BSOD system_service_exception

Joined
Dec 7, 2010
Messages
3
Reaction score
0
Hey i just recently built my PC and after awhile i started getting the BSOD saying
"system_service_exception"
the crashes happen at random times and somtimes during and after im playing counter strike:source or any games
im not very tech savy sso any ideas??

i get this message after the crash i dont know if it'll help


Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7600.2.0.0.768.3
Locale ID: 1033

Additional information about the problem:
BCCode: 1e
BCP1: 0000000000000000
BCP2: 0000000000000000
BCP3: 0000000000000000
BCP4: 0000000000000000
OS Version: 6_1_7600
Service Pack: 0_0
Product: 768_1
--------------------------------------------------------------------------------------------------------------------------------------
Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7600.2.0.0.768.3
Locale ID: 1033

Additional information about the problem:
BCCode: 24
BCP1: 00000000001904FB
BCP2: FFFFF88007B6C048
BCP3: FFFFF88007B6B8B0
BCP4: FFFFF80002CD2CF0
OS Version: 6_1_7600
Service Pack: 0_0
Product: 768_1
----------------------------------------------------------------------------------------------------------------------------------------------------------------
my computer specs.
MB: Asus M4A785TD-M Evo 785G RT
CPU: AMD Phenom II X2 555 Processor 3.21 GHz
RAM: 4GB OCZ
Graphics Card: VGA SAPPHIRE Radeon 5770
OS: Windows 7 x64 bit
 

Attachments

Last edited:
Joined
Sep 19, 2010
Messages
87
Reaction score
12
I don't really know how to analyze dumps but from what I have observed, people will just tell you to update your drivers.

Try checking your RAM voltage. Sometimes, the default 'auto' setting for your RAM voltage in the BIOS is wrong and you will have to manually set it yourself. Google up your RAM (exact brand and model) and look for the right voltage for your RAM then set it up in the BIOS yourself.

If that doesn't fix it, try running memtest86+. You may have some bad RAM.
 
Joined
Dec 7, 2010
Messages
3
Reaction score
0
i tried updating the drivers but only 2 can not install. i have no idea why..
changing the voltage didnt help it crashed again with the same message.
 
Joined
Sep 19, 2010
Messages
87
Reaction score
12
You sure you used the correct voltage?

If yes, then you may have bad RAM and you may need to have it replaced. Check it with memtest86+, one RAM stick at a time if you have to. Since it's brand new, I assume the warranty is still in effect.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
AVG's bugging out through tcpip.


Remove AVG using the official tool:

AVGIDSDriver AVGIDSDriver.Sys Tue Aug 03 18:24:45 2010

http://www.avg.com/ww-en/download-tools



Install MSE:

http://www.microsoft.com/security_essentials/



Update Realtek NDIS:

RtNdPt60.sys Mon Dec 10 21:49:52 2007


Update Realtek 8136/8168/8169:

Rt64win7.sys Thu Aug 20 12:05:06 2009


Check if there are any updates for your VIA Audio.




Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120610-26473-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c50000 PsLoadedModuleList = 0xfffff800`02e8de50
Debug session time: Mon Dec  6 22:05:31.264 2010 (UTC - 5:00)
System Uptime: 0 days 0:02:04.622
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff960000c7cec, fffff880034d7d40, 0}

Probably caused by : win32k.sys ( win32k!MAPPER::bNearMatch+14c )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960000c7cec, Address of the instruction which caused the bugcheck
Arg3: fffff880034d7d40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
win32k!MAPPER::bNearMatch+14c
fffff960`000c7cec 8a422d          mov     al,byte ptr [rdx+2Dh]

CONTEXT:  fffff880034d7d40 -- (.cxr 0xfffff880034d7d40)
rax=fffff900c06b9310 rbx=fffff880034d8840 rcx=0000000000000000
rdx=bffff900c06b9680 rsi=fffff880034d87e0 rdi=000000004426111d
rip=fffff960000c7cec rsp=fffff880034d8720 rbp=0000000000000000
 r8=fffff900c59a7124  r9=0000000001000080 r10=0000000000000001
r11=fffff900c009bb88 r12=0000000000000001 r13=fffff900c06b9310
r14=0000000000000000 r15=fffff880034d87e8
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
win32k!MAPPER::bNearMatch+0x14c:
fffff960`000c7cec 8a422d          mov     al,byte ptr [rdx+2Dh] ds:002b:bffff900`c06b96ad=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  VDeck.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff960000c7cec

STACK_TEXT:  
fffff880`034d8720 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!MAPPER::bNearMatch+0x14c


FOLLOWUP_IP: 
win32k!MAPPER::bNearMatch+14c
fffff960`000c7cec 8a422d          mov     al,byte ptr [rdx+2Dh]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!MAPPER::bNearMatch+14c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc5e0

STACK_COMMAND:  .cxr 0xfffff880034d7d40 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_win32k!MAPPER::bNearMatch+14c

BUCKET_ID:  X64_0x3B_win32k!MAPPER::bNearMatch+14c

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120610-24804-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c1d000 PsLoadedModuleList = 0xfffff800`02e5ae50
Debug session time: Mon Dec  6 16:20:16.796 2010 (UTC - 5:00)
System Uptime: 0 days 0:50:05.279
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : tcpip.sys ( tcpip!Ipv6pInterfaceSetTimeout+80 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+3538336635646631
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000b9c228 -- (.exr 0xfffff80000b9c228)
ExceptionAddress: fffff8800165990b (tcpip!Ipv6pInterfaceSetTimeout+0x0000000000000080)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000b9c2d0 -- (.trap 0xfffff80000b9c2d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000011 rbx=0000000000000000 rcx=fffffa8005830cb0
rdx=fffffa8005837de0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800165990b rsp=fffff80000b9c460 rbp=fffffa8004800090
 r8=fffff80000b9c310  r9=0000000000001779 r10=fffff80002c1d000
r11=fffffa8005671070 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
tcpip!Ipv6pInterfaceSetTimeout+0x80:
fffff880`0165990b f041834424e801  lock add dword ptr [r12-18h],1 ds:ffffffff`ffffffe8=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c86c2e to fffff80002c8eed0

STACK_TEXT:  
fffff800`00b9b308 fffff800`02c86c2e : fffffa80`06402030 00000000`00000000 fffff800`00b9ba80 fffff800`02cbbe28 : nt!KeBugCheck
fffff800`00b9b310 fffff800`02cb4bed : fffff800`02e9bc24 fffff800`02dd4a3c fffff800`02c1d000 fffff800`00b9c228 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00b9b340 fffff800`02cbc250 : fffff800`02ddcb5c fffff800`00b9b3b8 fffff800`00b9c228 fffff800`02c1d000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b9b370 fffff800`02cc91b5 : fffff800`00b9c228 fffff800`00b9ba80 fffff800`00000000 00000000`00000006 : nt!RtlDispatchException+0x410
fffff800`00b9ba50 fffff800`02c8e542 : fffff800`00b9c228 00000000`00000000 fffff800`00b9c2d0 fffffa80`05830f64 : nt!KiDispatchException+0x135
fffff800`00b9c0f0 fffff800`02c8ce4a : fffffa80`05172260 fffff880`0165a2a0 fffffa80`056887e1 fffff880`0165a2a0 : nt!KiExceptionDispatch+0xc2
fffff800`00b9c2d0 fffff880`0165990b : 00000000`00000000 fffffa80`04800088 fffffa80`04800090 fffffa80`04800028 : nt!KiGeneralProtectionFault+0x10a
fffff800`00b9c460 fffff880`0165a488 : fffffa80`04800088 fffffa80`04800028 00000000`00000000 fffff800`00b9c600 : tcpip!Ipv6pInterfaceSetTimeout+0x80
fffff800`00b9c4d0 fffff880`01659339 : 00000000`00000000 fffff800`00b9c600 00000000`00000001 fffff800`02c939fa : tcpip!IppCompartmentSetTimeout+0x88
fffff800`00b9c540 fffff800`02c9afa6 : fffff800`02e15c40 00000000`00000000 00000000`40a40000 00000000`00000001 : tcpip!IppTimeout+0x89
fffff800`00b9c570 fffff800`02c9a326 : fffffa80`05ac9168 fffffa80`05ac9168 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`00b9c5e0 fffff800`02c9ae7e : 00000006`ff494825 fffff800`00b9cc58 00000000`0002f084 fffff800`02e0b308 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cc30 fffff800`02c9a697 : 00000002`325a0fc3 00000002`0002f084 00000002`325a0fa2 00000000`00000084 : nt!KiTimerExpiration+0x1be
fffff800`00b9ccd0 fffff800`02c976fa : fffff800`02e07e80 fffff800`02e15c40 00000000`00000000 fffff880`014b4c50 : nt!KiRetireDpcList+0x277
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tcpip!Ipv6pInterfaceSetTimeout+80
fffff880`0165990b f041834424e801  lock add dword ptr [r12-18h],1

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  tcpip!Ipv6pInterfaceSetTimeout+80

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc26e

FAILURE_BUCKET_ID:  X64_0x1E_0_tcpip!Ipv6pInterfaceSetTimeout+80

BUCKET_ID:  X64_0x1E_0_tcpip!Ipv6pInterfaceSetTimeout+80

Followup: MachineOwner
---------


























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120610-33353-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c0f000 PsLoadedModuleList = 0xfffff800`02e4ce50
Debug session time: Mon Dec  6 22:02:38.680 2010 (UTC - 5:00)
System Uptime: 0 days 0:22:32.162
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002c5d519, fffff88001f89f00, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiInsertQueueApc+171 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c5d519, Address of the instruction which caused the bugcheck
Arg3: fffff88001f89f00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!KiInsertQueueApc+171
fffff800`02c5d519 48894108        mov     qword ptr [rcx+8],rax

CONTEXT:  fffff88001f89f00 -- (.cxr 0xfffff88001f89f00)
rax=fffffa8005400c00 rbx=fffffa80041a5b60 rcx=fefffa8006f12700
rdx=fffffa80041a5bb0 rsi=0000000000000000 rdi=fffff880009e9180
rip=fffff80002c5d519 rsp=fffff88001f8a8e0 rbp=fffff80002df9e80
 r8=0000000000000000  r9=fffffa80041a5bb0 r10=fffff80002dfa800
r11=fffff88001f8aa00 r12=0000000000000000 r13=0000000000000000
r14=fffffa8005929c70 r15=0000000000000002
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!KiInsertQueueApc+0x171:
fffff800`02c5d519 48894108        mov     qword ptr [rcx+8],rax ds:002b:fefffa80`06f12708=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  avgcsrva.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002c5d519

STACK_TEXT:  
fffff880`01f8a8e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInsertQueueApc+0x171


FOLLOWUP_IP: 
nt!KiInsertQueueApc+171
fffff800`02c5d519 48894108        mov     qword ptr [rcx+8],rax

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiInsertQueueApc+171

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

STACK_COMMAND:  .cxr 0xfffff88001f89f00 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiInsertQueueApc+171

BUCKET_ID:  X64_0x3B_nt!KiInsertQueueApc+171






fffff880`04787000 fffff880`047c5000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ecf000 fffff880`00f26000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03877000 fffff880`03901000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03a25000 fffff880`03a3b000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03aea000 fffff880`03aff000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e64000 fffff880`00e6f000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0461d000 fffff880`04625000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`03abe000 fffff880`03ac4000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`03ab8000 fffff880`03abe000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`07153000 fffff880`0715e000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00e31000 fffff880`00e3a000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e3a000 fffff880`00e64000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04bd2000 fffff880`04bf2000   AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
fffff880`03c08000 fffff880`043fd000   atikmdag atikmdag.sys Tue Oct 26 22:29:53 2010 (4CC78EA1)
fffff880`03aff000 fffff880`03b4a000   atikmpag atikmpag.sys Tue Oct 26 22:14:23 2010 (4CC78AFF)
fffff880`015f7000 fffff880`015ff000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`0614f000 fffff880`06183000   AVGIDSDriver AVGIDSDriver.Sys Tue Aug 03 18:24:45 2010 (4C58972D)
fffff880`01216000 fffff880`01220000   AVGIDSEH AVGIDSEH.Sys Mon Sep 13 18:46:38 2010 (4C8EA9CE)
fffff880`03670000 fffff880`0367c000   AVGIDSFilter AVGIDSFilter.Sys Tue Aug 03 18:23:21 2010 (4C5896D9)
fffff880`03a69000 fffff880`03ab8000   avgldx64 avgldx64.sys Mon Sep 06 20:49:29 2010 (4C858C19)
fffff880`02a58000 fffff880`02a67000   avgmfx64 avgmfx64.sys Mon Sep 06 20:49:14 2010 (4C858C0A)
fffff880`015ed000 fffff880`015f7000   avgrkx64 avgrkx64.sys Mon Sep 06 20:49:37 2010 (4C858C21)
fffff880`02b1c000 fffff880`02b7d000   avgtdia  avgtdia.sys  Tue Nov 09 15:13:33 2010 (4CD9AB6D)
fffff880`02a70000 fffff880`02a77000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0382d000 fffff880`0383e000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0378c000 fffff880`037aa000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00670000 fffff960`00697000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`02a2e000 fffff880`02a58000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c82000 fffff880`00d42000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`011cb000 fffff880`011fb000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c24000 fffff880`00c82000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`012a1000 fffff880`01314000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03a15000 fffff880`03a25000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05a00000 fffff880`05a0e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`05be5000 fffff880`05be7f00   dadder   dadder.sys   Mon Apr 19 05:04:42 2010 (4BCC1CAA)
fffff880`0380f000 fffff880`0382d000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03800000 fffff880`0380f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01200000 fffff880`01216000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04a3d000 fffff880`04a5f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05a1a000 fffff880`05a23000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05a0e000 fffff880`05a1a000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05a23000 fffff880`05a36000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04a65000 fffff880`04a71000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04629000 fffff880`0471d000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`0471d000 fffff880`04763000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00ebb000 fffff880`00ecf000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00e6f000 fffff880`00ebb000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01325000 fffff880`0132f000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`013b5000 fffff880`013ef000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`047e1000 fffff880`047ee000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`031ec000 fffff800`03235000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04763000 fffff880`04787000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04ac0000 fffff880`04ad9000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04ad9000 fffff880`04ae1080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05be8000 fffff880`05bf6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`036c4000 fffff880`0378c000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015e4000 fffff880`015ed000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03bdf000 fffff880`03bfd000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`047ee000 fffff880`047fd000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04bc4000 fffff880`04bd2000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba8000 fffff800`00bb2000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04af3000 fffff880`04b36000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01287000 fffff880`012a1000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`04a5f000 fffff880`04a64200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0368b000 fffff880`036a0000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04a7f000 fffff880`04aa2000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c03000 fffff880`00c10000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`04a71000 fffff880`04a7f000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04ae2000 fffff880`04af1000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04bb7000 fffff880`04bc4000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e17000 fffff880`00e31000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`037aa000 fffff880`037c2000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`037c2000 fffff880`037ee000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`03600000 fffff880`0364d000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`0364d000 fffff880`03670000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`02ad5000 fffff880`02ae0000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f2f000 fffff880`00f39000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01229000 fffff880`01287000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`039e8000 fffff880`039f3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`014dd000 fffff880`014ef000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014f2000 fffff880`015e4000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0383e000 fffff880`0384a000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02bc2000 fffff880`02bf1000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04ba2000 fffff880`04bb7000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03930000 fffff880`0393f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02b7d000 fffff880`02bc2000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02ae0000 fffff880`02af1000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`039dc000 fffff880`039e8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c0f000 fffff800`031ec000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01028000 fffff880`011cb000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02a67000 fffff880`02a70000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0390a000 fffff880`03930000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04600000 fffff880`0461d000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f79000 fffff880`00f8e000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f39000 fffff880`00f6c000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e00000 fffff880`00e07000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e07000 fffff880`00e17000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01314000 fffff880`01325000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0605f000 fffff880`06105000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04a00000 fffff880`04a3d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c10000 fffff880`00c24000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03a3b000 fffff880`03a5f000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0384a000 fffff880`03865000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`02a00000 fffff880`02a21000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04aa4000 fffff880`04abe000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0398b000 fffff880`039dc000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02aba000 fffff880`02ac3000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02ac3000 fffff880`02acc000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02acc000 fffff880`02ad5000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0137b000 fffff880`013b5000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`036a0000 fffff880`036b8000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03b4a000 fffff880`03b89000   Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
fffff880`036b8000 fffff880`036c4000   RtNdPt60 RtNdPt60.sys Mon Dec 10 21:49:52 2007 (475DFAD0)
fffff880`06105000 fffff880`06110000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03a00000 fffff880`03a0c000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0393f000 fffff880`0395c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`014d5000 fffff880`014dd000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07019000 fffff880`070b1000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`06183000 fffff880`061ec000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`06110000 fffff880`0613d000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`04af1000 fffff880`04af2480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`0613d000 fffff880`0614f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02b0f000 fffff880`02b1c000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02af1000 fffff880`02b0f000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03977000 fffff880`0398b000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00590000 fffff960`0059a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03ac4000 fffff880`03aea000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04b36000 fffff880`04b48000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05bf6000 fffff880`05bf7f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`047d0000 fffff880`047e1000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04b48000 fffff880`04ba2000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`047c5000 fffff880`047d0000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03b89000 fffff880`03bdf000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f6c000 fffff880`00f79000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02a77000 fffff880`02a85000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04abe000 fffff880`04abfd80   vHidDev  vHidDev.sys  Mon Dec 21 08:49:58 2009 (4B2F7D06)
fffff880`05a37000 fffff880`05be5000   viahduaa viahduaa.sys Mon Jan 11 05:05:18 2010 (4B4AF7DE)
fffff880`02a85000 fffff880`02aaa000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f8e000 fffff880`00fa3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00fa3000 fffff880`00fff000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0132f000 fffff880`0137b000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`0395c000 fffff880`03977000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02aaa000 fffff880`02aba000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d42000 fffff880`00de6000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00de6000 fffff880`00df5000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03901000 fffff880`0390a000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000d0000 fffff960`003df000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`03a0c000 fffff880`03a15000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f26000 fffff880`00f2f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01000000 fffff880`01021000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`0715e000 fffff880`071cf000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`070e2000 fffff880`07153000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`070b1000 fffff880`070e2000   AODDriver.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`013ef000 fffff880`013fd000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01000000 fffff880`0100c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01220000 fffff880`01229000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`0100c000 fffff880`0101f000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
120710-21746-01.dmp
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed
Probably caused by : atikmpag.sys

120710-30435-01.dmp
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
PROCESS_NAME: System
Probably caused by : ntkrnlmp.exe

120710-28095-01.dmp
SYSTEM_SERVICE_EXCEPTION (3b)
PROCESS_NAME: avgwdsvc.exe
Probably caused by : ntkrnlmp.exe

120710-18595-01.dmp
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses
Probably caused by : memory_corruption

120710-24944-01.dmp
NTFS_FILE_SYSTEM (24)
Probably caused by : Ntfs.sys


0x116 - video card failure due to a physical damage, driver, or overclocking
0x24 - ntfs error, can be due to a broken ntfs or a memory damage


What I suggest:

1. Run memtest 10 passes overnight: https://www.w7forums.com/memtest86-memory-testing-t9067.html#post71124

2. If the memtest doesn't show errors:

reinstall the video card driver. Use Driver Sweeper before installing a new one. Run Furmark for a short while whatching that the GPU does not exceed the recommended temperature (70-80 degrees Celcius):

Furmark

~~~~~~~~~~

Your most recent crash 120710-24944-01.dmp shows you removed AVG, which was the right thing to do. These drivers have not been updated though:

Realtek NDIS
RtNdPt60.sys Mon Dec 10 21:49:52 2007

Realtek 8136/8168/8169
Rt64win7.sys Thu Aug 20 12:05:06 2009



Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120710-21746-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4f000 PsLoadedModuleList = 0xfffff800`02e8ce50
Debug session time: Tue Dec  7 18:08:29.837 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:33.336
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 116, {fffffa8005167010, fffff88003cc8fb8, 0, d}

*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : atikmpag.sys ( atikmpag+6fb8 )

Followup: MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa8005167010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff88003cc8fb8, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 000000000000000d, Optional internal context dependent data.

Debugging Details:
------------------


FAULTING_IP: 
atikmpag+6fb8
fffff880`03cc8fb8 4883ec28        sub     rsp,28h

DEFAULT_BUCKET_ID:  GRAPHICS_DRIVER_TDR_FAULT

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x116

PROCESS_NAME:  System

CURRENT_IRQL:  0

STACK_TEXT:  
fffff880`0366d9c8 fffff880`048f9ef8 : 00000000`00000116 fffffa80`05167010 fffff880`03cc8fb8 00000000`00000000 : nt!KeBugCheckEx
fffff880`0366d9d0 fffff880`048f9c7f : fffff880`03cc8fb8 fffffa80`05167010 fffffa80`03c07950 fffffa80`03eb2410 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`0366da10 fffff880`049a0f07 : fffffa80`05167010 00000000`00000000 fffffa80`03c07950 fffffa80`03eb2410 : dxgkrnl!TdrIsRecoveryRequired+0x21f
fffff880`0366da40 fffff880`049cab75 : 00000000`ffffffff 00000000`000016cb 00000000`00000000 00000000`00000002 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`0366db20 fffff880`049c92bb : 00000000`00000102 00000000`00000001 00000000`000016cb 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x71
fffff880`0366db50 fffff880`0499c2c6 : ffffffff`ff676980 fffffa80`03eb2410 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1fb
fffff880`0366dbf0 fffff880`049c8e7a : 00000000`00000000 fffffa80`03fc05a0 00000000`00000080 fffffa80`03eb2410 : dxgmms1!VidSchiScheduleCommandToRun+0x1da
fffff880`0366dd00 fffff800`02f63c06 : 00000000`fffffc32 fffffa80`03f67b60 fffffa80`018c5040 fffffa80`03f67b60 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`0366dd40 fffff800`02c9dc26 : fffff880`009e9180 fffffa80`03f67b60 fffffa80`0311a670 65652b4d`467a7339 : nt!PspSystemThreadStartup+0x5a
fffff880`0366dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  .bugcheck ; kb

FOLLOWUP_IP: 
atikmpag+6fb8
fffff880`03cc8fb8 4883ec28        sub     rsp,28h

SYMBOL_NAME:  atikmpag+6fb8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmpag

IMAGE_NAME:  atikmpag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc78aff

FAILURE_BUCKET_ID:  X64_0x116_IMAGE_atikmpag.sys

BUCKET_ID:  X64_0x116_IMAGE_atikmpag.sys

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120710-30435-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
Debug session time: Tue Dec  7 17:59:17.465 2010 (UTC - 5:00)
System Uptime: 0 days 0:07:10.964
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff80002c8e0d6, fffff880031ea8d8, fffff880031ea140}

Probably caused by : ntkrnlmp.exe ( nt!KiInsertTimerTable+c6 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002c8e0d6, The address that the exception occurred at
Arg3: fffff880031ea8d8, Exception Record Address
Arg4: fffff880031ea140, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!KiInsertTimerTable+c6
fffff800`02c8e0d6 4c894008        mov     qword ptr [rax+8],r8

EXCEPTION_RECORD:  fffff880031ea8d8 -- (.exr 0xfffff880031ea8d8)
ExceptionAddress: fffff80002c8e0d6 (nt!KiInsertTimerTable+0x00000000000000c6)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880031ea140 -- (.cxr 0xfffff880031ea140)
rax=fefffa8001a869a8 rbx=fffffa8003207100 rcx=00000001650e4fe7
rdx=fffffa8001a393a0 rsi=00000000000006e0 rdi=fffff80002dfbe80
rip=fffff80002c8e0d6 rsp=fffff880031eab10 rbp=fffffa8003d5cb40
 r8=fffffa8003207120  r9=0000000000000027 r10=fffff80002dfbe80
r11=fffffa8003207300 r12=fffff80002dfe768 r13=0000000000000001
r14=0000000000000000 r15=000000026680acb8
iopl=0         nv up ei pl nz ac pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010212
nt!KiInsertTimerTable+0xc6:
fffff800`02c8e0d6 4c894008        mov     qword ptr [rax+8],r8 ds:002b:fefffa80`01a869b0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
 ffffffffffffffff 

FOLLOWUP_IP: 
nt!KiInsertTimerTable+c6
fffff800`02c8e0d6 4c894008        mov     qword ptr [rax+8],r8

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff80002c88af2 to fffff80002c8e0d6

STACK_TEXT:  
fffff880`031eab10 fffff800`02c88af2 : fffffa80`03207040 fffffa80`03207040 fffffa80`00000000 00000000`00000000 : nt!KiInsertTimerTable+0xc6
fffff880`031eab70 fffff800`02c8c2a1 : 00000000`00000002 fffffa80`04f9c340 00000000`00000027 00000000`00000000 : nt!KiCommitThreadWait+0x332
fffff880`031eac00 fffff800`02c8e939 : fffff800`02e26500 fffff880`01012560 fffffa80`01b614d8 00000000`00000002 : nt!KeRemoveQueueEx+0x301
fffff880`031eacb0 fffff800`02f25c06 : 00000000`0371b527 fffffa80`03207040 00000000`00000080 fffffa80`018df9e0 : nt!ExpWorkerThread+0xe9
fffff880`031ead40 fffff800`02c5fc26 : fffff800`02dfbe80 fffffa80`03207040 fffff800`02e09c40 fffff880`0124c534 : nt!PspSystemThreadStartup+0x5a
fffff880`031ead80 00000000`00000000 : fffff880`031eb000 fffff880`031e5000 fffff880`031ea9f0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiInsertTimerTable+c6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff880031ea140 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_nt!KiInsertTimerTable+c6

BUCKET_ID:  X64_0x7E_nt!KiInsertTimerTable+c6

Followup: MachineOwner

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002c8e0d6, The address that the exception occurred at
Arg3: fffff880031ea8d8, Exception Record Address
Arg4: fffff880031ea140, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!KiInsertTimerTable+c6
fffff800`02c8e0d6 4c894008        mov     qword ptr [rax+8],r8

EXCEPTION_RECORD:  fffff880031ea8d8 -- (.exr 0xfffff880031ea8d8)
ExceptionAddress: fffff80002c8e0d6 (nt!KiInsertTimerTable+0x00000000000000c6)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880031ea140 -- (.cxr 0xfffff880031ea140)
rax=fefffa8001a869a8 rbx=fffffa8003207100 rcx=00000001650e4fe7
rdx=fffffa8001a393a0 rsi=00000000000006e0 rdi=fffff80002dfbe80
rip=fffff80002c8e0d6 rsp=fffff880031eab10 rbp=fffffa8003d5cb40
 r8=fffffa8003207120  r9=0000000000000027 r10=fffff80002dfbe80
r11=fffffa8003207300 r12=fffff80002dfe768 r13=0000000000000001
r14=0000000000000000 r15=000000026680acb8
iopl=0         nv up ei pl nz ac pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010212
nt!KiInsertTimerTable+0xc6:
fffff800`02c8e0d6 4c894008        mov     qword ptr [rax+8],r8 ds:002b:fefffa80`01a869b0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS:  ffffffffffffffff 

FOLLOWUP_IP: 
nt!KiInsertTimerTable+c6
fffff800`02c8e0d6 4c894008        mov     qword ptr [rax+8],r8

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff80002c88af2 to fffff80002c8e0d6

STACK_TEXT:  
fffff880`031eab10 fffff800`02c88af2 : fffffa80`03207040 fffffa80`03207040 fffffa80`00000000 00000000`00000000 : nt!KiInsertTimerTable+0xc6
fffff880`031eab70 fffff800`02c8c2a1 : 00000000`00000002 fffffa80`04f9c340 00000000`00000027 00000000`00000000 : nt!KiCommitThreadWait+0x332
fffff880`031eac00 fffff800`02c8e939 : fffff800`02e26500 fffff880`01012560 fffffa80`01b614d8 00000000`00000002 : nt!KeRemoveQueueEx+0x301
fffff880`031eacb0 fffff800`02f25c06 : 00000000`0371b527 fffffa80`03207040 00000000`00000080 fffffa80`018df9e0 : nt!ExpWorkerThread+0xe9
fffff880`031ead40 fffff800`02c5fc26 : fffff800`02dfbe80 fffffa80`03207040 fffff800`02e09c40 fffff880`0124c534 : nt!PspSystemThreadStartup+0x5a
fffff880`031ead80 00000000`00000000 : fffff880`031eb000 fffff880`031e5000 fffff880`031ea9f0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiInsertTimerTable+c6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff880031ea140 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_nt!KiInsertTimerTable+c6

BUCKET_ID:  X64_0x7E_nt!KiInsertTimerTable+c6

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120710-28095-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5f000 PsLoadedModuleList = 0xfffff800`02e9ce50
Debug session time: Tue Dec  7 00:52:07.130 2010 (UTC - 5:00)
System Uptime: 0 days 0:18:50.628
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002cab42a, fffff88005b0bda0, 0}

Probably caused by : ntkrnlmp.exe ( nt!AlpcpQueueIoCompletionPort+20a )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cab42a, Address of the instruction which caused the bugcheck
Arg3: fffff88005b0bda0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!AlpcpQueueIoCompletionPort+20a
fffff800`02cab42a f0490fbaae9044000000 lock bts qword ptr [r14+4490h],0

CONTEXT:  fffff88005b0bda0 -- (.cxr 0xfffff88005b0bda0)
rax=fffffa800412c3b0 rbx=fffffa800412c3b0 rcx=0000000000000001
rdx=fffffa8001dde988 rsi=fffff80002e49e80 rdi=fffffa80040c9820
rip=fffff80002cab42a rsp=fffff88005b0c770 rbp=0000000000000000
 r8=fffffa8003bf9168  r9=0000000000000000 r10=0000000600000001
r11=0000000000000000 r12=fffffa800412c3b8 r13=fffffa8001dde880
r14=fefff880009e9180 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!AlpcpQueueIoCompletionPort+0x20a:
fffff800`02cab42a f0490fbaae9044000000 lock bts qword ptr [r14+4490h],0 ds:002b:fefff880`009ed610=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  avgwdsvc.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002cab42a

STACK_TEXT:  
fffff880`05b0c770 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpQueueIoCompletionPort+0x20a


FOLLOWUP_IP: 
nt!AlpcpQueueIoCompletionPort+20a
fffff800`02cab42a f0490fbaae9044000000 lock bts qword ptr [r14+4490h],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!AlpcpQueueIoCompletionPort+20a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88005b0bda0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!AlpcpQueueIoCompletionPort+20a

BUCKET_ID:  X64_0x3B_nt!AlpcpQueueIoCompletionPort+20a

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120710-18595-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c55000 PsLoadedModuleList = 0xfffff800`02e92e50
Debug session time: Tue Dec  7 19:29:36.105 2010 (UTC - 5:00)
System Uptime: 0 days 0:18:51.603
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {28, 2, 0, fffff80002d07518}

Probably caused by : memory_corruption ( nt!MiFindNodeOrParent+0 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002d07518, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efd0e0
 0000000000000028 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiFindNodeOrParent+0
fffff800`02d07518 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff88004cc6400 -- (.trap 0xfffff88004cc6400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d07518 rsp=fffff88004cc6598 rbp=0000000000000000
 r8=fffff88004cc65e0  r9=0000000000000000 r10=fffffa800434e010
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiFindNodeOrParent:
fffff800`02d07518 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h ds:f000:00000000`00000028=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cc4ca9 to fffff80002cc5740

STACK_TEXT:  
fffff880`04cc62b8 fffff800`02cc4ca9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`04cc62c0 fffff800`02cc3920 : fffffa80`04d8b3f8 fffffa80`0434e058 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`04cc6400 fffff800`02d07518 : fffff800`02d0b2d7 00000000`000007ff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`04cc6598 fffff800`02d0b2d7 : 00000000`000007ff 00000000`00000000 00000000`00000000 00001f80`00000000 : nt!MiFindNodeOrParent
fffff880`04cc65a0 fffff800`02d0b25d : fffff8a0`00a25b90 00000000`00000000 fffff880`04cc67c0 00000000`00000001 : nt!MiLocateAddressInTree+0x17
fffff880`04cc65d0 fffff800`02d0b368 : 00000000`00000002 fffffa80`0434e0c8 00000000`0000003c fffffa80`0434e0c8 : nt!MiGetSharedProtosAtDpcLevel+0xbd
fffff880`04cc6620 fffff800`02c631cb : 000067ee`6947dfb1 00000000`00000000 00000000`00000000 fffff800`02ce8139 : nt!MiGetSharedProtos+0x18
fffff880`04cc6650 fffff800`02d77c4b : 00000000`00008529 02000000`0001a321 00000000`000018c0 fffff800`02f8c35b : nt! ?? ::FNODOBFM::`string'+0x927b
fffff880`04cc6680 fffff800`02d787cb : 00000000`00000000 00000000`00000004 fffffa80`01befc28 fffffa80`01bef000 : nt!MiIdentifyPfn+0x39b
fffff880`04cc6720 fffff800`030d7595 : fffffa80`01bef000 fffff880`04cc6ca0 fffff880`04cc67f8 00000000`00000000 : nt!MmQueryPfnList+0xbb
fffff880`04cc6760 fffff800`0301c8b8 : 00000000`00000006 00000000`00000000 fffffa80`01bef000 fffff800`02c55001 : nt!PfpPfnPrioRequest+0x115
fffff880`04cc67b0 fffff800`02fc33c3 : 00000000`00000000 fffff800`02c55000 ffffffff`ffffffff fffffa80`00ebbe01 : nt! ?? ::NNGAKEGL::`string'+0x472ad
fffff880`04cc6840 fffff800`02fc41e5 : 00000000`0164b780 fffffa80`0196bcc0 00000000`0164b7e0 0a000000`00000000 : nt!ExpQuerySystemInformation+0x11c2
fffff880`04cc6be0 fffff800`02cc4993 : 00000000`00000001 00000000`052d8d78 80000000`00000001 00000000`00000001 : nt!NtQuerySystemInformation+0x4d
fffff880`04cc6c20 00000000`773e00ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0164b6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773e00ba


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiFindNodeOrParent+0
fffff800`02d07518 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiFindNodeOrParent+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0xA_nt!MiFindNodeOrParent+0

BUCKET_ID:  X64_0xA_nt!MiFindNodeOrParent+0

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120710-24944-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5c000 PsLoadedModuleList = 0xfffff800`02e99e50
Debug session time: Tue Dec  7 19:37:17.274 2010 (UTC - 5:00)
System Uptime: 0 days 0:05:57.773
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880085dd0c8, fffff880085dc930, fffff80002cd7950}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushUserStream+92 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880085dd0c8
Arg3: fffff880085dc930
Arg4: fffff80002cd7950

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880085dd0c8 -- (.exr 0xfffff880085dd0c8)
ExceptionAddress: fffff80002cd7950 (nt!ObFastReferenceObject+0x0000000000000010)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880085dc930 -- (.cxr 0xfffff880085dc930)
rax=0000000000000000 rbx=0000000000000001 rcx=fefffa8001d96740
rdx=fffff8a003692bd8 rsi=fefffa8001d96700 rdi=fefffa8001d96740
rip=fffff80002cd7950 rsp=fffff880085dd300 rbp=fefffa8001d96740
 r8=fffffa8001d96780  r9=fffffa8001d96780 r10=fffffa80018afe40
r11=fffff880085dd540 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffffa8001d96780
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObFastReferenceObject+0x10:
fffff800`02cd7950 4c8b01          mov     r8,qword ptr [rcx] ds:002b:fefffa80`01d96740=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  VSSVC.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f040e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsFlushUserStream+92
fffff880`0110a642 389c24a0000000  cmp     byte ptr [rsp+0A0h],bl

FAULTING_IP: 
nt!ObFastReferenceObject+10
fffff800`02cd7950 4c8b01          mov     r8,qword ptr [rcx]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff80002cb9fd1 to fffff80002cd7950

STACK_TEXT:  
fffff880`085dd300 fffff800`02cb9fd1 : 00000000`00000000 00000000`00000001 fffffa80`00000000 fffff8a0`0000000f : nt!ObFastReferenceObject+0x10
fffff880`085dd330 fffff800`02cb8954 : fffff8a0`036929e0 fffff8a0`03692be0 fffffa80`01d96780 fffffa80`01d96780 : nt!MiFlushSectionInternal+0xa1
fffff880`085dd570 fffff800`02cb84fa : 00000000`00000000 fffff980`1ab1ba00 00000000`00000000 fffff880`010f3961 : nt!MmFlushSection+0x1f4
fffff880`085dd630 fffff880`0110a642 : fffffa80`022c4958 00000000`00000000 fffff8a0`00000000 00000000`00000001 : nt!CcFlushCache+0x88a
fffff880`085dd730 fffff880`010b99e7 : 00000000`00000000 fffff8a0`085a1c70 00000000`00000000 00000000`00000001 : Ntfs!NtfsFlushUserStream+0x92
fffff880`085dd7b0 fffff880`0110abbd : fffffa80`03c95010 fffffa80`0275b180 00000000`00000001 0000000f`ffffff00 : Ntfs!NtfsFlushVolume+0x2c7
fffff880`085dd8e0 fffff880`0110b5f0 : fffffa80`03c95010 fffffa80`01af68c0 fffffa80`03c18f20 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459
fffff880`085dd9c0 fffff880`00c3823f : fffffa80`01af6c60 fffffa80`01af68c0 fffffa80`03c95010 fffff880`085dd9e8 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`085dda30 fffff880`00c366df : fffffa80`0274a950 00000000`00000000 fffffa80`0274a900 fffffa80`01af68c0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`085ddac0 fffff800`02fe2ca9 : 00000000`00000002 fffffa80`03c18f20 00000000`00000000 fffffa80`01af68c0 : fltmgr!FltpDispatch+0xcf
fffff880`085ddb20 fffff800`02f6f331 : fffffa80`01af68c0 fffffa80`01cfe6b0 fffffa80`03c18f20 00000000`000007ff : nt!IopSynchronousServiceTail+0xf9
fffff880`085ddb90 fffff800`02ccb993 : fffffa80`01cfe6b0 00000000`ffdd2270 fffffa80`0274a950 fffffa80`03c18f20 : nt!NtFlushBuffersFile+0x171
fffff880`085ddc20 00000000`77b4020a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0111f1a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b4020a


SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  Ntfs!NtfsFlushUserStream+92

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff880085dc930 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushUserStream+92

BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushUserStream+92















fffff880`049a5000 fffff880`049e3000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f55000 fffff880`00fac000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03964000 fffff880`039ee000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04b4f000 fffff880`04b65000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`02bd5000 fffff880`02bea000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04af5000 fffff880`04afd000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`02ba9000 fffff880`02baf000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`02ba3000 fffff880`02ba9000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`082cc000 fffff880`082d7000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00de1000 fffff880`00dea000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0470d000 fffff880`0472d000   AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
fffff880`03c09000 fffff880`043fe000   atikmdag atikmdag.sys Tue Oct 26 22:29:53 2010 (4CC78EA1)
fffff880`02a00000 fffff880`02a4b000   atikmpag atikmpag.sys Tue Oct 26 22:14:23 2010 (4CC78AFF)
fffff880`015f8000 fffff880`01600000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`03873000 fffff880`0387a000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02b92000 fffff880`02ba3000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`032e7000 fffff880`03305000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006c0000 fffff960`006e7000   cdd      cdd.dll      unavailable (00000000)
fffff880`03813000 fffff880`0383d000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d07000 fffff880`00dc7000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01000000 fffff880`01030000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ca9000 fffff880`00d07000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01326000 fffff880`01399000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04b3f000 fffff880`04b4f000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04c0c000 fffff880`04c1a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04c42000 fffff880`04c44f00   dadder   dadder.sys   Mon Apr 19 05:04:42 2010 (4BCC1CAA)
fffff880`02b74000 fffff880`02b92000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02b65000 fffff880`02b74000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01274000 fffff880`0128a000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0476a000 fffff880`0478c000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04c26000 fffff880`04c2f000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04c1a000 fffff880`04c26000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04c2f000 fffff880`04c42000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04c00000 fffff880`04c0c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04847000 fffff880`0493b000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`0493b000 fffff880`04981000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00dea000 fffff880`00dfe000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00c35000 fffff880`00c81000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013aa000 fffff880`013b4000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0123a000 fffff880`01274000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`04acb000 fffff880`04ad8000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02c13000 fffff800`02c5c000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04981000 fffff880`049a5000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04a1c000 fffff880`04a35000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04a35000 fffff880`04a3d080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04792000 fffff880`047a0000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0321f000 fffff880`032e7000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015ef000 fffff880`015f8000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04afd000 fffff880`04b1b000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04b1b000 fffff880`04b2a000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`046ff000 fffff880`0470d000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bcf000 fffff800`00bd9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0462e000 fffff880`04671000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`0130c000 fffff880`01326000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015b2000 fffff880`015dd000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0478c000 fffff880`04791200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04600000 fffff880`04615000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`047ae000 fffff880`047d1000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c88000 fffff880`00c95000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`047a0000 fffff880`047ae000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04a3e000 fffff880`04a4d000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`046f2000 fffff880`046ff000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dc7000 fffff880`00de1000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0383d000 fffff880`0386a000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`033bb000 fffff880`033cb000   MpNWMon  MpNWMon.sys  Sat Mar 20 01:58:00 2010 (4BA463E8)
fffff880`03305000 fffff880`0331d000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0331d000 fffff880`0334a000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0334a000 fffff880`03398000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`03398000 fffff880`033bb000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`038d8000 fffff880`038e3000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fb5000 fffff880`00fbf000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`012ae000 fffff880`0130c000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02b5a000 fffff880`02b65000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015dd000 fffff880`015ef000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01460000 fffff880`01552000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04b89000 fffff880`04b95000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04b95000 fffff880`04bc4000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`046dd000 fffff880`046f2000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02aa2000 fffff880`02ab1000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`0391f000 fffff880`03964000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01552000 fffff880`015b2000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`038e3000 fffff880`038f4000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02b4e000 fffff880`02b5a000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c5c000 fffff800`03238000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0103f000 fffff880`011e2000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0386a000 fffff880`03873000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02a7c000 fffff880`02aa2000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04ad8000 fffff880`04af5000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fbf000 fffff880`00ff2000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e86000 fffff880`00e8d000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e8d000 fffff880`00e9d000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01399000 fffff880`013aa000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05013000 fffff880`050b9000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0472d000 fffff880`0476a000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c95000 fffff880`00ca9000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04b65000 fffff880`04b89000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04bc4000 fffff880`04bdf000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04bdf000 fffff880`04c00000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04a00000 fffff880`04a1a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02afd000 fffff880`02b4e000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`038bd000 fffff880`038c6000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`038c6000 fffff880`038cf000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`038cf000 fffff880`038d8000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01200000 fffff880`0123a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04615000 fffff880`0462d000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04800000 fffff880`0483f000   Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
fffff880`047f2000 fffff880`047fe000   RtNdPt60 RtNdPt60.sys Mon Dec 10 21:49:52 2007 (475DFAD0)
fffff880`050b9000 fffff880`050c4000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04b2a000 fffff880`04b36000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02ab1000 fffff880`02ace000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0144a000 fffff880`01452000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0825b000 fffff880`082cc000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`0516a000 fffff880`05200000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`05103000 fffff880`0516a000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`050c4000 fffff880`050f1000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`04a4d000 fffff880`04a4e480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`050f1000 fffff880`05103000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`03912000 fffff880`0391f000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`038f4000 fffff880`03912000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02ae9000 fffff880`02afd000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02baf000 fffff880`02bd5000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04671000 fffff880`04683000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04c45000 fffff880`04c46f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04aba000 fffff880`04acb000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04683000 fffff880`046dd000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`049e3000 fffff880`049ee000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04a64000 fffff880`04aba000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00ff2000 fffff880`00fff000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0387a000 fffff880`03888000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04a1a000 fffff880`04a1bd80   vHidDev  vHidDev.sys  Mon Dec 21 08:49:58 2009 (4B2F7D06)
fffff880`04c51000 fffff880`04dff000   viahduaa viahduaa.sys Mon Jan 11 05:05:18 2010 (4B4AF7DE)
fffff880`03888000 fffff880`038ad000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`013b4000 fffff880`01400000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02ace000 fffff880`02ae9000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`038ad000 fffff880`038bd000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ea2000 fffff880`00f46000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f46000 fffff880`00f55000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`039ee000 fffff880`039f7000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`0037f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`04b36000 fffff880`04b3f000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fac000 fffff880`00fb5000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`047d1000 fffff880`047f2000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`033cb000 fffff880`033fc000   AODDriver.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`01452000 fffff880`01460000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0128a000 fffff880`01296000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01296000 fffff880`0129f000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`011e2000 fffff880`011f5000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top