff880`00cd0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`012eb000 fffff880`012fc000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05ae1000 fffff880`05b87000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`040db000 fffff880`040eb000   point64  point64.sys  Fri Apr 08 18:58:14 2011 (4D9F9306)
fffff880`0406f000 fffff880`040ac000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf2000 fffff880`00d06000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`129dc000 fffff880`12a00000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`040f1000 fffff880`0410c000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0410c000 fffff880`0412d000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0412d000 fffff880`04147000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03d34000 fffff880`03d85000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04147000 fffff880`04152000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02b59000 fffff880`02b62000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b62000 fffff880`02b6b000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b6b000 fffff880`02b74000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01564000 fffff880`0159e000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`038df000 fffff880`038f7000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03f15000 fffff880`03f7c000   Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`05b87000 fffff880`05b92000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03e24000 fffff880`03e30000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03ce8000 fffff880`03d05000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0155c000 fffff880`01564000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05d0c000 fffff880`05d7d000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`05c43000 fffff880`05cd8000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`05a00000 fffff880`05a67000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`05b92000 fffff880`05bbf000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`04170000 fffff880`04171480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05bbf000 fffff880`05bd1000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02bae000 fffff880`02bbb000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b90000 fffff880`02bae000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03d20000 fffff880`03d34000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03cbe000 fffff880`03ce4000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`041b5000 fffff880`041c7000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`041df000 fffff880`041fc000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`03f13000 fffff880`03f14f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03fdd000 fffff880`03fee000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`04000000 fffff880`0405a000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`03f7c000 fffff880`03f87000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03f87000 fffff880`03fdd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00e00000 fffff880`00e0d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02b16000 fffff880`02b24000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04e3b000 fffff880`04ff2000   viahduaa viahduaa.sys Sat May 15 06:22:39 2010 (4BEE75EF)
fffff880`02b24000 fffff880`02b49000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01500000 fffff880`01510000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e22000 fffff880`00e37000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e37000 fffff880`00e93000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01510000 fffff880`0155c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03d05000 fffff880`03d20000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02b49000 fffff880`02b59000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ea8000 fffff880`00f4c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f4c000 fffff880`00f5b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02acf000 fffff880`02ad8000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000c0000 fffff960`003d2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`03e55000 fffff880`03e5e000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fb2000 fffff880`00fbb000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`05d86000 fffff880`05d8f000   DirectIo.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`05d7d000 fffff880`05d86000   DirectIo.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01416000 fffff880`01424000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`015f3000 fffff880`015ff000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`011d3000 fffff880`011dc000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`011dc000 fffff880`011ef000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Thanks for the suggestions,

I uninstalled F-secure (and suffered a SYSTEM_SERVICE_EXCEPTION in the process, but I think I got it all after a few tries).

There doesn't seem to be any "fail safe" options available in my bios, currently running on defaults.

I ran with one stick all day yesterday in the same slot, ran Memtest86+ overnight with no errors. In slot 2 Memtest curiously reports the memory as 200mhz, but in the other slots the normal 666mhz, using the same stick. CPU-Z and Rammon report the correct values for all slots. Last night I ran Memtest again overnight with another stick in another slot, and it came up clean. I have had BSODs regardless of which of my four brand-new memory sticks I've used, in every slot, both in double and single setups.

Chkdsk reported nothing.

While running HDTunePro I experienced a BAD_POOL_HEADER, but was unfortunately unable to replicate the error because HDTunePro in the process "forgot" I was still on my trial period. HDTune (with a more limited test) did not crash. Both HDDScan and DiscCheckup reported one UltraDMA CRC Error. While running HDDScan the third time or so I got a SYSTEM_SERVICE_EXCEPTION, and the same again 15 minutes into the next reboot, this time while writing on this forum (that particular error is not included in the dumpfiles included).

The first generic BSOD this morning reported afd.sys as the guilty party.

In Safe Mode I have yet to experience a BSOD.

Next I will try with the same configuration as now but with another GPU.
 

Attachments

  • SAMSUNG HD103SJ-S246J9FB109356-SMART.txt
    1.6 KB · Views: 411
  • RAMMon - SPD Info.txt
    20.3 KB · Views: 369
  • DriveInfo.txt
    10.4 KB · Views: 402
  • Windows_NT6_BSOD_jcgriff2.rar
    573.5 KB · Views: 269
  • WDC WD5000AAKS-00A7B2-WD-WCASY5461492-SMART.txt
    1.3 KB · Views: 330
Both HDDScan and DiscCheckup reported one UltraDMA CRC Error.

It's Ok, especially if it wasn't marked red.


I ran with one stick all day yesterday in the same slot, ran Memtest86+ overnight with no errors. In slot 2 Memtest curiously reports the memory as 200mhz, but in the other slots the normal 666mhz, using the same stick.

That's the problem, something's not right with that slot. Slot#2 could be faulty. I would suggest you be adding sticks one by one each after a day or so of testing. Place 1 stick in Slot #1, run it for a day or two. Then if no crashes add another stick in slot #3, #4, and if no errors then put the final stick in Slot #2. Make sure sticks are sitting well in slots.
 
The CRC Error was marked as yellow.

I've actually already done that, sort of by mistake. At the moment I only have one stick in slot 3, which came up clean after a night of Memtest, and yet I have experienced three BSODs already today.

EDIT: And the day before yesterday I ran it all day with another stick in slot 1, resulting in a BSOD.

EDIT2: Right. I tried switching over to an 8800 GTS, it installed fine, recognized the drivers and I rebooted for good measure. As a test I ran 3DMark06, during which I got a generic Stop-BSOD. I turned off the computer, switched off the main power from behind the PSU, waited a little while, switched it back on and the computer started immediately as I pressed the main 0/I switch, resulting in a "Power source surges detected during the previous power on ASUS Anti-surge triggered to protect system from unstable PSU"-messages, prompting me to setup/load default bios settings. I chose default settings, booted in safe mode and just as the icons and what not were loading I got a PAGE_FAULT_IN_NONPAGED_AREA attributed to nfts.sys. Now I got back into safe mode without issue.

So apparently it's not the GPU either. The PSU is brand new (see original post).

EDIT3: Added the new dumps (made in safe mode, does that matter?)
 

Attachments

  • Windows_NT6_BSOD_jcgriff2.rar
    608 KB · Views: 260
Last edited:
It does look like bad RAM:

KMODE_EXCEPTION_NOT_HANDLED (1e)
Probably caused by : memory_corruption ( nt!MiAllocatePagedPoolPages+175 )

DRIVER_PORTION_MUST_BE_NONPAGED (d3)
nt!KiInsertTimerTable+13b

SYSTEM_SERVICE_EXCEPTION (3b)
nt!ObLogSecurityDescriptor+23f

KMODE_EXCEPTION_NOT_HANDLED (1e)
Memory Access Violation by nt!MiAllocatePagedPoolPages+175

BugCheck 3B, {c0000005, fffff80002bcdeb1, fffff88004dc0d60, 0}
nt!ObLogSecurityDescriptor+c2


And there's nothing "suspicious" in your drivers.



~~~~~~~~~~~


The CRC Error was marked as yellow.

Yes, it's a very common error generally considered OK if "yellow". Many people have it. Even if you replace SATA and cabling it won't fix you. Just forget it.





CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042511-23415-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a5ee90
Debug session time: Mon Apr 25 16:59:41.493 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:18.773
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, 66c4f3}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: 000000000066c4f3

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  3DMark06.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002898be9 to fffff80002899640

STACK_TEXT:  
fffff880`009efce8 fffff800`02898be9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009efcf0 fffff800`028970b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009efe30 00000000`0066c4f3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
00000000`0991fe68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x66c4f3


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`028970b2 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

Followup: MachineOwner
---------





Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042511-19874-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02863000 PsLoadedModuleList = 0xfffff800`02aa8e90
Debug session time: Mon Apr 25 15:07:07.853 2011 (UTC - 4:00)
System Uptime: 0 days 0:15:31.133
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002bcdeb1, fffff88004dc0d60, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObLogSecurityDescriptor+c2 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002bcdeb1, Address of the instruction which caused the bugcheck
Arg3: fffff88004dc0d60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObLogSecurityDescriptor+c2
fffff800`02bcdeb1 8b4614          mov     eax,dword ptr [rsi+14h]

CONTEXT:  fffff88004dc0d60 -- (.cxr 0xfffff88004dc0d60)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000011
rdx=000000006d08b81c rsi=0000000000000000 rdi=000000006d08b8d7
rip=fffff80002bcdeb1 rsp=fffff88004dc1740 rbp=fffffa800495d800
 r8=0000000000000098  r9=fffff8a00c4dac74 r10=fffff8a00c4dac74
r11=00000000000000b4 r12=fffff80002a8cca8 r13=0000000000000000
r14=fffff80002a8ccb0 r15=fffff8a00c4dabc0
iopl=0         nv up ei pl nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010207
nt!ObLogSecurityDescriptor+0xc2:
fffff800`02bcdeb1 8b4614          mov     eax,dword ptr [rsi+14h] ds:002b:00000000`00000014=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002bcdeb1

STACK_TEXT:  
fffff880`04dc1740 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObLogSecurityDescriptor+0xc2


FOLLOWUP_IP: 
nt!ObLogSecurityDescriptor+c2
fffff800`02bcdeb1 8b4614          mov     eax,dword ptr [rsi+14h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObLogSecurityDescriptor+c2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff88004dc0d60 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObLogSecurityDescriptor+c2

BUCKET_ID:  X64_0x3B_nt!ObLogSecurityDescriptor+c2

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042411-29811-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02854000 PsLoadedModuleList = 0xfffff800`02a91e50
Debug session time: Sun Apr 24 21:57:44.248 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:19.903
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff800028ef5f5, 0, ffffffffffffffff}

Probably caused by : memory_corruption ( nt!MiAllocatePagedPoolPages+175 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800028ef5f5, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MiAllocatePagedPoolPages+175
fffff800`028ef5f5 4c0b02          or      r8,qword ptr [rdx]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002afc0e0
 ffffffffffffffff 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff8800226bb98 -- (.exr 0xfffff8800226bb98)
ExceptionAddress: fffff800028ef5f5 (nt!MiAllocatePagedPoolPages+0x0000000000000175)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff8800226bc40 -- (.trap 0xfffff8800226bc40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000201 rbx=0000000000000000 rcx=0000000000008006
rdx=ffff788001801008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028ef5f5 rsp=fffff8800226bdd0 rbp=fffff8800226be40
 r8=000000000000003f  r9=0000000001ffffff r10=fffff80002afc808
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
nt!MiAllocatePagedPoolPages+0x175:
fffff800`028ef5f5 4c0b02          or      r8,qword ptr [rdx] ds:0002:ffff7880`01801008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028fea39 to fffff800028c4740

STACK_TEXT:  
fffff880`0226b3c8 fffff800`028fea39 : 00000000`0000001e ffffffff`c0000005 fffff800`028ef5f5 00000000`00000000 : nt!KeBugCheckEx
fffff880`0226b3d0 fffff800`028c3d82 : fffff880`0226bb98 00000000`00000002 fffff880`0226bc40 ffff7880`01800000 : nt!KiDispatchException+0x1b9
fffff880`0226ba60 fffff800`028c268a : fffff880`00000001 fffffa80`00000001 fffff880`0226be10 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0226bc40 fffff800`028ef5f5 : fffff880`0226bf78 fffff880`01243094 fffff880`0226be10 fffffa80`0195b010 : nt!KiGeneralProtectionFault+0x10a
fffff880`0226bdd0 fffff800`029f5ceb : 00000000`00001800 00000000`00001800 00000000`00000001 00000000`00000000 : nt!MiAllocatePagedPoolPages+0x175
fffff880`0226bef0 fffff800`028d7050 : 00000000`00001800 fffffa80`01832000 00000000`00000001 00000000`00000001 : nt!MiAllocatePoolPages+0x8e2
fffff880`0226c040 fffff800`029f8bfe : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`01832000 : nt!ExpAllocateBigPool+0xb0
fffff880`0226c130 fffff800`02b86865 : 000007ff`3e350000 000007ff`3e350000 00000000`00000001 00000000`00000000 : nt!ExAllocatePoolWithTag+0x82e
fffff880`0226c220 fffff800`02bbd9f1 : fffff8a0`07a019f0 fffff880`0226c430 00000000`00000138 00000000`00000001 : nt!MiRelocateImage+0x345
fffff880`0226c390 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCreateSection+0x825


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiAllocatePagedPoolPages+175
fffff800`028ef5f5 4c0b02          or      r8,qword ptr [rdx]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!MiAllocatePagedPoolPages+175

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!MiAllocatePagedPoolPages+175

BUCKET_ID:  X64_0x1E_c0000005_nt!MiAllocatePagedPoolPages+175

Followup: MachineOwner
---------





Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042511-21528-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02816000 PsLoadedModuleList = 0xfffff800`02a5be90
Debug session time: Mon Apr 25 14:49:25.464 2011 (UTC - 4:00)
System Uptime: 0 days 0:11:28.119
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002b8102e, fffff88006d12d60, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObLogSecurityDescriptor+23f )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002b8102e, Address of the instruction which caused the bugcheck
Arg3: fffff88006d12d60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObLogSecurityDescriptor+23f
fffff800`02b8102e 4c8928          mov     qword ptr [rax],r13

CONTEXT:  fffff88006d12d60 -- (.cxr 0xfffff88006d12d60)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a00bbb74f0
rdx=fffffffffe087990 rsi=fffff8a0014975a0 rdi=000000006d08b8d7
rip=fffff80002b8102e rsp=fffff88006d13740 rbp=fffffa8003bca060
 r8=0000000000000000  r9=0000000000000000 r10=001c000200000030
r11=00000000000000b4 r12=fffff80002a3fca8 r13=fffff8a00bbb74d0
r14=fffff80002a3fcb0 r15=fffff8a009c3ee80
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!ObLogSecurityDescriptor+0x23f:
fffff800`02b8102e 4c8928          mov     qword ptr [rax],r13 ds:002b:00000000`00000000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002b8102e

STACK_TEXT:  
fffff880`06d13740 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObLogSecurityDescriptor+0x23f


FOLLOWUP_IP: 
nt!ObLogSecurityDescriptor+23f
fffff800`02b8102e 4c8928          mov     qword ptr [rax],r13

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObLogSecurityDescriptor+23f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff88006d12d60 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObLogSecurityDescriptor+23f

BUCKET_ID:  X64_0x3B_nt!ObLogSecurityDescriptor+23f

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042511-23322-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02814000 PsLoadedModuleList = 0xfffff800`02a59e90
Debug session time: Mon Apr 25 14:34:41.779 2011 (UTC - 4:00)
System Uptime: 0 days 0:17:34.059
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D3, {fffff88002ccf318, 2, 0, fffff800028a04fb}

Probably caused by : ntkrnlmp.exe ( nt!KiInsertTimerTable+13b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_PORTION_MUST_BE_NONPAGED (d3)
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers marking code or data as pageable when it should be
marked nonpaged.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88002ccf318, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800028a04fb, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac50e8
 fffff88002ccf318 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiInsertTimerTable+13b
fffff800`028a04fb 488b42f8        mov     rax,qword ptr [rdx-8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD3

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  fffff88002528900 -- (.trap 0xfffff88002528900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff88002ccf320 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028a04fb rsp=fffff88002528a90 rbp=fffff80002a0b068
 r8=ffffffffffffffff  r9=00000000000000ef r10=fffff80002a06e80
r11=00000000002f5600 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
nt!KiInsertTimerTable+0x13b:
fffff800`028a04fb 488b42f8        mov     rax,qword ptr [rdx-8] ds:fffff880`02ccf318=ff084b8d48104b89
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002893be9 to fffff80002894640

STACK_TEXT:  
fffff880`025287b8 fffff800`02893be9 : 00000000`0000000a fffff880`02ccf318 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`025287c0 fffff800`02892860 : 00000000`00000003 00000000`00000000 fffffa80`01d45840 fffffa80`01d45900 : nt!KiBugCheckDispatch+0x69
fffff880`02528900 fffff800`028a04fb : 00000000`00000000 fffff800`02b8a900 00000008`00000002 fffff880`02f63180 : nt!KiPageFault+0x260
fffff880`02528a90 fffff800`02899af2 : fffffa80`01d45840 fffffa80`01d45840 00000000`00000000 fffff800`00000000 : nt!KiInsertTimerTable+0x13b
fffff880`02528af0 fffff800`0289b1a2 : 00000000`00000001 00000000`00000000 00000000`000000ef fffff880`02528ca0 : nt!KiCommitThreadWait+0x332
fffff880`02528b80 fffff800`02b8aa2e : fffffa80`01d45840 fffff800`02893793 00000000`0197fd00 00000000`000000ef : nt!KeDelayExecutionThread+0x186
fffff880`02528bf0 fffff800`028938d3 : fffffa80`01d45840 00000000`0000020c ffffffff`ffffd8f0 fffffa80`03b151b0 : nt!NtDelayExecution+0x59
fffff880`02528c20 00000000`73862e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0197ed78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73862e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiInsertTimerTable+13b
fffff800`028a04fb 488b42f8        mov     rax,qword ptr [rdx-8]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiInsertTimerTable+13b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0xD3_nt!KiInsertTimerTable+13b

BUCKET_ID:  X64_0xD3_nt!KiInsertTimerTable+13b

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`00f15000 fffff880`00f6c000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`03efd000 fffff880`03f86000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`03ee2000 fffff880`03ef8000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0411d000 fffff880`04132000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c47000 fffff880`00c52000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`1103d000 fffff880`11045000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`040f1000 fffff880`040f7000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`040eb000 fffff880`040f1000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`00c14000 fffff880`00c1d000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c1d000 fffff880`00c47000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff960`00980000 fffff960`009e1000   ATMFD    ATMFD.DLL    Sat Feb 19 04:00:32 2011 (4D5F86B0)
fffff880`0165b000 fffff880`01662000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`040da000 fffff880`040eb000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`01fb2000 fffff880`01fd0000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`006f0000 fffff960`00717000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`01600000 fffff880`0161d000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`01628000 fffff880`01652000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cd7000 fffff880`00d97000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`019ba000 fffff880`019ea000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c79000 fffff880`00cd7000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01119000 fffff880`0118b000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`03ed2000 fffff880`03ee2000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`05704000 fffff880`0570d000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`05b39000 fffff880`05b41000   cpuz_x64 cpuz_x64.sys Tue Oct 07 15:44:27 2008 (48EBBC1B)
fffff880`013ec000 fffff880`013fa000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04039000 fffff880`040bc000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`040bc000 fffff880`040da000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`03ec3000 fffff880`03ed2000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`019a4000 fffff880`019ba000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045b3000 fffff880`045d5000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0444d000 fffff880`04456000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ded000 fffff880`00df9000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01e86000 fffff880`01e99000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`019ea000 fffff880`019f6000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`11cec000 fffff880`11de0000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`04132000 fffff880`04178000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`010a7000 fffff880`010bb000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0105b000 fffff880`010a7000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`013d5000 fffff880`013df000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0196a000 fffff880`019a4000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01867000 fffff880`018b1000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`02e03000 fffff800`02e4c000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`04000000 fffff880`04024000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`04400000 fffff880`04419000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`04419000 fffff880`04421080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`045f2000 fffff880`04600000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`01ee9000 fffff880`01fb2000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01961000 fffff880`0196a000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`044b7000 fffff880`044c6000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0443f000 fffff880`0444d000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00b9c000 fffff800`00ba6000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`044d7000 fffff880`0451a000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`013a9000 fffff880`013c4000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`043f7000 fffff880`043fc200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`01ebc000 fffff880`01ed1000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01e99000 fffff880`01ebc000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c58000 fffff880`00c65000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05b2b000 fffff880`05b39000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`044c6000 fffff880`044d5000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04422000 fffff880`0442f000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d97000 fffff880`00db1000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`01fd0000 fffff880`01fe8000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`01e00000 fffff880`01e2d000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`01e2d000 fffff880`01e7a000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`056e0000 fffff880`05704000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`015e2000 fffff880`015ed000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f75000 fffff880`00f7f000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010bb000 fffff880`01119000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`03eb8000 fffff880`03ec3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0194f000 fffff880`01961000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014e6000 fffff880`015d9000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`0402d000 fffff880`04039000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`011d1000 fffff880`01200000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`0459e000 fffff880`045b3000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`03e00000 fffff880`03e0f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03f86000 fffff880`03fcb000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`015ed000 fffff880`015fe000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03eac000 fffff880`03eb8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02819000 fffff800`02e03000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01206000 fffff880`013a9000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`01652000 fffff880`0165b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0452c000 fffff880`04544000   nusb3hub nusb3hub.sys Thu Jan 21 22:22:18 2010 (4B5919EA)
fffff880`11000000 fffff880`11030000   nusb3xhc nusb3xhc.sys Thu Jan 21 22:22:21 2010 (4B5919ED)
fffff880`11cea000 fffff880`11ceb180   nvBridge nvBridge.kmd Thu Apr 07 23:14:49 2011 (4D9E7DA9)
fffff880`11045000 fffff880`11ce9300   nvlddmkm nvlddmkm.sys Thu Apr 07 23:22:12 2011 (4D9E7F64)
fffff880`03fd4000 fffff880`03ffa000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`041df000 fffff880`041fc000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00fbf000 fffff880`00fd4000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f7f000 fffff880`00fb2000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00fe9000 fffff880`00ff0000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00ff0000 fffff880`01000000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013c4000 fffff880`013d5000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0570d000 fffff880`057b3000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0442f000 fffff880`0443f000   point64  point64.sys  Fri Apr 08 18:58:14 2011 (4D9F9306)
fffff880`043ba000 fffff880`043f7000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c65000 fffff880`00c79000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`011ad000 fffff880`011d1000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`04456000 fffff880`04471000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04471000 fffff880`04492000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`04492000 fffff880`044ac000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03e5b000 fffff880`03eac000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`044ac000 fffff880`044b7000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`014ce000 fffff880`014d7000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`014d7000 fffff880`014e0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015d9000 fffff880`015e2000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01915000 fffff880`0194f000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`01ed1000 fffff880`01ee9000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04178000 fffff880`041df000   Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`057b3000 fffff880`057be000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`11df1000 fffff880`11dfd000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03e0f000 fffff880`03e2c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0190d000 fffff880`01915000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05b41000 fffff880`05bb2000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`05a93000 fffff880`05b2b000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`05612000 fffff880`0567c000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`057be000 fffff880`057ef000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`044d5000 fffff880`044d6480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01663000 fffff880`01867000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`05600000 fffff880`05612000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`013df000 fffff880`013ec000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`0118b000 fffff880`011ad000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`03e47000 fffff880`03e5b000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00430000 fffff960`0043a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`040f7000 fffff880`0411d000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`0451a000 fffff880`0452c000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`045d5000 fffff880`045f2000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`11030000 fffff880`11031f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`11de0000 fffff880`11df1000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`04544000 fffff880`0459e000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`11032000 fffff880`1103d000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`01000000 fffff880`01056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00fb2000 fffff880`00fbf000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0148b000 fffff880`01499000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04203000 fffff880`043ba000   viahduaa viahduaa.sys Sat May 15 06:22:39 2010 (4BEE75EF)
fffff880`01499000 fffff880`014be000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00db1000 fffff880`00ded000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`018b1000 fffff880`018c1000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00fd4000 fffff880`00fe9000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`018c1000 fffff880`0190d000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`03e2c000 fffff880`03e47000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`014be000 fffff880`014ce000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e62000 fffff880`00f06000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f06000 fffff880`00f15000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03fcb000 fffff880`03fd4000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`00392000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`00c00000 fffff880`00c14000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`04024000 fffff880`0402d000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f6c000 fffff880`00f75000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`019ea000 fffff880`019f8000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01600000 fffff880`0160c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0160c000 fffff880`01615000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01615000 fffff880`01628000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Thanks for all your help, but it just seems so incredibly unlikely that I would have gotten four new sticks of ram that are all broken. The computer has crashed more than once with each and every single stick used by themselves - one at a time. I suppose it's not impossible that the store I bought them from would have suffered some enormous electromagnetic incident that destroyed all of their ram, but I think they would have mentioned it the last time I was in there.

What would be the second most likely cause?
 
I already said: it could be some issue with the motherboard, such as a physical defect OR incompatibility with the RAM.

Reinstall the system. Then try another motherboard/RAM.
 
Back
Top