Solved BSOD in varying modules.

SilentD

New Member
Messages
12
I've been looking through the forums posts trying different steps. The problems started after installing new RAM and a new SSD (which is a secondary SSD).

I've run the RAM through MemTest including the hammer test and after 8.5 hours the ram passed with no errors.

In spite of having a gaming laptop I don't play many games (only Brogue, really).

Anecdotal evidence suggests video related issues. Typically the BSOD will appear when I'm moving a window from one monitor to another or clicking on a menu. The video drivers should be up to date. If watching a video on youtube BSOD us more likely to occur, but not guaranteed. Sometimes the same video will BSOD at the same point in the video (but I haven't tried more than twice).

I do have a USB keyboard plugged in (G110) and a headset plugged into the keyboard. The keyboard's USB plug is plugged into a Vantec powered USB hub and that's plugged into a USB 3 port on the laptop. USB Wireless mouse is in a USB 2 port. Occasionally the USB 3 port on the laptop seems to short and loses power. I have to reboot to restore functionality. BSOD doesn't seem directly connected to those events.

I'm wondering if my power settings need to be tweaked but I'll wait for that advice. HWiNFO64 shows my CPU status voltage running between 1.120V and up to 1.758V - mostly hovers at 1.1470V.

I'm not overclocking (at least I haven't turned that on specifically).

I use Oracle Virtual Box to run several 2GB virtual machines (never more than 3 at once) which is why I bumped the RAM.

BSOD have not appeared when running idle.
 
Hello,
Your system seems to be completely out of date... :D
There is no single source of problem, network and video drivers should be updated since this seems to be most critical section on your laptop.

Dump 1 ( 2 of the kind )

Code:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


[B]DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)[/B]
[COLOR=#ff0000]An attempt was made to access a pageable (or completely invalid) address at an[/COLOR]
[COLOR=#ff0000]interrupt request level (IRQL) that is too high.  This is usually[/COLOR]
[COLOR=#ff0000]caused by drivers using improper addresses.[/COLOR]
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000002a, memory referenced
Arg2: 000000000000000[COLOR=#ff0000]2, IRQL[/COLOR]
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80031777404, address which referenced memory


Debugging Details:
------------------




READ_ADDRESS: GetPointerFromAddress: unable to read from fffff801cade5138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 000000000000002a 


CURRENT_IRQL:  2


FAULTING_IP: 
USBPORT!USBPORT_Core_iCompleteDoneTransfer+ba4
fffff800`31777404 48837a2800      cmp     qword ptr [rdx+28h],0


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  AV


PROCESS_NAME:  System


ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre


DPC_STACK_BASE:  FFFFF801CC706FB0


TRAP_FRAME:  fffff801cc6ff410 -- (.trap 0xfffff801cc6ff410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe00067d3d1a0 rbx=0000000000000000 rcx=ffffe00067d3e398
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80031777404 rsp=fffff801cc6ff5a0 rbp=fffff801cc6ff6b0
 r8=0000000000009dd0  r9=fffff801caa82000 r10=00000000000003ed
r11=ffffe00067cfe000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xba4:
fffff800`31777404 48837a2800      cmp     qword ptr [rdx+28h],0 ds:00000000`0000002a=????????????????
Resetting default scope


LAST_CONTROL_TRANSFER:  from fffff801cabde4e9 to fffff801cabd29a0


STACK_TEXT:  
fffff801`cc6ff2c8 fffff801`cabde4e9 : 00000000`0000000a 00000000`0000002a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`cc6ff2d0 fffff801`cabdcd3a : 00000000`00000000 ffffe000`72355970 ffffe000`6c1f7000 ffffe000`6c22c9b0 : nt!KiBugCheckDispatch+0x69
fffff801`cc6ff410 fffff800`31777404 : ffffffff`ffffffff ffffe000`67d3d3a0 fffff801`cc6ff6b0 ffffe000`00000005 : nt!KiPageFault+0x23a
fffff801`cc6ff5a0 fffff800`3177676d : 00000000`00000002 ffffe000`7268780c ffffe000`67d3e0e0 ffffe000`67d3d1a0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xba4
fffff801`cc6ff740 fffff800`317763e3 : ffffe000`72687944 ffffe000`67d3e178 ffffe000`67d3d1a0 00001d43`00001e00 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x21d
fffff801`cc6ff7a0 fffff800`31775f4e : fffff801`cc6ff900 ffffe000`67d3d050 00000000`00000002 ffffe000`00000002 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0x1e3
fffff801`cc6ff810 fffff801`cab36d50 : fffff801`cc6ff990 fffff801`caa82000 fffff801`cc6ffb50 00000000`00000f44 : USBPORT!USBPORT_Xdpc_Worker_IocDpc+0x1fe
fffff801`cc6ff890 fffff801`cab36007 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x1b0
fffff801`cc6ff9e0 fffff801`cabd64ea : fffff801`cad85180 fffff801`cad85180 fffff801`caddea00 ffffe000`68661880 : nt!KiRetireDpcList+0xd7
fffff801`cc6ffc60 00000000`00000000 : fffff801`cc700000 fffff801`cc6fa000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a




STACK_COMMAND:  kb


FOLLOWUP_IP: 
USBPORT!USBPORT_Core_iCompleteDoneTransfer+ba4
fffff800`31777404 48837a2800      cmp     qword ptr [rdx+28h],0


SYMBOL_STACK_INDEX:  3


SYMBOL_NAME:  USBPORT!USBPORT_Core_iCompleteDoneTransfer+ba4


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: USBPORT


IMAGE_NAME:  [COLOR=#ff0000]USBPORT.SYS[/COLOR]


DEBUG_FLR_IMAGE_TIMESTAMP:  53897701


IMAGE_VERSION:  6.3.9600.17195


BUCKET_ID_FUNC_OFFSET:  ba4


FAILURE_BUCKET_ID:  AV_USBPORT!USBPORT_Core_iCompleteDoneTransfer


BUCKET_ID:  AV_USBPORT!USBPORT_Core_iCompleteDoneTransfer


ANALYSIS_SOURCE:  KM


FAILURE_ID_HASH_STRING:  km:av_usbport!usbport_core_icompletedonetransfer


FAILURE_ID_HASH:  {97aa3145-0dee-e1fa-5761-df3626c8dc26}


Followup: MachineOwner
---------

Code:
3: kd> !cpuinfoCP  F/M/S Manufacturer  MHz PRCB Signature    MSR 8B Signature Features
 3  6,60,3 GenuineIntel 2794 0000001700000000                   3d193fff
                      Cached Update Signature 0000001700000000
                     Initial Update Signature 0000001700000000

For reference:
Windows Kits\8.1\Include\km\wdm.h
Code:
#if defined(_AMD64_) 
//
// Interrupt Request Level definitions
//


#define PASSIVE_LEVEL 0                 // Passive release level
#define LOW_LEVEL 0                     // Lowest interrupt level
#define APC_LEVEL 1                     // APC interrupt level
[COLOR=#ff0000]#define DISPATCH_LEVEL 2                [/COLOR][COLOR=#008000]// Dispatcher level[/COLOR]
#define CMCI_LEVEL 5                    // CMCI handler level


#define CLOCK_LEVEL 13                  // Interval clock level
#define IPI_LEVEL 14                    // Interprocessor interrupt level
#define DRS_LEVEL 14                    // Deferred Recovery Service level
#define POWER_LEVEL 14                  // Power failure level
#define PROFILE_LEVEL 15                // timer used for profiling.
#define HIGH_LEVEL 15                   // Highest interrupt level


#endif

Modules loaded:
Code:
3: kd> lm n tstart             end                 module name
fffff801`42b9f000 fffff801`42ba8000   kd       kd.dll       Thu Aug 22 13:40:43 2013 (5215F8BB)
fffff801`43c01000 fffff801`43c71000   hal      hal.dll      Mon Jun 02 00:49:12 2014 (538BADE8)
fffff801`43c71000 fffff801`44405000   nt       ntkrnlmp.exe Sat Jan 10 07:13:11 2015 (54B0C2F7)
fffff801`60405000 fffff801`6046b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Thu Aug 22 13:40:16 2013 (5215F8A0)
fffff801`6046b000 fffff801`60479000   werkernel werkernel.sys Thu Aug 22 13:40:24 2013 (5215F8A8)
fffff801`60479000 fffff801`604da000   CLFS     CLFS.SYS     Wed Mar 19 09:12:20 2014 (53295164)
fffff801`604da000 fffff801`604fc000   tm       tm.sys       Thu Aug 22 13:39:33 2013 (5215F875)
fffff801`604fc000 fffff801`60511000   PSHED    PSHED.dll    Sat Sep 14 15:57:19 2013 (52346B3F)
fffff801`60511000 fffff801`6051b000   BOOTVID  BOOTVID.dll  Thu Aug 22 13:40:26 2013 (5215F8AA)
fffff801`6051b000 fffff801`605a3000   CI       CI.dll       Sat Dec 06 04:23:28 2014 (548276B0)
fffff801`605a3000 fffff801`60600000   msrpc    msrpc.sys    Thu Aug 22 13:39:22 2013 (5215F86A)
fffff801`6061d000 fffff801`606ec000   Wdf01000 Wdf01000.sys Thu Aug 22 13:38:56 2013 (5215F850)
fffff801`606ec000 fffff801`606fd000   WDFLDR   WDFLDR.SYS   Thu Aug 22 13:39:03 2013 (5215F857)
fffff801`606fd000 fffff801`60715000   acpiex   acpiex.sys   Thu Aug 22 13:37:47 2013 (5215F80B)
fffff801`60715000 fffff801`60720000   WppRecorder WppRecorder.sys Thu Aug 22 13:39:40 2013 (5215F87C)
fffff801`60720000 fffff801`607aa000   ACPI     ACPI.sys     Sat Feb 22 13:13:57 2014 (53089485)
fffff801`607aa000 fffff801`607b4000   WMILIB   WMILIB.SYS   Thu Aug 22 13:40:23 2013 (5215F8A7)
fffff801`607b4000 fffff801`60800000   netbt    netbt.sys    Thu Aug 22 13:37:01 2013 (5215F7DD)
fffff801`60800000 fffff801`6081c000   pdc      pdc.sys      Wed Oct 08 07:21:59 2014 (5434C9F7)
fffff801`6081c000 fffff801`60834000   partmgr  partmgr.sys  Thu Aug 22 13:40:20 2013 (5215F8A4)
fffff801`60834000 fffff801`6089d000   spaceport spaceport.sys Thu Jul 24 13:45:14 2014 (53D0F1CA)
fffff801`6089d000 fffff801`608b2000   volmgr   volmgr.sys   Thu Aug 22 13:39:53 2013 (5215F889)
fffff801`608ef000 fffff801`6097b000   cng      cng.sys      Wed Jan 14 03:29:05 2015 (54B5D471)
fffff801`60986000 fffff801`60990000   msisadrv msisadrv.sys Thu Aug 22 13:39:03 2013 (5215F857)
fffff801`60990000 fffff801`609d8000   pci      pci.sys      Thu Jul 24 13:45:24 2014 (53D0F1D4)
fffff801`609d8000 fffff801`609e5000   vdrvroot vdrvroot.sys Thu Aug 22 13:38:49 2013 (5215F849)
fffff801`60a00000 fffff801`60a1c000   disk     disk.sys     Thu Aug 22 13:39:47 2013 (5215F883)
fffff801`60a1c000 fffff801`60a71000   CLASSPNP CLASSPNP.SYS Wed Apr 09 08:53:25 2014 (5344EE65)
fffff801`60a95000 fffff801`60af4000   volmgrx  volmgrx.sys  Thu Aug 22 13:40:23 2013 (5215F8A7)
fffff801`60af4000 fffff801`60b0d000   vmci     vmci.sys     Sat May 18 03:19:18 2013 (5196D716)
fffff801`60b0d000 fffff801`60b24000   vsock    vsock.sys    Mon Jun 30 02:37:03 2014 (53B0B12F)
fffff801`60b24000 fffff801`60b3f000   mountmgr mountmgr.sys Thu Aug 22 13:40:04 2013 (5215F894)
fffff801`60b3f000 fffff801`60b81000   WdFilter WdFilter.sys Thu Jul 10 04:42:59 2014 (53BDFDB3)
fffff801`60b81000 fffff801`60bb2000   ksecpkg  ksecpkg.sys  Mon Jan 12 04:01:17 2015 (54B338FD)
fffff801`60bb2000 fffff801`60bf8000   rdyboost rdyboost.sys Sat Feb 22 13:13:40 2014 (53089474)
fffff801`60c1a000 fffff801`60ed0000   iaStorA  iaStorA.sys  Mon Oct 28 22:15:26 2013 (526ED3EE)
fffff801`60ed0000 fffff801`60f2f000   storport storport.sys Sun Apr 06 16:08:55 2014 (53415FF7)
fffff801`60f49000 fffff801`60fa5000   fltmgr   fltmgr.sys   Sun Apr 06 16:10:42 2014 (53416062)
fffff801`60fa5000 fffff801`60fbb000   fileinfo fileinfo.sys Sat Feb 22 13:13:10 2014 (53089456)
fffff801`60fbb000 fffff801`60fe6000   Wof      Wof.sys      Thu Mar 13 09:27:29 2014 (53216BF1)
fffff801`61000000 fffff801`61078000   NETIO    NETIO.SYS    Tue Sep 09 10:35:50 2014 (540EBBE6)
fffff801`61078000 fffff801`6108f000   mup      mup.sys      Thu Aug 22 13:40:28 2013 (5215F8AC)
fffff801`6108f000 fffff801`6109e000   intelpep intelpep.sys Wed Oct 08 09:33:44 2014 (5434E8D8)
fffff801`6109e000 fffff801`61294000   Ntfs     Ntfs.sys     Thu Jul 24 09:30:36 2014 (53D0B61C)
fffff801`61294000 fffff801`612b0000   ksecdd   ksecdd.sys   Sat Sep 21 09:59:44 2013 (523D51F0)
fffff801`612b0000 fffff801`612c0000   pcw      pcw.sys      Thu Aug 22 10:46:34 2013 (5215CFEA)
fffff801`612c0000 fffff801`612cb000   Fs_Rec   Fs_Rec.sys   Thu Aug 22 10:46:33 2013 (5215CFE9)
fffff801`612cb000 fffff801`613e3000   ndis     ndis.sys     Thu Jun 05 13:49:03 2014 (5390592F)
fffff801`613e3000 fffff801`613f8000   crashdmp crashdmp.sys Thu Aug 22 13:40:03 2013 (5215F893)
fffff801`61406000 fffff801`61677000   tcpip    tcpip.sys    Mon Sep 08 03:52:24 2014 (540D0BD8)
fffff801`61677000 fffff801`616e3000   fwpkclnt fwpkclnt.sys Mon Sep 08 03:51:02 2014 (540D0B86)
fffff801`616e3000 fffff801`61708000   wfplwfs  wfplwfs.sys  Sat Mar 08 10:22:45 2014 (531AE165)
fffff801`61708000 fffff801`6179d000   fvevol   fvevol.sys   Tue Apr 08 00:25:31 2014 (534325DB)
fffff801`6179d000 fffff801`617ec000   volsnap  volsnap.sys  Thu Jun 19 00:41:28 2014 (53A21598)
fffff801`617ec000 fffff801`617f7000   nvpciflt nvpciflt.sys Thu Feb 05 18:50:32 2015 (54D3AD68)
fffff801`61a00000 fffff801`61a0c000   Msfs     Msfs.SYS     Thu Aug 22 13:40:24 2013 (5215F8A8)
fffff801`61a0c000 fffff801`61a2c000   tdx      tdx.sys      Thu Aug 22 13:36:34 2013 (5215F7C2)
fffff801`61a2c000 fffff801`61a3a000   TDI      TDI.SYS      Thu Aug 22 13:39:01 2013 (5215F855)
fffff801`61a3a000 fffff801`61a45000   ws2ifsl  ws2ifsl.sys  Thu Aug 22 13:40:03 2013 (5215F893)
fffff801`61a70000 fffff801`61a81000   umbus    umbus.sys    Thu Aug 22 13:38:59 2013 (5215F853)
fffff801`61a81000 fffff801`61d37000   dump_iaStorA dump_iaStorA.sys Mon Oct 28 22:15:26 2013 (526ED3EE)
fffff801`61d5a000 fffff801`61d88000   cdrom    cdrom.sys    Thu Aug 22 10:46:35 2013 (5215CFEB)
fffff801`61d88000 fffff801`61db2000   ccSetx64 ccSetx64.sys Mon Jul 29 21:50:14 2013 (51F6C776)
fffff801`61db2000 fffff801`61dbb000   Null     Null.SYS     Thu Aug 22 13:40:24 2013 (5215F8A8)
fffff801`61dbb000 fffff801`61dc3000   Beep     Beep.SYS     Thu Aug 22 13:40:24 2013 (5215F8A8)
fffff801`61dc3000 fffff801`61dd1000   BasicRender BasicRender.sys Sat Feb 22 13:14:02 2014 (5308948A)
fffff801`61dd1000 fffff801`61de3000   BasicDisplay BasicDisplay.sys Thu Aug 22 13:39:31 2013 (5215F873)
fffff801`61de3000 fffff801`61df7000   Npfs     Npfs.SYS     Thu Aug 22 13:40:25 2013 (5215F8A9)
fffff801`61e00000 fffff801`61e61000   dxgmms1  dxgmms1.sys  Thu Mar 06 10:22:14 2014 (53183E46)
fffff801`61e68000 fffff801`61fe9000   dxgkrnl  dxgkrnl.sys  Fri Jun 13 00:32:12 2014 (539A2A6C)
fffff801`61fe9000 fffff801`61ffb000   watchdog watchdog.sys Sat Feb 22 13:14:39 2014 (530894AF)
fffff801`62028000 fffff801`62035000   teamviewervpn teamviewervpn.sys Thu Dec 13 10:22:09 2007 (4760F9C1)
fffff801`62035000 fffff801`62042000   tap0901  tap0901.sys  Thu Nov 24 19:50:27 2011 (4ECE91F3)
fffff801`62042000 fffff801`62051000   CompositeBus CompositeBus.sys Thu Aug 22 13:38:48 2013 (5215F848)
fffff801`62051000 fffff801`6205c000   kdnic    kdnic.sys    Thu Aug 22 13:38:26 2013 (5215F832)
fffff801`6206b000 fffff801`620fd000   afd      afd.sys      Fri May 30 05:03:01 2014 (5387F4E5)
fffff801`620fd000 fffff801`62127000   pacer    pacer.sys    Thu Aug 22 13:36:06 2013 (5215F7A6)
fffff801`62127000 fffff801`6213f000   vwififlt vwififlt.sys Wed Apr 30 08:43:46 2014 (53609BA2)
fffff801`6213f000 fffff801`6218c000   nvkflt   nvkflt.sys   Thu Feb 05 18:50:27 2015 (54D3AD63)
fffff801`6218c000 fffff801`62198000   npsvctrig npsvctrig.sys Thu Aug 22 13:38:22 2013 (5215F82E)
fffff801`62198000 fffff801`621a4000   mssmbios mssmbios.sys Thu Aug 22 13:39:41 2013 (5215F87D)
fffff801`621a4000 fffff801`621ca000   dfsc     dfsc.sys     Thu Mar 06 10:22:50 2014 (53183E6A)
fffff801`621da000 fffff801`621f1000   ahcache  ahcache.sys  Fri Dec 12 01:51:20 2014 (548A3C08)
fffff801`62200000 fffff801`6220e000   nsiproxy nsiproxy.sys Thu Aug 22 13:36:34 2013 (5215F7C2)
fffff801`62214000 fffff801`6246b000   bwcW8x64 bwcW8x64.sys Thu Apr 10 17:40:24 2014 (5346BB68)
fffff801`6246b000 fffff801`6247c000   netbios  netbios.sys  Thu Aug 22 13:38:58 2013 (5215F852)
fffff801`6247c000 fffff801`624ec000   rdbss    rdbss.sys    Tue Dec 17 08:21:22 2013 (52AFFB72)
fffff801`624ec000 fffff801`625d1000   VBoxDrv  VBoxDrv.sys  Mon Mar 02 15:20:04 2015 (54F47194)
fffff801`62600000 fffff801`6261c000   drmk     drmk.sys     Thu Aug 22 13:39:24 2013 (5215F86C)
fffff801`6261c000 fffff801`6266a000   ks       ks.sys       Fri Jul 04 14:58:59 2014 (53B6A513)
fffff801`6266a000 fffff801`62675000   NdisVirtualBus NdisVirtualBus.sys Thu Aug 22 13:36:25 2013 (5215F7B9)
fffff801`62675000 fffff801`62681000   iwdbus   iwdbus.sys   Thu Sep 26 23:38:04 2013 (5244A93C)
fffff801`62690000 fffff801`630a2000   nvlddmkm nvlddmkm.sys Thu Feb 05 19:01:37 2015 (54D3B001)
fffff801`630a2000 fffff801`6312d000   SynTP    SynTP.sys    Fri Jan 10 04:16:42 2014 (52CF661A)
fffff801`6312d000 fffff801`63155000   SteelBus64 SteelBus64.sys Wed Jan 08 18:00:12 2014 (52CD841C)
fffff801`63155000 fffff801`63160000   rdpbus   rdpbus.sys   Thu Aug 22 13:38:52 2013 (5215F84C)
fffff801`6316a000 fffff801`63188000   intelppm intelppm.sys Thu Aug 22 10:46:35 2013 (5215CFEB)
fffff801`63188000 fffff801`63193000   UEFI     UEFI.sys     Thu Aug 22 13:40:03 2013 (5215F893)
fffff801`63193000 fffff801`631a0000   nvvad64v nvvad64v.sys Thu Nov 20 16:33:54 2014 (546E09E2)
fffff801`631a0000 fffff801`631e7000   portcls  portcls.sys  Sat Feb 22 13:11:25 2014 (530893ED)
fffff801`63200000 fffff801`6326f000   USBPORT  USBPORT.SYS  Sat May 31 08:30:25 2014 (53897701)
fffff801`6326f000 fffff801`63288000   HDAudBus HDAudBus.sys Thu Jul 24 13:45:39 2014 (53D0F1E3)
fffff801`63288000 fffff801`632ab000   e22w8x64 e22w8x64.sys Wed Mar 26 16:58:37 2014 (5332F92D)
fffff801`632ab000 fffff801`632b8000   Smb_driver_Intel Smb_driver_Intel.sys Fri Jan 10 04:21:21 2014 (52CF6731)
fffff801`632bb000 fffff801`636dd000   igdkmd64 igdkmd64.sys Wed Dec 18 21:49:12 2013 (52B20A48)
fffff801`636dd000 fffff801`63732000   USBXHCI  USBXHCI.SYS  Sat Feb 22 13:11:27 2014 (530893EF)
fffff801`63732000 fffff801`63764000   ucx01000 ucx01000.sys Sat Feb 22 13:11:33 2014 (530893F5)
fffff801`63764000 fffff801`63781000   TeeDriverx64 TeeDriverx64.sys Wed Nov 27 18:56:32 2013 (52963250)
fffff801`63781000 fffff801`63799000   usbehci  usbehci.sys  Sat May 31 08:29:54 2014 (538976E2)
fffff801`63799000 fffff801`637b8000   i8042prt i8042prt.sys Thu Aug 22 13:39:15 2013 (5215F863)
fffff801`637b8000 fffff801`637beb80   SAlphaPS264 SAlphaPS264.sys Wed Mar 05 16:00:39 2014 (53173C17)
fffff801`637bf000 fffff801`637cf000   kbdclass kbdclass.sys Thu Aug 22 13:39:23 2013 (5215F86B)
fffff801`637cf000 fffff801`637da000   VMkbd    VMkbd.sys    Fri Nov 21 02:36:56 2014 (546E9738)
fffff801`637da000 fffff801`637e0380   CmBatt   CmBatt.sys   Thu Aug 22 13:39:43 2013 (5215F87F)
fffff801`637e1000 fffff801`637ed000   BATTC    BATTC.SYS    Thu Aug 22 13:40:04 2013 (5215F894)
fffff801`637ed000 fffff801`637f7000   wmiacpi  wmiacpi.sys  Thu Aug 22 13:40:04 2013 (5215F894)
fffff801`637f7000 fffff801`637fc300   ksthunk  ksthunk.sys  Thu Aug 22 13:39:31 2013 (5215F873)
fffff801`63800000 fffff801`63871000   RtsPer   RtsPer.sys   Fri Oct 18 08:09:07 2013 (5260D083)
fffff801`63871000 fffff801`6387d000   USBD     USBD.SYS     Sat May 31 08:31:17 2014 (53897735)
fffff801`63880000 fffff801`63bdf000   Netwbw02 Netwbw02.sys Wed Apr 16 22:57:48 2014 (534EEECC)
fffff801`63bdf000 fffff801`63bec000   vwifibus vwifibus.sys Thu Aug 22 13:39:00 2013 (5215F854)
fffff801`63bec000 fffff801`63bfc000   mouclass mouclass.sys Thu Aug 22 13:39:13 2013 (5215F861)
fffff801`63bfc000 fffff801`63bfd600   swenum   swenum.sys   Thu Aug 22 13:39:29 2013 (5215F871)
fffff801`63c00000 fffff801`63c32000   ibtusb   ibtusb.sys   Fri Apr 04 06:17:46 2014 (533E326A)
fffff801`63c32000 fffff801`63c56000   luafv    luafv.sys    Sat Feb 22 13:14:25 2014 (530894A1)
fffff801`63c56000 fffff801`63c6a000   lltdio   lltdio.sys   Thu Aug 22 13:36:18 2013 (5215F7B2)
fffff801`63c7a000 fffff801`63ce4000   usbhub   usbhub.sys   Thu Jul 24 13:45:29 2014 (53D0F1D9)
fffff801`63ce4000 fffff801`63d0b000   usbccgp  usbccgp.sys  Thu Jul 24 13:44:51 2014 (53D0F1B3)
fffff801`63d0b000 fffff801`63d83000   UsbHub3  UsbHub3.sys  Thu Jul 24 13:43:31 2014 (53D0F163)
fffff801`63d83000 fffff801`63d91000   hidusb   hidusb.sys   Thu Mar 06 10:24:14 2014 (53183EBE)
fffff801`63d91000 fffff801`63db0000   HIDCLASS HIDCLASS.SYS Thu Mar 06 10:24:40 2014 (53183ED8)
fffff801`63db0000 fffff801`63db7f00   HIDPARSE HIDPARSE.SYS Thu Aug 22 13:40:26 2013 (5215F8AA)
fffff801`63e00000 fffff801`63e11000   vmnetbridge vmnetbridge.sys Sun Jul 27 15:30:32 2014 (53D4FEF8)
fffff801`63e1a000 fffff801`63e28000   kbdhid   kbdhid.sys   Thu Aug 22 13:39:13 2013 (5215F861)
fffff801`63e28000 fffff801`63e35000   mouhid   mouhid.sys   Thu Aug 22 13:39:13 2013 (5215F861)
fffff801`63e38000 fffff801`641e1d80   RTKVHD64 RTKVHD64.sys Tue Jan 21 12:16:00 2014 (52DE56F0)
fffff801`641e2000 fffff801`641f0000   MBfilt64 MBfilt64.sys Fri Jul 31 05:40:32 2009 (4A7267B0)
fffff801`641f4000 fffff801`641ff000   VMNET    VMNET.SYS    Sun Jul 27 15:30:27 2014 (53D4FEF3)
fffff801`64200000 fffff801`64239000   fastfat  fastfat.SYS  Thu Aug 22 13:40:18 2013 (5215F8A2)
fffff801`64239000 fffff801`64247000   monitor  monitor.sys  Thu Aug 22 13:36:37 2013 (5215F7C5)
fffff801`6424a000 fffff801`643a9000   btmhsf   btmhsf.sys   Thu Feb 20 15:42:24 2014 (53061450)
fffff801`643a9000 fffff801`643c2000   BTHUSB   BTHUSB.sys   Fri Jan 31 13:09:17 2014 (52EB926D)
fffff801`643c2000 fffff801`643e9000   btmaux   btmaux.sys   Mon Feb 03 12:31:32 2014 (52EF7E14)
fffff801`643e9000 fffff801`643ff000   dump_dumpfve dump_dumpfve.sys Sat Feb 22 13:14:48 2014 (530894B8)
fffff801`64400000 fffff801`6443d000   BthLEEnum BthLEEnum.sys Wed Dec 04 19:41:54 2013 (529F7772)
fffff801`6443d000 fffff801`6446b000   rfcomm   rfcomm.sys   Mon Jan 27 20:48:03 2014 (52E6B7F3)
fffff801`6446b000 fffff801`6447d000   BthEnum  BthEnum.sys  Thu Aug 22 13:36:46 2013 (5215F7CE)
fffff801`6447f000 fffff801`645ab000   bthport  bthport.sys  Thu Jul 24 13:42:01 2014 (53D0F109)
fffff801`645c9000 fffff801`645ea000   bthpan   bthpan.sys   Thu Jul 24 13:41:43 2014 (53D0F0F7)
fffff801`645ea000 fffff801`645f6000   dump_diskdump dump_diskdump.sys Thu Aug 22 13:40:18 2013 (5215F8A2)
fffff801`6467f000 fffff801`646f3000   nwifi    nwifi.sys    Thu Jul 24 13:42:14 2014 (53D0F116)
fffff801`646f3000 fffff801`64707000   ndisuio  ndisuio.sys  Thu Aug 22 13:37:34 2013 (5215F7FE)
fffff801`64707000 fffff801`6471f000   rspndr   rspndr.sys   Thu Aug 22 13:36:34 2013 (5215F7C2)
fffff801`6471f000 fffff801`6472f000   condrv   condrv.sys   Thu Aug 22 13:40:17 2013 (5215F8A1)
fffff801`6472f000 fffff801`64749000   vmx86    vmx86.sys    Fri Nov 21 03:35:28 2014 (546EA4F0)
fffff801`64749000 fffff801`64794000   mrxsmb10 mrxsmb10.sys Thu Mar 06 10:19:36 2014 (53183DA8)
fffff801`64800000 fffff801`64820000   bowser   bowser.sys   Thu Aug 22 13:38:38 2013 (5215F83E)
fffff801`64820000 fffff801`64837000   mpsdrv   mpsdrv.sys   Thu Aug 22 13:36:06 2013 (5215F7A6)
fffff801`64837000 fffff801`648a3000   mrxsmb   mrxsmb.sys   Wed Apr 30 08:41:44 2014 (53609B28)
fffff801`648a3000 fffff801`648dc000   mrxsmb20 mrxsmb20.sys Fri Jun 20 01:37:24 2014 (53A37434)
fffff801`648dc000 fffff801`648ed000   hcmon    hcmon.sys    Tue Nov 18 17:04:00 2014 (546B6DF0)
fffff801`648ed000 fffff801`648fc000   vwifimp  vwifimp.sys  Wed Apr 30 08:41:59 2014 (53609B37)
fffff801`648fc000 fffff801`649f6000   HTTP     HTTP.sys     Mon Jan 27 20:48:02 2014 (52E6B7F2)
fffff801`64a00000 fffff801`64a28000   VBoxNetAdp VBoxNetAdp.sys Mon Mar 02 15:18:55 2015 (54F4714F)
fffff801`64a28000 fffff801`64a53000   VBoxNetFlt VBoxNetFlt.sys Mon Mar 02 15:18:54 2015 (54F4714E)
fffff801`64a9f000 fffff801`64b48000   peauth   peauth.sys   Sat Feb 22 13:09:37 2014 (53089381)
fffff801`64b48000 fffff801`64b53000   secdrv   secdrv.SYS   Wed Sep 13 15:18:38 2006 (4508052E)
fffff801`64b53000 fffff801`64b96000   srvnet   srvnet.sys   Fri Jun 27 08:22:21 2014 (53AD0D9D)
fffff801`64b96000 fffff801`64ba8000   tcpipreg tcpipreg.sys Thu Mar 06 10:19:59 2014 (53183DBF)
fffff801`64ba8000 fffff801`64bb2000   vmnetuserif vmnetuserif.sys Fri Nov 21 01:59:48 2014 (546E8E84)
fffff801`64bb2000 fffff801`64bbc000   NvStreamKms NvStreamKms.sys Mon Jan 12 18:56:42 2015 (54B40ADA)
fffff801`64bbc000 fffff801`64bc2000   winio64  winio64.sys  Fri Jun 04 06:08:03 2010 (4C087C23)
fffff801`64bc2000 fffff801`64be8000   VBoxUSBMon VBoxUSBMon.sys Mon Mar 02 15:18:55 2015 (54F4714F)
fffff801`64e00000 fffff801`64e20000   WudfPf   WudfPf.sys   Sat May 31 08:27:20 2014 (53897648)
fffff801`64e20000 fffff801`64e5d000   WUDFRd   WUDFRd.sys   Sat May 31 08:26:44 2014 (53897624)
fffff801`64e5d000 fffff801`64e66000   mshidumdf mshidumdf.sys Thu Aug 22 13:39:06 2013 (5215F85A)
fffff801`64e66000 fffff801`64e6d000   NTIOLib_X64 NTIOLib_X64.sys Thu Oct 25 12:27:58 2012 (5089142E)
fffff801`64e6d000 fffff801`64f19000   srv2     srv2.sys     Thu Jul 24 13:44:19 2014 (53D0F193)
fffff801`64f19000 fffff801`64f46000   tunnel   tunnel.sys   Thu Aug 22 13:35:45 2013 (5215F791)
fffff801`64f46000 fffff801`64fd4000   srv      srv.sys      Thu Jul 24 13:43:27 2014 (53D0F15F)
fffff801`64fd4000 fffff801`64ff3000   WdNisDrv WdNisDrv.sys Thu Jul 10 04:43:40 2014 (53BDFDDC)
fffff801`66200000 fffff801`66226000   USBSTOR  USBSTOR.SYS  Sun Aug 31 00:49:23 2014 (540254F3)
fffff801`66240000 fffff801`6624b000   WpdUpFltr WpdUpFltr.sys Thu Aug 22 13:38:45 2013 (5215F845)
fffff801`66299000 fffff801`663a9000   VMMR0    VMMR0.r0     Mon Mar 02 15:19:46 2015 (54F47182)
fffff801`663a9000 fffff801`663d2000   VBoxDDR0 VBoxDDR0.r0  Mon Mar 02 15:18:54 2015 (54F4714E)
fffff801`663d2000 fffff801`663db000   VBoxDD2R0 VBoxDD2R0.r0 Mon Mar 02 15:18:54 2015 (54F4714E)
fffff960`0013e000 fffff960`00554000   win32k   win32k.sys   unavailable (00000000)
fffff960`0068d000 fffff960`00696000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00902000 fffff960`0093d000   cdd      cdd.dll      unavailable (00000000)
fffff960`00abd000 fffff960`00b1c000   ATMFD    ATMFD.DLL    unavailable (00000000)


Unloaded modules:
fffff801`66226000 fffff801`66240000   EhStorClass.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001A000
fffff801`645ab000 fffff801`645c9000   usbaudio.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001E000
fffff801`64ff3000 fffff801`64ffe000   WpdUpFltr.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff801`63db8000 fffff801`63dde000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00026000
fffff801`641f0000 fffff801`641f4000   wdcsam64.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00004000
fffff801`62512000 fffff801`625f7000   VBoxDrv.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  000E5000
fffff801`624ec000 fffff801`62512000   VBoxUSBMon.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00026000
fffff801`61a45000 fffff801`61a70000   VBoxNetFlt.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff801`62000000 fffff801`62028000   VBoxNetAdp.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00028000
fffff801`60fe6000 fffff801`60ff2000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff801`61a8e000 fffff801`61d44000   dump_iaStorA
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  002B6000
fffff801`61d44000 fffff801`61d5a000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00016000
fffff801`63e00000 fffff801`63e1a000   EhStorClass.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001A000
fffff801`60f2f000 fffff801`60f49000   EhStorClass.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001A000
fffff801`6312d000 fffff801`6316a000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0003D000
fffff801`621ca000 fffff801`621da000   dam.sys 
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00010000
fffff801`6097b000 fffff801`60986000   WdBoot.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff801`613e3000 fffff801`613ef000   hwpolicy.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000

Faulting driver info:
Code:
0: kd> lmvm usbportstart             end                 module name
fffff800`3176c000 fffff800`317db000   USBPORT    (pdb symbols)          d:\symbols\usbport.pdb\28C1655CA79342BB8598F96E061103D61\usbport.pdb
    Loaded symbol image file: USBPORT.SYS
    Mapped memory image file: d:\symbols\USBPORT.SYS\538977016f000\USBPORT.SYS
    Image path: \SystemRoot\System32\drivers\USBPORT.SYS
    Image name: USBPORT.SYS
    Timestamp:        Sat May 31 08:30:25 2014 (53897701)
    CheckSum:         000790F5
    ImageSize:        0006F000
    File version:     6.3.9600.17195
    Product version:  6.3.9600.17195
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        2.0 Dll
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     usbport.sys
    OriginalFilename: usbport.sys
    ProductVersion:   6.3.9600.17195
    FileVersion:      6.3.9600.17195 (winblue_gdr.140530-1506)
    FileDescription:  USB 1.1 & 2.0 Port Driver
    LegalCopyright:   © Microsoft Corporation. All rights reserved.


Dump 3: Ancillary Function Driver for Winsock ( 2 of the kind )
Code:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


[B]IRQL_NOT_LESS_OR_EQUAL (a)[/B]
[COLOR=#ff0000]An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.[/COLOR]
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000060008, memory referenced
Arg2: 000000000000000[COLOR=#ff0000]2, IRQL[/COLOR]
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801b5aaa9f6, address which referenced memory


Debugging Details:
------------------




READ_ADDRESS: GetPointerFromAddress: unable to read from fffff801b5d6c138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 0000000000060008 


CURRENT_IRQL:  2


FAULTING_IP: 
nt!IopfCompleteRequest+976
fffff801`b5aaa9f6 48394208        cmp     qword ptr [rdx+8],rax


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  AV


PROCESS_NAME:  System


ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre


DPC_STACK_BASE:  FFFFF801B779CFB0


TRAP_FRAME:  fffff801b7795690 -- (.trap 0xfffff801b7795690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe0006202c118 rbx=0000000000000000 rcx=ffffe00059d0f0e8
rdx=0000000000060000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801b5aaa9f6 rsp=fffff801b7795820 rbp=fffff801b7795920
 r8=0000000000000004  r9=fffff801b5aa5a60 r10=fffff801b5d0ef80
r11=fffff801b7795958 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!IopfCompleteRequest+0x976:
fffff801`b5aaa9f6 48394208        cmp     qword ptr [rdx+8],rax ds:00000000`00060008=????????????????
Resetting default scope


LAST_CONTROL_TRANSFER:  from fffff801b5b654e9 to fffff801b5b599a0


STACK_TEXT:  
fffff801`b7795548 fffff801`b5b654e9 : 00000000`0000000a 00000000`00060008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`b7795550 fffff801`b5b63d3a : 00000000`00000000 ffffe000`59d0f060 00000000`00000000 ffffe000`00000010 : nt!KiBugCheckDispatch+0x69
fffff801`b7795690 fffff801`b5aaa9f6 : ffffe000`59d0f060 ffffe000`58e63060 fffff801`b7795920 ffffe000`62781000 : nt!KiPageFault+0x23a
fffff801`b7795820 fffff801`f509aba0 : fffff801`b7795b00 ffffe000`59d0f002 00000000`00000000 fffff801`b5ab0f45 : nt!IopfCompleteRequest+0x976
fffff801`b7795960 fffff801`f509ac7e : fffff801`b7795b60 ffffe000`6591e478 00000000`00000001 ffffe000`659e7920 : afd!AfdCompletePollIrp+0x80
fffff801`b77959b0 fffff801`b5abd428 : 00000000`00000000 fffff801`b7795ae0 00000000`00000001 00000000`00000001 : afd!AfdTimeoutPoll+0x2e
fffff801`b77959e0 fffff801`b5b5d4ea : fffff801`b5d0c180 fffff801`b5d0c180 fffff801`b5d65a00 ffffe000`60c75880 : nt!KiRetireDpcList+0x4f8
fffff801`b7795c60 00000000`00000000 : fffff801`b7796000 fffff801`b7790000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a




STACK_COMMAND:  kb


FOLLOWUP_IP: 
afd!AfdCompletePollIrp+80
fffff801`f509aba0 488b5c2450      mov     rbx,qword ptr [rsp+50h]


SYMBOL_STACK_INDEX:  4


SYMBOL_NAME:  afd!AfdCompletePollIrp+80


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: afd


IMAGE_NAME:  afd.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  5387f4e5


IMAGE_VERSION:  6.3.9600.17194


BUCKET_ID_FUNC_OFFSET:  80


FAILURE_BUCKET_ID:  AV_afd!AfdCompletePollIrp


BUCKET_ID:  AV_afd!AfdCompletePollIrp


ANALYSIS_SOURCE:  KM


FAILURE_ID_HASH_STRING:  km:av_afd!afdcompletepollirp


FAILURE_ID_HASH:  {391ebd74-0f39-15f7-e5d5-58ee1191dd0f}


Followup: MachineOwner
---------

About this driver:
Code:
0: kd> lmvm afdstart             end                 module name
fffff801`f504c000 fffff801`f50de000   afd        (pdb symbols)          d:\symbols\afd.pdb\573AECD2398440D5AF663DECF64B2AF72\afd.pdb
    Loaded symbol image file: afd.sys
    Mapped memory image file: d:\symbols\afd.sys\5387F4E592000\afd.sys
    Image path: \SystemRoot\system32\drivers\afd.sys
    Image name: afd.sys
    Timestamp:        Fri May 30 05:03:01 2014 (5387F4E5)
    CheckSum:         000970DE
    ImageSize:        00092000
    File version:     6.3.9600.17194
    Product version:  6.3.9600.17194
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     afd.sys
    OriginalFilename: afd.sys
    ProductVersion:   6.3.9600.17194
    FileVersion:      6.3.9600.17194 (winblue_gdr.140529-1934)
    FileDescription:  Ancillary Function Driver for WinSock
    LegalCopyright:   © Microsoft Corporation. All rights reserved.



This one related to PCI driver, related to Nvidia PCI Express: ( Only once )

Code:
3: kd> !analyze -v*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


DRIVER_POWER_STATE_FAILURE (9f)
A driver has failed to complete a power IRP within a specific time.
Arguments:
Arg1: 0000000000000003, A device object has been blocking an Irp for too long a time
Arg2: ffffe00051bee060, Physical Device Object of the stack
Arg3: ffffd000c15e1960, nt!TRIAGE_9F_POWER on Win7 and higher, otherwise the Functional Device Object of the stack
Arg4: ffffe00057e8b520, The blocked IRP


Debugging Details:
------------------




DRVPOWERSTATE_SUBCODE:  3


IMAGE_NAME:  pci.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  53d0f1d4


MODULE_NAME: pci


FAULTING_MODULE: fffff801b831a000 pci


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  0x9F


PROCESS_NAME:  System


CURRENT_IRQL:  2


ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre


DPC_STACK_BASE:  FFFFD000C15E8FB0


STACK_TEXT:  
ffffd000`c15e1928 fffff802`cee17e3e : 00000000`0000009f 00000000`00000003 ffffe000`51bee060 ffffd000`c15e1960 : nt!KeBugCheckEx
ffffd000`c15e1930 fffff802`cee17d5e : ffffe000`55bdaf00 00000000`00000001 ffffe000`55bdaf38 fffff802`cecc2515 : nt!PopIrpWatchdogBugcheck+0xde
ffffd000`c15e1990 fffff802`cecc3428 : 00000000`00000000 ffffd000`c15e1ae0 00000000`00000001 00000000`00000002 : nt!PopIrpWatchdog+0x32
ffffd000`c15e19e0 fffff802`ced634ea : ffffd000`c1589180 ffffd000`c1589180 ffffd000`c15953c0 ffffe000`56fab080 : nt!KiRetireDpcList+0x4f8
ffffd000`c15e1c60 00000000`00000000 : ffffd000`c15e2000 ffffd000`c15dc000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a




STACK_COMMAND:  kb


FOLLOWUP_NAME:  MachineOwner


IMAGE_VERSION:  6.3.9600.17238


FAILURE_BUCKET_ID:  0x9F_3_nvlddmkm_IMAGE_pci.sys


BUCKET_ID:  0x9F_3_nvlddmkm_IMAGE_pci.sys


ANALYSIS_SOURCE:  KM


FAILURE_ID_HASH_STRING:  km:0x9f_3_nvlddmkm_image_pci.sys


FAILURE_ID_HASH:  {a47222af-fbac-bc49-47e0-2cf5d31cc673}


Followup: MachineOwner
---------

Closer look at above:
Code:
3: kd> !irp ffffe00057e8b520Irp is active with 4 stacks 3 is current (= 0xffffe00057e8b680)
 No Mdl: No System Buffer: Thread 00000000:  Irp stack trace.  Pending has been returned
     cmd  flg cl Device   File     Completion-Context
 [  0, 0]   0  2 00000000 00000000 00000000-00000000    


            Args: 00000000 00000000 00000000 ffffffffc000000e
 [ 16, 0]   0  2 ffffe00051bee060 00000000 fffff801ba340df8-ffffe000532d6650    
           [COLOR=#ff0000]\Driver\pci    nvlddmkm[/COLOR]
            Args: 00000000 00000000 00000000 00000000
>[ 16, 2]   0 e1 ffffe000533fa040 00000000 fffff802ced2defc-ffffe00055bdaf00 [COLOR=#ff0000]Success Error Cancel pending[/COLOR]
           \Driver\nvlddmkm    nt!PopRequestCompletion
            Args: 00000000 00000001 00000001 00000000
 [  0, 0]   0  0 00000000 00000000 00000000-ffffe00055bdaf00    


            Args: 00000000 00000000 00000000 00000000


And here is a bad driver
one that makes a logic pattern with all of the above bogus "2 of the kind" dumps: ( again! 2 of the kind )
Code:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


[B]SYSTEM_SERVICE_EXCEPTION (3b)[/B]
[COLOR=#ff0000]An exception happened while executing a system service routine.
Arguments:[/COLOR]
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801aa404f20, Address of the instruction which caused the bugcheck
Arg3: ffffd00026271d90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.


Debugging Details:
------------------




EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.


FAULTING_IP: 
dlkmd+4f20
fffff801`aa404f20 483910          cmp     qword ptr [rax],rdx


CONTEXT:  ffffd00026271d90 -- (.cxr 0xffffd00026271d90;r)
rax=0000001e6e6a0402 rbx=0000000000000000 rcx=ffffe001027fd000
rdx=ffffe00103de3dc0 rsi=ffffe001027fd000 rdi=ffffd000262733c0
rip=fffff801aa404f20 rsp=ffffd000262727c8 rbp=ffffd00026272a80
 r8=0000000000000000  r9=7ffff801aa4643e8 r10=fffff801aa4643e8
r11=7ffffffffffffffc r12=ffffe0010778f000 r13=ffffe00103de3dc0
r14=ffffd00026272cd0 r15=ffffe000fe117bb0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
dlkmd+0x4f20:
fffff801`aa404f20 483910          cmp     qword ptr [rax],rdx ds:002b:0000001e`6e6a0402=????????????????
Last set context:
rax=0000001e6e6a0402 rbx=0000000000000000 rcx=ffffe001027fd000
rdx=ffffe00103de3dc0 rsi=ffffe001027fd000 rdi=ffffd000262733c0
rip=fffff801aa404f20 rsp=ffffd000262727c8 rbp=ffffd00026272a80
 r8=0000000000000000  r9=7ffff801aa4643e8 r10=fffff801aa4643e8
r11=7ffffffffffffffc r12=ffffe0010778f000 r13=ffffe00103de3dc0
r14=ffffd00026272cd0 r15=ffffe000fe117bb0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
dlkmd+0x4f20:
fffff801`aa404f20 483910          cmp     qword ptr [rax],rdx ds:002b:0000001e`6e6a0402=????????????????
Resetting default scope


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  0x3B


PROCESS_NAME:  dwm.exe


CURRENT_IRQL:  1


ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre


LAST_CONTROL_TRANSFER:  from fffff801aa4106d0 to fffff801aa404f20


STACK_TEXT:  
ffffd000`262727c8 fffff801`aa4106d0 : 00000000`00000000 ffffd000`26272a80 ffffe001`027fd000 ffffd000`262733c0 : dlkmd+0x4f20
ffffd000`262727d0 00000000`00000000 : ffffd000`26272a80 ffffe001`027fd000 ffffd000`262733c0 00000000`00000000 : dlkmd+0x106d0




FOLLOWUP_IP: 
dlkmd+4f20
fffff801`aa404f20 483910          cmp     qword ptr [rax],rdx


SYMBOL_STACK_INDEX:  0


SYMBOL_NAME:  dlkmd+4f20


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: dlkmd


IMAGE_NAME:  dlkmd.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  53bd4c1e


STACK_COMMAND:  .cxr 0xffffd00026271d90 ; kb


FAILURE_BUCKET_ID:  0x3B_dlkmd+4f20


BUCKET_ID:  0x3B_dlkmd+4f20


ANALYSIS_SOURCE:  KM


FAILURE_ID_HASH_STRING:  km:0x3b_dlkmd+4f20


FAILURE_ID_HASH:  {fc927101-fa8b-7645-01f0-0f7ec2f6f544}


Followup: MachineOwner
---------


About this driver:
Code:
0: kd> lmvm dlkmd
start             end                 module name
fffff801`aa400000 fffff801`aa491000   dlkmd    T (no symbols)           
    Loaded symbol image file: dlkmd.sys
    Image path: \SystemRoot\system32\drivers\dlkmd.sys
    Image name: dlkmd.sys
    Timestamp:        Wed Jul 09 16:05:18 2014 (53BD4C1E)
    CheckSum:         0006B432
    ImageSize:        00091000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4

This one related to networking so matches with the above winsock:
Code:
0: kd> !analyze -v*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


[B]ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)[/B]
[COLOR=#ff0000]An attempt was made to execute non-executable memory.  The guilty driver[/COLOR]
[COLOR=#ff0000]is on the stack trace (and is typically the current instruction pointer).[/COLOR]
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffd0019e462009, Virtual address for the attempted execute.
Arg2: 800000000132b963, PTE contents.
Arg3: ffffd0019e461dc0, (reserved)
Arg4: 0000000000000000, (reserved)


Debugging Details:
------------------




CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  0xFC


PROCESS_NAME:  System


CURRENT_IRQL:  2


ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre


TRAP_FRAME:  ffffd0019e461dc0 -- (.trap 0xffffd0019e461dc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0019e461f68 rbx=0000000000000000 rcx=ffffe00103d5bc11
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd0019e462009 rsp=ffffd0019e461f58 rbp=0000000000000001
 r8=ffffd0019e461f58  r9=ffffd0019e461f78 r10=0000000000000000
r11=ffffd0019e461f58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffffd001`9e462009 0000            add     byte ptr [rax],al ds:ffffd001`9e461f68=01
Resetting default scope


LAST_CONTROL_TRANSFER:  from fffff80038db15fa to fffff80038d539a0


STACK_TEXT:  
ffffd001`9e461b78 fffff800`38db15fa : 00000000`000000fc ffffd001`9e462009 80000000`0132b963 ffffd001`9e461dc0 : nt!KeBugCheckEx
ffffd001`9e461b80 fffff800`38e0250a : 00000000`00000000 fffff800`0b27bd5b ffffe001`014cd1a0 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x4d74a
ffffd001`9e461bc0 fffff800`38d7e44d : ffffe001`0799c420 ffffd001`9e461c80 ffffe001`07467df0 00000000`00000000 : nt!MiRaisedIrqlFault+0x152
ffffd001`9e461c00 fffff800`38d5dc2f : 00000000`00000008 ffffe001`0799c420 ffffe001`04d52000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x1a59d
ffffd001`9e461dc0 ffffd001`9e462009 : fffff800`0b269d00 ffffe001`0799c420 00000000`00000001 ffffe001`03d1ca21 : nt!KiPageFault+0x12f
ffffd001`9e461f58 fffff800`0b269d00 : ffffe001`0799c420 00000000`00000001 ffffe001`03d1ca21 ffffe001`071d7800 : 0xffffd001`9e462009
ffffd001`9e461f60 ffffe001`014cd1a0 : ffffe001`03d2d010 ffffe001`03d2d010 00000000`00000002 ffffe001`07467df0 : ndis!ndisMSendNetBufferListsCompleteInternal+0x100
ffffd001`9e461fc0 ffffe001`03d2d010 : ffffe001`03d2d010 00000000`00000002 ffffe001`07467df0 ffffe001`00000001 : 0xffffe001`014cd1a0
ffffd001`9e461fc8 ffffe001`03d2d010 : 00000000`00000002 ffffe001`07467df0 ffffe001`00000001 00000000`00000001 : 0xffffe001`03d2d010
ffffd001`9e461fd0 00000000`00000002 : ffffe001`07467df0 ffffe001`00000001 00000000`00000001 ffffe001`05b0a000 : 0xffffe001`03d2d010
ffffd001`9e461fd8 ffffe001`07467df0 : ffffe001`00000001 00000000`00000001 ffffe001`05b0a000 00001fff`03ffbfff : 0x2
ffffd001`9e461fe0 ffffe001`00000001 : 00000000`00000001 ffffe001`05b0a000 00001fff`03ffbfff ffffe000`00000000 : 0xffffe001`07467df0
ffffd001`9e461fe8 00000000`00000001 : ffffe001`05b0a000 00001fff`03ffbfff ffffe000`00000000 00000000`00000000 : 0xffffe001`00000001
ffffd001`9e461ff0 ffffe001`05b0a000 : 00001fff`03ffbfff ffffe000`00000000 00000000`00000000 ffffe001`03d5fc10 : 0x1
ffffd001`9e461ff8 00001fff`03ffbfff : ffffe000`00000000 00000000`00000000 ffffe001`03d5fc10 00000000`00000000 : 0xffffe001`05b0a000
ffffd001`9e462000 ffffe000`00000000 : 00000000`00000000 ffffe001`03d5fc10 00000000`00000000 00000000`00000000 : 0x00001fff`03ffbfff
ffffd001`9e462008 00000000`00000000 : ffffe001`03d5fc10 00000000`00000000 00000000`00000000 00000000`00000001 : 0xffffe000`00000000




STACK_COMMAND:  kb


FOLLOWUP_IP: 
ndis!ndisMSendNetBufferListsCompleteInternal+100
fffff800`0b269d00 7424            je      ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x16 (fffff800`0b269d26)


SYMBOL_STACK_INDEX:  6


SYMBOL_NAME:  ndis!ndisMSendNetBufferListsCompleteInternal+100


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: ndis


IMAGE_NAME:  ndis.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  54d01043


IMAGE_VERSION:  6.3.9600.17672


BUCKET_ID_FUNC_OFFSET:  100


FAILURE_BUCKET_ID:  0xFC_ndis!ndisMSendNetBufferListsCompleteInternal


BUCKET_ID:  0xFC_ndis!ndisMSendNetBufferListsCompleteInternal


ANALYSIS_SOURCE:  KM


FAILURE_ID_HASH_STRING:  km:0xfc_ndis!ndismsendnetbufferlistscompleteinternal


FAILURE_ID_HASH:  {1e62ec78-16a3-d031-52c7-9ce4e413dc6e}


Followup: MachineOwner
---------

Another bogus dump related to networking: ( 3 of the kind )
Code:
0: kd> !analyze -v*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


[B]UNEXPECTED_KERNEL_MODE_TRAP (7f)[/B]
[COLOR=#ff0000]This means a trap occurred in kernel mode, and it's a trap of a kind[/COLOR]
[COLOR=#ff0000]that the kernel isn't allowed to have/catch (bound trap) or that[/COLOR]
[COLOR=#ff0000]is always instant death (double fault).  [/COLOR]The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff803733a5e70
Arg3: ffffd0011409db20
Arg4: fffff80024496bd3


Debugging Details:
------------------




BUGCHECK_STR:  0x7f_8


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


PROCESS_NAME:  System


CURRENT_IRQL:  2


ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre


LAST_CONTROL_TRANSFER:  from fffff803717e74e9 to fffff803717db9a0


STACK_TEXT:  
fffff803`733a5d28 fffff803`717e74e9 : 00000000`0000007f 00000000`00000008 fffff803`733a5e70 ffffd001`1409db20 : nt!KeBugCheckEx
fffff803`733a5d30 fffff803`717e55f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`733a5e70 fffff800`24496bd3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb4
ffffd001`1409db20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IpNlpFastSendDatagram+0x23




STACK_COMMAND:  kb


FOLLOWUP_IP: 
tcpip!IpNlpFastSendDatagram+23
fffff800`24496bd3 48898424e0000000 mov     qword ptr [rsp+0E0h],rax


SYMBOL_STACK_INDEX:  3


SYMBOL_NAME:  tcpip!IpNlpFastSendDatagram+23


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: tcpip


IMAGE_NAME:  tcpip.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  540d0bd8


IMAGE_VERSION:  6.3.9600.17336


BUCKET_ID_FUNC_OFFSET:  23


FAILURE_BUCKET_ID:  0x7f_8_tcpip!IpNlpFastSendDatagram


BUCKET_ID:  0x7f_8_tcpip!IpNlpFastSendDatagram


ANALYSIS_SOURCE:  KM


FAILURE_ID_HASH_STRING:  km:0x7f_8_tcpip!ipnlpfastsenddatagram


FAILURE_ID_HASH:  {56a1f840-eb05-2058-a9fe-9da98312d4bc}


Followup: MachineOwner
---------


0: kd> lmvm tcpip
start             end                 module name
fffff800`24485000 fffff800`246f6000   tcpip      (pdb symbols)          d:\symbols\tcpip.pdb\C468A466DED64681B58275676A4795752\tcpip.pdb
    Loaded symbol image file: tcpip.sys
    Mapped memory image file: d:\symbols\tcpip.sys\540D0BD8271000\tcpip.sys
    Image path: \SystemRoot\System32\drivers\tcpip.sys
    Image name: tcpip.sys
    Timestamp:        Mon Sep 08 03:52:24 2014 (540D0BD8)
    CheckSum:         002678D0
    ImageSize:        00271000
    File version:     6.3.9600.17336
    Product version:  6.3.9600.17336
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.6 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     tcpip.sys
    OriginalFilename: tcpip.sys
    ProductVersion:   6.3.9600.17336
    FileVersion:      6.3.9600.17336 (winblue_r3.140907-1500)
    FileDescription:  TCP/IP Driver
    LegalCopyright:   © Microsoft Corporation. All rights reserved.


And here is the one that USB related:

Code:
5: kd> !analyze -v*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000002c88, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803f4caceaa, address which referenced memory


Debugging Details:
------------------




READ_ADDRESS: GetPointerFromAddress: unable to read from fffff803f4f71138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 0000000000002c88 


CURRENT_IRQL:  2


FAULTING_IP: 
nt!KeSetEvent+1fa
fffff803`f4caceaa 4839b7882c0000  cmp     qword ptr [rdi+2C88h],rsi


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  AV


PROCESS_NAME:  System


ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre


TRAP_FRAME:  ffffd0014bb78960 -- (.trap 0xffffd0014bb78960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe001aebfd9b0 rbx=0000000000000000 rcx=ffffe001aebfd9b0
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803f4caceaa rsp=ffffd0014bb78af0 rbp=0000000000000000
 r8=0000000000000100  r9=0000000000000000 r10=ffffe001af75a1b0
r11=ffffd0014bb78950 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeSetEvent+0x1fa:
fffff803`f4caceaa 4839b7882c0000  cmp     qword ptr [rdi+2C88h],rsi ds:00000000`00002c88=????????????????
Resetting default scope


LAST_CONTROL_TRANSFER:  from fffff803f4d6a4e9 to fffff803f4d5e9a0


STACK_TEXT:  
ffffd001`4bb78818 fffff803`f4d6a4e9 : 00000000`0000000a 00000000`00002c88 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd001`4bb78820 fffff803`f4d68d3a : 00000000`00000000 ffffe001`aebfd9a8 000000cb`00000000 00000062`00000062 : nt!KiBugCheckDispatch+0x69
ffffd001`4bb78960 fffff803`f4caceaa : ffffe001`aebfd9a8 00000000`00000000 00000000`00000000 ffffd001`4a900180 : nt!KiPageFault+0x23a
ffffd001`4bb78af0 fffff800`b0aa6931 : ffffe001`00000000 fffff800`00000000 ffffe001`aab2d400 fffff800`00000000 : nt!KeSetEvent+0x1fa
ffffd001`4bb78bb0 ffffe001`00000000 : fffff800`00000000 ffffe001`aab2d400 fffff800`00000000 ffffd001`4a900180 : RtsPer+0x5a931
ffffd001`4bb78bb8 fffff800`00000000 : ffffe001`aab2d400 fffff800`00000000 ffffd001`4a900180 ffffe001`ae922620 : 0xffffe001`00000000
ffffd001`4bb78bc0 ffffe001`aab2d400 : fffff800`00000000 ffffd001`4a900180 ffffe001`ae922620 fffff800`b0aa67a8 : 0xfffff800`00000000
ffffd001`4bb78bc8 fffff800`00000000 : ffffd001`4a900180 ffffe001`ae922620 fffff800`b0aa67a8 ffffe001`aa7af900 : 0xffffe001`aab2d400
ffffd001`4bb78bd0 ffffd001`4a900180 : ffffe001`ae922620 fffff800`b0aa67a8 ffffe001`aa7af900 ffffe001`af9ff040 : 0xfffff800`00000000
ffffd001`4bb78bd8 ffffe001`ae922620 : fffff800`b0aa67a8 ffffe001`aa7af900 ffffe001`af9ff040 fffff803`f4ce6280 : 0xffffd001`4a900180
ffffd001`4bb78be0 fffff800`b0aa67a8 : ffffe001`aa7af900 ffffe001`af9ff040 fffff803`f4ce6280 ffffffff`ffd9da60 : 0xffffe001`ae922620
ffffd001`4bb78be8 ffffe001`aa7af900 : ffffe001`af9ff040 fffff803`f4ce6280 ffffffff`ffd9da60 ffffe001`af9ff040 : RtsPer+0x5a7a8
ffffd001`4bb78bf0 ffffe001`af9ff040 : fffff803`f4ce6280 ffffffff`ffd9da60 ffffe001`af9ff040 00000000`00000080 : 0xffffe001`aa7af900
ffffd001`4bb78bf8 fffff803`f4ce6280 : ffffffff`ffd9da60 ffffe001`af9ff040 00000000`00000080 fffff803`f4d61d7d : 0xffffe001`af9ff040
ffffd001`4bb78c00 fffff803`f4d64fc6 : ffffd001`4f1ef180 ffffe001`af9ff040 ffffd001`4f1fb3c0 00000000`00001000 : nt!PspSystemThreadStartup+0x58
ffffd001`4bb78c60 00000000`00000000 : ffffd001`4bb79000 ffffd001`4bb73000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16




STACK_COMMAND:  kb


FOLLOWUP_IP: 
RtsPer+5a931
fffff800`b0aa6931 ??              ???


SYMBOL_STACK_INDEX:  4


SYMBOL_NAME:  RtsPer+5a931


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: RtsPer


IMAGE_NAME:  RtsPer.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  5260d083


FAILURE_BUCKET_ID:  AV_RtsPer+5a931


BUCKET_ID:  AV_RtsPer+5a931


ANALYSIS_SOURCE:  KM


FAILURE_ID_HASH_STRING:  km:av_rtsper+5a931


FAILURE_ID_HASH:  {7e497569-499a-2ede-f6b3-7cafa8e53ed3}


Followup: MachineOwner
---------


5: kd> lmvm RtsPer
start             end                 module name
fffff800`b0a4c000 fffff800`b0abd000   RtsPer   T (no symbols)           
    Loaded symbol image file: RtsPer.sys
    Image path: \SystemRoot\system32\DRIVERS\RtsPer.sys
    Image name: RtsPer.sys
    Timestamp:        Fri Oct 18 08:09:07 2013 (5260D083)
    CheckSum:         00072CDF
    ImageSize:        00071000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4


Drivers that must be installed:

MSI drivers download page:


Additional drivers, Refer to bellow links only if you still encounter BSOD:

Realtek USB

Realtek Audio

Intel graphics and chip set drivers
 
Thanks for looking into that for me. I would have made an attempt myself but I don't know where to start analyzing the dump files.

I've updated all of my drivers (according to DriverMax). I also removed the MSI overclocking software driver, just in case.

sfc does report that I have issues but it can't fix them so I'm going to go into safe mode and see if I can get that part fixed up, too.

I'll report back my findings. Thanks again!
 
Update

I've updated just about all of the drivers that I could find. I'm using DriverMax PRO to handle the searching and installation. I'm down to a fewer number of BSOD now. Just had one this afternoon so I'm including it. I'm still uncertain how to read these so I appreciate your assistance. View attachment 61606
 
Hi, why drivermax? why not buying a game or some other useful piece of software instead of drivermax?

go to website of your PC manufacturer, download original drivers and install them.
remove anything drivemax might have installed.
 
I originally went to the MSI site (MSI Global - The best gaming gears maker in the world) and downloaded the 15 or so drivers they have listed (including the BIOS update) and installed them in the order that they specified. I rebooted when asked. I then went from 1 BSOD per day to 3-4 per day. It was horrid. I've never had a problem with any computer like I started to have with this one. When I reached out for help, above, one part of your initial response indicated that almost all of those drivers were out of date. :shock:

Sometimes I arrived at a vendor's site downloaded what I thought was the correct driver only to be told that it wasn't the right driver for my computer or it wouldn't install. Finding the actual drivers seems to be an art all by itself.

DriverMax seemed to have a better way of finding the drivers that I wasn't able to locate and also found drivers for things I didn't even think of (like bus drivers, etc). I usually would hunt down a video driver or a printer driver - end of story. Things seemed to get much more stable and the variety of modules listed in my BSODs diminished. So while I agree that DriverMax is really doing something that I should be able to do - I decided to take a chance on $40 versus losing 1-2 hours of work/productivity every day. And, if I can't watch a youtube video without my machine crashing - what hope did I have of playing a game. ;)

If you still think that I should uninstall all of my drivers and re-install then I'll do that over the long weekend.

Thank you for staying in touch.
 
Last edited:
OK, let's skip drivers then, but I just want to let you know that driver download programs can cause problems and I don't trust such programs, I believe manual work and testing is worth much more.
Also I personally assembled/repaired a ton of computers and never had to use things such as drivermax in order to make stuff work, such not needed programs is what is put into category "bloatware" if you ask people like me.

NOTE: You are supposed to complete following steps carefully and report results of each one in order to get further assistance.
If you stuck at some point or don't know how to complete something then please ask instead of skipping the step.
You will need at least one day to complete all the steps.


Now first, why none of the drivers installed so far make any difference? it could be the problem isn't in drivers but in one of the following:
1.) hardware failure
2.) drivers are not designed to work for Windows 8.1
3.) some drivers cause too high DPC


Here is what you can do to identify each of possible problems above one by one:
1.) Hardware failure tests:
MEMORY TEST
To perform memory test visit below link and as explained on that link perform an extended test with at least 2 pass counts:
DOWNLOAD LINK

HARD DRIVE TEST
To check hard drive for problems perform following:
Close down all programs
Press: Windows key + X
Select: Command prompt (Admin)
Type: chkdsk /R /F
If the above command tells you following:
Chkdsk cannot run because the volume is in use by another
process. Would you like to schedule this volume to be
checked the next time the system restarts? (Y/N)
Type 'Y' hit enter and reboot.

TEMPERATURE TEST
Download temperature monitor program from below link:
DOWNLOAD LINK
Run the tool as Administrator ( otherwise the view will be limited )
While this tool is running try to overheat your PC, for example play some resource hungry games and use Windows key to minimize the game and watch for temp each 10 minutes. ( the game would have been played for about 40 minutes or more )
CPU/GPU temp. should not go over 85 or 90 C during that time.

CPU TEST
Visit below links to download software and perform testing.
Intel generic test
Prime number test

2.) drivers are not designed to work for Windows 8.1
I can't help you with this step since you didn't install only original drivers, you'll need to query drivermax and only hope it can tell you what drivers he installed.
However here is a tool which you can use to possibly identify bad 3rd party drivers.
- you're supposed to know what drivers drivermax installed before using the tool
- you're supposed to understand how to use the tool by learning from below link
How to use driver verifier

NOTE: do not test Microsoft drivers, only 3rd party drivers.

3.) some drivers cause too high DPC
Here is a tutorial and download links to check if drivers behave bad in real time:
DOWNLOAD 7zip
DOWNLOAD Windows SDK
DOWNLOAD DPC latency checker
TUTORIAL LINK
If you're unable to follow or understand this tutorial then please zip up the performance file captured by xperf and attach the file here.
Note: Only performance monitor is needed from SDK package.
Hint: the performance file will be large, it's recommended to use 7 zip and zip the file with LZMA2 ultra method in order to compress it up to 10 times of it's original size, before attaching it here.

If so far any of the above tests/steps does not yield bad or not expected results then here is what to do next:
we can assume the problem is with Windows itself, for example if Windows is corrupt it will not work properly and could even cause BSOD.
1.) Core windows file integrity test:
Close down all programs
Press: Windows key + X
Select: Command prompt (Admin)
Type: sfc /scannow

If the above results in error do this:
Press: Windows key + X
Select: Command prompt (Admin)
Type: dism /online /cleanup-image /restorehealth
If successful ( after it's complete )
Type again: sfc /scannow
and see if that worked

2.) Reproducing BSOD in clean boot
Visit below link to learn how to perform clean boot:
LINK
Once you done this try to reproduce BSOD

3.) Reproducing BSOD in safe mode
Visit below link to learn how to start Windows in safe mode:
LINK
Once you done this try to reproduce BSOD

4.) Scanning PC for malware:
There are many software available to make a scan. here are few good ones to perform a scan:
Free Avira Antivirus
Malwarebytes
Kaspersky offline scanner

Few notes about how to perform the scan:
- Full system scan with avira with maximum settings ( that is maximum heuristic and scan of all disks )
- Full system scan with malwarebytes with maximum settings ( that is maximum heuristic and scan of all disks )
- Kaspersky offline is not needed but an alternative to perform a full scan with max settings while Windows is down, in addition performing 2 different scans ( Avira and Kaspersky ) might result in different reports.

5.) For troubleshooting purposes remove ( if any ) of the following programs known to reproduce BSOD:
- Virtual machines
- 3rd party firewalls
- 3rd party Antivirus programs ( most notably: Avira, AVG, BitDefender and few others )
NOTE: using their official removal programs is better than removing manually
- Burning tools (ex. Alcohol, Nero... )

And yes, the driver max deserves to be listed above, because the drivers installed can't be trusted and are a big obstacle to identify problems while performing these test.

The above 5 steps should help isolate problems and I advise you to use them to help identify/isolate problems which could then be used to help identify additional problems or perform additional tests.

Please report results of each test.
In addition to test results provide following information:
1.) For how long are you using this Windows ( when you last time (re)installed windows )
2.) When did BSOD problems first time occur? ( in regard to Windows installation date )
3.) Have you ever installed non signed or untrusted software?
4.) How old is your PC?
5.) When did you last time change hardware components? (if any)
 
Quick note: This post is simply and update - no action necessary.

Note: DriverMax found version 10.18.14.4208 of the Intel HD Graphics 4600 driver so I installed that prior to running these tests.
Starting some of the diagnostics.
Processor Diagnostic Test passed
I ran the temperature monitor while running the CPU test. Max core temps (4 cores): 86, 92, 89 and 84.
Running Prime Number Test with the first option to maximize heat stress. No BSOD. Max core temps: 88, 97, 96, 92. Avg. temp: 85-87. Fan ran at medium speed with only an occasional change to the high speed.
Laptop has excellent ventilation. It is up on blocks so the main body is 2.5" above the desk. Fan vent is not impeded.

I'll update with the Microsoft ram test after next reboot.
 
Update - no action necessary:

Core windows integrity test failed. [DEL] Working on fixing that. [/DEL] Now passes.
Memory diagnostic test passed.
chkdsk test passed. No bad sectors found on the C drive. [DEL]Testing D drive now.[/DEL] No errors on D drive.
Malware tested negative.
 
Last edited:
Update - no action necessary.
I pulled out my SSD and went 8 days with no BSOD.
I put it back in yesterday and has a BSOD yesterday and one today. I've pulled it out again and will see if I stay stable.
I've been keeping up to date with all drivers as well.
 
Update - no action necessary.
SSD has been out for 3 days and no BSOD. I'll update in a week or so and mark as solved.
 
Update:
On a whim I let my system update to Windows 10. Went up to 3 BSODs a day. Often when accessed remotely (using TeamViewer). Gave up. Did a factory reset. Now I wait and keep my driver updates to a minimum.
 
Okay - Win10 didn't help at all. Several BSODs. Mostly occurring watching YouTube videos or editing videos. Surrendered. Did a system refresh back to day 1.
Went to MSI website and have installed all of the listed drivers, in order, and re-booted after each driver.
The NVidia driver has updated itself to the latest version.
Now I wait and try to break it. Shouldn't be hard.
 
Temperature test showed no problems.
CPU test showed no problems.
Core windows file integrity test is clean (but I did need to fix a problem)
ChkDsk finished with no errors.
I can reproduce the BSOD by leaving Firefox playing a long playlist of YouTube videos.
Was not able to reproduce BSOD in clean boot
I wasn't able to get computer to have networking access in Safe Mode so I wasn't able to test BSOD condition. I think I need to figure out how to duplicate without YouTube.

DOTA2 crashes within 30 seconds of playing in normal Windows boot. No BSOD, however.

Other note: When I plug a headset with separate plugs the laptop is unable to 'hear' the microphone. Realtek reports that something was plugged into the jack but it doesn't seems to be able to set it up properly. I had this problem before restoring the computer but I don't recall how I fixed it.

Other notes:
Laptop is less than a year old, purchased new from store.
Before it was really used had store install additional SSD (there's an accessible slot and I've determined that BSOD occurs with and without SSD installed) and new RAM (4x8gb).
Hammer Test on RAM (took about 8 hours) showed no errors.
I do have VirtualBox installed. That's basically the purpose of this machine and why I purchased so much RAM. Will try to reproduce BSOD in Clean Boot mode after un-installing VirtualBox.
 
UPDATE:
I took it into the shop (still under warranty) and it looks like re-applying thermal paste has sorted out the issue. I'm able to play long play-lists of YouTube videos that would normally make it crash and I can play DOTA 2 for more than 30 seconds (previously it would simply quit).

Marking as solved.
 
Back
Top