PC Crashes BSOD Playing Games

Joined
Dec 21, 2010
Messages
9
Reaction score
0
I get bsod when playing games: Oblivion, Operation Flashpoint Dragon Rising, GTAIV

PC:
MB: M4A79XTD EVO AM3
Video Card: Sapphire 100283L Radeon HD 5770 (Juniper XT) 1GB
PSU: OCZ Modstream Pro OCZ700MXSP 700W
CPU: AMD Phenom II X4 955 Black Edition Denab 3.2 GHz
RAM: 2 x2GB G.SKILL DDR3 SDRAM 1600 (PC3 12800)

I've attached the minidumps.

Any help would be greatly appreciated.

Ran memtest86 for hours w/ no errors.
 

Attachments

Joined
Sep 19, 2010
Messages
87
Reaction score
12
We have roughly the same system :D Try setting the correct voltage for your RAM in the BIOS settings as there are times that the default 'auto' setting is wrong. Google up your RAM's exact model and specifications to find out the correct setting. I used to have BSODs myself when I first got my rig and that solved my problem.
 

Elmer BeFuddled

Resident eejit
Joined
Jun 12, 2010
Messages
1,050
Reaction score
251
Could you re-attach your minidump files? I'm getting corruption message when trying to open. Copy to desktop, then zip and attach (but you know that!! :))
 
Joined
Dec 21, 2010
Messages
9
Reaction score
0
Attached minidumps

I'll mess around w/ voltage and let you know.

The odd thing is I think it has to do w/ drivers or software. Oblivion ran fine for a long time, then I bought Operation Flashpoint dragon rising, then that started crashing. So I updated drivers. Flashpoint still crashed, then Oblivion started crashing.
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Uninstall McAfee completely with the use of this tool to clean up its tracks:

http://service.mcafee.com/FAQDocument.aspx?id=TS100507


MSE as the replacement:

https://www.microsoft.com/security_essentials/



Update:

ASACPI.sys Sun Mar 27 22:30:36 2005
ASUS ATK0110 ACPI Utility

pcouffin.sys Tue Dec 05 09:39:30 2006
Patin-Couffin VSO Software - update or uninstall it

ctxusbm.sys Mon Sep 07 14:09:28 2009
Citrix ICA Client

Rt64win7.sys Thu Feb 26 04:04:13 2009
Realtek 8136/8168/8169 NDIS 6.20







Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-17113-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
Debug session time: Sun Dec 19 10:43:06.658 2010 (UTC - 5:00)
System Uptime: 0 days 0:47:07.727
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff88004021008, fffff88001fbd698, fffff88001fbcf00}

Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004021008, The address that the exception occurred at
Arg3: fffff88001fbd698, Exception Record Address
Arg4: fffff88001fbcf00, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8
fffff880`04021008 4c8900          mov     qword ptr [rax],r8

EXCEPTION_RECORD:  fffff88001fbd698 -- (.exr 0xfffff88001fbd698)
ExceptionAddress: fffff88004021008 (dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0x00000000000000b8)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88001fbcf00 -- (.cxr 0xfffff88001fbcf00)
rax=002e00740072006f rbx=fffff8a009985440 rcx=fffff8a008343fb8
rdx=0000000000000000 rsi=fffffa8003db4880 rdi=fffffa800574b000
rip=fffff88004021008 rsp=fffff88001fbd8d0 rbp=0000000000000000
 r8=fffffa8003db48d0  r9=0000000000000001 r10=0000000000000000
r11=fffffa800574c3c0 r12=00000000000000cb r13=0000000000000000
r14=fffffa800652b290 r15=0000000000000735
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0xb8:
fffff880`04021008 4c8900          mov     qword ptr [rax],r8 ds:002b:002e0074`0072006f=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d050e0
 ffffffffffffffff 

FOLLOWUP_IP: 
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8
fffff880`04021008 4c8900          mov     qword ptr [rax],r8

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff8800401e8af to fffff88004021008

STACK_TEXT:  
fffff880`01fbd8d0 fffff880`0401e8af : 00000000`00000000 fffffa80`041ea658 00000000`0000010a fffffa80`03e5f310 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0xb8
fffff880`01fbd910 fffff880`0403865d : 00000000`00000000 fffff8a0`07fb34e0 fffffa80`00000000 fffffa80`0652b290 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0xe1b
fffff880`01fbdae0 fffff880`04038398 : fffff800`00b96080 fffff880`04037d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`01fbdcd0 fffff880`04037e96 : 00000000`00000000 fffffa80`06d9a430 00000000`00000080 fffffa80`05716010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`01fbdd00 fffff800`02d71c06 : 00000000`02ab2544 fffffa80`0571ca10 fffffa80`039d0740 fffffa80`0571ca10 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`01fbdd40 fffff800`02aabc26 : fffff800`02c47e80 fffffa80`0571ca10 fffff800`02c55c40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`01fbdd80 00000000`00000000 : fffff880`01fbe000 fffff880`01fb8000 fffff880`01fbd690 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

STACK_COMMAND:  .cxr 0xfffff88001fbcf00 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8

BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121810-17082-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
Debug session time: Sat Dec 18 16:28:50.871 2010 (UTC - 5:00)
System Uptime: 0 days 3:41:31.572
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff80002a80ccf}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80002a80ccf

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  OFDR.exe

CURRENT_IRQL:  1

EXCEPTION_RECORD:  fffff88008529ab8 -- (.exr 0xfffff88008529ab8)
ExceptionAddress: fffff80002abb627 (nt!KeContextFromKframes+0x00000000000001b3)
   ExceptionCode: 10000002
  ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME:  fffff88008529b60 -- (.trap 0xfffff88008529b60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000100008 rbx=0000000000000000 rcx=0000000000100008
rdx=fffff8800852a3c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002abb627 rsp=fffff88008529cf0 rbp=0000000000000001
 r8=fffff88008529d60  r9=0000000000010040 r10=000000000010001f
r11=fffff88008529d60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeContextFromKframes+0x1b3:
fffff800`02abb627 f30f7f83a0010000 movdqu  xmmword ptr [rbx+1A0h],xmm0 ds:00000000`000001a0=????????????????????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a80ca9 to fffff80002a81740

STACK_TEXT:  
fffff880`02d69ce8 fffff800`02a80ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02d69cf0 fffff800`02a7f172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02d69e30 fffff800`02a80ccf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`08528f40 fffff800`02a7eedf : fffff880`08529120 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xf
fffff880`08529120 fffff800`02abb627 : 00000000`00000000 fffff800`02aba4a5 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`085292b0 fffff800`02abb985 : fffff880`08529ab8 fffff880`08529820 fffff880`08529b60 fffff880`0852a5a0 : nt!KeContextFromKframes+0x1b3
fffff880`085292f0 fffff800`02a80d82 : fffff880`08529ab8 fffff880`08529d60 fffff880`08529b60 00000000`0010001f : nt!KiDispatchException+0x105
fffff880`08529980 fffff800`02a7eedf : fffff880`08529b60 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`08529b60 fffff800`02abb627 : 00000000`00000000 fffff800`02aba4a5 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`08529cf0 fffff800`02abb985 : fffff880`0852a4f8 fffff880`0852a260 fffff880`0852a5a0 fffff880`0852afe0 : nt!KeContextFromKframes+0x1b3
fffff880`08529d30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x105


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`02a7f172 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121810-22386-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a53000 PsLoadedModuleList = 0xfffff800`02c90e50
Debug session time: Sat Dec 18 12:46:13.290 2010 (UTC - 5:00)
System Uptime: 2 days 8:25:42.854
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff80004a3a0c7, 1, fffff88004a3a0e4, 2}

Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys

Could not read faulting driver name
Probably caused by : atikmdag.sys ( atikmdag+4280e4 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff80004a3a0c7, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88004a3a0e4, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfb0e0
 fffff80004a3a0c7 

FAULTING_IP: 
atikmdag+4280e4
fffff880`04a3a0e4 41c7000f65c190  mov     dword ptr [r8],90C1650Fh

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800514aa90 -- (.trap 0xfffff8800514aa90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000b328bb40 rbx=0000000000000000 rcx=0000000000000018
rdx=0000000000000138 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004a3a0e4 rsp=fffff8800514ac28 rbp=0000000000000400
 r8=fffff80004a3a0c7  r9=fffff8800514ac70 r10=0002043bb328ba08
r11=000000000000013f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac pe nc
atikmdag+0x4280e4:
fffff880`04a3a0e4 41c7000f65c190  mov     dword ptr [r8],90C1650Fh ds:aca8:fffff800`04a3a0c7=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b428f2 to fffff80002ac3740

STACK_TEXT:  
fffff880`0514a928 fffff800`02b428f2 : 00000000`00000050 fffff800`04a3a0c7 00000000`00000001 fffff880`0514aa90 : nt!KeBugCheckEx
fffff880`0514a930 fffff800`02ac182e : 00000000`00000001 00000000`00000004 9e2f85f7`1a7ffb00 409cc51d`d3614ae9 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`0514aa90 fffff880`04a3a0e4 : fffff880`048931a0 00000000`00000004 cccccccc`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0514ac28 fffff880`048931a0 : 00000000`00000004 cccccccc`00000000 00000000`00000000 00000000`00000000 : atikmdag+0x4280e4
fffff880`0514ac30 00000000`00000004 : cccccccc`00000000 00000000`00000000 00000000`00000000 fffff880`009e9180 : atikmdag+0x2811a0
fffff880`0514ac38 cccccccc`00000000 : 00000000`00000000 00000000`00000000 fffff880`009e9180 0000000a`a0b817c0 : 0x4
fffff880`0514ac40 00000000`00000000 : 00000000`00000000 fffff880`009e9180 0000000a`a0b817c0 00000004`0000017e : 0xcccccccc`00000000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
atikmdag+4280e4
fffff880`04a3a0e4 41c7000f65c190  mov     dword ptr [r8],90C1650Fh

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  atikmdag+4280e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ca29946

FAILURE_BUCKET_ID:  X64_0x50_atikmdag+4280e4

BUCKET_ID:  X64_0x50_atikmdag+4280e4

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-15194-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a0b000 PsLoadedModuleList = 0xfffff800`02c48e50
Debug session time: Sat Dec 18 16:30:24.681 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:26.992
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck FC, {fffff880026557d0, 8000000116cb0963, fffff88002655480, 2}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42497 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff880026557d0, Virtual address for the attempted execute.
Arg2: 8000000116cb0963, PTE contents.
Arg3: fffff88002655480, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88002655480 -- (.trap 0xfffff88002655480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000018f682c
rdx=0000000000012c68 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880026557d0 rsp=fffff88002655618 rbp=fffff900c01ec240
 r8=00000000018f2c68  r9=0000000000000002 r10=fffff900c01ea1b8
r11=fffff880026555f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
fffff880`026557d0 98              cwde
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002afbbcf to fffff80002a7b740

STACK_TEXT:  
fffff880`02655318 fffff800`02afbbcf : 00000000`000000fc fffff880`026557d0 80000001`16cb0963 fffff880`02655480 : nt!KeBugCheckEx
fffff880`02655320 fffff800`02a7982e : 00000000`00000008 fffff880`02655630 fffffa80`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42497
fffff880`02655480 fffff880`026557d0 : fffff900`c01ea304 fffff880`02655630 fffff880`02655698 00000000`00000006 : nt!KiPageFault+0x16e
fffff880`02655618 fffff900`c01ea304 : fffff880`02655630 fffff880`02655698 00000000`00000006 00000000`00000000 : 0xfffff880`026557d0
fffff880`02655620 fffff880`02655630 : fffff880`02655698 00000000`00000006 00000000`00000000 fffff900`c01ea1b8 : 0xfffff900`c01ea304
fffff880`02655628 fffff880`02655698 : 00000000`00000006 00000000`00000000 fffff900`c01ea1b8 fffff900`c01ea580 : 0xfffff880`02655630
fffff880`02655630 00000000`00000006 : 00000000`00000000 fffff900`c01ea1b8 fffff900`c01ea580 00000000`00000000 : 0xfffff880`02655698
fffff880`02655638 00000000`00000000 : fffff900`c01ea1b8 fffff900`c01ea580 00000000`00000000 fffff960`000bf417 : 0x6


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+42497
fffff800`02afbbcf cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42497

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xFC_nt!_??_::FNODOBFM::_string_+42497

BUCKET_ID:  X64_0xFC_nt!_??_::FNODOBFM::_string_+42497

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\122010-21730-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Mon Dec 20 07:40:34.045 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:11.746
Loading Kernel Symbols
...............................................................
..............................................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff80002b49599, fffff88002fbcc28, fffff88002fbc490}

Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_HalAllocateCommonBuffer+1c6 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002b49599, The address that the exception occurred at
Arg3: fffff88002fbcc28, Exception Record Address
Arg4: fffff88002fbc490, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MiStealPage+c79
fffff800`02b49599 488b4b28        mov     rcx,qword ptr [rbx+28h]

EXCEPTION_RECORD:  fffff88002fbcc28 -- (.exr 0xfffff88002fbcc28)
ExceptionAddress: fffff80002b49599 (nt!MiStealPage+0x0000000000000c79)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88002fbc490 -- (.cxr 0xfffff88002fbc490)
rax=000fffffffffff7d rbx=02fffa7fffffe770 rcx=000fffffffffff7d
rdx=000fffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b49599 rsp=fffff88002fbce60 rbp=fffff88002fbcec0
 r8=0000058000000000  r9=000fffffffffffff r10=0000000000000002
r11=fffff68000000000 r12=fffffa80026fd7e0 r13=0000000000000000
r14=00000000000cff2a r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!MiStealPage+0xc79:
fffff800`02b49599 488b4b28        mov     rcx,qword ptr [rbx+28h] ds:002b:02fffa7f`ffffe798=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cab0e0
 ffffffffffffffff 

FOLLOWUP_IP: 
USBPORT!USBPORT_HalAllocateCommonBuffer+1c6
fffff880`03e2d99e 488bf8          mov     rdi,rax

BUGCHECK_STR:  0x7E

LOCK_ADDRESS:  fffff80002c77400 -- (!locks fffff80002c77400)

Resource @ nt!PiEngineLock (0xfffff80002c77400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
	Lock address  : 0xfffff80002c77400
	Thread Count  : 0
	Thread address: 0x0000000000000000
	Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff80002b4abbb to fffff80002b49599

STACK_TEXT:  
fffff880`02fbce60 fffff800`02b4abbb : fffffa80`026fd7e0 fffffa80`026fd7e0 fffff6fc`40005d68 fffffa80`05490900 : nt!MiStealPage+0xc79
fffff880`02fbd0a0 fffff800`02b4bc00 : fffffa80`026fd7e0 00000000`00000001 00000000`00000001 fffff6fc`40005d68 : nt!MiClaimPhysicalRun+0x60b
fffff880`02fbd160 fffff800`02b85c95 : 00000000`00000000 00000000`000fffff 00000000`00100000 00000000`00000001 : nt!MiFindContiguousPages+0xb30
fffff880`02fbd280 fffff800`02b86c33 : 00000000`00002000 00000000`00000000 00000000`cd5a6000 fffff880`050c4000 : nt!MiAllocateContiguousMemory+0x2a5
fffff880`02fbd310 fffff800`02fe32a0 : 00000000`00000040 00000000`00001000 fffffa80`052209c0 fffffa80`052201a0 : nt!MmAllocateContiguousMemorySpecifyCache+0x53
fffff880`02fbd350 fffff880`03e2d99e : 00000000`00000000 00000000`00000000 fffffa80`052209a0 00000000`000007ff : hal!HalAllocateCommonBuffer+0x40
fffff880`02fbd390 fffff880`03e03799 : fffffa80`04ebd920 00000000`00000000 00000000`cd5a6000 fffff880`00f5cc6c : USBPORT!USBPORT_HalAllocateCommonBuffer+0x1c6
fffff880`02fbd400 fffff880`03e044e4 : fffffa80`05220960 00000000`c0000000 fffffa80`052201a0 00000000`00000001 : USBPORT!USBPORT_AllocateControllerCommonBuffers+0xa9
fffff880`02fbd450 fffff880`03e1959f : 00000000`00000000 fffffa80`0c031000 fffffa80`00000000 fffffa80`00000000 : USBPORT!USBPORT_StartDevice+0xb54
fffff880`02fbd680 fffff880`03e18f29 : fffffa80`047b46b0 fffffa80`052201a0 fffffa80`047b4600 fffffa80`047b4500 : USBPORT!USBPORT_DeferredStartDevice+0x43
fffff880`02fbd6b0 fffff880`03e048d5 : 00000000`00000000 fffff880`02fbd820 fffffa80`047b4550 fffffa80`039aca20 : USBPORT!USBPORT_FdoPnP+0x6c1
fffff880`02fbd760 fffff800`02e3206e : 00000000`00000000 fffffa80`039aca20 fffffa80`05288750 fffff880`009e9180 : USBPORT!USBPORT_DispatchPnP+0x1d
fffff880`02fbd790 fffff800`02b6d14d : fffffa80`039aca20 fffffa80`05288750 fffff800`02b72d30 00000000`00000000 : nt!PnpAsynchronousCall+0xce
fffff880`02fbd7d0 fffff800`02e3cdb6 : fffff800`02c771c0 fffffa80`039b2390 fffffa80`05288750 fffffa80`039b2538 : nt!PnpStartDevice+0x11d
fffff880`02fbd890 fffff800`02e3d054 : fffffa80`039b2390 fffffa80`03a2003c fffffa80`03a23d90 00000000`00000001 : nt!PnpStartDeviceNode+0x156
fffff880`02fbd920 fffff800`02e60346 : fffffa80`039b2390 fffffa80`03a23d90 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74
fffff880`02fbd950 fffff800`02e607fc : fffffa80`050ca5c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x296
fffff880`02fbdbc0 fffff800`02b75382 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`02fbdc10 fffff800`02a80961 : fffff800`02b75080 fffff800`02ecae01 fffffa80`039ffb00 00000554`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`02fbdcb0 fffff800`02d17c06 : 00000554`00000000 fffffa80`039ffb60 00000000`00000080 fffffa80`039ea740 : nt!ExpWorkerThread+0x111
fffff880`02fbdd40 fffff800`02a51c26 : fffff880`02d63180 fffffa80`039ffb60 fffff880`02d6dfc0 00000554`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fbdd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  USBPORT!USBPORT_HalAllocateCommonBuffer+1c6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBPORT

IMAGE_NAME:  USBPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc07

STACK_COMMAND:  .cxr 0xfffff88002fbc490 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_USBPORT!USBPORT_HalAllocateCommonBuffer+1c6

BUCKET_ID:  X64_0x7E_USBPORT!USBPORT_HalAllocateCommonBuffer+1c6

Followup: MachineOwner
---------


Drivers:

Code:
start             end                 module name
fffff880`04fb9000 fffff880`04ff7000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ed6000 fffff880`00f2d000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03cbf000 fffff880`03d49000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03ebf000 fffff880`03ed5000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03f4b000 fffff880`03f60000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ec0000 fffff880`00ecb000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0460b000 fffff880`04613000   ASACPI   ASACPI.sys   Sun Mar 27 22:30:36 2005 (42476C4C)
fffff880`00e8d000 fffff880`00e96000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e96000 fffff880`00ec0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04618000 fffff880`04e29000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
fffff880`03f60000 fffff880`03fac000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
fffff880`016ca000 fffff880`016d1000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f14000 fffff880`03f25000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`01697000 fffff880`016c1000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01631000 fffff880`01661000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ce5000 fffff880`00d43000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0113a000 fffff880`011ad000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03eaf000 fffff880`03ebf000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`01661000 fffff880`0166f000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ef9000 fffff880`03f14000   ctxusbm  ctxusbm.sys  Mon Sep 07 14:09:28 2009 (4AA54C58)
fffff880`03edb000 fffff880`03ef9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c97000 fffff880`03ca6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01235000 fffff880`0124b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0167b000 fffff880`01684000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0166f000 fffff880`0167b000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01684000 fffff880`01697000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04e29000 fffff880`04f1d000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04f1d000 fffff880`04f63000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01049000 fffff880`0105d000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00faa000 fffff880`00ff6000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01000000 fffff880`0103a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0174b000 fffff880`01795000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02fdf000 fffff800`03028000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04f63000 fffff880`04f87000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`015eb000 fffff880`015f4000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03e73000 fffff880`03e91000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01600000 fffff880`0161e000   ipfltdrv ipfltdrv.sys Mon Jul 13 20:10:03 2009 (4A5BCCDB)
fffff880`03e91000 fffff880`03ea0000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bac000 fffff800`00bb6000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04394000 fffff880`043d7000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015c0000 fffff880`015eb000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00cc4000 fffff880`00cd1000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`0105d000 fffff880`010dbc00   mfehidk  mfehidk.sys  Fri Aug 06 18:33:19 2010 (4C5C8DAF)
fffff880`03ea0000 fffff880`03eaf000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00e73000 fffff880`00e8d000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`01795000 fffff880`017d2000   Mpfp     Mpfp.sys     Thu Jul 15 15:40:11 2010 (4C3F641B)
fffff880`0172f000 fffff880`0173a000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f36000 fffff880`00f40000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010dc000 fffff880`0113a000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c8c000 fffff880`03c97000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01454000 fffff880`01466000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0146e000 fffff880`01560000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03fd0000 fffff880`03fdc000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`042f8000 fffff880`04327000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03dbd000 fffff880`03dcc000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03d49000 fffff880`03d8e000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01560000 fffff880`015c0000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0173a000 fffff880`0174b000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c80000 fffff880`03c8c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a03000 fffff800`02fdf000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01256000 fffff880`013f9000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`016c1000 fffff880`016ca000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03d97000 fffff880`03dbd000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f80000 fffff880`00f95000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f40000 fffff880`00f73000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0437d000 fffff880`04391380   pcouffin pcouffin.sys Tue Dec 05 09:39:30 2006 (457584A2)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00cd1000 fffff880`00ce5000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03fac000 fffff880`03fd0000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04327000 fffff880`04342000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04342000 fffff880`04363000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04363000 fffff880`0437d000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03c2f000 fffff880`03c80000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01714000 fffff880`0171d000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0171d000 fffff880`01726000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01726000 fffff880`0172f000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011ad000 fffff880`011e7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04f87000 fffff880`04fb9000   Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`03e67000 fffff880`03e73000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03dcc000 fffff880`03de9000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0144c000 fffff880`01454000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`04392000 fffff880`04393480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`02a01000 fffff880`02bfe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`017d2000 fffff880`017df000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`017df000 fffff880`017fd000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03c1b000 fffff880`03c2f000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03f25000 fffff880`03f4b000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`043d7000 fffff880`043e9000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`03e56000 fffff880`03e67000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04200000 fffff880`0425a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04600000 fffff880`0460b000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e00000 fffff880`03e56000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f73000 fffff880`00f80000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`016d1000 fffff880`016df000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`016df000 fffff880`01704000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f95000 fffff880`00faa000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01400000 fffff880`0144c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03c00000 fffff880`03c1b000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01704000 fffff880`01714000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d43000 fffff880`00de7000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00de7000 fffff880`00df6000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d8e000 fffff880`03d97000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04ff7000 fffff880`05000000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f2d000 fffff880`00f36000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
 
Joined
Dec 21, 2010
Messages
9
Reaction score
0
Thanks for the super fast reply. I'll try this tonight one by one and let you know what the problem was.

How did you come to that conclusion by reading the mini-dumps? Any pointers (or websites do explain)?
 
Joined
Dec 21, 2010
Messages
9
Reaction score
0
Followed your directions and played games for about an hour tonight with no crash!!! Not sure if it was Mcafee or the driver updates. You don't know how much time I wasted troubleshooting this!

Thanks again and have a happy holidays!
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
It was both McAfee and the old drivers altogether crashing you.

Happy Holidays!
 
Joined
Dec 21, 2010
Messages
9
Reaction score
0
PC Crashed again, BSOD while playing games. This was after I installed Microsoft Security Essentials. I disabled live protection and games seem to play fine now.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Yes, these two are pending waiting for an update :

RtNdPt60.sys Mon Dec 10 21:49:52 2007
Realtek NDIS Protocol Driver

AsIO.sys Mon Dec 17 04:11:49 2007
ASUS Utilities

Search ASUS and Realtek downloads.

If it is absolutely impossible a task for you to update them, then navigate to C:\Windows\system32\drivers and rename them to .bak, like this:

RtNdPt60.bak
AsIO.bak


But first try updating them.


Code:
BugCheck 3B, {c0000005, fffff88004dad986, fffff88008570bf0, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VidMmDestroyAllocation+46 )

If it still crashes, then uninstall your current Catalyst and install its more stable earlier release. Use driver sweeper before installing another Catalyst version:

http://www.guru3d.com/category/driversweeper/



Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\122310-17550-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a0d000 PsLoadedModuleList = 0xfffff800`02c4ae50
Debug session time: Thu Dec 23 07:30:18.366 2010 (UTC - 5:00)
System Uptime: 0 days 12:40:53.368
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff88004d7dd0c, fffff8800a166508, fffff8800a165d70}

Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004d7dd0c, The address that the exception occurred at
Arg3: fffff8800a166508, Exception Record Address
Arg4: fffff8800a165d70, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
fffff880`04d7dd0c 488908          mov     qword ptr [rax],rcx

EXCEPTION_RECORD:  fffff8800a166508 -- (.exr 0xfffff8800a166508)
ExceptionAddress: fffff88004d7dd0c (dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0x0000000000000094)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 0000000000000000
Attempt to write to address 0000000000000000

CONTEXT:  fffff8800a165d70 -- (.cxr 0xfffff8800a165d70)
rax=0000000000000000 rbx=fffff8a00b32bd60 rcx=0000000000058983
rdx=fffff8a003f8db40 rsi=fffff8a003f8db40 rdi=fffffa8005aaed70
rip=fffff88004d7dd0c rsp=fffff8800a166740 rbp=fffffa800572ec80
 r8=fffff8800a1667a8  r9=fffff8800a1667b0 r10=000000000000040a
r11=fffff8a00b9f96b0 r12=0000000000000000 r13=fffff8a00b32bd40
r14=0000000000000000 r15=fffff8a00cc80618
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0x94:
fffff880`04d7dd0c 488908          mov     qword ptr [rax],rcx ds:002b:00000000`00000000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000000000

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb50e0
 0000000000000000 

FOLLOWUP_IP: 
dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
fffff880`04d7dd0c 488908          mov     qword ptr [rax],rcx

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff88004d6d5e1 to fffff88004d7dd0c

STACK_TEXT:  
fffff880`0a166740 fffff880`04d6d5e1 : fffffa80`05acd000 00000000`00000000 00000000`00000000 ffffffff`00003000 : dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0x94
fffff880`0a1667a0 fffff880`04d7e6e7 : fffffa80`051bb280 fffff8a0`03f8db40 fffffa80`051bb230 fffff8a0`0cc805f0 : dxgmms1!VIDMM_GLOBAL::NotifyAllocationEviction+0x59
fffff880`0a1667d0 fffff880`04d700a5 : fffffa80`05aaed70 fffff800`0000000c 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+0x2bb
fffff880`0a1668a0 fffff880`04d6ba8f : fffff8a0`0cad0260 fffff8a0`0cad0260 fffffa80`05acd000 fffffa80`04413820 : dxgmms1!VIDMM_GLOBAL::AllocateResourceForPinnedAllocation+0x55
fffff880`0a166920 fffff880`04d6b38f : fffff880`0a166c78 fffff880`494e494d fffff880`0a166bf0 fffff880`0a166c88 : dxgmms1!VIDMM_GLOBAL::ProcessDeferredCommand+0x19f
fffff880`0a166a40 fffff880`04d85231 : 00000000`00000001 fffff880`04d570d4 fffffa80`05aaa450 fffffa80`05aaa450 : dxgmms1!VidMmiProcessSystemCommand+0x23
fffff880`0a166a70 fffff880`04d843bc : fffff880`0a166bd0 00000000`00000000 fffffa80`057ae8b0 00000000`00000001 : dxgmms1!VidSchiSubmitSystemCommand+0x39
fffff880`0a166aa0 fffff880`04d5677a : 00000000`00000000 fffffa80`05aaa450 fffffa80`057ae8b0 fffffa80`057ae8b0 : dxgmms1!VidSchiSubmitQueueCommand+0x74
fffff880`0a166ad0 fffff880`04d86927 : fffffa80`0590daf0 fffffa80`05aa2000 fffffa80`057ae8b0 fffff880`6d4d6956 : dxgmms1!VidSchiSubmitQueueCommandDirect+0x1e6
fffff880`0a166b60 fffff880`04d6b4b9 : fffffa80`00000001 fffffa80`03a43410 fffffa80`05acd000 fffff880`0a166c78 : dxgmms1!VidSchiSubmitCommandPacketToQueue+0x15f
fffff880`0a166bd0 fffff880`04d6b8dc : fffff880`0a166d30 fffff8a0`0cad0260 fffff880`0a166d30 fffff8a0`0cad0260 : dxgmms1!VIDMM_GLOBAL::QueueSystemCommandAndWait+0xf9
fffff880`0a166c40 fffff880`04d66faa : 00000000`00000000 00000000`00000000 fffffa80`05acd000 fffff8a0`011f1770 : dxgmms1!VIDMM_GLOBAL::QueueDeferredCommandAndWait+0x4c
fffff880`0a166cb0 fffff880`04d4daa7 : fffff8a0`04007090 fffff8a0`1131a520 fffff880`0a166e20 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+0x2da
fffff880`0a166d90 fffff880`04c993a1 : fffff8a0`086d74e0 fffff880`0a167260 00000000`00000000 00000000`00000000 : dxgmms1!VidMmOpenAllocation+0xeb
fffff880`0a166de0 fffff880`04c92554 : fffff880`0a167048 fffff8a0`099b3ae0 fffff880`0a167220 fffff880`0a167220 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations<_DXGK_ALLOCATIONINFO>+0x28d
fffff880`0a166e70 fffff880`04c94233 : fffff8a0`08817000 fffff880`0a1674d0 00000000`00000000 fffff8a0`08817000 : dxgkrnl!DXGDEVICE::CreateAllocation+0xca8
fffff880`0a167470 fffff880`04c9a914 : 00000000`00009000 fffff900`c221e79c 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::CreateStandardAllocation+0x367
fffff880`0a1675d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkCddEnable+0x904


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

STACK_COMMAND:  .cxr 0xfffff8800a165d70 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94

BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94

Followup: MachineOwner
---------

















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\122310-23244-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a07000 PsLoadedModuleList = 0xfffff800`02c44e50
Debug session time: Thu Dec 23 12:50:12.224 2010 (UTC - 5:00)
System Uptime: 0 days 5:19:01.926
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff88004dad986, fffff88008570bf0, 0}

Probably caused by : dxgmms1.sys ( dxgmms1!VidMmDestroyAllocation+46 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88004dad986, Address of the instruction which caused the bugcheck
Arg3: fffff88008570bf0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
dxgmms1!VidMmDestroyAllocation+46
fffff880`04dad986 49894108        mov     qword ptr [r9+8],rax

CONTEXT:  fffff88008570bf0 -- (.cxr 0xfffff88008570bf0)
rax=fffff8a0086369f0 rbx=fffff8a0086369f0 rcx=fffffa8005a6f000
rdx=fffff8a009789550 rsi=fffff8a009789550 rdi=0000000000000000
rip=fffff88004dad986 rsp=fffff880085715c0 rbp=fffffa8005a6f000
 r8=fffff8a008636810  r9=0000000000000000 r10=fffff80002a07000
r11=fffff880085715a0 r12=fffff8a009417ae0 r13=fffff8a0089a54f0
r14=0000000000000001 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010283
dxgmms1!VidMmDestroyAllocation+0x46:
fffff880`04dad986 49894108        mov     qword ptr [r9+8],rax ds:002b:00000000`00000008=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  OFDR.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88004dad986

STACK_TEXT:  
fffff880`085715c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VidMmDestroyAllocation+0x46


FOLLOWUP_IP: 
dxgmms1!VidMmDestroyAllocation+46
fffff880`04dad986 49894108        mov     qword ptr [r9+8],rax

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VidMmDestroyAllocation+46

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

STACK_COMMAND:  .cxr 0xfffff88008570bf0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_dxgmms1!VidMmDestroyAllocation+46

BUCKET_ID:  X64_0x3B_dxgmms1!VidMmDestroyAllocation+46

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`03e10000 fffff880`03e4e000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ec0000 fffff880`00f17000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03c80000 fffff880`03d0a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03f29000 fffff880`03f3f000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`029db000 fffff880`029f0000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e00000 fffff880`00e0b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03ec0000 fffff880`03ec8000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`03df7000 fffff880`03dfe000   AsIO     AsIO.sys     Mon Dec 17 04:11:49 2007 (47663D55)
fffff880`0793d000 fffff880`07948000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00ff7000 fffff880`01000000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d7d000 fffff880`00da7000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04f9e000 fffff880`04fbe000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`044a7000 fffff880`04cb8000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
fffff880`02800000 fffff880`0284c000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
fffff880`028ae000 fffff880`028b5000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`029a4000 fffff880`029b5000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06fb3000 fffff880`06fd1000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00680000 fffff960`006a7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`011bc000 fffff880`011e6000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d05000 fffff880`00d63000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`012c4000 fffff880`01337000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03f19000 fffff880`03f29000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`036c6000 fffff880`036d4000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03dd9000 fffff880`03df7000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c68000 fffff880`03c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`013c6000 fffff880`013dc000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04e00000 fffff880`04e22000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`036e0000 fffff880`036e9000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`036d4000 fffff880`036e0000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`036e9000 fffff880`036fc000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04eb6000 fffff880`04ec2000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04cb8000 fffff880`04dac000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04dac000 fffff880`04df2000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00cd0000 fffff880`00ce4000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00da7000 fffff880`00df3000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01348000 fffff880`01352000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0138c000 fffff880`013c6000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0292f000 fffff880`02979000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02fe3000 fffff800`0302c000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04400000 fffff880`04424000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04e28000 fffff880`04e84000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04e92000 fffff880`04eab000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04eab000 fffff880`04eb3080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04e84000 fffff880`04e92000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`06eeb000 fffff880`06fb3000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01412000 fffff880`0141b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03ed4000 fffff880`03ef2000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03ef2000 fffff880`03f01000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bad000 fffff800`00bb7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04eda000 fffff880`04f1d000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`012aa000 fffff880`012c4000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01577000 fffff880`015a2000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04e22000 fffff880`04e27200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03740000 fffff880`03755000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`036fc000 fffff880`0371f000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ce4000 fffff880`00cf1000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`036b8000 fffff880`036c6000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03f01000 fffff880`03f10000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00d63000 fffff880`00d7d000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02874000 fffff880`028a5000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`06e9e000 fffff880`06eae000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`06fd1000 fffff880`06fe9000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06e00000 fffff880`06e2d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`06e2d000 fffff880`06e7b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`06e7b000 fffff880`06e9e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02913000 fffff880`0291e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f20000 fffff880`00f2a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0124c000 fffff880`012aa000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c5d000 fffff880`03c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01400000 fffff880`01412000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01425000 fffff880`01517000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03f63000 fffff880`03f6f000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03f6f000 fffff880`03f9e000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04f89000 fffff880`04f9e000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03d7e000 fffff880`03d8d000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03d0a000 fffff880`03d4f000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01517000 fffff880`01577000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`06eae000 fffff880`06ebd000   npf      npf.sys      Tue Oct 20 14:00:19 2009 (4ADDFAB3)
fffff880`0291e000 fffff880`0292f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c51000 fffff880`03c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a07000 fffff800`02fe3000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01019000 fffff880`011bc000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`028a5000 fffff880`028ae000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03d58000 fffff880`03d7e000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f6a000 fffff880`00f7f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f2a000 fffff880`00f5d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ff0000 fffff880`00ff7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00cc0000 fffff880`00cd0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01337000 fffff880`01348000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0747d000 fffff880`07523000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04fbe000 fffff880`04ffb000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf1000 fffff880`00d05000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03f3f000 fffff880`03f63000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03f9e000 fffff880`03fb9000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03fb9000 fffff880`03fda000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03fda000 fffff880`03ff4000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03c00000 fffff880`03c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`028f8000 fffff880`02901000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02901000 fffff880`0290a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0290a000 fffff880`02913000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01352000 fffff880`0138c000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03755000 fffff880`0376d000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04424000 fffff880`0447a000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`0376d000 fffff880`03779000   RtNdPt60 RtNdPt60.sys Mon Dec 10 21:49:52 2007 (475DFAD0)
fffff880`07523000 fffff880`0752e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03ec8000 fffff880`03ed4000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03d8d000 fffff880`03daa000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015ee000 fffff880`015f6000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07821000 fffff880`078b7000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0756d000 fffff880`075d4000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0752e000 fffff880`0755b000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03ff4000 fffff880`03ff5480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`03a01000 fffff880`03bfe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0755b000 fffff880`0756d000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02997000 fffff880`029a4000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02979000 fffff880`02997000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03dc5000 fffff880`03dd9000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`029b5000 fffff880`029db000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03658000 fffff880`036ac000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`04f1d000 fffff880`04f2f000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04eb4000 fffff880`04eb5f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03eaf000 fffff880`03ec0000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04f2f000 fffff880`04f89000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03e4e000 fffff880`03e59000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e59000 fffff880`03eaf000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`036ac000 fffff880`036b8000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
fffff880`00f5d000 fffff880`00f6a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`028b5000 fffff880`028c3000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`028c3000 fffff880`028e8000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f7f000 fffff880`00f94000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f94000 fffff880`00ff0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`015a2000 fffff880`015ee000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03daa000 fffff880`03dc5000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`028e8000 fffff880`028f8000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e0d000 fffff880`00eb1000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00eb1000 fffff880`00ec0000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d4f000 fffff880`03d58000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00050000 fffff960`00360000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`03f10000 fffff880`03f19000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f17000 fffff880`00f20000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0371f000 fffff880`03740000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`078cc000 fffff880`0793d000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`078b7000 fffff880`078cc000   NisDrvWFP.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00015000
fffff880`01230000 fffff880`0123e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0123e000 fffff880`0124a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0141b000 fffff880`01424000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`013dc000 fffff880`013ef000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Last edited:
Joined
Dec 21, 2010
Messages
9
Reaction score
0
What is the best way to update those? I can't seem to find where they reside in device manager. I updated the RtNdPt60.sys file by downloading a newer one off this site and copying it over the old ones throughout my pc. Can't seem to find a new copy of the AsIO.sys file.
 
Joined
Dec 21, 2010
Messages
9
Reaction score
0
Updated realtek driver from Asus & uninstalled the asus utility that used AsIO.sys file. Had another blue screen today...

Attached is minidump.

Did I miss something else? Should I update my bios?
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Two things you need to take care of:

1. AsIO.sys Mon Dec 17 04:11:49 2007

If you can't uninstall or update it, which would be the right approach, let's take a shortcut. Navigate to C:\Windows\system32\drivers and rename AsIO.sys to AsIO.bak.



2. Rt64win7.sys Thu Aug 20 12:05:06 2009

The Realtek LAN driver is too old for Windows 7 and therefore needs to be updated.

http://www.realtek.com.tw/downloads/downloadsView.aspx?Langid=1&PNid=10&PFid=13&Level=4&Conn=3




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\010211-24726-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a55000 PsLoadedModuleList = 0xfffff800`02c92e50
Debug session time: Sun Jan  2 20:23:58.193 2011 (UTC - 5:00)
System Uptime: 0 days 18:20:19.505
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff880848e70cb, 1, fffff880048e70b5, 5}

Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys

Could not read faulting driver name
Probably caused by : atikmdag.sys ( atikmdag+4480b5 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff880848e70cb, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff880048e70b5, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfd0e0
 fffff880848e70cb 

FAULTING_IP: 
atikmdag+4480b5
fffff880`048e70b5 66413100        xor     word ptr [r8],ax

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880059e4a90 -- (.trap 0xfffff880059e4a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000f13c rbx=0000000000000000 rcx=0000000000000038
rdx=fffff880059e4c70 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880048e70b5 rsp=fffff880059e4c28 rbp=cccccccccccccccd
 r8=fffff880848e70cb  r9=fffff880059e4c70 r10=fffff80002a55000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na po nc
atikmdag+0x4480b5:
fffff880`048e70b5 66413100        xor     word ptr [r8],ax ds:4ca8:fffff880`848e70cb=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b448c1 to fffff80002ac5740

STACK_TEXT:  
fffff880`059e4928 fffff800`02b448c1 : 00000000`00000050 fffff880`848e70cb 00000000`00000001 fffff880`059e4a90 : nt!KeBugCheckEx
fffff880`059e4930 fffff800`02ac382e : 00000000`00000001 00000000`00000004 2483da56`d36c8d00 1204fbca`7abc7705 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`059e4a90 fffff880`048e70b5 : fffff880`04790e84 fffff880`04b20a00 cccccccc`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`059e4c28 fffff880`04790e84 : fffff880`04b20a00 cccccccc`00000000 00000000`00000000 00000000`00000000 : atikmdag+0x4480b5
fffff880`059e4c30 fffff880`04b20a00 : cccccccc`00000000 00000000`00000000 00000000`00000000 fffff800`02c3fe80 : atikmdag+0x2f1e84
fffff880`059e4c38 cccccccc`00000000 : 00000000`00000000 00000000`00000000 fffff800`02c3fe80 fffffa80`00014729 : atikmdag+0x681a00
fffff880`059e4c40 00000000`00000000 : 00000000`00000000 fffff800`02c3fe80 fffffa80`00014729 00000000`0000019d : 0xcccccccc`00000000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
atikmdag+4480b5
fffff880`048e70b5 66413100        xor     word ptr [r8],ax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  atikmdag+4480b5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4cef1f94

FAILURE_BUCKET_ID:  X64_0x50_atikmdag+4480b5

BUCKET_ID:  X64_0x50_atikmdag+4480b5

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`03e67000 fffff880`03ea5000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f37000 fffff880`00f8e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03c83000 fffff880`03d0d000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03f47000 fffff880`03f5d000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`029c9000 fffff880`029de000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04496000 fffff880`0449e000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`03c77000 fffff880`03c7e000   AsIO     AsIO.sys     Mon Dec 17 04:11:49 2007 (47663D55)
fffff880`07671000 fffff880`0767c000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00e78000 fffff880`00e81000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04ed6000 fffff880`04ef6000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`0449f000 fffff880`04cb0000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
fffff880`03e1b000 fffff880`03e67000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
fffff880`0289c000 fffff880`028a3000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02992000 fffff880`029a3000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0377c000 fffff880`0379a000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      unavailable (00000000)
fffff880`0763f000 fffff880`0765c000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`02838000 fffff880`02862000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cfb000 fffff880`00dbb000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00c35000 fffff880`00c65000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c9d000 fffff880`00cfb000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010e3000 fffff880`01156000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03f37000 fffff880`03f47000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0233e000 fffff880`0234c000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ddc000 fffff880`03dfa000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c68000 fffff880`03c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0141b000 fffff880`01431000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04f33000 fffff880`04f55000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`02358000 fffff880`02361000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0234c000 fffff880`02358000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02361000 fffff880`02374000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04fb7000 fffff880`04fc3000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04cb0000 fffff880`04da4000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04da4000 fffff880`04dea000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01071000 fffff880`01085000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01025000 fffff880`01071000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`011a2000 fffff880`011dc000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0291d000 fffff880`02967000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a0c000 fffff800`02a55000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04400000 fffff880`04424000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04f5b000 fffff880`04fb7000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`0239e000 fffff880`023b7000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`023b7000 fffff880`023bf080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`02390000 fffff880`0239e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`036b4000 fffff880`0377c000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01412000 fffff880`0141b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03efb000 fffff880`03f19000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03f19000 fffff880`03f28000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bb5000 fffff800`00bbf000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04e12000 fffff880`04e55000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01590000 fffff880`015bb000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04f55000 fffff880`04f5a200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02221000 fffff880`02236000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`023c0000 fffff880`023e3000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c7c000 fffff880`00c89000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`02382000 fffff880`02390000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03f28000 fffff880`03f37000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00dcb000 fffff880`00de5000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02862000 fffff880`02893000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`0379a000 fffff880`037b2000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`037b2000 fffff880`037df000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`03600000 fffff880`0364e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0364e000 fffff880`03671000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02901000 fffff880`0290c000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f97000 fffff880`00fa1000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01085000 fffff880`010e3000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c5d000 fffff880`03c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01400000 fffff880`01412000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0143e000 fffff880`01530000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03f81000 fffff880`03f8d000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03f8d000 fffff880`03fbc000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04ec1000 fffff880`04ed6000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03d81000 fffff880`03d90000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03d0d000 fffff880`03d52000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01530000 fffff880`01590000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`03671000 fffff880`03680000   npf      npf.sys      Tue Oct 20 14:00:19 2009 (4ADDFAB3)
fffff880`0290c000 fffff880`0291d000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c51000 fffff880`03c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a55000 fffff800`03031000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01258000 fffff880`013fb000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02893000 fffff880`0289c000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03d5b000 fffff880`03d81000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fe1000 fffff880`00ff6000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fa1000 fffff880`00fd4000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00dbb000 fffff880`00dcb000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0767d000 fffff880`07723000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04ef6000 fffff880`04f33000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c89000 fffff880`00c9d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03f5d000 fffff880`03f81000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03fbc000 fffff880`03fd7000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03fd7000 fffff880`03ff8000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03e00000 fffff880`03e1a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03c00000 fffff880`03c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`028e6000 fffff880`028ef000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`028ef000 fffff880`028f8000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`028f8000 fffff880`02901000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015c3000 fffff880`015fd000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02236000 fffff880`0224e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`07600000 fffff880`0763f000   Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
fffff880`07723000 fffff880`0772e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04dea000 fffff880`04df6000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03d90000 fffff880`03dad000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015bb000 fffff880`015c3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0224e000 fffff880`022e4000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0776d000 fffff880`077d4000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0772e000 fffff880`0775b000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03ff8000 fffff880`03ff9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`03a00000 fffff880`03bfd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0775b000 fffff880`0776d000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02985000 fffff880`02992000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02967000 fffff880`02985000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03dc8000 fffff880`03ddc000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005f0000 fffff960`005fa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`029a3000 fffff880`029c9000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`022ea000 fffff880`0233e000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`04e55000 fffff880`04e67000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`02380000 fffff880`02381f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04485000 fffff880`04496000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04e67000 fffff880`04ec1000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0447a000 fffff880`04485000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03ea5000 fffff880`03efb000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`02374000 fffff880`02380000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
fffff880`00fd4000 fffff880`00fe1000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`028a3000 fffff880`028b1000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`028b1000 fffff880`028d6000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01156000 fffff880`011a2000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03dad000 fffff880`03dc8000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`028d6000 fffff880`028e6000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e84000 fffff880`00f28000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f28000 fffff880`00f37000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d52000 fffff880`03d5b000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`00390000   win32k   win32k.sys   unavailable (00000000)
fffff880`04df6000 fffff880`04dff000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f8e000 fffff880`00f97000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02200000 fffff880`02221000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`04424000 fffff880`0447a000   Rt64win7.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00056000
fffff880`07600000 fffff880`07671000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01235000 fffff880`01243000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01431000 fffff880`0143d000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01243000 fffff880`0124c000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`011dc000 fffff880`011ef000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000




 
Last edited:
Joined
Dec 21, 2010
Messages
9
Reaction score
0
Reinstalled Windows 7

OK, so I reinstalled windows to eliminate any other software issue. So now I have a fresh install of windows 7 with a bunch of updates, driver udpates, etc. and my PC still crashes while playing Roller Coaster Tycoon 3. The only program I have installed is RCT3.

Attached is the minidump.

Could it be a heat issue?
 

Attachments

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads

SOLVED Laptop crashes (no BSOD) - please help me 3
SOLVED BSOD and crashes 9
BSOD/Crashes. 3
Various BSOD crashes 1
Random Crashes & BSOD 2
BSOD - Intermittent Crashes 4
BSOD and crashes games 50
SOLVED BSOD/crashes - Win7 64bit 10

Top