BSOD - About to give up with computer


  1. Posts : 7
    window 7 64
       #1

    BSOD - About to give up with computer


    Hi all,

    I have posted here a couple of times and everything I tried I could not fix it so I sent it to a PC shop to have a look.

    They did the following

    Stress tested everything for long periods - no BSOD
    Memtest overnight - No erorrs
    Played games on it for hours - No problems
    I gave them my mouse they put it in the USB - they said they got BSOD

    So i thought they found the problem they sorted it said they had the machine stable I took it home turned it on no problems, needed to restart for an updated ....

    BSOD

    Then 6 more BSOD trying to get the computer to boot back up again with or without usb products plugged in.

    I dont know what to do , this a brand new machine with seeming no errors but completely random BSOD's for no real reason.

    I have uploaded the dump, I will try phoning where I got the PC from but I know If i take it there its not going to BSOD and they will charge me for looking at it

    It has been windows 7 from new.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    One of your crashes was caused by Razer Synapse, a few others by ATI DSM Dynamic Driver, and you also have ntfs_24_error. A wide range actually.


    1. Check for updates:

    Rt64win7.sys Thu Aug 20 19:05:06 2009
    Realtek 8136/8168/8169 PCI/PCIe Adapters

    AtiPcie.sys Tue May 05 18:00:22 2009
    ATI PCIE Driver for ATI PCIE chipset

    atdcm64a.sys Fri Jun 26 00:56:31 2009
    ATI DSM Dynamic Driver


    2. Test RAM and HDD:

    RAM - Test with Memtest86+

    HD Diagnostic



    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100910-14679-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
    Debug session time: Sat Oct  9 09:02:13.719 2010 (GMT-5)
    System Uptime: 0 days 0:01:18.499
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C9, {20e, fffff880076ee432, fffff98011bf0ea0, 0}
    
    Unable to load image \??\C:\Users\Luke\Documents\AMD_Chipset_V51010008V13049_XPVistaWin7\Win 7\Bin64\atdcm64a.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for atdcm64a.sys
    *** ERROR: Module load completed but symbols could not be loaded for atdcm64a.sys
    Probably caused by : atdcm64a.sys ( atdcm64a+2432 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
    The IO manager has caught a misbehaving driver.
    Arguments:
    Arg1: 000000000000020e, A PNP IRP has an invalid status. Any PNP IRP must have its status initialized
    	to STATUS_NOT_SUPPORTED.
    Arg2: fffff880076ee432, The address in the driver's code where the error was detected.
    Arg3: fffff98011bf0ea0, IRP address.
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xc9_20e
    
    DRIVER_VERIFIER_IO_VIOLATION_TYPE:  20e
    
    FAULTING_IP: 
    atdcm64a+2432
    fffff880`076ee432 89442478        mov     dword ptr [rsp+78h],eax
    
    FOLLOWUP_IP: 
    atdcm64a+2432
    fffff880`076ee432 89442478        mov     dword ptr [rsp+78h],eax
    
    IRP_ADDRESS:  fffff98011bf0ea0
    
    DEVICE_OBJECT: 0000000000000000
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    PROCESS_NAME:  InstallManager
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002f193dc to fffff80002a8f740
    
    STACK_TEXT:  
    fffff880`09701368 fffff800`02f193dc : 00000000`000000c9 00000000`0000020e fffff880`076ee432 fffff980`11bf0ea0 : nt!KeBugCheckEx
    fffff880`09701370 fffff800`02f2347a : fffff800`02f179f0 fffff880`076ee432 fffff980`11bf0ea0 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
    fffff880`097013b0 fffff800`02f24483 : 00000000`0000020e 00000000`00000000 fffff980`11bf0ea0 00000000`ffffffff : nt!ViErrorFinishReport+0xda
    fffff880`09701400 fffff800`02f25115 : 00000000`00000000 fffffa80`056ff902 fffff980`11bf0ea0 fffff800`02f1ae56 : nt!VfErrorReport1+0x63
    fffff880`097014a0 fffff800`02f191e0 : fffff980`11bf0fb8 fffffa80`07012e50 00000000`00000000 fffff800`02f27e3f : nt!VfPnpVerifyNewRequest+0x45
    fffff880`097014d0 fffff800`02f31b33 : fffffa80`056ff980 fffffa80`07012e50 fffff980`11bf0ea0 fffffa80`06d51150 : nt!VfMajorVerifyNewRequest+0x70
    fffff880`09701520 fffff800`02f31d86 : 004d0041`00000001 fffffa80`00000001 fffffa80`00000001 fffff880`076ee432 : nt!IovpCallDriver1+0x483
    fffff880`097015d0 fffff800`02f35bb2 : fffff980`11bf0ea0 00000000`00000002 fffff980`11bf0ea0 fffff800`02cfc00c : nt!VfBeforeCallDriver+0x186
    fffff880`09701630 fffff880`076ee432 : fffff980`11a04ee0 00000000`00000002 fffffa80`05f9ba20 fffffa80`0734c260 : nt!IovCallDriver+0x502
    fffff880`09701690 fffff980`11a04ee0 : 00000000`00000002 fffffa80`05f9ba20 fffffa80`0734c260 00000000`00000000 : atdcm64a+0x2432
    fffff880`09701698 00000000`00000002 : fffffa80`05f9ba20 fffffa80`0734c260 00000000`00000000 fffff880`097016f0 : 0xfffff980`11a04ee0
    fffff880`097016a0 fffffa80`05f9ba20 : fffffa80`0734c260 00000000`00000000 fffff880`097016f0 fffff880`097016e0 : 0x2
    fffff880`097016a8 fffffa80`0734c260 : 00000000`00000000 fffff880`097016f0 fffff880`097016e0 00000000`00000000 : 0xfffffa80`05f9ba20
    fffff880`097016b0 00000000`00000000 : fffff880`097016f0 fffff880`097016e0 00000000`00000000 fffff980`11bf0ea0 : 0xfffffa80`0734c260
    
    
    STACK_COMMAND:  kb
    
    SYMBOL_STACK_INDEX:  9
    
    SYMBOL_NAME:  atdcm64a+2432
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: atdcm64a
    
    IMAGE_NAME:  atdcm64a.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a43f28f
    
    FAILURE_BUCKET_ID:  X64_0xc9_20e_VRF_atdcm64a+2432
    
    BUCKET_ID:  X64_0xc9_20e_VRF_atdcm64a+2432
    
    Followup: MachineOwner
    ---------
    
    3: kd> lmvm atdcm64a
    start             end                 module name
    fffff880`076ec000 fffff880`076f6000   atdcm64a T (no symbols)           
        Loaded symbol image file: atdcm64a.sys
        Image path: \??\C:\Users\Luke\Documents\AMD_Chipset_V51010008V13049_XPVistaWin7\Win 7\Bin64\atdcm64a.sys
        Image name: atdcm64a.sys
        Timestamp:        Fri Jun 26 00:56:31 2009 (4A43F28F)
        CheckSum:         0000B83F
        ImageSize:        0000A000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101410-16099-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a4a000 PsLoadedModuleList = 0xfffff800`02c87e50
    Debug session time: Thu Oct 14 17:02:45.128 2010 (GMT-5)
    System Uptime: 0 days 0:02:34.907
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................
    Loading User Symbols
    Loading unloaded module list
    ....................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {fffff8a0022fcfe0, 2, 0, fffff8800618e26d}
    
    Unable to load image \SystemRoot\system32\DRIVERS\RzSynapse.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for RzSynapse.sys
    *** ERROR: Module load completed but symbols could not be loaded for RzSynapse.sys
    Probably caused by : RzSynapse.sys ( RzSynapse+426d )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: fffff8a0022fcfe0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800618e26d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf20e0
     fffff8a0022fcfe0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    RzSynapse+426d
    fffff880`0618e26d 833804          cmp     dword ptr [rax],4
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002dfd240 -- (.trap 0xfffff88002dfd240)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8a0022fcfe0 rbx=0000000000000000 rcx=fffffa8006ddd270
    rdx=fffff88002dfd370 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800618e26d rsp=fffff88002dfd3d0 rbp=fffffa8004aab390
     r8=0000057ff9222de8  r9=000000000000100a r10=fffffa80064b14f0
    r11=fffff88002dfd388 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    RzSynapse+0x426d:
    fffff880`0618e26d 833804          cmp     dword ptr [rax],4 ds:d3d0:fffff8a0`022fcfe0=00000002
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ab9ca9 to fffff80002aba740
    
    STACK_TEXT:  
    fffff880`02dfd0f8 fffff800`02ab9ca9 : 00000000`0000000a fffff8a0`022fcfe0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02dfd100 fffff800`02ab8920 : fffff880`02dd9f40 fffffa80`0713ff00 00000202`0018002b 00000000`80000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02dfd240 fffff880`0618e26d : fffffa80`06ddd270 fffffa80`0713ff00 fffffa80`0713ff00 0000057f`f8ec01e8 : nt!KiPageFault+0x260
    fffff880`02dfd3d0 fffffa80`06ddd270 : fffffa80`0713ff00 fffffa80`0713ff00 0000057f`f8ec01e8 0000057f`fb97f0a8 : RzSynapse+0x426d
    fffff880`02dfd3d8 fffffa80`0713ff00 : fffffa80`0713ff00 0000057f`f8ec01e8 0000057f`fb97f0a8 fffff880`0618e09b : 0xfffffa80`06ddd270
    fffff880`02dfd3e0 fffffa80`0713ff00 : 0000057f`f8ec01e8 0000057f`fb97f0a8 fffff880`0618e09b 0000057f`fb554fd8 : 0xfffffa80`0713ff00
    fffff880`02dfd3e8 0000057f`f8ec01e8 : 0000057f`fb97f0a8 fffff880`0618e09b 0000057f`fb554fd8 0000057f`fb554fd8 : 0xfffffa80`0713ff00
    fffff880`02dfd3f0 0000057f`fb97f0a8 : fffff880`0618e09b 0000057f`fb554fd8 0000057f`fb554fd8 05000000`014a0000 : 0x57f`f8ec01e8
    fffff880`02dfd3f8 fffff880`0618e09b : 0000057f`fb554fd8 0000057f`fb554fd8 05000000`014a0000 00000000`00000000 : 0x57f`fb97f0a8
    fffff880`02dfd400 0000057f`fb554fd8 : 0000057f`fb554fd8 05000000`014a0000 00000000`00000000 00000000`00000000 : RzSynapse+0x409b
    fffff880`02dfd408 0000057f`fb554fd8 : 05000000`014a0000 00000000`00000000 00000000`00000000 fffff880`0618ffde : 0x57f`fb554fd8
    fffff880`02dfd410 05000000`014a0000 : 00000000`00000000 00000000`00000000 fffff880`0618ffde fffffa80`04af2de0 : 0x57f`fb554fd8
    fffff880`02dfd418 00000000`00000000 : 00000000`00000000 fffff880`0618ffde fffffa80`04af2de0 00000000`00000000 : 0x5000000`014a0000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    RzSynapse+426d
    fffff880`0618e26d 833804          cmp     dword ptr [rax],4
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  RzSynapse+426d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: RzSynapse
    
    IMAGE_NAME:  RzSynapse.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bceaef1
    
    FAILURE_BUCKET_ID:  X64_0xD1_VRF_RzSynapse+426d
    
    BUCKET_ID:  X64_0xD1_VRF_RzSynapse+426d
    
    Followup: MachineOwner
    ---------
    
    3: kd> lmvm RzSynapse
    start             end                 module name
    fffff880`0618a000 fffff880`061a2000   RzSynapse T (no symbols)           
        Loaded symbol image file: RzSynapse.sys
        Image path: \SystemRoot\system32\DRIVERS\RzSynapse.sys
        Image name: RzSynapse.sys
        Timestamp:        Wed Apr 21 10:53:21 2010 (4BCEAEF1)
        CheckSum:         0001A940
        ImageSize:        00018000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100910-18720-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a61000 PsLoadedModuleList = 0xfffff800`02c9ee50
    Debug session time: Sat Oct  9 03:43:00.130 2010 (GMT-5)
    System Uptime: 0 days 0:01:27.519
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {6535dd8, 2, 0, fffff88003fc45c4}
    
    Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for atikmdag.sys
    *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
    Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiExecuteMmIoFlip+98 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000006535dd8, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88003fc45c4, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d090e0
     0000000006535dd8 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    dxgmms1!VidSchiExecuteMmIoFlip+98
    fffff880`03fc45c4 8b8638040000    mov     eax,dword ptr [rsi+438h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002ffb160 -- (.trap 0xfffff88002ffb160)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88002ffb388 rbx=0000000000000000 rcx=fffff88002ffb5c8
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88003fc45c4 rsp=fffff88002ffb2f0 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=fffffa8006530000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    dxgmms1!VidSchiExecuteMmIoFlip+0x98:
    fffff880`03fc45c4 8b8638040000    mov     eax,dword ptr [rsi+438h] ds:0002:00000000`00000438=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ad0ca9 to fffff80002ad1740
    
    STACK_TEXT:  
    fffff880`02ffb018 fffff800`02ad0ca9 : 00000000`0000000a 00000000`06535dd8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02ffb020 fffff800`02acf920 : 00000000`00000000 00000000`00000014 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02ffb160 fffff880`03fc45c4 : 00000000`00040000 00000000`00000013 00000000`00000004 fffff880`02ff6000 : nt!KiPageFault+0x260
    fffff880`02ffb2f0 fffff880`03fc4a0e : fffffa80`05af3000 00000000`00000000 00000000`00000014 00000000`00000001 : dxgmms1!VidSchiExecuteMmIoFlip+0x98
    fffff880`02ffb610 fffff880`03fc1638 : fffffa80`05ba5410 fffffa80`060aa9f0 fffffa80`060a5010 fffff880`04871370 : dxgmms1!VidSchUnwaitFlipQueue+0x146
    fffff880`02ffb660 fffff880`03fc0e00 : 00000000`00000000 fffffa80`00000013 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiProcessDpcCompletedPacket+0x214
    fffff880`02ffb700 fffff880`03fc0c4c : fffffa80`06423b60 fffffa80`03a2b410 fffffa80`05ab98d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyDpcWorker+0x198
    fffff880`02ffb750 fffff880`03ec71cf : fffffa80`05123480 fffffa80`047fe1b0 fffffa80`047fe1b0 00000000`00000000 : dxgmms1!VidSchDdiNotifyDpc+0x94
    fffff880`02ffb7a0 fffff880`048613ec : fffffa80`047fe060 00000000`00000000 fffffa80`049d2010 fffff880`01994947 : dxgkrnl!DxgNotifyDpcCB+0x77
    fffff880`02ffb7d0 fffffa80`047fe060 : 00000000`00000000 fffffa80`049d2010 fffff880`01994947 fffffa80`00000001 : atikmdag+0x553ec
    fffff880`02ffb7d8 00000000`00000000 : fffffa80`049d2010 fffff880`01994947 fffffa80`00000001 fffff880`04871370 : 0xfffffa80`047fe060
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VidSchiExecuteMmIoFlip+98
    fffff880`03fc45c4 8b8638040000    mov     eax,dword ptr [rsi+438h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgmms1!VidSchiExecuteMmIoFlip+98
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578
    
    FAILURE_BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiExecuteMmIoFlip+98
    
    BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiExecuteMmIoFlip+98
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100810-15662-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a0c000 PsLoadedModuleList = 0xfffff800`02c49e50
    Debug session time: Fri Oct  8 15:39:25.362 2010 (GMT-5)
    System Uptime: 0 days 0:49:29.141
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff88008849d88, fffff880088495f0, fffff880010716ce}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsClearCancelRoutine+16 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff88008849d88
    Arg3: fffff880088495f0
    Arg4: fffff880010716ce
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff88008849d88 -- (.exr 0xfffff88008849d88)
    ExceptionAddress: fffff880010716ce (Ntfs!NtfsClearCancelRoutine+0x0000000000000016)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff880088495f0 -- (.cxr 0xfffff880088495f0)
    rax=0000000000000000 rbx=effffa80045eac10 rcx=fffff88002d63860
    rdx=0000000000000000 rsi=fffffa80049d05d0 rdi=fffff8800884a730
    rip=fffff880010716ce rsp=fffff88008849fc0 rbp=fffff8800884a980
     r8=fffffa8004a10e90  r9=0000000000000000 r10=fffff88002d63ca0
    r11=fffffa800442eae0 r12=fffff8a00019ab60 r13=fffffa80060c9190
    r14=fffff8a00019ad30 r15=fffff8a01180c300
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    Ntfs!NtfsClearCancelRoutine+0x16:
    fffff880`010716ce 48874368        xchg    rax,qword ptr [rbx+68h] ds:002b:effffa80`045eac78=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  firefox.exe
    
    CURRENT_IRQL:  2
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb40e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsClearCancelRoutine+16
    fffff880`010716ce 48874368        xchg    rax,qword ptr [rbx+68h]
    
    FAULTING_IP: 
    Ntfs!NtfsClearCancelRoutine+16
    fffff880`010716ce 48874368        xchg    rax,qword ptr [rbx+68h]
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from fffff880011203ab to fffff880010716ce
    
    STACK_TEXT:  
    fffff880`08849fc0 fffff880`011203ab : 00000000`2869bb01 fffffa80`03c34010 00000000`7646744e 00000000`000005d9 : Ntfs!NtfsClearCancelRoutine+0x16
    fffff880`08849ff0 fffff880`010fa5fa : fffff880`0884a730 fffff8a0`0019ab60 00000000`2869bb00 fffff880`00000101 : Ntfs!NtOfsPostNewLength+0x6b
    fffff880`0884a080 fffff880`0110ca07 : fffff880`0884a730 fffff880`0884a980 fffff880`0884a730 fffff8a0`0df6ba70 : Ntfs!NtfsCommitCurrentTransaction+0x22a
    fffff880`0884a110 fffff880`010fb98b : fffff8a0`0df6b940 fffff8a0`0f491710 fffff8a0`0019ab60 fffff8a0`0df6b940 : Ntfs!NtfsCheckpointCurrentTransaction+0x27
    fffff880`0884a140 fffff880`01069aa9 : fffff880`0884a628 fffff880`02acf670 fffff880`0884a690 fffff880`08839000 : Ntfs!NtfsCommonCleanup+0x135b
    fffff880`0884a550 fffff800`02a8be5a : fffff880`0884a690 fffff880`02b09c10 fffff8a0`0d742220 fffff800`02bb12dd : Ntfs!NtfsCommonCleanupCallout+0x19
    fffff880`0884a580 fffff880`01069662 : fffff880`01069a90 fffff880`0884a690 fffff880`0884a900 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`0884a660 fffff880`0110b244 : fffff880`0884a730 fffff880`0884a730 fffff880`0884a730 fffff8a0`0fb1a010 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
    fffff880`0884a6d0 fffff880`00fac23f : fffff880`0884a730 fffffa80`043cc530 fffffa80`043cc8d0 fffffa80`04431010 : Ntfs!NtfsFsdCleanup+0x144
    fffff880`0884a940 fffff880`00faa6df : fffffa80`048c9d90 00000000`00000000 fffffa80`0438e200 fffffa80`043cc530 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`0884a9d0 fffff800`02d92a0f : fffffa80`043cc530 fffffa80`06a9a740 00000000`00000000 fffffa80`04a27120 : fltmgr!FltpDispatch+0xcf
    fffff880`0884aa30 fffff800`02d78a24 : 00000000`00000000 fffffa80`06a9a740 fffffa80`048c9d00 fffffa80`06b30060 : nt!IopCloseFile+0x11f
    fffff880`0884aac0 fffff800`02d92501 : fffffa80`06a9a740 fffffa80`00000001 fffff8a0`07680c90 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
    fffff880`0884ab40 fffff800`02d92414 : 00000000`0000050c fffffa80`06a9a740 fffff8a0`07680c90 00000000`0000050c : nt!ObpCloseHandleTableEntry+0xb1
    fffff880`0884abd0 fffff800`02a7b993 : fffffa80`06b30060 fffff880`0884aca0 00000000`7ef71000 fffffa80`04a27120 : nt!ObpCloseHandle+0x94
    fffff880`0884ac20 00000000`772bfe4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`04a9e3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772bfe4a
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsClearCancelRoutine+16
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    STACK_COMMAND:  .cxr 0xfffff880088495f0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsClearCancelRoutine+16
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsClearCancelRoutine+16
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101410-32557-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a56000 PsLoadedModuleList = 0xfffff800`02c93e50
    Debug session time: Thu Oct 14 16:35:09.729 2010 (GMT-5)
    System Uptime: 0 days 0:00:43.508
    Loading Kernel Symbols
    ...............................................................
    .............................................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {ffffffffc0000005, fffff80002a74b6c, fffff880031a7fd8, fffff880031a7840}
    
    Probably caused by : cng.sys ( cng!GatherRandomKey+294 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002a74b6c, The address that the exception occurred at
    Arg3: fffff880031a7fd8, Exception Record Address
    Arg4: fffff880031a7840, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!ExpGetLookasideInformation+8c
    fffff800`02a74b6c 0fb742c0        movzx   eax,word ptr [rdx-40h]
    
    EXCEPTION_RECORD:  fffff880031a7fd8 -- (.exr 0xfffff880031a7fd8)
    Cannot read Exception record @ fffff880031a7fd8
    
    CONTEXT:  fffff880031a7840 -- (.cxr 0xfffff880031a7840)
    rax=0000000000000070 rbx=0000000000000ff4 rcx=fffff8800eea9b10
    rdx=effff880009ea880 rsi=0000000000000000 rdi=0000000000000001
    rip=fffff80002a74b6c rsp=fffff880031a8210 rbp=000000000000004d
     r8=fffff80002c6b720  r9=0000000000000000 r10=0000000000000000
    r11=0000fffffffff000 r12=fffff880031a82e0 r13=0000000000000000
    r14=000000000001fe90 r15=fffff880031a8840
    iopl=0         nv up ei ng nz na po cy
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
    nt!ExpGetLookasideInformation+0x8c:
    fffff800`02a74b6c 0fb742c0        movzx   eax,word ptr [rdx-40h] ds:002b:effff880`009ea840=????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  NULL_DEREFERENCE
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfe0e0
     0000000000000000 
    
    FOLLOWUP_IP: 
    cng!GatherRandomKey+294
    fffff880`01320b04 85c0            test    eax,eax
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from fffff80002dc47bb to fffff80002a74b6c
    
    STACK_TEXT:  
    fffff880`031a8210 fffff800`02dc47bb : 00000000`00000000 fffff800`00000ff4 fffff880`031a82e0 00000000`00000000 : nt!ExpGetLookasideInformation+0x8c
    fffff880`031a82a0 fffff800`02dc51e5 : fffff8a0`012c6170 00000000`00000000 00000000`00000004 00000000`00000000 : nt!ExpQuerySystemInformation+0x15bc
    fffff880`031a8640 fffff800`02ac5993 : fffff8a0`012e0000 fffff800`02ac493d 00000000`00000041 fffffa80`05606080 : nt!NtQuerySystemInformation+0x4d
    fffff880`031a8680 fffff800`02ac1f30 : fffff880`01320b04 00000000`00020000 fffff880`031a8844 fffff8a0`012c6148 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`031a8818 fffff880`01320b04 : 00000000`00020000 fffff880`031a8844 fffff8a0`012c6148 fffff800`02a2044e : nt!KiServiceLinkage
    fffff880`031a8820 fffff880`0132056d : fffffa80`05606080 00000000`00000000 fffff800`02c6b5f8 fffff800`02ad12a1 : cng!GatherRandomKey+0x294
    fffff880`031a8be0 fffff800`02dc2c5d : 00000000`00000000 fffff980`026c8fc0 fffff980`026c8fc0 fffffa80`039ffb60 : cng!scavengingWorkItemRoutine+0x3d
    fffff880`031a8c80 fffff800`02ad3961 : fffff800`02c6b500 fffff800`02dc2c20 fffffa80`039ffb60 00000000`00000000 : nt!IopProcessWorkItem+0x3d
    fffff880`031a8cb0 fffff800`02d6ac06 : 00000000`00000000 fffffa80`039ffb60 00000000`00000080 fffffa80`03988890 : nt!ExpWorkerThread+0x111
    fffff880`031a8d40 fffff800`02aa4c26 : fffff880`02f64180 fffffa80`039ffb60 fffff880`02f6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`031a8d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  cng!GatherRandomKey+294
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: cng
    
    IMAGE_NAME:  cng.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc814
    
    STACK_COMMAND:  .cxr 0xfffff880031a7840 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x7E_VRF_cng!GatherRandomKey+294
    
    BUCKET_ID:  X64_0x7E_VRF_cng!GatherRandomKey+294
    
    Followup: MachineOwner
    ---------
    
    3: kd> lmtn
    start             end                 module name
    fffff800`00bc9000 fffff800`00bd3000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
    fffff800`02a0d000 fffff800`02a56000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
    fffff800`02a56000 fffff800`03032000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
    fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
    fffff880`00ca4000 fffff880`00cb3000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00cbf000 fffff880`00ccc000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
    fffff880`00ccc000 fffff880`00ce0000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
    fffff880`00ce0000 fffff880`00d3e000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`00d3e000 fffff880`00dfe000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
    fffff880`00e00000 fffff880`00e10000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
    fffff880`00e10000 fffff880`00e2a000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00e2a000 fffff880`00e33000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`00e33000 fffff880`00e5d000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
    fffff880`00e5d000 fffff880`00e68000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
    fffff880`00e68000 fffff880`00eb4000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
    fffff880`00ebb000 fffff880`00f12000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
    fffff880`00f12000 fffff880`00f1b000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`00f1b000 fffff880`00f25000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
    fffff880`00f25000 fffff880`00f58000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`00f58000 fffff880`00f65000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
    fffff880`00f65000 fffff880`00f7a000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`00f7a000 fffff880`00f8f000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`00f8f000 fffff880`00feb000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
    fffff880`00feb000 fffff880`00ff2000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
    fffff880`01025000 fffff880`01039000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
    fffff880`01039000 fffff880`011dc000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
    fffff880`01200000 fffff880`0123a000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
    fffff880`0123a000 fffff880`01274000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
    fffff880`01274000 fffff880`0128a000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`012a1000 fffff880`012ff000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
    fffff880`012ff000 fffff880`01319000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
    fffff880`01319000 fffff880`0138c000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
    fffff880`0138c000 fffff880`0139d000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
    fffff880`0139d000 fffff880`013a7000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
    fffff880`013a7000 fffff880`013f3000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
    fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
    fffff880`014d5000 fffff880`014dd000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
    fffff880`014dd000 fffff880`014ef000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
    fffff880`014ef000 fffff880`014f8000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
    fffff880`014fc000 fffff880`015ee000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
    fffff880`01800000 fffff880`01811000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
    fffff880`01811000 fffff880`0182f000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
    fffff880`0182f000 fffff880`0183c000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
    fffff880`0183c000 fffff880`018c6000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`018ef000 fffff880`0191f000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`0191f000 fffff880`01927000   AtiPcie  AtiPcie.sys  Tue May 05 18:00:22 2009 (4A005486)
    fffff880`0195d000 fffff880`01987000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`01987000 fffff880`01990000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
    fffff880`01990000 fffff880`01997000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
    fffff880`01997000 fffff880`019a5000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
    fffff880`019a5000 fffff880`019ca000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
    fffff880`019ca000 fffff880`019da000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
    fffff880`019da000 fffff880`019e3000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`019e3000 fffff880`019ec000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`019ec000 fffff880`019f5000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
    fffff880`019f5000 fffff880`01a00000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
    fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
    fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
    fffff880`02c68000 fffff880`02c77000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
    fffff880`02c77000 fffff880`02c95000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
    fffff880`02c95000 fffff880`02ca6000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
    fffff880`02ca6000 fffff880`02cac000   AsUpIO   AsUpIO.sys   Mon Jul 06 05:21:38 2009 (4A515FB2)
    fffff880`02cac000 fffff880`02cb2000   AsIO     AsIO.sys     Mon Aug 03 10:03:16 2009 (4A768BB4)
    fffff880`02cb2000 fffff880`02cd8000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
    fffff880`02cd8000 fffff880`02ced000   amdppm   amdppm.sys   Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    fffff880`02cfd000 fffff880`02d42000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
    fffff880`02d42000 fffff880`02d4b000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`02d4b000 fffff880`02d71000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
    fffff880`02d71000 fffff880`02d80000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`02d80000 fffff880`02d9d000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
    fffff880`02d9d000 fffff880`02db8000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
    fffff880`02db8000 fffff880`02dcc000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
    fffff880`03e00000 fffff880`03e21000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
    fffff880`03e21000 fffff880`03e3b000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
    fffff880`03e3b000 fffff880`03e4a000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff880`03e4a000 fffff880`03e8d000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
    fffff880`03e8d000 fffff880`03e9f000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
    fffff880`03ec8000 fffff880`03f12000   atikmpag atikmpag.sys Thu Aug 26 04:20:56 2010 (4C75C178)
    fffff880`03f12000 fffff880`03f68000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
    fffff880`03f68000 fffff880`03f7e000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
    fffff880`03f7e000 fffff880`03fa2000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`03fa2000 fffff880`03fae000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
    fffff880`03fae000 fffff880`03fdd000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`03fdd000 fffff880`03ff8000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
    fffff880`04000000 fffff880`04046000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
    fffff880`04046000 fffff880`0406a000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
    fffff880`0406a000 fffff880`040a9000   Rt64win7 Rt64win7.sys Thu Aug 20 19:05:06 2009 (4A8D7432)
    fffff880`040a9000 fffff880`040b4000   usbohci  usbohci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
    fffff880`040b4000 fffff880`040c5000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
    fffff880`040c5000 fffff880`040c6480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
    fffff880`040cb000 fffff880`041bf000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
    fffff880`041bf000 fffff880`041dc000   parport  parport.sys  Tue Jul 14 03:00:40 2009 (4A5BCAA8)
    fffff880`041dc000 fffff880`041e4000   ASACPI   ASACPI.sys   Thu Jul 16 06:31:29 2009 (4A5E9F11)
    fffff880`041e4000 fffff880`041f3000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff880`041f3000 fffff880`041ff000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
    fffff880`04800000 fffff880`04810000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
    fffff880`04818000 fffff880`04fd3000   atikmdag atikmdag.sys Thu Aug 26 04:47:22 2010 (4C75C7AA)
    fffff880`04fd3000 fffff880`04ff1000   i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`04ff1000 fffff880`04ffa000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:31:02 2009 (4A5BC3B6)
    fffff880`05800000 fffff880`05818000   RzSynapse RzSynapse.sys Wed Apr 21 10:53:21 2010 (4BCEAEF1)
    fffff880`05818000 fffff880`05826000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
    fffff880`05826000 fffff880`05834000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
    fffff880`05834000 fffff880`05840000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`05840000 fffff880`05849000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`05849000 fffff880`0585c000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    fffff880`0585c000 fffff880`05868000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
    fffff880`05868000 fffff880`05876000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
    fffff880`058fa000 fffff880`05954000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
    fffff880`05954000 fffff880`05969000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
    fffff880`05969000 fffff880`05989000   AtihdW76 AtihdW76.sys Thu Jul 15 15:46:49 2010 (4C3F0339)
    fffff880`05989000 fffff880`059c6000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
    fffff880`059c6000 fffff880`059e8000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
    fffff880`059e8000 fffff880`059ed200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
    fffff880`059ee000 fffff880`059fb000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
    fffff880`06000000 fffff880`0601d000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
    fffff880`0601d000 fffff880`0601ef00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
    fffff880`0601f000 fffff880`0602d000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
    fffff880`0602d000 fffff880`06046000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
    fffff880`06046000 fffff880`0604e080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
    fffff880`0604f000 fffff880`061fd000   viahduaa viahduaa.sys Mon Jan 11 12:05:18 2010 (4B4AF7DE)
    fffff960`000d0000 fffff960`003df000   win32k   win32k.sys   unavailable (00000000)
    
    Unloaded modules:
    fffff880`01927000 fffff880`01935000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01935000 fffff880`01941000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01941000 fffff880`0194a000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0194a000 fffff880`0195d000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:09.
Find Us